IOC Report
hesaphareketi_1.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
hesaphareketi_1.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x5240ef93, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cbsBVT.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ch0lgdmz.2ec.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cle1hxl3.tk0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eckwbzzv.zhy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fllulnlq.3yr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fowbeh4v.1ik.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fvaj1xj5.uha.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hdbheqwd.wwo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kg4hvtwm.cu1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lfpezawh.b3z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nucdcpkm.i3z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sa4ndqpe.fl1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tz3wjugj.kkm.ps1
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\hesaphareketi_1.scr.exe
"C:\Users\user\Desktop\hesaphareketi_1.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"Powershell.exe" ??????????-??????????E??????????x??????????e??????????c??????????u??????????t??????????i??????????o??????????n??????????P??????????o??????????l??????????i??????????c??????????y?????????? ??????????B??????????y??????????p??????????a??????????s??????????s?????????? ??????????-??????????c??????????o??????????m??????????m??????????a??????????n??????????d ?????????C?????????o?????????p?????????y?????????-?????????I?????????t?????????e?????????m 'C:\Users\user\Desktop\hesaphareketi_1.scr.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
malicious
C:\Users\user\Desktop\hesaphareketi_1.scr.exe
"C:\Users\user\Desktop\hesaphareketi_1.scr.exe"
malicious
C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe
"C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"Powershell.exe" ??????????-??????????E??????????x??????????e??????????c??????????u??????????t??????????i??????????o??????????n??????????P??????????o??????????l??????????i??????????c??????????y?????????? ??????????B??????????y??????????p??????????a??????????s??????????s?????????? ??????????-??????????c??????????o??????????m??????????m??????????a??????????n??????????d ?????????C?????????o?????????p?????????y?????????-?????????I?????????t?????????e?????????m 'C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
malicious
C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe
"C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe"
malicious
C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe
"C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe"
malicious
C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe
"C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"Powershell.exe" ??????????-??????????E??????????x??????????e??????????c??????????u??????????t??????????i??????????o??????????n??????????P??????????o??????????l??????????i??????????c??????????y?????????? ??????????B??????????y??????????p??????????a??????????s??????????s?????????? ??????????-??????????c??????????o??????????m??????????m??????????a??????????n??????????d ?????????C?????????o?????????p?????????y?????????-?????????I?????????t?????????e?????????m 'C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
malicious
C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe
"C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe"
malicious
C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe
"C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe"
malicious
C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe
"C:\Users\user\AppData\Roaming\cbsBVT\cbsBVT.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://api.ipify.org/
104.26.13.205
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://sectigo.com/CPS0
unknown
http://ocsp.sectigo.com0-
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://g.live.com/odclientsettings/ProdV2/C:
unknown
https://api.ipify.org/t
unknown
https://github.com/sam210723/goesrecv-monitor/releases/latest
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
https://api.ipify.org
unknown
http://crl.microj
unknown
https://aka.ms/pscore6lB
unknown
http://crl.mi?
unknown
http://business29.web-hosting.com
unknown
https://vksdr.com/goesrecv-monitor
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://wdcp.mi
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ipify.org
104.26.13.205
business29.web-hosting.com
198.54.114.199

IPs

IP
Domain
Country
Malicious
198.54.114.199
business29.web-hosting.com
United States
104.26.13.205
api.ipify.org
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\hesaphareketi_1_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
cbsBVT
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cbsBVT_RASMANCS
FileDirectory
There are 21 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
319C000
trusted library allocation
page read and write
malicious
2F8C000
trusted library allocation
page read and write
malicious
31A4000
trusted library allocation
page read and write
malicious
2F94000
trusted library allocation
page read and write
malicious
3171000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
31BC000
trusted library allocation
page read and write
malicious
3191000
trusted library allocation
page read and write
malicious
2F61000
trusted library allocation
page read and write
malicious
44F9000
trusted library allocation
page read and write
malicious
31C4000
trusted library allocation
page read and write
malicious
8840000
trusted library allocation
page read and write
5010000
heap
page read and write
49FC000
stack
page read and write
1572000
trusted library allocation
page read and write
8560000
trusted library allocation
page read and write
6D50000
trusted library allocation
page execute and read and write
9B4747E000
unkown
page readonly
2E3E000
stack
page read and write
7014000
heap
page read and write
595D000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
2F1C000
trusted library allocation
page read and write
156D000
trusted library allocation
page execute and read and write
9B46CFE000
stack
page read and write
7920000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
161E000
stack
page read and write
5148000
trusted library allocation
page read and write
2F6E000
trusted library allocation
page read and write
712E000
stack
page read and write
790D000
stack
page read and write
1262000
heap
page read and write
775E000
stack
page read and write
693E000
stack
page read and write
70E0000
heap
page read and write
7670000
heap
page read and write
2BC0000
heap
page read and write
9B4607B000
stack
page read and write
122E000
heap
page read and write
1430000
heap
page read and write
680A000
heap
page read and write
5B0E000
stack
page read and write
9B46B7C000
stack
page read and write
1330000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
55EC000
stack
page read and write
31B0000
heap
page read and write
2F66000
trusted library allocation
page read and write
1490000
heap
page read and write
7430000
trusted library allocation
page read and write
1620000
heap
page read and write
31A0000
heap
page read and write
26D56490000
trusted library section
page readonly
593B000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
2880000
heap
page read and write
26D5ADC0000
remote allocation
page read and write
131B000
heap
page read and write
1740000
trusted library allocation
page read and write
7778000
heap
page read and write
147E000
heap
page read and write
30AF000
stack
page read and write
59E3000
heap
page read and write
8570000
heap
page read and write
5962000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
1456000
heap
page read and write
26D5565B000
heap
page read and write
5F10000
trusted library section
page readonly
43B0000
heap
page readonly
74D2000
heap
page read and write
5AD9000
trusted library allocation
page read and write
709C000
heap
page read and write
5F8C000
stack
page read and write
2EF0000
heap
page read and write
4F3E000
stack
page read and write
FE0000
trusted library allocation
page read and write
147C000
heap
page read and write
7FD40000
trusted library allocation
page execute and read and write
5A00000
heap
page read and write
311C000
stack
page read and write
29C5000
trusted library allocation
page read and write
315F000
trusted library allocation
page read and write
155D000
trusted library allocation
page execute and read and write
8610000
heap
page read and write
7F10000
trusted library allocation
page execute and read and write
7960000
trusted library allocation
page read and write
1564000
trusted library allocation
page read and write
4EFA000
stack
page read and write
4F7F000
trusted library allocation
page read and write
D7A000
stack
page read and write
8092000
heap
page read and write
683D000
stack
page read and write
4EDC000
trusted library allocation
page read and write
6ECE000
stack
page read and write
3120000
trusted library allocation
page read and write
125A000
stack
page read and write
16A8000
trusted library allocation
page read and write
83BD000
stack
page read and write
83F0000
trusted library allocation
page read and write
7F00000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
70AE000
stack
page read and write
2CE2000
trusted library allocation
page read and write
CCE000
stack
page read and write
3124000
trusted library allocation
page read and write
2F5E000
stack
page read and write
1690000
heap
page read and write
D00000
heap
page read and write
6FA0000
trusted library allocation
page read and write
2E50000
heap
page read and write
26D5AAF3000
heap
page read and write
40DA000
trusted library allocation
page read and write
34C0000
trusted library allocation
page read and write
8330000
trusted library allocation
page execute and read and write
3161000
trusted library allocation
page read and write
2E45000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
2E92000
trusted library allocation
page read and write
26D55540000
heap
page read and write
1680000
heap
page read and write
12E0000
heap
page read and write
531E000
stack
page read and write
2F5C000
heap
page read and write
13C0000
heap
page read and write
2ADF000
stack
page read and write
7E20000
heap
page read and write
9B45B7E000
unkown
page readonly
9B454CB000
stack
page read and write
7F498000
trusted library allocation
page execute and read and write
2FBE000
stack
page read and write
2CC4000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
6850000
trusted library allocation
page execute and read and write
5E28000
heap
page read and write
5D40000
heap
page read and write
148E000
stack
page read and write
34BF000
trusted library allocation
page read and write
1867000
trusted library allocation
page execute and read and write
2F7E000
stack
page read and write
817E000
stack
page read and write
6DBE000
stack
page read and write
26D55641000
heap
page read and write
672C000
heap
page read and write
4031000
trusted library allocation
page read and write
3979000
trusted library allocation
page read and write
6C3D000
stack
page read and write
67FD000
stack
page read and write
4370000
trusted library allocation
page read and write
71CE000
stack
page read and write
4BDE000
stack
page read and write
2EF6000
heap
page read and write
5570000
trusted library allocation
page execute and read and write
26D569A0000
trusted library allocation
page read and write
8400000
heap
page read and write
81E2000
trusted library allocation
page read and write
6EFE000
stack
page read and write
F63000
trusted library allocation
page read and write
63CE000
stack
page read and write
2F7A000
trusted library allocation
page read and write
12D0000
heap
page read and write
1657000
heap
page read and write
5F79000
trusted library allocation
page read and write
4B2B000
trusted library allocation
page read and write
6A3E000
stack
page read and write
7090000
trusted library allocation
page execute and read and write
4F10000
trusted library allocation
page read and write
4350000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
1862000
trusted library allocation
page read and write
8061000
heap
page read and write
5C20000
trusted library section
page read and write
78CE000
stack
page read and write
4E53000
trusted library allocation
page read and write
1597000
heap
page read and write
6455000
heap
page read and write
1256000
heap
page read and write
120E000
stack
page read and write
164E000
heap
page read and write
4997000
heap
page read and write
785E000
stack
page read and write
19DE000
stack
page read and write
717E000
stack
page read and write
5C61000
trusted library allocation
page read and write
2FFF000
stack
page read and write
5370000
heap
page read and write
1360000
trusted library allocation
page read and write
2CF7000
trusted library allocation
page execute and read and write
85B0000
trusted library allocation
page read and write
6D00000
heap
page read and write
6F60000
heap
page read and write
4CDE000
stack
page read and write
83ED000
trusted library allocation
page read and write
6F87000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
9B464FE000
stack
page read and write
70F1000
heap
page read and write
79AC000
trusted library allocation
page read and write
6C07000
trusted library allocation
page read and write
62BE000
stack
page read and write
26D5AB00000
heap
page read and write
27A0000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
7697000
heap
page read and write
D50000
heap
page read and write
5C7A000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
5ADE000
stack
page read and write
64CC000
stack
page read and write
6A2E000
stack
page read and write
6D4D000
stack
page read and write
5F90000
heap
page read and write
77D2000
heap
page read and write
1640000
trusted library allocation
page read and write
1200000
heap
page read and write
2537000
stack
page read and write
73B0000
trusted library allocation
page read and write
5AD1000
trusted library allocation
page read and write
5214000
trusted library allocation
page read and write
84B0000
heap
page read and write
79C0000
trusted library allocation
page read and write
5480000
heap
page read and write
31BA000
trusted library allocation
page read and write
26D5AB1D000
heap
page read and write
720D000
stack
page read and write
31D0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
1587000
trusted library allocation
page execute and read and write
84AE000
stack
page read and write
7042000
heap
page read and write
2F72000
trusted library allocation
page read and write
76E1000
heap
page read and write
73F0000
trusted library allocation
page read and write
71E0000
trusted library allocation
page execute and read and write
5C50000
heap
page execute and read and write
1880000
trusted library allocation
page read and write
34C5000
trusted library allocation
page read and write
26D5AC40000
trusted library allocation
page read and write
7FA7000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
5F30000
heap
page read and write
5E70000
heap
page read and write
1359000
stack
page read and write
861A000
heap
page read and write
156B000
stack
page read and write
3929000
trusted library allocation
page read and write
2E6B000
trusted library allocation
page read and write
1A50000
trusted library allocation
page read and write
8591000
heap
page read and write
D6F000
heap
page read and write
2E53000
heap
page read and write
26D5569F000
heap
page read and write
2D10000
trusted library allocation
page read and write
3F11000
trusted library allocation
page read and write
6A9B000
heap
page read and write
1660000
trusted library allocation
page read and write
34F1000
trusted library allocation
page read and write
77DE000
stack
page read and write
9B46D7E000
unkown
page readonly
7926000
trusted library allocation
page read and write
4E44000
trusted library allocation
page read and write
7EEE000
stack
page read and write
5E10000
heap
page read and write
813F000
stack
page read and write
6113000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
789F000
stack
page read and write
4410000
heap
page read and write
856A000
trusted library allocation
page read and write
287E000
stack
page read and write
3020000
heap
page execute and read and write
582C000
stack
page read and write
7071000
heap
page read and write
297B000
heap
page read and write
73A0000
trusted library allocation
page read and write
26D56460000
trusted library section
page readonly
26D5568D000
heap
page read and write
759E000
stack
page read and write
1605000
heap
page read and write
4980000
heap
page readonly
7420000
trusted library allocation
page read and write
735D000
stack
page read and write
5BDE000
stack
page read and write
30D4000
trusted library allocation
page read and write
11B3000
trusted library allocation
page execute and read and write
2BED000
stack
page read and write
4385000
trusted library allocation
page execute and read and write
5F99000
trusted library allocation
page read and write
9B46FFE000
unkown
page readonly
9B4647E000
unkown
page readonly
9B45F7E000
unkown
page readonly
8651000
heap
page read and write
2F11000
trusted library allocation
page read and write
8645000
heap
page read and write
1A20000
trusted library allocation
page execute and read and write
26D55600000
heap
page read and write
2E60000
heap
page read and write
9B4697E000
unkown
page readonly
12E7000
heap
page read and write
5630000
heap
page read and write
781E000
stack
page read and write
59DE000
stack
page read and write
7774000
heap
page read and write
54B0000
trusted library allocation
page read and write
7760000
heap
page read and write
27D0000
heap
page execute and read and write
4F13000
trusted library allocation
page read and write
5479000
trusted library allocation
page read and write
6FE2000
heap
page read and write
FC0000
heap
page read and write
25FD000
stack
page read and write
72EF000
stack
page read and write
7560000
heap
page read and write
14FD000
stack
page read and write
6BEA000
stack
page read and write
2D60000
trusted library allocation
page execute and read and write
4C5E000
stack
page read and write
1200000
trusted library allocation
page read and write
9B46C7E000
unkown
page readonly
4149000
trusted library allocation
page read and write
8437000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
5810000
heap
page execute and read and write
5B5E000
stack
page read and write
4910000
trusted library allocation
page read and write
1860000
trusted library allocation
page read and write
26D556FF000
heap
page read and write
1563000
trusted library allocation
page execute and read and write
5530000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
8830000
trusted library allocation
page execute and read and write
4FFE000
stack
page read and write
159C000
heap
page read and write
5BB9000
trusted library allocation
page read and write
599C000
stack
page read and write
8652000
heap
page read and write
2A23000
trusted library allocation
page read and write
59AE000
stack
page read and write
5942000
trusted library allocation
page read and write
82BE000
stack
page read and write
26D5AA41000
heap
page read and write
5A5C000
stack
page read and write
9B4707E000
unkown
page readonly
5790000
heap
page execute and read and write
9B468FE000
stack
page read and write
4354000
trusted library allocation
page read and write
28DC000
heap
page read and write
1560000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
780B000
heap
page read and write
13C0000
trusted library allocation
page execute and read and write
4AD1000
trusted library allocation
page read and write
2949000
trusted library allocation
page read and write
1150000
heap
page read and write
76F0000
trusted library allocation
page read and write
5A9E000
stack
page read and write
7EE50000
trusted library allocation
page execute and read and write
1386000
trusted library allocation
page execute and read and write
6D70000
trusted library allocation
page execute and read and write
2FF0000
heap
page read and write
F60000
trusted library allocation
page read and write
755F000
stack
page read and write
1210000
heap
page read and write
756E000
heap
page read and write
7050000
trusted library allocation
page read and write
5F71000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
5F91000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
596E000
stack
page read and write
57A6000
trusted library allocation
page read and write
26D55728000
heap
page read and write
7200000
trusted library allocation
page read and write
26D5AA4E000
heap
page read and write
7910000
trusted library allocation
page read and write
2F81000
trusted library allocation
page read and write
67A0000
heap
page read and write
7380000
heap
page read and write
78B0000
trusted library allocation
page read and write
9B4667E000
unkown
page readonly
11EB000
trusted library allocation
page execute and read and write
5C00000
heap
page read and write
4217000
trusted library allocation
page read and write
6A6E000
stack
page read and write
11CD000
trusted library allocation
page execute and read and write
6F8F000
stack
page read and write
1415000
heap
page read and write
89EE000
stack
page read and write
83E0000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
11F4000
heap
page read and write
7039000
heap
page read and write
6CBE000
stack
page read and write
75D0000
trusted library allocation
page read and write
72DE000
stack
page read and write
8210000
trusted library allocation
page read and write
76AF000
heap
page read and write
6D4E000
stack
page read and write
619E000
stack
page read and write
595C000
stack
page read and write
6116000
heap
page read and write
554E000
trusted library allocation
page read and write
1625000
heap
page read and write
4A3C000
stack
page read and write
26D5AC89000
trusted library allocation
page read and write
68FE000
stack
page read and write
731E000
stack
page read and write
4990000
heap
page read and write
692E000
stack
page read and write
7789000
heap
page read and write
199E000
stack
page read and write
5794000
heap
page read and write
512C000
stack
page read and write
8041000
heap
page read and write
26D556B3000
heap
page read and write
7EEC8000
trusted library allocation
page execute and read and write
50AE000
stack
page read and write
329B000
heap
page read and write
43A0000
trusted library allocation
page read and write
4E3E000
stack
page read and write
78F0000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
4166000
trusted library allocation
page read and write
26D55E02000
heap
page read and write
78E0000
trusted library allocation
page read and write
8022000
heap
page read and write
D8A000
heap
page read and write
313D000
trusted library allocation
page execute and read and write
5490000
heap
page read and write
6FF0000
heap
page read and write
4C55000
trusted library allocation
page read and write
4C90000
heap
page execute and read and write
26D55E15000
heap
page read and write
8658000
heap
page read and write
6F7E000
trusted library allocation
page read and write
3133000
trusted library allocation
page execute and read and write
435D000
trusted library allocation
page execute and read and write
316D000
trusted library allocation
page read and write
4A40000
trusted library allocation
page execute and read and write
291E000
stack
page read and write
6F4E000
stack
page read and write
744E000
stack
page read and write
6C7E000
stack
page read and write
4E6D000
trusted library allocation
page read and write
63FE000
stack
page read and write
6B6E000
stack
page read and write
4382000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
83D0000
trusted library allocation
page execute and read and write
2CEA000
trusted library allocation
page execute and read and write
9B4687E000
unkown
page readonly
4460000
heap
page execute and read and write
8049000
heap
page read and write
5AF9000
trusted library allocation
page read and write
25B0000
heap
page read and write
2F50000
trusted library allocation
page read and write
26D5ACF0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page execute and read and write
7025000
heap
page read and write
76E0000
heap
page execute and read and write
316E000
stack
page read and write
4DED000
trusted library allocation
page read and write
8043000
heap
page read and write
4DFB000
stack
page read and write
FD0000
unkown
page readonly
59C0000
trusted library allocation
page read and write
153E000
stack
page read and write
14F0000
heap
page read and write
2E8D000
trusted library allocation
page read and write
7900000
trusted library allocation
page read and write
294B000
trusted library allocation
page read and write
1210000
trusted library allocation
page execute and read and write
4F60000
heap
page execute and read and write
1392000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
7710000
heap
page read and write
1180000
heap
page read and write
57BE000
trusted library allocation
page read and write
49DE000
stack
page read and write
79B0000
trusted library allocation
page read and write
7019000
heap
page read and write
26D5ADC0000
remote allocation
page read and write
70EF000
stack
page read and write
7F0D000
trusted library allocation
page read and write
84CE000
stack
page read and write
2ED0000
heap
page read and write
555A000
trusted library allocation
page read and write
85D3000
heap
page read and write
1A1E000
stack
page read and write
7990000
trusted library allocation
page read and write
31A7000
heap
page read and write
6EBE000
stack
page read and write
52DE000
stack
page read and write
26D5AB0A000
heap
page read and write
6CF0000
trusted library allocation
page read and write
3A1A000
trusted library allocation
page read and write
9B4627B000
stack
page read and write
5B80000
heap
page read and write
BBE000
stack
page read and write
6E50000
trusted library allocation
page read and write
F4F000
stack
page read and write
7EF0000
heap
page read and write
13D0000
trusted library allocation
page read and write
1382000
trusted library allocation
page read and write
140B000
heap
page read and write
3196000
trusted library allocation
page read and write
30D3000
trusted library allocation
page execute and read and write
F6D000
trusted library allocation
page execute and read and write
157E000
heap
page read and write
7F480000
trusted library allocation
page execute and read and write
854E000
stack
page read and write
9B479FE000
stack
page read and write
5BFE000
stack
page read and write
5BB0000
trusted library allocation
page read and write
41DC000
trusted library allocation
page read and write
4360000
trusted library allocation
page read and write
6E8E000
stack
page read and write
4915000
trusted library allocation
page execute and read and write
3170000
heap
page readonly
317F000
trusted library allocation
page read and write
5624000
trusted library allocation
page read and write
57C1000
trusted library allocation
page read and write
FE4000
trusted library allocation
page read and write
70DD000
stack
page read and write
30FA000
trusted library allocation
page execute and read and write
8920000
trusted library allocation
page read and write
806F000
heap
page read and write
2D5E000
stack
page read and write
4089000
trusted library allocation
page read and write
7091000
heap
page read and write
51A0000
heap
page execute and read and write
7F798000
trusted library allocation
page execute and read and write
26D5AD70000
trusted library allocation
page read and write
7054000
heap
page read and write
86B2000
heap
page read and write
2CFB000
trusted library allocation
page execute and read and write
26D55E00000
heap
page read and write
3380000
trusted library allocation
page read and write
8661000
heap
page read and write
7661000
heap
page read and write
11C6000
heap
page read and write
8350000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
5AEE000
stack
page read and write
26D5AD00000
trusted library allocation
page read and write
6F60000
heap
page read and write
29C0000
heap
page read and write
30A0000
trusted library allocation
page execute and read and write
4C53000
trusted library allocation
page read and write
2CF2000
trusted library allocation
page read and write
6429000
trusted library allocation
page read and write
767F000
heap
page read and write
1553000
trusted library allocation
page execute and read and write
772A000
heap
page read and write
7370000
trusted library allocation
page execute and read and write
165C000
stack
page read and write
1670000
trusted library allocation
page read and write
26D5AABF000
heap
page read and write
59B0000
heap
page read and write
15CA000
heap
page read and write
5D1E000
stack
page read and write
8772000
trusted library allocation
page read and write
4E4B000
trusted library allocation
page read and write
6C70000
trusted library allocation
page execute and read and write
26D5AAEE000
heap
page read and write
7950000
trusted library allocation
page read and write
1260000
heap
page read and write
57C6000
trusted library allocation
page read and write
4D60000
heap
page read and write
7F7000
stack
page read and write
4E7F000
stack
page read and write
69D0000
heap
page execute and read and write
64BB000
stack
page read and write
4380000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
1A40000
trusted library allocation
page read and write
3237000
heap
page read and write
78D0000
trusted library allocation
page read and write
59A0000
trusted library section
page readonly
57A0000
trusted library allocation
page read and write
4369000
trusted library allocation
page read and write
8550000
heap
page read and write
26D55580000
trusted library section
page read and write
9B4737A000
stack
page read and write
702D000
stack
page read and write
8655000
heap
page read and write
83FE000
stack
page read and write
72CE000
stack
page read and write
586E000
stack
page read and write
1760000
heap
page read and write
F5D000
trusted library allocation
page execute and read and write
340E000
stack
page read and write
5499000
trusted library allocation
page read and write
732D000
stack
page read and write
7740000
heap
page read and write
6FE0000
heap
page execute and read and write
4E4E000
trusted library allocation
page read and write
2DE3000
heap
page read and write
41A8000
trusted library allocation
page read and write
26D5AA95000
heap
page read and write
1A60000
heap
page read and write
30B0000
trusted library allocation
page read and write
6BAD000
stack
page read and write
9B465FE000
stack
page read and write
65FE000
stack
page read and write
1843000
trusted library allocation
page read and write
34D0000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
26D55613000
heap
page read and write
DF3000
heap
page read and write
59FB000
stack
page read and write
9330000
heap
page read and write
769D000
heap
page read and write
75DE000
stack
page read and write
292F000
heap
page read and write
CD7000
heap
page read and write
FE6000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page execute and read and write
2F47000
trusted library allocation
page read and write
A60000
heap
page read and write
5FD7000
trusted library allocation
page read and write
7780000
trusted library allocation
page execute and read and write
2D70000
heap
page execute and read and write
26D5AA54000
heap
page read and write
4300000
heap
page read and write
1190000
heap
page read and write
556E000
stack
page read and write
1550000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
315A000
trusted library allocation
page execute and read and write
50C2000
trusted library allocation
page read and write
772E000
stack
page read and write
437A000
trusted library allocation
page execute and read and write
1228000
heap
page read and write
1890000
heap
page read and write
2F0E000
stack
page read and write
5820000
heap
page read and write
4C1E000
stack
page read and write
8649000
heap
page read and write
84D0000
trusted library allocation
page read and write
5013000
heap
page read and write
5780000
trusted library allocation
page execute and read and write
28E9000
heap
page read and write
9B4617E000
unkown
page readonly
7940000
trusted library allocation
page read and write
43C7000
heap
page read and write
281E000
stack
page read and write
4AFC000
stack
page read and write
8851000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
1641000
heap
page read and write
2FDC000
stack
page read and write
736A000
stack
page read and write
139B000
trusted library allocation
page execute and read and write
6CFD000
trusted library allocation
page read and write
306E000
stack
page read and write
1674000
trusted library allocation
page read and write
67EE000
stack
page read and write
899E000
stack
page read and write
34B0000
trusted library allocation
page read and write
26D55F1A000
heap
page read and write
7EAE000
stack
page read and write
729E000
stack
page read and write
77EA000
heap
page read and write
777C000
heap
page read and write
6C60000
trusted library allocation
page read and write
11B4000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
32EE000
stack
page read and write
26D5AD70000
trusted library allocation
page read and write
4F71000
trusted library allocation
page read and write
1417000
heap
page read and write
1370000
trusted library allocation
page read and write
3F39000
trusted library allocation
page read and write
5D50000
heap
page read and write
84FF000
stack
page read and write
11BA000
heap
page read and write
706B000
stack
page read and write
3ACC000
trusted library allocation
page read and write
302E000
heap
page read and write
68BE000
stack
page read and write
10F7000
stack
page read and write
69BE000
stack
page read and write
2FC0000
heap
page read and write
412A000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
6460000
heap
page read and write
156D000
trusted library allocation
page execute and read and write
84C0000
trusted library allocation
page execute and read and write
8380000
trusted library allocation
page read and write
26D55673000
heap
page read and write
7C62000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
26D5AC60000
trusted library allocation
page read and write
1A67000
heap
page read and write
5C82000
trusted library allocation
page read and write
73BE000
stack
page read and write
311E000
stack
page read and write
26D55F00000
heap
page read and write
4353000
trusted library allocation
page execute and read and write
26D5AAE8000
heap
page read and write
5A20000
trusted library allocation
page read and write
15DE000
stack
page read and write
70E0000
trusted library allocation
page read and write
26D5A9A0000
trusted library allocation
page read and write
8A8E000
stack
page read and write
2EC0000
trusted library allocation
page read and write
7080000
trusted library allocation
page execute and read and write
7390000
trusted library allocation
page read and write
2B0C000
stack
page read and write
834D000
trusted library allocation
page read and write
594E000
trusted library allocation
page read and write
5A10000
heap
page read and write
2BE8000
stack
page read and write
3181000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
497E000
stack
page read and write
26D5AC21000
trusted library allocation
page read and write
2973000
trusted library allocation
page read and write
5B36000
trusted library allocation
page read and write
DE0000
heap
page read and write
2DC0000
heap
page read and write
2F6B000
trusted library allocation
page read and write
6F0E000
stack
page read and write
5660000
heap
page read and write
702A000
heap
page read and write
73D0000
trusted library allocation
page read and write
2F68000
heap
page read and write
445E000
stack
page read and write
1650000
heap
page read and write
5E5E000
stack
page read and write
5AF1000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
5B1E000
stack
page read and write
66ED000
stack
page read and write
9B46EFE000
stack
page read and write
2B4D000
stack
page read and write
6E0F000
stack
page read and write
807F000
heap
page read and write
3F76000
trusted library allocation
page read and write
1856000
trusted library allocation
page execute and read and write
9B469FE000
stack
page read and write
4121000
trusted library allocation
page read and write
319A000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
1770000
heap
page read and write
9B463FE000
stack
page read and write
5320000
heap
page read and write
8410000
trusted library allocation
page execute and read and write
11B0000
trusted library allocation
page read and write
5566000
trusted library allocation
page read and write
11E7000
trusted library allocation
page execute and read and write
8812000
trusted library allocation
page read and write
1139000
stack
page read and write
1560000
trusted library allocation
page read and write
F76000
trusted library allocation
page execute and read and write
4E66000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
697E000
stack
page read and write
8340000
trusted library allocation
page read and write
283D000
stack
page read and write
2A27000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
44CB000
trusted library allocation
page read and write
11C3000
heap
page read and write
730E000
stack
page read and write
7370000
heap
page read and write
5C75000
trusted library allocation
page read and write
6FC0000
heap
page read and write
70D0000
heap
page read and write
26D5AAC6000
heap
page read and write
2975000
trusted library allocation
page read and write
8200000
trusted library allocation
page execute and read and write
5AAE000
stack
page read and write
2E64000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
26D5AC64000
trusted library allocation
page read and write
3000000
heap
page read and write
26D56450000
trusted library section
page readonly
F8B000
trusted library allocation
page execute and read and write
162C000
heap
page read and write
65AD000
stack
page read and write
6B7E000
stack
page read and write
6DFE000
stack
page read and write
5A80000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
846D000
stack
page read and write
6D10000
heap
page read and write
26D5AC91000
trusted library allocation
page read and write
1683000
heap
page read and write
138A000
trusted library allocation
page execute and read and write
3031000
trusted library allocation
page read and write
784E000
stack
page read and write
26D55460000
heap
page read and write
8430000
trusted library allocation
page read and write
26D5B000000
heap
page read and write
13F0000
heap
page read and write
6420000
trusted library allocation
page read and write
2A1F000
trusted library allocation
page read and write
1363000
trusted library allocation
page execute and read and write
9B46E79000
stack
page read and write
26D5ADC0000
remote allocation
page read and write
79F0000
trusted library allocation
page read and write
28B0000
heap
page read and write
7400000
trusted library allocation
page read and write
1623000
heap
page read and write
4A9D000
stack
page read and write
7685000
heap
page read and write
7081000
heap
page read and write
5B9D000
stack
page read and write
559E000
stack
page read and write
6A7E000
stack
page read and write
79E0000
trusted library allocation
page read and write
857F000
heap
page read and write
33F0000
heap
page read and write
6EFE000
stack
page read and write
15A0000
heap
page read and write
8637000
heap
page read and write
3100000
trusted library allocation
page read and write
3105000
trusted library allocation
page execute and read and write
9B4637E000
unkown
page readonly
4E5E000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
56B3000
trusted library allocation
page read and write
762C000
heap
page read and write
2E81000
trusted library allocation
page read and write
61D0000
heap
page read and write
2F8A000
trusted library allocation
page read and write
751E000
stack
page read and write
6B6E000
stack
page read and write
8221000
trusted library allocation
page read and write
10CA000
stack
page read and write
3188000
trusted library allocation
page read and write
157A000
trusted library allocation
page execute and read and write
66AE000
stack
page read and write
13B0000
trusted library allocation
page read and write
11C3000
trusted library allocation
page read and write
253D000
stack
page read and write
324F000
heap
page read and write
7610000
heap
page read and write
1B6F000
stack
page read and write
1576000
trusted library allocation
page execute and read and write
76B5000
heap
page read and write
57B2000
trusted library allocation
page read and write
312E000
stack
page read and write
31DC000
heap
page read and write
8612000
heap
page read and write
FD2000
unkown
page readonly
3134000
trusted library allocation
page read and write
1364000
trusted library allocation
page read and write
7E30000
trusted library allocation
page execute and read and write
9B46A7E000
unkown
page readonly
6478000
trusted library allocation
page read and write
59E0000
heap
page read and write
6A79000
heap
page read and write
3140000
trusted library allocation
page read and write
6F7F000
stack
page read and write
24FC000
stack
page read and write
555E000
trusted library allocation
page read and write
F54000
trusted library allocation
page read and write
45C8000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
4471000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
5615000
trusted library allocation
page read and write
2986000
heap
page read and write
8624000
heap
page read and write
307E000
stack
page read and write
44F1000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
1340000
heap
page read and write
6A40000
heap
page read and write
789D000
stack
page read and write
697E000
stack
page read and write
702E000
heap
page read and write
561C000
trusted library allocation
page read and write
8440000
heap
page read and write
1850000
trusted library allocation
page read and write
4C95000
heap
page execute and read and write
328B000
trusted library allocation
page read and write
59D0000
trusted library allocation
page execute and read and write
3168000
heap
page read and write
5DA0000
heap
page read and write
72B0000
heap
page read and write
2F60000
trusted library allocation
page read and write
6BDE000
stack
page read and write
788E000
stack
page read and write
8400000
heap
page read and write
650D000
stack
page read and write
7FAA000
trusted library allocation
page read and write
CE0000
heap
page read and write
11D6000
trusted library allocation
page execute and read and write
2992000
heap
page read and write
3121000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
9B4657E000
unkown
page readonly
2E86000
trusted library allocation
page read and write
164F000
trusted library allocation
page read and write
2952000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
137D000
trusted library allocation
page execute and read and write
26D5AC20000
trusted library allocation
page read and write
75F2000
heap
page read and write
26D5AC10000
trusted library allocation
page read and write
2E00000
heap
page read and write
1634000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
86C2000
heap
page read and write
440E000
stack
page read and write
55E0000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
77D0000
heap
page read and write
186B000
trusted library allocation
page execute and read and write
7060000
heap
page read and write
7980000
trusted library allocation
page read and write
26D56480000
trusted library section
page readonly
6122000
trusted library allocation
page read and write
75C0000
heap
page execute and read and write
5170000
heap
page read and write
27B0000
trusted library allocation
page read and write
2B1E000
stack
page read and write
6F9000
stack
page read and write
5980000
trusted library allocation
page read and write
6F3E000
stack
page read and write
1395000
trusted library allocation
page execute and read and write
1195000
heap
page read and write
D58000
heap
page read and write
556D000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
26D55F5B000
heap
page read and write
3120000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
B7E000
stack
page read and write
105A000
stack
page read and write
2F5D000
trusted library allocation
page read and write
26D55570000
trusted library allocation
page read and write
2DBC000
stack
page read and write
158B000
trusted library allocation
page execute and read and write
5E60000
heap
page read and write
598F000
stack
page read and write
1397000
trusted library allocation
page execute and read and write
26D55678000
heap
page read and write
2CF0000
trusted library allocation
page read and write
7642000
heap
page read and write
4141000
trusted library allocation
page read and write
34E0000
heap
page execute and read and write
2F7E000
trusted library allocation
page read and write
6BFD000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
5951000
trusted library allocation
page read and write
65BE000
stack
page read and write
1570000
heap
page read and write
2E7E000
trusted library allocation
page read and write
5C9E000
stack
page read and write
83F0000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
774D000
heap
page read and write
26D5AC50000
trusted library allocation
page read and write
2FE0000
heap
page execute and read and write
2B5E000
stack
page read and write
2CC0000
trusted library allocation
page read and write
5F45000
heap
page read and write
6119000
heap
page read and write
4E72000
trusted library allocation
page read and write
6E4E000
stack
page read and write
683F000
heap
page read and write
1159000
stack
page read and write
5D9F000
stack
page read and write
79D0000
trusted library allocation
page read and write
867F000
heap
page read and write
102C000
unkown
page readonly
5B9E000
stack
page read and write
3102000
trusted library allocation
page read and write
66FE000
stack
page read and write
8500000
trusted library allocation
page read and write
1A30000
heap
page read and write
3080000
heap
page read and write
83FF000
stack
page read and write
776F000
stack
page read and write
15D6000
heap
page read and write
1777000
heap
page read and write
77BC000
heap
page read and write
4039000
trusted library allocation
page read and write
5604000
trusted library allocation
page read and write
15B9000
heap
page read and write
809E000
heap
page read and write
30E0000
trusted library allocation
page read and write
850D000
stack
page read and write
1230000
heap
page read and write
185A000
trusted library allocation
page execute and read and write
5C72000
trusted library allocation
page read and write
26D56001000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
5CDE000
stack
page read and write
4A50000
heap
page execute and read and write
83BE000
stack
page read and write
5D3E000
stack
page read and write
26D556A4000
heap
page read and write
26D55694000
heap
page read and write
34BE000
trusted library allocation
page read and write
6CDE000
stack
page read and write
611A000
trusted library allocation
page read and write
77D4000
heap
page read and write
2FA0000
trusted library allocation
page read and write
4E61000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
9B4677C000
stack
page read and write
4AC0000
heap
page read and write
702E000
stack
page read and write
4930000
trusted library allocation
page read and write
12F0000
heap
page read and write
6A65000
heap
page read and write
28A0000
heap
page read and write
26D556B7000
heap
page read and write
693E000
stack
page read and write
13D0000
heap
page read and write
F87000
trusted library allocation
page execute and read and write
152E000
stack
page read and write
26D5568F000
heap
page read and write
2FAB000
heap
page read and write
7FE0000
heap
page read and write
5580000
trusted library allocation
page read and write
7F9E000
stack
page read and write
332C000
stack
page read and write
6494000
heap
page read and write
CD0000
heap
page read and write
30E9000
trusted library allocation
page read and write
521E000
stack
page read and write
F53000
trusted library allocation
page execute and read and write
1234000
heap
page read and write
7920000
trusted library allocation
page execute and read and write
6E60000
trusted library allocation
page read and write
6CFE000
stack
page read and write
BC5000
heap
page read and write
4186000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
1039000
stack
page read and write
1570000
heap
page read and write
531F000
stack
page read and write
13E8000
heap
page read and write
2CDD000
trusted library allocation
page execute and read and write
15D4000
heap
page read and write
6790000
heap
page read and write
6A1E000
stack
page read and write
1620000
trusted library allocation
page read and write
5D55000
heap
page read and write
27C0000
trusted library allocation
page read and write
7328000
heap
page read and write
1590000
heap
page read and write
78A0000
trusted library allocation
page read and write
26D5AC00000
trusted library allocation
page read and write
312C000
trusted library allocation
page read and write
57BA000
trusted library allocation
page read and write
26D5AB04000
heap
page read and write
8067000
heap
page read and write
765E000
stack
page read and write
157A000
heap
page read and write
3150000
trusted library allocation
page read and write
2B48000
stack
page read and write
5934000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
11DA000
trusted library allocation
page execute and read and write
7F780000
trusted library allocation
page execute and read and write
776E000
heap
page read and write
26D5AA00000
heap
page read and write
41A1000
trusted library allocation
page read and write
6AEB000
stack
page read and write
8570000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
75F0000
heap
page read and write
26D55F02000
heap
page read and write
6102000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
26D55F13000
heap
page read and write
3160000
heap
page read and write
2BAC000
stack
page read and write
30C0000
trusted library allocation
page read and write
33DE000
stack
page read and write
3198000
trusted library allocation
page read and write
55DE000
stack
page read and write
554B000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
13E0000
heap
page read and write
5471000
trusted library allocation
page read and write
27B5000
trusted library allocation
page read and write
2CC3000
trusted library allocation
page execute and read and write
7FA0000
trusted library allocation
page read and write
2EF0000
heap
page read and write
4F18000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
31B8000
trusted library allocation
page read and write
318D000
trusted library allocation
page read and write
827E000
stack
page read and write
7440000
trusted library allocation
page read and write
9B47A7E000
unkown
page readonly
7658000
heap
page read and write
57CD000
trusted library allocation
page read and write
F7A000
trusted library allocation
page execute and read and write
3370000
trusted library allocation
page execute and read and write
9B45D7E000
unkown
page readonly
6D0E000
stack
page read and write
F82000
trusted library allocation
page read and write
5620000
heap
page execute and read and write
26D56440000
trusted library section
page readonly
26D5AA58000
heap
page read and write
4C4F000
trusted library allocation
page read and write
6FB5000
heap
page read and write
6D57000
trusted library allocation
page read and write
6C50000
trusted library allocation
page execute and read and write
4D5D000
stack
page read and write
69D5000
heap
page execute and read and write
5F40000
heap
page read and write
87B1000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
4169000
trusted library allocation
page read and write
FB0000
trusted library allocation
page execute and read and write
7910000
trusted library allocation
page read and write
26D55DC1000
trusted library allocation
page read and write
11BD000
trusted library allocation
page execute and read and write
1345000
heap
page read and write
63BF000
stack
page read and write
26D56470000
trusted library section
page readonly
30DD000
trusted library allocation
page execute and read and write
57AB000
trusted library allocation
page read and write
3A91000
trusted library allocation
page read and write
547C000
stack
page read and write
14B0000
heap
page read and write
9B45A77000
stack
page read and write
31AF000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
8A30000
trusted library allocation
page read and write
5287000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page execute and read and write
3A56000
trusted library allocation
page read and write
6AAD000
stack
page read and write
8669000
heap
page read and write
BC0000
heap
page read and write
11C0000
heap
page read and write
5561000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
4D1F000
stack
page read and write
26D5ACF0000
trusted library allocation
page read and write
700F000
heap
page read and write
1190000
heap
page read and write
28A9000
heap
page read and write
6450000
heap
page read and write
593E000
trusted library allocation
page read and write
1582000
trusted library allocation
page read and write
5600000
heap
page read and write
6B90000
heap
page read and write
15A8000
heap
page read and write
7410000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
26D55713000
heap
page read and write
9120000
heap
page read and write
5586000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
26D55702000
heap
page read and write
7120000
trusted library allocation
page execute and read and write
7FB0000
heap
page read and write
85A0000
trusted library allocation
page read and write
14EF000
stack
page read and write
8790000
trusted library allocation
page execute and read and write
26D5562B000
heap
page read and write
2F20000
trusted library allocation
page read and write
6700000
heap
page read and write
30F0000
trusted library allocation
page read and write
26D5AD60000
trusted library allocation
page read and write
183E000
stack
page read and write
26D5567D000
heap
page read and write
89A0000
trusted library allocation
page read and write
4912000
trusted library allocation
page read and write
68FE000
stack
page read and write
26D56580000
trusted library allocation
page read and write
7F5E000
stack
page read and write
6FA0000
heap
page read and write
5760000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
2CCD000
trusted library allocation
page execute and read and write
57AE000
trusted library allocation
page read and write
843A000
trusted library allocation
page read and write
309E000
stack
page read and write
3130000
heap
page read and write
26D5AD50000
trusted library allocation
page read and write
26D55440000
heap
page read and write
5C30000
trusted library allocation
page execute and read and write
60D0000
heap
page read and write
6C00000
trusted library allocation
page read and write
70C0000
heap
page read and write
3010000
heap
page execute and read and write
716A000
stack
page read and write
2A1C000
trusted library allocation
page read and write
6F0F000
stack
page read and write
9B45C7E000
stack
page read and write
6D60000
trusted library allocation
page read and write
302A000
heap
page read and write
67F0000
heap
page read and write
8567000
trusted library allocation
page read and write
30ED000
stack
page read and write
8A2E000
stack
page read and write
4FC6000
trusted library allocation
page read and write
26D5AD80000
trusted library allocation
page read and write
6C7B000
stack
page read and write
5584000
trusted library allocation
page read and write
4EBE000
stack
page read and write
7EEB0000
trusted library allocation
page execute and read and write
1220000
heap
page read and write
779E000
stack
page read and write
163D000
heap
page read and write
55ED000
stack
page read and write
6470000
heap
page read and write
1840000
trusted library allocation
page read and write
2BD0000
heap
page read and write
27AF000
trusted library allocation
page read and write
2F30000
heap
page read and write
5420000
trusted library section
page readonly
7310000
heap
page read and write
39CA000
trusted library allocation
page read and write
1554000
trusted library allocation
page read and write
FF0000
heap
page read and write
6CF5000
trusted library allocation
page read and write
26D5AA1F000
heap
page read and write
5546000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
70B0000
heap
page execute and read and write
D40000
trusted library allocation
page read and write
5956000
trusted library allocation
page read and write
314C000
trusted library allocation
page read and write
6B2E000
stack
page read and write
2F9E000
stack
page read and write
DF0000
heap
page read and write
26D55DF0000
trusted library allocation
page read and write
2994000
heap
page read and write
7FC10000
trusted library allocation
page execute and read and write
6CBE000
stack
page read and write
1265000
heap
page read and write
336D000
stack
page read and write
532E000
heap
page read and write
7FC0000
trusted library allocation
page read and write
848E000
stack
page read and write
43C0000
heap
page read and write
3177000
trusted library allocation
page read and write
49E8000
trusted library allocation
page read and write
3B07000
trusted library allocation
page read and write
1198000
heap
page read and write
400000
remote allocation
page execute and read and write
26D55F1B000
heap
page read and write
11C7000
stack
page read and write
26D5AA2C000
heap
page read and write
31E8000
heap
page read and write
6D07000
trusted library allocation
page read and write
678E000
stack
page read and write
26D5AC50000
trusted library allocation
page read and write
4BAE000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
4880000
trusted library allocation
page read and write
1585000
trusted library allocation
page execute and read and write
7930000
trusted library allocation
page read and write
9B4727E000
unkown
page readonly
26D5AC20000
trusted library allocation
page read and write
57D2000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
748E000
stack
page read and write
6F73000
trusted library allocation
page read and write
30D0000
heap
page execute and read and write
6F17000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
6C4D000
stack
page read and write
4340000
trusted library allocation
page read and write
2DE0000
heap
page read and write
6ADE000
stack
page read and write
8420000
heap
page read and write
15B3000
heap
page read and write
2F8D000
trusted library allocation
page read and write
1440000
heap
page read and write
26D55627000
heap
page read and write
9B45E7C000
stack
page read and write
26D5AAFB000
heap
page read and write
5DB0000
trusted library section
page read and write
6E57000
trusted library allocation
page read and write
D7A000
heap
page read and write
8910000
trusted library allocation
page read and write
5180000
trusted library allocation
page execute and read and write
303E000
stack
page read and write
5790000
heap
page read and write
26D56340000
trusted library allocation
page read and write
2CE6000
trusted library allocation
page execute and read and write
33F8000
heap
page read and write
2FF6000
heap
page read and write
1597000
heap
page read and write
80A6000
heap
page read and write
4EC0000
heap
page read and write
6BDE000
stack
page read and write
11E2000
trusted library allocation
page read and write
26D5AB02000
heap
page read and write
136D000
trusted library allocation
page execute and read and write
866E000
heap
page read and write
26D5AA61000
heap
page read and write
6A5D000
heap
page read and write
29C6000
heap
page read and write
55E3000
trusted library allocation
page read and write
6FE5000
heap
page execute and read and write
9B4717B000
stack
page read and write
87A0000
trusted library allocation
page read and write
3921000
trusted library allocation
page read and write
6756000
heap
page read and write
113E000
stack
page read and write
693E000
stack
page read and write
184D000
trusted library allocation
page execute and read and write
13F5000
heap
page read and write
4923000
trusted library allocation
page read and write
There are 1312 hidden memdumps, click here to show them.