IOC Report
SecuriteInfo.com.Win32.RansomX-gen.10689.14408.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.RansomX-gen.10689.14408.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\daqfbrlrs.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.RansomX-gen.10689.14408.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\daqfbrlrs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0cb5rply.1ww.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0wlv3toi.kpe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2d3gj3of.5as.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5kbu4qdz.a3e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5sw5h1ng.spj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cghyq10q.2nt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dawxwi3q.gqo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hijtj5lh.y22.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j34w5dz1.jir.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_podiwm1z.zhp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pwuawfro.lj0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u0fbit1t.5cu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u0x15smu.bgw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_us53d3h5.pz0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vaucdwah.gnf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yypo0gur.ors.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Apr 21 12:22:56 2024, mtime=Sun Apr 21 12:22:56 2024, atime=Sun Apr 21 12:22:56 2024, length=89760, window=hide
dropped
C:\Users\user\AppData\Roaming\daqfbrlrs.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10689.14408.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10689.14408.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10689.14408.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10689.14408.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SecuriteInfo.com.Win32.RansomX-gen.10689.14408.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecuriteInfo.com.Win32.RansomX-gen.10689.14408.exe'
malicious
C:\Users\user\AppData\Roaming\daqfbrlrs.exe
"C:\Users\user\AppData\Roaming\daqfbrlrs.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
malicious
C:\Users\user\AppData\Roaming\daqfbrlrs.exe
"C:\Users\user\AppData\Roaming\daqfbrlrs.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Users\user\AppData\Roaming\daqfbrlrs.exe
"C:\Users\user\AppData\Roaming\daqfbrlrs.exe"
malicious
C:\Users\user\AppData\Roaming\daqfbrlrs.exe
"C:\Users\user\AppData\Roaming\daqfbrlrs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
91.92.248.52
malicious
http://5.34.182.232
unknown
http://5.34.182.232/sm/Pxgimjrvqqb.wav0I4
unknown
http://nuget.org/NuGet.exe
unknown
http://5.34.182.232/sm/Pxgimjrvqqb.wav
5.34.182.232
https://sectigo.com/CPS0
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.microsoft
unknown
http://crl.microsoftQ5;
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://github.com/mgravell/protobuf-net
unknown
http://5.34.182.232/sm/Pxgimjrvqqb.wav0I
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://github.com/Pester/Pester
unknown
http://crl.mi
unknown
https://github.com/mgravell/protobuf-neti
unknown
http://crl.micro
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
https://aka.ms/pscore6lB
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://crl.micronq
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 24 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
91.92.248.52
unknown
Bulgaria
malicious
5.34.182.232
unknown
Ukraine

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
daqfbrlrs
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
FileDirectory
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7231000
trusted library allocation
page read and write
malicious
3155000
trusted library allocation
page read and write
malicious
44D9000
trusted library allocation
page read and write
malicious
5257000
trusted library allocation
page read and write
malicious
5F80000
trusted library section
page read and write
malicious
4BD0000
trusted library allocation
page read and write
malicious
362B000
trusted library allocation
page read and write
malicious
337B000
trusted library allocation
page read and write
malicious
35D1000
trusted library allocation
page read and write
malicious
3247000
trusted library allocation
page read and write
malicious
3027000
trusted library allocation
page read and write
malicious
3656000
trusted library allocation
page read and write
malicious
65C0000
trusted library section
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
36D9000
trusted library allocation
page read and write
malicious
38B2000
trusted library allocation
page read and write
112D000
trusted library allocation
page execute and read and write
63C0000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
40F1000
trusted library allocation
page read and write
4F0E000
stack
page read and write
6480000
trusted library allocation
page read and write
14A0000
heap
page read and write
3073000
trusted library allocation
page execute and read and write
6512000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
86F7000
trusted library allocation
page read and write
8A70000
trusted library allocation
page read and write
712D000
stack
page read and write
7520000
heap
page read and write
5705000
trusted library allocation
page read and write
5CEE000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
8DBD000
stack
page read and write
6330000
trusted library allocation
page read and write
61C6000
trusted library allocation
page read and write
3250000
heap
page read and write
1214000
trusted library allocation
page read and write
3651000
trusted library allocation
page read and write
7889000
heap
page read and write
3120000
heap
page read and write
2D19000
trusted library allocation
page read and write
2D50000
heap
page read and write
884000
trusted library allocation
page read and write
115E000
heap
page read and write
55BD000
stack
page read and write
1330000
trusted library allocation
page read and write
3405000
trusted library allocation
page read and write
792D000
heap
page read and write
6475000
trusted library allocation
page read and write
7EE28000
trusted library allocation
page execute and read and write
8873000
trusted library allocation
page read and write
6249000
heap
page read and write
5CEE000
stack
page read and write
8C4D000
stack
page read and write
527C000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
F10000
heap
page read and write
61CE000
trusted library allocation
page read and write
310E000
stack
page read and write
71B6000
heap
page read and write
8853000
heap
page read and write
5DA0000
trusted library allocation
page read and write
5AFE000
stack
page read and write
2E29000
trusted library allocation
page read and write
3323000
heap
page read and write
7A20000
trusted library allocation
page read and write
8503000
heap
page read and write
8780000
trusted library allocation
page read and write
14DF000
heap
page read and write
2CB0000
heap
page read and write
29FC000
stack
page read and write
B20000
trusted library allocation
page execute and read and write
5D04000
trusted library allocation
page read and write
386E000
trusted library allocation
page read and write
521D000
trusted library allocation
page read and write
6720000
trusted library allocation
page read and write
74A7000
heap
page read and write
4650000
trusted library allocation
page read and write
5F6F000
stack
page read and write
4D0C000
stack
page read and write
2E1E000
stack
page read and write
883B000
heap
page read and write
6FA0000
trusted library allocation
page read and write
7919000
heap
page read and write
7148000
heap
page read and write
1360000
trusted library allocation
page read and write
B60000
heap
page read and write
1147000
trusted library allocation
page execute and read and write
6680000
trusted library allocation
page execute and read and write
78D9000
heap
page read and write
5FB8000
trusted library allocation
page read and write
81E1000
heap
page read and write
6200000
trusted library allocation
page read and write
2D70000
trusted library allocation
page execute and read and write
1367000
stack
page read and write
7BD0000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
1250000
heap
page read and write
8730000
trusted library allocation
page read and write
38D1000
trusted library allocation
page read and write
91F000
heap
page read and write
3533000
trusted library allocation
page read and write
4640000
trusted library allocation
page execute and read and write
33C0000
trusted library allocation
page read and write
2CEE000
stack
page read and write
F66000
heap
page read and write
2EB0000
heap
page execute and read and write
2B60000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
149E000
stack
page read and write
4E26000
trusted library allocation
page read and write
2DF0000
heap
page read and write
4ECB000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
5D20000
trusted library allocation
page read and write
2D80000
heap
page read and write
1192000
heap
page read and write
737F000
stack
page read and write
53AA000
trusted library allocation
page read and write
14E0000
heap
page read and write
2E40000
trusted library allocation
page read and write
A9F000
stack
page read and write
30A0000
trusted library allocation
page execute and read and write
8A4D000
stack
page read and write
364D000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
53F0000
heap
page read and write
4F50000
trusted library allocation
page execute and read and write
10D0000
heap
page read and write
7A3E000
stack
page read and write
4AA0000
heap
page execute and read and write
307D000
trusted library allocation
page execute and read and write
4DB0000
heap
page execute and read and write
66CE000
stack
page read and write
2CE0000
trusted library allocation
page read and write
4371000
trusted library allocation
page read and write
38B8000
trusted library allocation
page read and write
4500000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
61C0000
trusted library allocation
page read and write
341E000
stack
page read and write
6510000
trusted library allocation
page read and write
BA0000
heap
page read and write
529E000
stack
page read and write
7B4D000
stack
page read and write
33A1000
trusted library allocation
page read and write
309A000
trusted library allocation
page execute and read and write
AB7000
trusted library allocation
page execute and read and write
7BA0000
trusted library allocation
page read and write
30A2000
trusted library allocation
page read and write
546D000
stack
page read and write
875E000
stack
page read and write
5BFE000
stack
page read and write
8710000
heap
page read and write
5BED000
stack
page read and write
5DC0000
trusted library allocation
page read and write
7840000
trusted library allocation
page read and write
2BAE000
stack
page read and write
33EC000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
3410000
heap
page readonly
61D0000
trusted library allocation
page read and write
63BC000
stack
page read and write
362E000
trusted library allocation
page read and write
61E1000
trusted library allocation
page read and write
2F03000
trusted library allocation
page read and write
6F7000
stack
page read and write
7330000
trusted library allocation
page read and write
82AD000
trusted library allocation
page read and write
79CB000
trusted library allocation
page read and write
71EF000
heap
page read and write
30E8000
trusted library allocation
page read and write
33B4000
trusted library allocation
page read and write
3264000
trusted library allocation
page read and write
84EC000
heap
page read and write
8700000
trusted library allocation
page read and write
2B18000
heap
page read and write
1003000
trusted library allocation
page execute and read and write
65E0000
trusted library allocation
page read and write
74A9000
heap
page read and write
8A10000
trusted library allocation
page execute and read and write
1142000
trusted library allocation
page read and write
5FEE000
trusted library allocation
page read and write
735E000
stack
page read and write
7A7F000
stack
page read and write
6470000
trusted library allocation
page read and write
8290000
trusted library allocation
page execute and read and write
749B000
stack
page read and write
6ABD000
stack
page read and write
71C9000
stack
page read and write
5F7F000
stack
page read and write
6380000
trusted library allocation
page read and write
8A8000
heap
page read and write
3080000
trusted library allocation
page read and write
8C00000
trusted library allocation
page execute and read and write
5D55000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
87F0000
heap
page read and write
2CF0000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
71B3000
heap
page read and write
5FF2000
trusted library allocation
page read and write
7F230000
trusted library allocation
page execute and read and write
141B000
heap
page read and write
8290000
heap
page read and write
5D90000
trusted library allocation
page read and write
3258000
heap
page read and write
4E37000
heap
page read and write
7A27000
trusted library allocation
page read and write
8E7E000
stack
page read and write
5E61000
trusted library allocation
page read and write
4D5F000
stack
page read and write
74FE000
heap
page read and write
564F000
stack
page read and write
3E21000
trusted library allocation
page read and write
3360000
heap
page read and write
33C0000
trusted library allocation
page read and write
7F288000
trusted library allocation
page execute and read and write
33FF000
trusted library allocation
page read and write
3407000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
35EC000
trusted library allocation
page read and write
81DD000
heap
page read and write
790D000
heap
page read and write
82F0000
trusted library allocation
page execute and read and write
5FF2000
trusted library allocation
page read and write
83C0000
trusted library allocation
page execute and read and write
355B000
trusted library allocation
page read and write
2ED1000
trusted library allocation
page read and write
8454000
heap
page read and write
6190000
trusted library allocation
page read and write
3867000
trusted library allocation
page read and write
7B80000
trusted library allocation
page execute and read and write
7BC0000
trusted library allocation
page read and write
87E0000
trusted library allocation
page read and write
3092000
trusted library allocation
page read and write
340E000
trusted library allocation
page read and write
2D8C000
stack
page read and write
2CA0000
heap
page read and write
6D8A000
heap
page read and write
F9E000
stack
page read and write
3554000
trusted library allocation
page read and write
859F000
stack
page read and write
4DAE000
stack
page read and write
46BE000
stack
page read and write
7B0E000
stack
page read and write
13EF000
stack
page read and write
2BAF000
heap
page read and write
13E5000
heap
page read and write
6490000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
45F0000
trusted library allocation
page read and write
1226000
trusted library allocation
page execute and read and write
3420000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
111E000
stack
page read and write
2EF7000
trusted library allocation
page read and write
8680000
trusted library allocation
page read and write
7F80000
trusted library allocation
page execute and read and write
6180000
trusted library allocation
page read and write
8660000
trusted library allocation
page execute and read and write
60EE000
stack
page read and write
4459000
trusted library allocation
page read and write
65F0000
trusted library allocation
page execute and read and write
33BD000
trusted library allocation
page execute and read and write
389D000
trusted library allocation
page read and write
316E000
stack
page read and write
3263000
trusted library allocation
page execute and read and write
33E5000
trusted library allocation
page execute and read and write
7BB0000
trusted library allocation
page read and write
61EE000
stack
page read and write
458E000
stack
page read and write
4C73000
trusted library allocation
page read and write
82E0000
heap
page read and write
8E3F000
stack
page read and write
169E000
stack
page read and write
7B2D000
stack
page read and write
6489000
trusted library allocation
page read and write
317D000
stack
page read and write
57D7000
trusted library allocation
page read and write
8A1E000
stack
page read and write
871E000
stack
page read and write
3260000
trusted library allocation
page read and write
5295000
trusted library allocation
page read and write
7904000
heap
page read and write
35E7000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
6DCE000
stack
page read and write
10C3000
trusted library allocation
page execute and read and write
514A000
trusted library allocation
page read and write
2C39000
stack
page read and write
45FC000
stack
page read and write
6D0E000
stack
page read and write
72CA000
stack
page read and write
BB0000
heap
page read and write
3292000
trusted library allocation
page read and write
6A7F000
stack
page read and write
66D0000
trusted library allocation
page execute and read and write
77FE000
trusted library allocation
page read and write
1033000
heap
page read and write
728D000
stack
page read and write
353B000
trusted library allocation
page read and write
4DE0000
heap
page execute and read and write
90F000
heap
page read and write
6700000
trusted library allocation
page read and write
6BBE000
stack
page read and write
7942000
heap
page read and write
8070000
trusted library allocation
page execute and read and write
340B000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
6E8B000
stack
page read and write
7C30000
trusted library allocation
page read and write
5291000
trusted library allocation
page read and write
82AB000
trusted library allocation
page read and write
4E00000
heap
page read and write
6DC0000
heap
page read and write
FEA000
heap
page read and write
79CD000
trusted library allocation
page read and write
83D0000
trusted library allocation
page read and write
1530000
heap
page read and write
7A40000
heap
page execute and read and write
6FAE000
stack
page read and write
883000
trusted library allocation
page execute and read and write
62BD000
stack
page read and write
5E3E000
stack
page read and write
2C90000
heap
page read and write
1184000
heap
page read and write
724E000
stack
page read and write
4D6E000
stack
page read and write
607E000
stack
page read and write
89D9000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
823E000
heap
page read and write
6500000
trusted library allocation
page execute and read and write
78FB000
heap
page read and write
2FED000
trusted library allocation
page execute and read and write
342C000
trusted library allocation
page read and write
8B90000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
78EE000
heap
page read and write
74C0000
heap
page read and write
62C0000
trusted library allocation
page execute and read and write
33B0000
trusted library allocation
page read and write
6710000
trusted library allocation
page execute and read and write
64CD000
heap
page read and write
1150000
heap
page read and write
3287000
heap
page read and write
86CE000
stack
page read and write
50C7000
trusted library allocation
page read and write
69D0000
trusted library allocation
page execute and read and write
81D5000
heap
page read and write
2DCE000
stack
page read and write
795A000
heap
page read and write
590E000
stack
page read and write
6440000
trusted library allocation
page read and write
79EE000
stack
page read and write
6020000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
5CCF000
stack
page read and write
55BE000
stack
page read and write
45A8000
trusted library allocation
page read and write
4E99000
trusted library allocation
page read and write
3899000
trusted library allocation
page read and write
5FD9000
stack
page read and write
930000
heap
page read and write
3100000
trusted library allocation
page execute and read and write
31F0000
trusted library allocation
page execute and read and write
8107000
trusted library allocation
page read and write
6508000
trusted library allocation
page read and write
8BC0000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
4730000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
137B000
trusted library allocation
page execute and read and write
74BE000
stack
page read and write
3520000
trusted library allocation
page read and write
2FF9000
trusted library allocation
page read and write
8397000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
6E90000
heap
page read and write
5278000
trusted library allocation
page read and write
6480000
trusted library allocation
page read and write
7F70000
heap
page read and write
8BDE000
stack
page read and write
2FE0000
trusted library allocation
page read and write
11F4000
heap
page read and write
50C3000
trusted library allocation
page read and write
342A000
trusted library allocation
page read and write
3ED1000
trusted library allocation
page read and write
2E7E000
stack
page read and write
4C8E000
stack
page read and write
2EB0000
trusted library allocation
page read and write
2BAC000
heap
page read and write
3A0000
heap
page read and write
739F000
stack
page read and write
2E21000
trusted library allocation
page read and write
5273000
trusted library allocation
page read and write
6749000
trusted library allocation
page read and write
BD0000
heap
page read and write
5E5E000
stack
page read and write
81E5000
heap
page read and write
2F19000
heap
page read and write
2D10000
trusted library allocation
page read and write
3B0000
heap
page read and write
7C50000
trusted library allocation
page read and write
834D000
stack
page read and write
4DB0000
heap
page execute and read and write
1362000
trusted library allocation
page read and write
793C000
heap
page read and write
5EDA000
stack
page read and write
64A0000
heap
page read and write
5BC2000
trusted library allocation
page read and write
6D20000
trusted library allocation
page execute and read and write
1120000
trusted library allocation
page read and write
6F60000
trusted library allocation
page execute and read and write
81B0000
heap
page read and write
328A000
trusted library allocation
page execute and read and write
5D80000
trusted library allocation
page read and write
3090000
trusted library allocation
page execute and read and write
78DD000
heap
page read and write
4CC0000
trusted library allocation
page read and write
78E7000
heap
page read and write
2B2D000
trusted library allocation
page execute and read and write
83B2000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
FE1000
heap
page read and write
2FE4000
trusted library allocation
page read and write
5D3E000
stack
page read and write
700F000
stack
page read and write
3312000
heap
page read and write
3060000
heap
page read and write
824D000
heap
page read and write
1158000
heap
page read and write
38CF000
trusted library allocation
page read and write
38BD000
trusted library allocation
page read and write
5A4E000
stack
page read and write
F5E000
stack
page read and write
8100000
trusted library allocation
page read and write
844C000
heap
page read and write
8A20000
trusted library allocation
page read and write
2EAE000
stack
page read and write
5D26000
trusted library allocation
page read and write
35FA000
trusted library allocation
page read and write
8C23000
trusted library allocation
page read and write
2D00000
heap
page read and write
7A90000
trusted library allocation
page read and write
FA0000
heap
page read and write
5FE4000
trusted library allocation
page read and write
875D000
stack
page read and write
53B4000
trusted library allocation
page read and write
FDD000
heap
page read and write
F26000
heap
page read and write
3FB9000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
2B88000
heap
page read and write
3428000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
31BE000
stack
page read and write
6550000
trusted library allocation
page execute and read and write
35D7000
trusted library allocation
page read and write
4B2E000
stack
page read and write
153E000
heap
page read and write
6740000
trusted library allocation
page read and write
55C0000
heap
page execute and read and write
6D8A000
stack
page read and write
3012000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
74B0000
heap
page read and write
38D5000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
4F1E000
stack
page read and write
4B60000
heap
page read and write
2EE8000
heap
page read and write
D3E000
stack
page read and write
6410000
trusted library allocation
page read and write
315F000
trusted library allocation
page read and write
84E000
stack
page read and write
87E2000
heap
page read and write
7483000
heap
page read and write
7BC0000
trusted library allocation
page read and write
5D2E000
stack
page read and write
71FE000
stack
page read and write
855E000
stack
page read and write
7810000
trusted library allocation
page read and write
4FBE000
stack
page read and write
88A8000
heap
page read and write
2B10000
heap
page read and write
77D0000
trusted library allocation
page execute and read and write
B1E000
stack
page read and write
3279000
trusted library allocation
page read and write
33D5000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
81D9000
heap
page read and write
3199000
trusted library allocation
page read and write
336E000
stack
page read and write
3889000
trusted library allocation
page read and write
5071000
trusted library allocation
page read and write
89C0000
trusted library allocation
page execute and read and write
5FE6000
trusted library allocation
page read and write
2B4B000
trusted library allocation
page execute and read and write
3884000
trusted library allocation
page read and write
3490000
heap
page read and write
5118000
trusted library allocation
page read and write
3269000
heap
page read and write
7A1E000
stack
page read and write
261B000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
7901000
heap
page read and write
4D1E000
stack
page read and write
326C000
heap
page read and write
327A000
heap
page read and write
88C5000
heap
page read and write
8C3000
heap
page read and write
84E6000
heap
page read and write
7C4F000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
71BE000
stack
page read and write
10C4000
trusted library allocation
page read and write
6D67000
heap
page read and write
30C0000
trusted library allocation
page read and write
6530000
trusted library allocation
page execute and read and write
55E3000
trusted library allocation
page read and write
129E000
stack
page read and write
768E000
stack
page read and write
30C0000
heap
page read and write
6012000
trusted library allocation
page read and write
454E000
stack
page read and write
64F0000
trusted library allocation
page read and write
7130000
heap
page read and write
8610000
trusted library allocation
page read and write
6950000
trusted library allocation
page execute and read and write
89A2000
trusted library allocation
page read and write
EF7000
stack
page read and write
746E000
stack
page read and write
2EC1000
trusted library allocation
page read and write
3371000
trusted library allocation
page read and write
8DBE000
stack
page read and write
7A8E000
stack
page read and write
770E000
stack
page read and write
33F6000
trusted library allocation
page read and write
34A8000
heap
page read and write
74F0000
trusted library allocation
page read and write
6490000
trusted library allocation
page execute and read and write
35FC000
trusted library allocation
page read and write
7907000
heap
page read and write
33A0000
trusted library allocation
page read and write
5FD2000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
7194000
heap
page read and write
6350000
trusted library allocation
page read and write
326D000
trusted library allocation
page execute and read and write
B30000
trusted library allocation
page read and write
33DB000
trusted library allocation
page read and write
F59000
heap
page read and write
8800000
heap
page read and write
74D0000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
3096000
trusted library allocation
page execute and read and write
3210000
heap
page read and write
731B000
stack
page read and write
64F7000
heap
page read and write
5ABE000
stack
page read and write
2F10000
heap
page read and write
61CB000
trusted library allocation
page read and write
565F000
stack
page read and write
4AA5000
heap
page execute and read and write
3154000
trusted library allocation
page read and write
6520000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
8640000
trusted library allocation
page execute and read and write
772E000
stack
page read and write
1377000
trusted library allocation
page execute and read and write
2FD0000
trusted library allocation
page read and write
4856000
trusted library allocation
page read and write
3658000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
554F000
stack
page read and write
2B47000
trusted library allocation
page execute and read and write
3070000
trusted library allocation
page read and write
7F9D000
trusted library allocation
page read and write
743E000
stack
page read and write
3403000
trusted library allocation
page read and write
3490000
trusted library allocation
page execute and read and write
F1D000
trusted library allocation
page execute and read and write
261D000
trusted library allocation
page read and write
33D3000
trusted library allocation
page read and write
8650000
trusted library allocation
page read and write
6EA0000
heap
page read and write
860D000
trusted library allocation
page read and write
2E8E000
stack
page read and write
122A000
trusted library allocation
page execute and read and write
59BE000
stack
page read and write
3EC1000
trusted library allocation
page read and write
4F14000
trusted library allocation
page read and write
BC7000
stack
page read and write
8670000
trusted library allocation
page read and write
57FD000
stack
page read and write
8257000
heap
page read and write
551E000
trusted library allocation
page read and write
337C000
heap
page read and write
8010000
heap
page read and write
8C20000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
2D57000
heap
page read and write
8C9000
heap
page read and write
3240000
trusted library section
page read and write
2C40000
heap
page read and write
6001000
trusted library allocation
page read and write
77CD000
stack
page read and write
85F0000
trusted library allocation
page execute and read and write
3531000
trusted library allocation
page read and write
7F9B000
trusted library allocation
page read and write
366B000
trusted library allocation
page read and write
2D07000
heap
page read and write
883B000
heap
page read and write
8680000
heap
page read and write
8600000
trusted library allocation
page read and write
8A30000
trusted library allocation
page read and write
3428000
trusted library allocation
page read and write
8870000
trusted library allocation
page read and write
4670000
heap
page execute and read and write
6299000
heap
page read and write
5FC1000
trusted library allocation
page read and write
63E0000
heap
page read and write
6540000
trusted library allocation
page read and write
493C000
stack
page read and write
574E000
stack
page read and write
63B0000
trusted library allocation
page read and write
59BE000
stack
page read and write
78C0000
heap
page read and write
74D3000
heap
page read and write
85E0000
heap
page read and write
7870000
trusted library allocation
page read and write
557C000
trusted library allocation
page read and write
31EE000
stack
page read and write
73F0000
heap
page execute and read and write
3C5000
heap
page read and write
5FFE000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
1004000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
8C1F000
stack
page read and write
474E000
stack
page read and write
3634000
trusted library allocation
page read and write
3601000
trusted library allocation
page read and write
61E9000
trusted library allocation
page read and write
4F5D000
trusted library allocation
page read and write
42B9000
trusted library allocation
page read and write
113A000
trusted library allocation
page execute and read and write
8E3E000
stack
page read and write
3110000
heap
page read and write
5E7E000
stack
page read and write
48FC000
stack
page read and write
7989000
heap
page read and write
1740000
heap
page read and write
151F000
stack
page read and write
49EE000
stack
page read and write
8802000
heap
page read and write
38B6000
trusted library allocation
page read and write
6029000
trusted library allocation
page read and write
65A0000
trusted library allocation
page read and write
2C30000
trusted library allocation
page execute and read and write
5D6B000
trusted library allocation
page read and write
15FE000
stack
page read and write
30C7000
heap
page read and write
61B0000
trusted library allocation
page execute and read and write
5820000
heap
page execute and read and write
6E0E000
stack
page read and write
126C000
stack
page read and write
308D000
trusted library allocation
page execute and read and write
12E0000
heap
page read and write
7908000
heap
page read and write
2E0E000
stack
page read and write
6F6B000
stack
page read and write
747B000
stack
page read and write
8804000
heap
page read and write
5E69000
trusted library allocation
page read and write
F30000
heap
page read and write
86CE000
stack
page read and write
1136000
trusted library allocation
page execute and read and write
87AC000
heap
page read and write
E30000
heap
page read and write
3539000
trusted library allocation
page read and write
2CC0000
trusted library section
page read and write
AA6000
trusted library allocation
page execute and read and write
1020000
heap
page read and write
80AE000
stack
page read and write
72F0000
heap
page execute and read and write
72DD000
stack
page read and write
71CC000
heap
page read and write
7975000
heap
page read and write
5327000
trusted library allocation
page read and write
7EED0000
trusted library allocation
page execute and read and write
16FF000
stack
page read and write
3558000
trusted library allocation
page read and write
4E0D000
trusted library allocation
page read and write
89D000
stack
page read and write
8140000
trusted library allocation
page read and write
2B47000
heap
page read and write
31EE000
stack
page read and write
345E000
stack
page read and write
3F39000
trusted library allocation
page read and write
76CE000
stack
page read and write
7B40000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
4C7C000
stack
page read and write
800D000
stack
page read and write
5CFF000
trusted library allocation
page read and write
2CA4000
trusted library allocation
page read and write
4CCC000
stack
page read and write
5FEB000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
30A7000
trusted library allocation
page execute and read and write
74BB000
heap
page read and write
33BE000
trusted library allocation
page read and write
6FEE000
stack
page read and write
7952000
heap
page read and write
35B6000
trusted library allocation
page read and write
3230000
trusted library section
page read and write
2600000
heap
page execute and read and write
5BBE000
stack
page read and write
7370000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
12A0000
heap
page read and write
25DE000
stack
page read and write
5810000
trusted library allocation
page read and write
3040000
heap
page read and write
5B61000
trusted library allocation
page read and write
136A000
trusted library allocation
page execute and read and write
7C40000
trusted library allocation
page read and write
8808000
heap
page read and write
894000
trusted library allocation
page read and write
8279000
heap
page read and write
82B0000
trusted library allocation
page read and write
7947000
heap
page read and write
38B0000
trusted library allocation
page read and write
1770000
heap
page read and write
5BAE000
stack
page read and write
7928000
heap
page read and write
5B8F000
stack
page read and write
54AD000
trusted library allocation
page read and write
49A0000
heap
page read and write
6510000
trusted library allocation
page execute and read and write
18BF000
stack
page read and write
74C6000
heap
page read and write
3260000
heap
page read and write
67C8000
trusted library allocation
page read and write
1039000
heap
page read and write
7800000
trusted library allocation
page read and write
2619000
trusted library allocation
page read and write
774E000
stack
page read and write
85C000
stack
page read and write
83E0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
3440000
heap
page read and write
8A60000
trusted library allocation
page read and write
33DA000
trusted library allocation
page execute and read and write
5D2E000
trusted library allocation
page read and write
5077000
trusted library allocation
page read and write
80E000
stack
page read and write
FAC000
heap
page read and write
87A0000
trusted library allocation
page read and write
52E8000
trusted library allocation
page read and write
8482000
heap
page read and write
776E000
stack
page read and write
706A000
stack
page read and write
35E9000
trusted library allocation
page read and write
35E3000
trusted library allocation
page read and write
123B000
trusted library allocation
page execute and read and write
910000
heap
page read and write
3295000
trusted library allocation
page execute and read and write
5814000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
86FA000
trusted library allocation
page read and write
3638000
trusted library allocation
page read and write
4C9D000
trusted library allocation
page read and write
3865000
trusted library allocation
page read and write
880C000
heap
page read and write
73EE000
stack
page read and write
2EB8000
heap
page read and write
6209000
trusted library allocation
page read and write
3200000
heap
page execute and read and write
4AEE000
stack
page read and write
82A0000
trusted library allocation
page read and write
10CD000
trusted library allocation
page execute and read and write
594E000
stack
page read and write
2C50000
heap
page read and write
74C0000
trusted library allocation
page execute and read and write
4D0F000
stack
page read and write
3550000
trusted library allocation
page read and write
5E75000
trusted library allocation
page read and write
8A4F000
stack
page read and write
1390000
heap
page read and write
14E5000
heap
page read and write
13B0000
heap
page read and write
7860000
trusted library allocation
page read and write
633B000
trusted library allocation
page read and write
102E000
heap
page read and write
3424000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
4B50000
heap
page execute and read and write
774F000
stack
page read and write
7472000
heap
page read and write
2E83000
heap
page read and write
886F000
stack
page read and write
5D0E000
trusted library allocation
page read and write
2DC7000
stack
page read and write
882E000
stack
page read and write
8857000
heap
page read and write
7BB0000
trusted library allocation
page read and write
628C000
heap
page read and write
33EA000
trusted library allocation
page read and write
3468000
trusted library allocation
page read and write
1366000
trusted library allocation
page execute and read and write
5F5F000
stack
page read and write
8458000
heap
page read and write
66E0000
trusted library section
page read and write
6430000
trusted library allocation
page read and write
4550000
trusted library allocation
page read and write
C30000
heap
page read and write
2CE0000
trusted library allocation
page read and write
81D0000
heap
page read and write
5AAE000
stack
page read and write
3C0000
heap
page read and write
600D000
trusted library allocation
page read and write
71E0000
trusted library allocation
page execute and read and write
53B0000
trusted library allocation
page read and write
31AE000
stack
page read and write
7954000
heap
page read and write
66F0000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
43D9000
trusted library allocation
page read and write
414000
remote allocation
page execute and read and write
2E8E000
stack
page read and write
1372000
trusted library allocation
page read and write
7500000
heap
page read and write
5450000
heap
page execute and read and write
1132000
trusted library allocation
page read and write
79D0000
trusted library allocation
page execute and read and write
7936000
heap
page read and write
61D0000
trusted library allocation
page read and write
134D000
trusted library allocation
page execute and read and write
899000
stack
page read and write
52C7000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
141F000
stack
page read and write
5E10000
trusted library allocation
page read and write
2EF5000
trusted library allocation
page read and write
4761000
trusted library allocation
page read and write
2F1F000
heap
page read and write
61A0000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
4DD9000
stack
page read and write
5A6E000
stack
page read and write
5E6E000
stack
page read and write
61DE000
trusted library allocation
page read and write
81B4000
heap
page read and write
623A000
heap
page read and write
4E30000
heap
page read and write
557D000
stack
page read and write
ACB000
stack
page read and write
7360000
trusted library allocation
page read and write
2EB0000
heap
page read and write
5CFF000
stack
page read and write
2E3E000
stack
page read and write
61A0000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
35E5000
trusted library allocation
page read and write
3130000
trusted library allocation
page execute and read and write
129E000
stack
page read and write
8D6000
heap
page read and write
4BBE000
trusted library allocation
page read and write
3EF9000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
74F1000
heap
page read and write
3010000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
4DB5000
heap
page execute and read and write
2F23000
trusted library allocation
page read and write
76CE000
stack
page read and write
30AB000
trusted library allocation
page execute and read and write
70BE000
stack
page read and write
72E0000
heap
page execute and read and write
4ACE000
stack
page read and write
62D0000
trusted library allocation
page read and write
12D0000
heap
page read and write
7F248000
trusted library allocation
page execute and read and write
87FC000
heap
page read and write
7870000
heap
page read and write
4BD1000
trusted library allocation
page read and write
301E000
stack
page read and write
33F4000
trusted library allocation
page read and write
742F000
stack
page read and write
7BF0000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
4E22000
trusted library allocation
page read and write
5440000
heap
page execute and read and write
1137000
stack
page read and write
792F000
heap
page read and write
3556000
trusted library allocation
page read and write
6D60000
heap
page read and write
8679000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
30BE000
stack
page read and write
33D7000
trusted library allocation
page read and write
B40000
heap
page read and write
78F7000
heap
page read and write
8790000
trusted library allocation
page read and write
6B75000
heap
page execute and read and write
307E000
stack
page read and write
364F000
trusted library allocation
page read and write
6530000
trusted library allocation
page read and write
64C5000
heap
page read and write
8448000
heap
page read and write
2FB0000
trusted library section
page read and write
1700000
heap
page read and write
310E000
stack
page read and write
2ED0000
trusted library allocation
page execute and read and write
7C10000
trusted library allocation
page read and write
33CF000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
79AE000
stack
page read and write
71DC000
heap
page read and write
4E2A000
trusted library allocation
page read and write
8BD0000
trusted library allocation
page read and write
5BFE000
stack
page read and write
4399000
trusted library allocation
page read and write
2CAE000
stack
page read and write
61F5000
trusted library allocation
page read and write
8848000
heap
page read and write
6610000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
362C000
trusted library allocation
page read and write
2E80000
heap
page read and write
83D0000
trusted library allocation
page execute and read and write
49A0000
trusted library allocation
page read and write
2C8E000
stack
page read and write
5ABF000
stack
page read and write
8832000
heap
page read and write
557E000
trusted library allocation
page read and write
3882000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
867F000
trusted library allocation
page read and write
2E4E000
stack
page read and write
8296000
heap
page read and write
84F2000
heap
page read and write
3270000
trusted library allocation
page read and write
33B3000
trusted library allocation
page execute and read and write
879E000
stack
page read and write
4BFF000
trusted library allocation
page read and write
79BD000
heap
page read and write
1170000
heap
page read and write
70EB000
stack
page read and write
C14000
trusted library allocation
page read and write
4C4F000
trusted library allocation
page read and write
341E000
trusted library allocation
page read and write
305E000
stack
page read and write
33D0000
trusted library allocation
page read and write
8286000
heap
page read and write
32F3000
heap
page read and write
850000
heap
page read and write
778E000
stack
page read and write
5E00000
trusted library allocation
page read and write
2D10000
heap
page read and write
74A0000
heap
page read and write
30F1000
trusted library allocation
page read and write
745E000
stack
page read and write
57CE000
stack
page read and write
114B000
trusted library allocation
page execute and read and write
702E000
stack
page read and write
870E000
stack
page read and write
1237000
trusted library allocation
page execute and read and write
3110000
heap
page read and write
10C0000
trusted library allocation
page read and write
ABB000
trusted library allocation
page execute and read and write
14E2000
heap
page read and write
751A000
stack
page read and write
6730000
trusted library allocation
page read and write
33C0000
heap
page readonly
5E41000
trusted library allocation
page read and write
1425000
heap
page read and write
1750000
heap
page read and write
3869000
trusted library allocation
page read and write
64C9000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
6C8B000
stack
page read and write
5530000
heap
page read and write
35DF000
trusted library allocation
page read and write
71A7000
heap
page read and write
389F000
trusted library allocation
page read and write
4E66000
trusted library allocation
page read and write
8280000
heap
page read and write
7F270000
trusted library allocation
page execute and read and write
103C000
stack
page read and write
463C000
stack
page read and write
8020000
heap
page read and write
61D4000
trusted library allocation
page read and write
353D000
trusted library allocation
page read and write
7FA0000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
70FF000
stack
page read and write
3422000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
869D000
stack
page read and write
2D6E000
stack
page read and write
14D0000
heap
page read and write
5284000
trusted library allocation
page read and write
898D000
stack
page read and write
4E07000
heap
page read and write
6006000
trusted library allocation
page read and write
343B000
trusted library allocation
page read and write
3527000
trusted library allocation
page read and write
4E11000
trusted library allocation
page read and write
499E000
stack
page read and write
50F7000
trusted library allocation
page read and write
86DB000
stack
page read and write
8DFE000
stack
page read and write
5E43000
trusted library allocation
page read and write
8884000
heap
page read and write
839A000
trusted library allocation
page read and write
3886000
trusted library allocation
page read and write
1010000
heap
page read and write
2C80000
heap
page execute and read and write
2FE3000
trusted library allocation
page execute and read and write
79A3000
heap
page read and write
3341000
heap
page read and write
4CBC000
stack
page read and write
4D9E000
stack
page read and write
1018000
heap
page read and write
845C000
heap
page read and write
6D43000
trusted library allocation
page read and write
2ACE000
stack
page read and write
5FE5000
trusted library allocation
page read and write
7EEE8000
trusted library allocation
page execute and read and write
67C0000
trusted library allocation
page read and write
71BB000
heap
page read and write
8828000
heap
page read and write
916000
heap
page read and write
348E000
stack
page read and write
38CD000
trusted library allocation
page read and write
F63000
heap
page read and write
7987000
heap
page read and write
354E000
trusted library allocation
page read and write
35FE000
trusted library allocation
page read and write
3611000
trusted library allocation
page read and write
3535000
trusted library allocation
page read and write
6370000
trusted library allocation
page execute and read and write
5FE3000
trusted library allocation
page read and write
8BD3000
trusted library allocation
page read and write
73BD000
stack
page read and write
30E0000
heap
page execute and read and write
5FB4000
trusted library allocation
page read and write
70AE000
stack
page read and write
6E60000
trusted library allocation
page read and write
7A30000
trusted library allocation
page read and write
3117000
heap
page read and write
3050000
heap
page read and write
3090000
trusted library allocation
page read and write
4EC9000
trusted library allocation
page read and write
526F000
trusted library allocation
page read and write
2CD0000
heap
page read and write
323F000
stack
page read and write
4DF7000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
61C0000
trusted library allocation
page read and write
887C000
heap
page read and write
71CF000
heap
page read and write
720E000
stack
page read and write
770E000
stack
page read and write
5FE0000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
8D3D000
stack
page read and write
361D000
trusted library allocation
page read and write
519A000
trusted library allocation
page read and write
64AD000
heap
page read and write
65BB000
trusted library allocation
page read and write
716C000
heap
page read and write
46F0000
heap
page read and write
5B89000
trusted library allocation
page read and write
86D0000
heap
page read and write
8A5E000
stack
page read and write
77F0000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
34A0000
heap
page read and write
F20000
heap
page read and write
38AE000
trusted library allocation
page read and write
54F3000
trusted library allocation
page read and write
64C0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page execute and read and write
6490000
trusted library allocation
page execute and read and write
71AB000
heap
page read and write
7BE0000
trusted library allocation
page read and write
13B8000
heap
page read and write
6B3E000
stack
page read and write
5D2B000
trusted library allocation
page read and write
4CB6000
trusted library allocation
page read and write
74C4000
heap
page read and write
725E000
stack
page read and write
387C000
trusted library allocation
page read and write
3125000
heap
page read and write
7500000
trusted library allocation
page read and write
464E000
stack
page read and write
5D00000
trusted library allocation
page read and write
33EE000
trusted library allocation
page read and write
337F000
heap
page read and write
5E2E000
stack
page read and write
1210000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
30D7000
trusted library allocation
page read and write
17BE000
stack
page read and write
8A0000
heap
page read and write
32E7000
heap
page read and write
4EC5000
trusted library allocation
page read and write
52DE000
stack
page read and write
31B000
stack
page read and write
7489000
heap
page read and write
7400000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
56CE000
stack
page read and write
2FF0000
trusted library allocation
page read and write
4759000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
741A000
stack
page read and write
8213000
heap
page read and write
920000
heap
page read and write
87A0000
heap
page read and write
4E50000
trusted library allocation
page read and write
87DE000
stack
page read and write
733E000
stack
page read and write
4940000
trusted library allocation
page read and write
363B000
trusted library allocation
page read and write
89F2000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page execute and read and write
CAC000
stack
page read and write
87DC000
stack
page read and write
135D000
trusted library allocation
page execute and read and write
5E90000
heap
page read and write
383D000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
867E000
stack
page read and write
13CE000
heap
page read and write
5D06000
trusted library allocation
page read and write
35BD000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
FB0000
heap
page read and write
6534000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
14D4000
heap
page read and write
5E11000
trusted library allocation
page read and write
6792000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
50EF000
trusted library allocation
page read and write
1344000
trusted library allocation
page read and write
8DFD000
stack
page read and write
D62000
unkown
page readonly
3110000
trusted library allocation
page read and write
6CCE000
stack
page read and write
F38000
heap
page read and write
3070000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
5244000
trusted library allocation
page read and write
6620000
trusted library section
page read and write
2B32000
trusted library allocation
page read and write
6F2D000
stack
page read and write
810A000
trusted library allocation
page read and write
351A000
trusted library allocation
page read and write
300A000
trusted library allocation
page execute and read and write
144B000
heap
page read and write
341C000
trusted library allocation
page read and write
3140000
trusted library allocation
page execute and read and write
13DA000
heap
page read and write
118F000
heap
page read and write
4E6F000
trusted library allocation
page read and write
33BA000
trusted library allocation
page read and write
76AE000
stack
page read and write
120F000
stack
page read and write
8A0E000
stack
page read and write
109E000
stack
page read and write
6340000
trusted library allocation
page read and write
7A2A000
trusted library allocation
page read and write
2DCD000
stack
page read and write
597E000
stack
page read and write
55FE000
stack
page read and write
7873000
trusted library allocation
page read and write
6780000
trusted library allocation
page execute and read and write
87FF000
heap
page read and write
7373000
trusted library allocation
page read and write
8ACE000
stack
page read and write
33B8000
trusted library allocation
page read and write
F4E000
heap
page read and write
8642000
trusted library allocation
page read and write
131E000
stack
page read and write
81E9000
heap
page read and write
14AE000
heap
page read and write
4BD7000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
84FB000
heap
page read and write
2B42000
trusted library allocation
page read and write
4F96000
trusted library allocation
page read and write
2FC0000
trusted library section
page read and write
7530000
heap
page read and write
335E000
heap
page read and write
7B80000
trusted library allocation
page read and write
8440000
heap
page read and write
6308000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
6220000
heap
page read and write
74DE000
stack
page read and write
718E000
stack
page read and write
6620000
trusted library allocation
page read and write
6DB0000
heap
page read and write
6E4D000
stack
page read and write
721E000
stack
page read and write
7890000
trusted library allocation
page read and write
2B0E000
stack
page read and write
8444000
heap
page read and write
3030000
trusted library allocation
page read and write
7561000
heap
page read and write
860B000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
617D000
stack
page read and write
84B9000
heap
page read and write
3498000
heap
page read and write
8D7E000
stack
page read and write
4B4E000
stack
page read and write
339F000
heap
page read and write
73FB000
stack
page read and write
74E0000
trusted library allocation
page read and write
506E000
stack
page read and write
870000
trusted library allocation
page read and write
3537000
trusted library allocation
page read and write
71FA000
heap
page read and write
3EFF000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
563E000
stack
page read and write
7220000
trusted library allocation
page read and write
32B0000
heap
page read and write
38B4000
trusted library allocation
page read and write
7350000
trusted library allocation
page read and write
1046000
heap
page read and write
6500000
trusted library allocation
page read and write
8851000
heap
page read and write
6B70000
heap
page execute and read and write
2B30000
trusted library allocation
page read and write
7F6E000
stack
page read and write
4A6B000
stack
page read and write
58A2000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
12DD000
stack
page read and write
6D4E000
stack
page read and write
74FE000
stack
page read and write
353F000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
361B000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
6C4D000
stack
page read and write
7B90000
trusted library allocation
page read and write
5094000
trusted library allocation
page read and write
58B1000
trusted library allocation
page read and write
77D2000
heap
page read and write
2ECC000
stack
page read and write
6AF9000
stack
page read and write
7110000
heap
page execute and read and write
52A7000
trusted library allocation
page read and write
5198000
trusted library allocation
page read and write
74AD000
stack
page read and write
5891000
trusted library allocation
page read and write
5D43000
trusted library allocation
page read and write
89D0000
trusted library allocation
page read and write
74E9000
heap
page read and write
838F000
stack
page read and write
5A8E000
stack
page read and write
102E000
heap
page read and write
58A9000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
55F8000
trusted library allocation
page read and write
6750000
trusted library allocation
page execute and read and write
5E49000
trusted library allocation
page read and write
2B3A000
trusted library allocation
page execute and read and write
7933000
heap
page read and write
1010000
heap
page read and write
5DB0000
trusted library allocation
page read and write
81BC000
heap
page read and write
3F37000
trusted library allocation
page read and write
2D2E000
stack
page read and write
8630000
heap
page read and write
890000
trusted library allocation
page read and write
6180000
heap
page read and write
F15000
heap
page read and write
7F90000
trusted library allocation
page read and write
87A8000
heap
page read and write
8680000
heap
page read and write
2C4E000
stack
page read and write
62D2000
trusted library allocation
page read and write
6440000
trusted library allocation
page execute and read and write
58A5000
trusted library allocation
page read and write
4B0E000
stack
page read and write
2C70000
trusted library allocation
page read and write
4590000
heap
page readonly
4EBE000
stack
page read and write
33E2000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
80BE000
stack
page read and write
7ACE000
stack
page read and write
7100000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
557E000
stack
page read and write
73DD000
stack
page read and write
6210000
trusted library allocation
page read and write
6FC3000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
8D3B000
stack
page read and write
5557000
trusted library allocation
page read and write
806E000
stack
page read and write
87F6000
heap
page read and write
5D9B000
trusted library allocation
page read and write
1081000
heap
page read and write
6540000
heap
page read and write
D60000
unkown
page readonly
4500000
trusted library allocation
page read and write
7782000
heap
page read and write
4F40000
trusted library allocation
page execute and read and write
14C7000
heap
page read and write
4E41000
trusted library allocation
page read and write
2D78000
stack
page read and write
2DD0000
trusted library allocation
page read and write
2D32000
trusted library allocation
page read and write
648B000
trusted library allocation
page read and write
38D3000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
3636000
trusted library allocation
page read and write
330E000
heap
page read and write
72DF000
stack
page read and write
33D0000
heap
page read and write
4E67000
trusted library allocation
page read and write
4559000
trusted library allocation
page read and write
2D2A000
trusted library allocation
page execute and read and write
7AEE000
stack
page read and write
5BCE000
stack
page read and write
F13000
trusted library allocation
page execute and read and write
32DA000
heap
page read and write
3653000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
555E000
stack
page read and write
32B8000
heap
page read and write
3655000
trusted library allocation
page read and write
8860000
heap
page read and write
7BD0000
trusted library allocation
page read and write
10D5000
heap
page read and write
7B50000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
11D4000
heap
page read and write
64A0000
trusted library allocation
page read and write
587E000
stack
page read and write
6273000
heap
page read and write
B2B000
stack
page read and write
4978000
trusted library allocation
page read and write
714C000
heap
page read and write
2CD0000
trusted library section
page read and write
5E19000
trusted library allocation
page read and write
4FBE000
stack
page read and write
5790000
trusted library allocation
page read and write
4DF1000
trusted library allocation
page read and write
1050000
heap
page read and write
4E11000
trusted library allocation
page read and write
B50000
heap
page read and write
8940000
trusted library allocation
page execute and read and write
7AA0000
trusted library allocation
page execute and read and write
6300000
trusted library allocation
page read and write
33CD000
trusted library allocation
page read and write
5729000
trusted library allocation
page read and write
31FE000
stack
page read and write
555C000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
749D000
heap
page read and write
4C6B000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
87BC000
heap
page read and write
3065000
heap
page read and write
5DD0000
trusted library allocation
page execute and read and write
1343000
trusted library allocation
page execute and read and write
7241000
heap
page read and write
6030000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
72E0000
heap
page read and write
4BD0000
trusted library allocation
page read and write
40B9000
trusted library allocation
page read and write
2EDB000
heap
page read and write
1340000
trusted library allocation
page read and write
5FC8000
trusted library allocation
page read and write
778E000
stack
page read and write
67CC000
trusted library allocation
page read and write
88D1000
heap
page read and write
2DA0000
heap
page execute and read and write
7BA0000
trusted library allocation
page read and write
80FE000
stack
page read and write
2EF9000
trusted library allocation
page read and write
51EE000
stack
page read and write
2EC0000
heap
page read and write
89C9000
stack
page read and write
86E0000
trusted library allocation
page execute and read and write
7580000
trusted library allocation
page read and write
7454000
heap
page read and write
38BA000
trusted library allocation
page read and write
3015000
trusted library allocation
page execute and read and write
2B36000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
78E2000
heap
page read and write
4A2D000
stack
page read and write
49B0000
trusted library allocation
page read and write
3606000
trusted library allocation
page read and write
4D7D000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
3632000
trusted library allocation
page read and write
729E000
stack
page read and write
6600000
trusted library allocation
page read and write
76EF000
stack
page read and write
72F5000
heap
page execute and read and write
2DBC000
stack
page read and write
87B4000
heap
page read and write
81ED000
heap
page read and write
551C000
trusted library allocation
page read and write
583B000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
2CA0000
heap
page read and write
4E10000
heap
page execute and read and write
793A000
heap
page read and write
716B000
stack
page read and write
70AE000
stack
page read and write
559F000
trusted library allocation
page read and write
4F66000
trusted library allocation
page read and write
8300000
heap
page read and write
620B000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
3863000
trusted library allocation
page read and write
64E7000
trusted library allocation
page read and write
4C5C000
trusted library allocation
page read and write
825B000
heap
page read and write
65D0000
trusted library allocation
page read and write
2D3C000
stack
page read and write
8BE000
heap
page read and write
6D20000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
3604000
trusted library allocation
page read and write
2D35000
trusted library allocation
page execute and read and write
33F2000
trusted library allocation
page read and write
87B0000
heap
page read and write
6900000
trusted library allocation
page execute and read and write
6FCE000
stack
page read and write
141D000
heap
page read and write
7EE10000
trusted library allocation
page execute and read and write
33BC000
trusted library allocation
page read and write
5FE9000
trusted library allocation
page read and write
35E1000
trusted library allocation
page read and write
3480000
trusted library allocation
page execute and read and write
7430000
heap
page read and write
50D3000
trusted library allocation
page read and write
64E0000
trusted library allocation
page read and write
13E7000
heap
page read and write
4701000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
60AE000
stack
page read and write
DA7000
stack
page read and write
3074000
trusted library allocation
page read and write
2611000
trusted library allocation
page read and write
6553000
trusted library allocation
page read and write
6219000
trusted library allocation
page read and write
4E1D000
trusted library allocation
page read and write
F14000
trusted library allocation
page read and write
2EC9000
heap
page read and write
8CF0000
trusted library allocation
page execute and read and write
8824000
heap
page read and write
2CF3000
trusted library allocation
page execute and read and write
4B61000
trusted library allocation
page read and write
5D69000
trusted library allocation
page read and write
87A4000
heap
page read and write
AAA000
trusted library allocation
page execute and read and write
8A8E000
stack
page read and write
6FA4000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
1546000
heap
page read and write
30D0000
heap
page readonly
5D30000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
5157000
trusted library allocation
page read and write
580E000
stack
page read and write
58BF000
stack
page read and write
5FAE000
stack
page read and write
5D79000
trusted library allocation
page read and write
8D7B000
stack
page read and write
57B0000
heap
page read and write
5670000
heap
page execute and read and write
7B70000
trusted library allocation
page read and write
There are 1513 hidden memdumps, click here to show them.