IOC Report
Gm602axA2d.exe

loading gif

Files

File Path
Type
Category
Malicious
Gm602axA2d.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Office Installer.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\files\ver.txt
JSON data
dropped
malicious
C:\Users\user\AppData\Local\Vulvvmkewji.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Lxfrfbi.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Lxfrfbi.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Vulvvmkewji.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Office Installer.ini
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ay3543wj.qil.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lskegv2z.c5e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n4rmtvfp.sld.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_opfzmfn2.2st.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_svbcxkr5.zts.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uqqjhq24.eqg.ps1
ASCII text, with no line terminators
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Gm602axA2d.exe
"C:\Users\user\Desktop\Gm602axA2d.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGEAdgB6ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGIAdABkACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGoAcQBxACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHoAcwBqACMAPgA="
malicious
C:\Users\user\AppData\Local\Vulvvmkewji.exe
"C:\Users\user\AppData\Local\Vulvvmkewji.exe"
malicious
C:\Users\user\AppData\Local\Temp\Office Installer.exe
"C:\Users\user\AppData\Local\Temp\Office Installer.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -nop -command "& { (New-Object Net.WebClient).DownloadFile('https://mrodevicemgr.officeapps.live.com/mrodevicemgrsvc/api/v2/C2RReleaseData', 'C:\Users\user\AppData\Local\Temp\files\ver.txt') }"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
malicious
C:\Users\user\AppData\Roaming\Lxfrfbi.exe
"C:\Users\user\AppData\Roaming\Lxfrfbi.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
malicious
C:\Users\user\AppData\Roaming\Lxfrfbi.exe
"C:\Users\user\AppData\Roaming\Lxfrfbi.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\reg.exe
"reg.exe" add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Script Host\Settings" /v "Enabled" /t REG_DWORD /d 1 /f
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
5512.sytes.net
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.vmware.com/0
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://ocsp.thawte.com0
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
https://github.com/Pester/Pester
unknown
https://msfree.su/donaties/donations.html
unknown
https://github.com/mgravell/protobuf-neti
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://aka.ms/pscore6lB
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://oneget.org
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
windowsupdatebg.s.llnwi.net
208.111.186.128

IPs

IP
Domain
Country
Malicious
95.211.208.153
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Lxfrfbi
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Script Host\Settings
Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
33E3000
trusted library allocation
page read and write
malicious
7381000
trusted library allocation
page read and write
malicious
6E41000
trusted library allocation
page read and write
malicious
7751000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
6E91000
trusted library allocation
page read and write
malicious
5784000
trusted library allocation
page read and write
malicious
3479000
trusted library allocation
page read and write
malicious
4EF4000
trusted library allocation
page read and write
malicious
6501000
trusted library allocation
page read and write
malicious
6F31000
trusted library allocation
page read and write
malicious
50C4000
trusted library allocation
page read and write
malicious
7169000
trusted library allocation
page read and write
malicious
68F1000
trusted library allocation
page read and write
malicious
39F5000
trusted library allocation
page read and write
malicious
36F9000
trusted library allocation
page read and write
malicious
7701000
trusted library allocation
page read and write
malicious
77F1000
trusted library allocation
page read and write
malicious
7730000
trusted library section
page read and write
malicious
3C6D000
trusted library allocation
page read and write
malicious
3169000
trusted library allocation
page read and write
malicious
7A90000
trusted library section
page read and write
malicious
4C51000
trusted library allocation
page read and write
malicious
7A0F000
stack
page read and write
78F1000
trusted library allocation
page read and write
6951000
trusted library allocation
page read and write
39BA000
trusted library allocation
page read and write
3315000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
47CD000
trusted library allocation
page read and write
827E000
stack
page read and write
3457000
trusted library allocation
page read and write
2D3C000
stack
page read and write
8F39000
stack
page read and write
2B40161C000
trusted library allocation
page read and write
3414000
trusted library allocation
page read and write
2B400001000
trusted library allocation
page read and write
5237000
trusted library allocation
page execute and read and write
402000
unkown
page readonly
39AB000
trusted library allocation
page read and write
1340000
heap
page read and write
7FC0000
trusted library allocation
page read and write
33EF000
stack
page read and write
3BD7000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
14C7000
trusted library allocation
page execute and read and write
39D7000
trusted library allocation
page read and write
694C000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
3BEC000
trusted library allocation
page read and write
3678000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
3BAB000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
25350A72000
heap
page read and write
39A9000
trusted library allocation
page read and write
58E4000
heap
page read and write
40E000
remote allocation
page execute and read and write
332A000
trusted library allocation
page read and write
3258000
trusted library allocation
page read and write
3BF0000
trusted library allocation
page read and write
12F7000
stack
page read and write
2B46D4B0000
heap
page execute and read and write
597D000
trusted library allocation
page read and write
2B46B690000
trusted library allocation
page read and write
7FF6C80E9000
unkown
page write copy
310F000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
522A000
trusted library allocation
page execute and read and write
7FFD9BB80000
trusted library allocation
page read and write
5B00000
trusted library allocation
page execute and read and write
2FB2000
trusted library allocation
page read and write
89A4000
heap
page read and write
7A40000
trusted library allocation
page read and write
67CC000
stack
page read and write
7630000
trusted library allocation
page read and write
6F89000
trusted library allocation
page read and write
6987000
trusted library allocation
page read and write
31F7000
trusted library allocation
page read and write
91DE000
stack
page read and write
88C0000
trusted library allocation
page read and write
16DE000
stack
page read and write
3829000
trusted library allocation
page read and write
25352330000
heap
page read and write
4DAE000
stack
page read and write
7040000
trusted library allocation
page read and write
E1D0AF8000
stack
page read and write
7A20000
trusted library allocation
page execute and read and write
253525FE000
heap
page read and write
7038000
trusted library allocation
page read and write
55D5000
heap
page read and write
3030000
trusted library allocation
page read and write
3659000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
E20000
heap
page read and write
2FCB000
trusted library allocation
page read and write
253523E3000
heap
page read and write
3010000
trusted library allocation
page read and write
934B000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
5EF0000
heap
page execute and read and write
86AF000
stack
page read and write
6BC000
stack
page read and write
E1D0BF9000
stack
page read and write
3F6C000
stack
page read and write
FDB000
stack
page read and write
25350A72000
heap
page read and write
7260000
trusted library allocation
page read and write
7B7E000
stack
page read and write
696E000
stack
page read and write
19D6000
trusted library allocation
page execute and read and write
56E8000
trusted library allocation
page read and write
39BC000
trusted library allocation
page read and write
390E000
stack
page read and write
36F3000
trusted library allocation
page execute and read and write
7C00000
heap
page read and write
9340000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
312A000
trusted library allocation
page read and write
16E0000
heap
page read and write
695B000
trusted library allocation
page read and write
4B8D000
trusted library allocation
page read and write
406C000
stack
page read and write
2F9F000
trusted library allocation
page read and write
2B46D507000
heap
page execute and read and write
3427000
trusted library allocation
page read and write
78F7000
trusted library allocation
page read and write
8B31000
trusted library allocation
page read and write
7C5E000
stack
page read and write
D36000
trusted library allocation
page execute and read and write
7D40000
trusted library allocation
page read and write
7522000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
402000
unkown
page readonly
7D30000
trusted library allocation
page execute and read and write
2B401644000
trusted library allocation
page read and write
19E2000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
253525B0000
heap
page read and write
9410000
heap
page read and write
9B000
stack
page read and write
170E000
heap
page read and write
3869000
trusted library allocation
page read and write
1A8E000
heap
page read and write
7250000
trusted library allocation
page read and write
DB4000
heap
page read and write
7FFD9BA90000
trusted library allocation
page execute and read and write
32EF000
trusted library allocation
page read and write
53FE000
stack
page read and write
FD0000
heap
page read and write
1383000
trusted library allocation
page execute and read and write
7980000
trusted library allocation
page read and write
6488000
trusted library allocation
page read and write
5214000
trusted library allocation
page read and write
400000
unkown
page readonly
53F0000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
592E000
stack
page read and write
7B20000
trusted library allocation
page read and write
25350A76000
heap
page read and write
5C66000
trusted library allocation
page read and write
74DB000
stack
page read and write
75D9000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
4DAA000
trusted library allocation
page read and write
362F000
trusted library allocation
page read and write
3BDF000
trusted library allocation
page read and write
32F9000
trusted library allocation
page read and write
55D0000
heap
page read and write
8180000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
132F000
stack
page read and write
71E6000
trusted library allocation
page read and write
7671000
heap
page read and write
850B000
heap
page read and write
7B7D000
heap
page read and write
2FD9000
trusted library allocation
page read and write
86B1000
trusted library allocation
page read and write
7D60000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
25350A7D000
heap
page read and write
912E000
stack
page read and write
25350A5A000
heap
page read and write
7B0D000
heap
page read and write
3B91000
trusted library allocation
page read and write
4D29000
trusted library allocation
page read and write
19B4000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
136E000
stack
page read and write
88CD000
trusted library allocation
page read and write
25352400000
heap
page read and write
7FF6C8886000
unkown
page readonly
3579000
trusted library allocation
page read and write
7FFD9B9B6000
trusted library allocation
page execute and read and write
4DA8000
trusted library allocation
page read and write
7960000
trusted library allocation
page execute and read and write
5638000
trusted library allocation
page read and write
648E000
trusted library allocation
page read and write
53BE000
stack
page read and write
62E1000
trusted library allocation
page read and write
634B000
trusted library allocation
page read and write
59FE000
trusted library allocation
page read and write
772F000
stack
page read and write
F57000
stack
page read and write
402000
unkown
page readonly
2FF0000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
7FF6C80DA000
unkown
page readonly
9314000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page execute and read and write
5200000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
70E1000
trusted library allocation
page read and write
3BAE000
stack
page read and write
385F000
trusted library allocation
page read and write
382B000
trusted library allocation
page read and write
DF3000
heap
page read and write
32CC000
trusted library allocation
page read and write
8FFE000
stack
page read and write
385B000
trusted library allocation
page read and write
2B410075000
trusted library allocation
page read and write
95B0000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
37E2000
trusted library allocation
page read and write
94AE000
stack
page read and write
399F000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
364A000
trusted library allocation
page read and write
8E00000
trusted library allocation
page execute and read and write
1598000
heap
page read and write
5A53000
trusted library allocation
page read and write
2B46D3E0000
heap
page execute and read and write
8030000
trusted library allocation
page execute and read and write
336C000
trusted library allocation
page read and write
90EE000
stack
page read and write
78C1000
trusted library allocation
page read and write
7B9000
stack
page read and write
5D8B000
stack
page read and write
6EE0000
trusted library allocation
page execute and read and write
253530D0000
heap
page read and write
5438000
heap
page read and write
8A69000
heap
page read and write
6D19000
trusted library allocation
page read and write
37D1000
trusted library allocation
page read and write
60AF000
stack
page read and write
36F0000
trusted library allocation
page read and write
A52C000
stack
page read and write
4EC5000
heap
page read and write
2B46D73C000
heap
page read and write
2F97000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
7EE0000
heap
page read and write
7D20000
trusted library allocation
page read and write
1700000
heap
page read and write
6DC7000
trusted library allocation
page execute and read and write
77D0000
heap
page read and write
7FF6C87C4000
unkown
page write copy
E1D0A7E000
stack
page read and write
3149000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
1A70000
heap
page read and write
B67000
heap
page read and write
30C0000
trusted library allocation
page execute and read and write
7FF6C809A000
unkown
page readonly
25350A59000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
5203000
trusted library allocation
page execute and read and write
39A3000
trusted library allocation
page read and write
7B27000
heap
page read and write
39B8000
trusted library allocation
page read and write
4FF0000
heap
page read and write
2FE6000
trusted library allocation
page read and write
30F4000
trusted library allocation
page read and write
88FA000
trusted library allocation
page read and write
2FCD000
trusted library allocation
page read and write
2FD3000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
761D000
stack
page read and write
2B46B530000
heap
page read and write
312E000
trusted library allocation
page read and write
694E000
trusted library allocation
page read and write
25352404000
heap
page read and write
5210000
heap
page read and write
7240000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
25350A64000
heap
page read and write
7A02000
trusted library allocation
page read and write
2FD7000
trusted library allocation
page read and write
19DA000
trusted library allocation
page execute and read and write
3446000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
3440000
trusted library allocation
page read and write
7FFD9B8D2000
trusted library allocation
page read and write
9520000
heap
page read and write
2B46B54C000
heap
page read and write
329A000
trusted library allocation
page read and write
CBE000
stack
page read and write
8F10000
trusted library allocation
page read and write
D6C000
stack
page read and write
7B29000
heap
page read and write
7FFD9B8D4000
trusted library allocation
page read and write
731D000
stack
page read and write
7E50000
trusted library allocation
page read and write
39C0000
trusted library allocation
page read and write
87E0000
heap
page read and write
6DC0000
trusted library allocation
page read and write
36A0000
heap
page read and write
7B8F000
heap
page read and write
939E000
stack
page read and write
7FFD9BA8A000
trusted library allocation
page read and write
83D3000
trusted library allocation
page read and write
314B000
trusted library allocation
page read and write
5227000
trusted library allocation
page execute and read and write
39C5000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
B4E000
stack
page read and write
6919000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
E1D0EFB000
stack
page read and write
5B60000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
32A9000
trusted library allocation
page read and write
1C7ED145000
heap
page read and write
2B46D5EE000
heap
page read and write
1E0000
heap
page read and write
344B000
trusted library allocation
page read and write
3BE8000
trusted library allocation
page read and write
190E000
stack
page read and write
7F23000
heap
page read and write
703D000
stack
page read and write
7FF6C809A000
unkown
page readonly
2B46B710000
heap
page read and write
3623000
trusted library allocation
page read and write
5430000
heap
page read and write
7A00000
trusted library allocation
page read and write
1985000
heap
page read and write
8A20000
trusted library allocation
page read and write
6309000
trusted library allocation
page read and write
53FB000
trusted library allocation
page read and write
9329000
trusted library allocation
page read and write
5E91000
trusted library allocation
page read and write
71FE000
trusted library allocation
page read and write
2B46D970000
heap
page read and write
14B0000
trusted library allocation
page read and write
505D000
trusted library allocation
page read and write
7871000
trusted library allocation
page read and write
8F7E000
stack
page read and write
7E00000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
1062000
heap
page read and write
5AA0000
trusted library allocation
page read and write
343E000
trusted library allocation
page read and write
32D6000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
5990000
heap
page execute and read and write
2FD5000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
30F6000
trusted library allocation
page read and write
314F000
trusted library allocation
page read and write
313B000
trusted library allocation
page read and write
25350A8D000
heap
page read and write
E02000
unkown
page readonly
3130000
trusted library allocation
page read and write
7B79000
heap
page read and write
3740000
heap
page read and write
30D0000
trusted library allocation
page read and write
3625000
trusted library allocation
page read and write
2FA1000
trusted library allocation
page read and write
7FF6C8846000
unkown
page readonly
8C5C000
stack
page read and write
4E10000
heap
page read and write
7AB0000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
2B46D526000
heap
page read and write
8A36000
heap
page read and write
3269000
trusted library allocation
page read and write
7D4F000
stack
page read and write
FA5000
heap
page read and write
7F67000
heap
page read and write
E02000
unkown
page readonly
340E000
trusted library allocation
page read and write
77D0000
trusted library allocation
page execute and read and write
7FFD9BB00000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
2F89000
trusted library allocation
page read and write
1384000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
3700000
heap
page read and write
2B46B57A000
heap
page read and write
8FBC000
stack
page read and write
37CE000
stack
page read and write
2B46B4F0000
heap
page read and write
5B30000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
7668000
heap
page read and write
6DD0000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
FF620000
trusted library allocation
page execute and read and write
3750000
heap
page read and write
32DF000
trusted library allocation
page read and write
30F8000
trusted library allocation
page read and write
DAB000
heap
page read and write
488D000
trusted library allocation
page read and write
E1D087E000
stack
page read and write
1880000
trusted library allocation
page read and write
3612000
trusted library allocation
page read and write
7FF6C8891000
unkown
page readonly
3128000
trusted library allocation
page read and write
7FF0000
trusted library allocation
page read and write
3BA3000
trusted library allocation
page read and write
1627000
unkown
page readonly
3661000
trusted library allocation
page read and write
2B46B536000
heap
page read and write
7FF6C80E9000
unkown
page write copy
37FE000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
FE0000
heap
page read and write
53ED000
stack
page read and write
5260000
trusted library allocation
page execute and read and write
5462000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7BBE000
stack
page read and write
E1D05EE000
stack
page read and write
2B40008A000
trusted library allocation
page read and write
68EF000
stack
page read and write
2B40186A000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
8A7F000
heap
page read and write
3709000
heap
page read and write
382F000
trusted library allocation
page read and write
19CE000
stack
page read and write
400000
unkown
page readonly
3750000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
2FFD000
trusted library allocation
page execute and read and write
91ED000
stack
page read and write
2B401C3C000
trusted library allocation
page read and write
1A0E000
stack
page read and write
1020000
heap
page read and write
2B46D71C000
heap
page read and write
2EEE000
stack
page read and write
7782000
trusted library allocation
page read and write
71EB000
trusted library allocation
page read and write
3002000
trusted library allocation
page read and write
6C0000
unkown
page readonly
342F000
trusted library allocation
page read and write
8E00000
heap
page read and write
73C5000
heap
page execute and read and write
5ABE000
trusted library allocation
page read and write
1910000
heap
page read and write
32D2000
trusted library allocation
page read and write
30FF000
trusted library allocation
page read and write
30F2000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
19B3000
trusted library allocation
page execute and read and write
7550000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
8DD0000
trusted library allocation
page read and write
8BDE000
stack
page read and write
2B46B4F8000
heap
page read and write
71F4000
trusted library allocation
page read and write
694A000
trusted library allocation
page read and write
E1D0B77000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
6F01000
trusted library allocation
page read and write
331B000
trusted library allocation
page read and write
7907000
trusted library allocation
page read and write
56A0000
heap
page read and write
2B401648000
trusted library allocation
page read and write
749D000
stack
page read and write
7EF9000
heap
page read and write
331D000
trusted library allocation
page read and write
E1D0C79000
stack
page read and write
2B46D561000
heap
page read and write
2B46D263000
trusted library allocation
page read and write
344A000
heap
page read and write
58E0000
heap
page read and write
1899000
heap
page read and write
72A0000
trusted library allocation
page read and write
25350A7D000
heap
page read and write
52E1000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
5856000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
5270000
heap
page read and write
9349000
trusted library allocation
page read and write
8E4D000
stack
page read and write
739E000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
3BD5000
trusted library allocation
page read and write
7628000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
76DB000
stack
page read and write
19D0000
trusted library allocation
page read and write
9E0C000
stack
page read and write
695E000
trusted library allocation
page read and write
5E65000
heap
page read and write
19C0000
trusted library allocation
page read and write
37C9000
heap
page read and write
3137000
trusted library allocation
page read and write
5428000
heap
page read and write
7D80000
trusted library allocation
page read and write
903E000
stack
page read and write
6940000
trusted library allocation
page read and write
E42000
trusted library allocation
page read and write
3642000
trusted library allocation
page read and write
1787000
stack
page read and write
7EE30000
trusted library allocation
page execute and read and write
1665000
unkown
page readonly
3200000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
778E000
stack
page read and write
80F0000
trusted library allocation
page execute and read and write
2B4018F3000
trusted library allocation
page read and write
B70000
heap
page read and write
6D8F000
stack
page read and write
7510000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
7FF6C7E71000
unkown
page execute read
7AB4000
heap
page read and write
374E000
stack
page read and write
555E000
stack
page read and write
7DE0000
trusted library allocation
page read and write
37A0000
heap
page read and write
253525FE000
heap
page read and write
2B46D769000
heap
page read and write
5E7B000
trusted library allocation
page read and write
3E2E000
stack
page read and write
7DF0000
trusted library allocation
page read and write
3431000
trusted library allocation
page read and write
E1D0D7E000
stack
page read and write
8301000
trusted library allocation
page read and write
2F30000
heap
page execute and read and write
7FAA8000
trusted library allocation
page execute and read and write
7FE8000
trusted library allocation
page read and write
25350A59000
heap
page read and write
25350A59000
heap
page read and write
88D0000
heap
page read and write
8DD0000
heap
page read and write
4E00000
heap
page readonly
1DFF000
stack
page read and write
365F000
trusted library allocation
page read and write
6DB4000
trusted library allocation
page read and write
7B75000
heap
page read and write
7970000
heap
page execute and read and write
6F20000
heap
page execute and read and write
3BD3000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
7FF6C8838000
unkown
page read and write
9ACE000
stack
page read and write
E5B000
stack
page read and write
334D000
trusted library allocation
page read and write
2F17000
trusted library allocation
page read and write
25352363000
heap
page read and write
E10000
heap
page read and write
170A000
heap
page read and write
172BF0F000
stack
page read and write
6933000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
3BF6000
trusted library allocation
page read and write
E0D000
heap
page read and write
345B000
trusted library allocation
page read and write
1B01000
heap
page read and write
DF8000
heap
page read and write
7FFD9B98C000
trusted library allocation
page execute and read and write
3AF5000
trusted library allocation
page read and write
253524B3000
heap
page read and write
39D5000
trusted library allocation
page read and write
1627000
unkown
page readonly
3819000
trusted library allocation
page read and write
362D000
trusted library allocation
page read and write
3444000
trusted library allocation
page read and write
4F89000
stack
page read and write
3986000
trusted library allocation
page read and write
692E000
trusted library allocation
page read and write
19BD000
trusted library allocation
page execute and read and write
9550000
trusted library section
page read and write
5230000
trusted library allocation
page read and write
7B24000
heap
page read and write
533A000
trusted library allocation
page read and write
32B9000
trusted library allocation
page read and write
8810000
trusted library allocation
page read and write
72C0000
trusted library allocation
page execute and read and write
5B80000
heap
page read and write
2F10000
trusted library allocation
page read and write
30E0000
heap
page read and write
253551A9000
heap
page read and write
32E3000
trusted library allocation
page read and write
397E000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
3319000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
3BC2000
trusted library allocation
page read and write
563A000
trusted library allocation
page read and write
E1D05AE000
stack
page read and write
14E0000
trusted library allocation
page read and write
2B400C31000
trusted library allocation
page read and write
794F000
stack
page read and write
6DDB000
trusted library allocation
page execute and read and write
19A000
stack
page read and write
9350000
trusted library allocation
page read and write
703C000
trusted library allocation
page read and write
E1D0DFE000
stack
page read and write
39C7000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
172BE8D000
stack
page read and write
8A54000
heap
page read and write
32E5000
trusted library allocation
page read and write
2F56000
trusted library allocation
page read and write
A72D000
stack
page read and write
89A8000
heap
page read and write
7BA0000
trusted library allocation
page read and write
2B46B610000
heap
page read and write
7220000
trusted library allocation
page read and write
7FF6C8846000
unkown
page readonly
7FFD9B990000
trusted library allocation
page execute and read and write
3410000
trusted library allocation
page read and write
8A77000
heap
page read and write
7FF6C80DA000
unkown
page readonly
D14000
trusted library allocation
page read and write
3368000
trusted library allocation
page read and write
6966000
trusted library allocation
page read and write
2B46D630000
heap
page read and write
37EE000
trusted library allocation
page read and write
2D69000
heap
page read and write
8B2E000
stack
page read and write
5970000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
4251000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
4F00000
heap
page read and write
310D000
trusted library allocation
page read and write
14B6000
trusted library allocation
page execute and read and write
7B90000
heap
page read and write
813E000
stack
page read and write
7451000
trusted library allocation
page read and write
3311000
trusted library allocation
page read and write
83C0000
heap
page read and write
95E0000
heap
page read and write
2FE8000
trusted library allocation
page read and write
735B000
stack
page read and write
6E3E000
stack
page read and write
8A71000
heap
page read and write
7AA0000
trusted library allocation
page read and write
3BBA000
trusted library allocation
page read and write
9420000
heap
page read and write
25350A72000
heap
page read and write
83F0000
trusted library allocation
page execute and read and write
7EF90000
trusted library allocation
page execute and read and write
3CAF000
stack
page read and write
7770000
trusted library allocation
page execute and read and write
5E50000
trusted library allocation
page read and write
E6E000
stack
page read and write
E47000
trusted library allocation
page execute and read and write
3676000
trusted library allocation
page read and write
3A0F000
stack
page read and write
E69000
stack
page read and write
88CB000
trusted library allocation
page read and write
3351000
trusted library allocation
page read and write
25350A72000
heap
page read and write
77CE000
stack
page read and write
6D90000
trusted library allocation
page read and write
525E000
stack
page read and write
550C000
stack
page read and write
2F99000
trusted library allocation
page read and write
2B400231000
trusted library allocation
page read and write
3408000
trusted library allocation
page read and write
7B10000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
B75000
heap
page read and write
9619000
heap
page read and write
3345000
trusted library allocation
page read and write
E1D18CE000
stack
page read and write
8FDD000
stack
page read and write
7DF486BF0000
trusted library allocation
page execute and read and write
A20000
heap
page read and write
1E5000
heap
page read and write
3614000
trusted library allocation
page read and write
7EC0000
heap
page read and write
31EF000
stack
page read and write
55BD000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
53C0000
heap
page read and write
6929000
trusted library allocation
page read and write
3101000
trusted library allocation
page read and write
50BA000
trusted library allocation
page read and write
25350A10000
heap
page read and write
BF7000
heap
page read and write
3861000
trusted library allocation
page read and write
692B000
trusted library allocation
page read and write
7230000
trusted library allocation
page execute and read and write
14F0000
trusted library allocation
page execute and read and write
1B08000
heap
page read and write
39C3000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
3790000
trusted library allocation
page read and write
1370000
heap
page read and write
3816000
trusted library allocation
page read and write
7FF6C87C2000
unkown
page read and write
60B1000
trusted library allocation
page read and write
3410000
heap
page read and write
84B0000
heap
page read and write
25350AB6000
heap
page read and write
7215000
trusted library allocation
page read and write
19A0000
trusted library allocation
page read and write
3113000
trusted library allocation
page read and write
25350A73000
heap
page read and write
3844000
trusted library allocation
page read and write
19E7000
trusted library allocation
page execute and read and write
693E000
trusted library allocation
page read and write
253522F5000
heap
page read and write
5E70000
trusted library allocation
page read and write
511D000
trusted library allocation
page read and write
7FFA000
trusted library allocation
page read and write
7C9F000
stack
page read and write
8A8D000
stack
page read and write
7D90000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
77A0000
trusted library allocation
page execute and read and write
79F0000
trusted library allocation
page execute and read and write
5EA5000
trusted library allocation
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
7AA0000
heap
page read and write
5AC1000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
7D1D000
stack
page read and write
401000
unkown
page execute read
58CD000
stack
page read and write
5A17000
trusted library allocation
page read and write
3846000
trusted library allocation
page read and write
1AA5000
heap
page read and write
6DA4000
trusted library allocation
page read and write
32B1000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
3286000
heap
page read and write
3629000
trusted library allocation
page read and write
34FA000
heap
page read and write
1CF0000
heap
page read and write
3364000
trusted library allocation
page read and write
3349000
trusted library allocation
page read and write
25353376000
heap
page read and write
7FF6C8886000
unkown
page readonly
3BBC000
trusted library allocation
page read and write
2CFE000
stack
page read and write
2F79000
stack
page read and write
5E7E000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
7B4F000
stack
page read and write
697F000
trusted library allocation
page read and write
32CA000
trusted library allocation
page read and write
7A4E000
stack
page read and write
3313000
trusted library allocation
page read and write
940E000
stack
page read and write
138D000
trusted library allocation
page execute and read and write
71E0000
trusted library allocation
page read and write
1A67000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
253529F1000
heap
page read and write
95D0000
heap
page execute and read and write
340A000
trusted library allocation
page read and write
3876000
trusted library allocation
page read and write
8DD3000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
2B46D500000
heap
page execute and read and write
6497000
trusted library allocation
page read and write
71D9000
trusted library allocation
page read and write
32BB000
trusted library allocation
page read and write
9A8E000
stack
page read and write
5980000
trusted library allocation
page read and write
2F41000
trusted library allocation
page read and write
95AF000
stack
page read and write
E1D09FE000
stack
page read and write
1A00000
trusted library allocation
page read and write
B60000
heap
page read and write
14AD000
trusted library allocation
page execute and read and write
5AB4000
trusted library allocation
page read and write
5B40000
trusted library allocation
page read and write
25350A64000
heap
page read and write
D20000
trusted library allocation
page read and write
1C6F000
stack
page read and write
3B9F000
trusted library allocation
page read and write
498D000
trusted library allocation
page read and write
8FE0000
heap
page execute and read and write
2B401896000
trusted library allocation
page read and write
2FBA000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
340C000
trusted library allocation
page read and write
4DFE000
stack
page read and write
5AA6000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
6DAD000
trusted library allocation
page execute and read and write
7BFE000
stack
page read and write
8A75000
heap
page read and write
5560000
heap
page read and write
36FD000
trusted library allocation
page execute and read and write
312C000
trusted library allocation
page read and write
253525D9000
heap
page read and write
7EC6000
heap
page read and write
509D000
trusted library allocation
page read and write
399D000
trusted library allocation
page read and write
83BE000
stack
page read and write
25350A59000
heap
page read and write
7B8E000
stack
page read and write
9326000
trusted library allocation
page read and write
7E80000
trusted library allocation
page execute and read and write
1890000
heap
page read and write
398A000
trusted library allocation
page read and write
102E000
heap
page read and write
382D000
trusted library allocation
page read and write
7FFD9BA81000
trusted library allocation
page read and write
8C1E000
stack
page read and write
7BDE000
stack
page read and write
7849000
trusted library allocation
page read and write
25350A7B000
heap
page read and write
BBE000
stack
page read and write
4E87000
trusted library allocation
page read and write
1C7ED0B0000
heap
page read and write
7001000
trusted library allocation
page read and write
89A0000
heap
page read and write
2B401622000
trusted library allocation
page read and write
58AB000
stack
page read and write
7A80000
trusted library allocation
page execute and read and write
32E7000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
3147000
trusted library allocation
page read and write
E1D194D000
stack
page read and write
3423000
trusted library allocation
page read and write
A62E000
stack
page read and write
3296000
trusted library allocation
page read and write
8F9E000
stack
page read and write
7DA0000
trusted library allocation
page read and write
30FA000
trusted library allocation
page read and write
365B000
trusted library allocation
page read and write
2B410010000
trusted library allocation
page read and write
1510000
heap
page read and write
7B9A000
heap
page read and write
7639000
trusted library allocation
page read and write
37C0000
heap
page read and write
77B8000
trusted library allocation
page read and write
2B46D2A2000
heap
page read and write
2B46D260000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
5A9D000
stack
page read and write
7AD4000
heap
page read and write
3BD9000
trusted library allocation
page read and write
535F000
stack
page read and write
5CC8000
trusted library allocation
page read and write
1A40000
heap
page execute and read and write
2E6F000
stack
page read and write
8031000
trusted library allocation
page read and write
7B40000
trusted library allocation
page read and write
541A000
heap
page read and write
1755000
heap
page read and write
2B46D5BB000
heap
page read and write
32B3000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
5E97000
trusted library allocation
page read and write
2B401C40000
trusted library allocation
page read and write
5DCE000
stack
page read and write
3BF2000
trusted library allocation
page read and write
6C2000
unkown
page readonly
769D000
stack
page read and write
4D60000
trusted library allocation
page read and write
253509D0000
heap
page read and write
3988000
trusted library allocation
page read and write
1665000
unkown
page readonly
1625000
unkown
page readonly
89BC000
heap
page read and write
3301000
trusted library allocation
page read and write
3CEE000
stack
page read and write
7800000
trusted library allocation
page execute and read and write
1A20000
heap
page read and write
956F000
stack
page read and write
3BF4000
trusted library allocation
page read and write
1532000
heap
page read and write
3332000
trusted library allocation
page read and write
E1D097E000
stack
page read and write
526E000
stack
page read and write
56DD000
stack
page read and write
88F7000
trusted library allocation
page read and write
4F90000
heap
page read and write
2B46B675000
heap
page read and write
480D000
trusted library allocation
page read and write
596E000
stack
page read and write
19CD000
trusted library allocation
page execute and read and write
88E0000
trusted library allocation
page execute and read and write
7AFB000
heap
page read and write
7FF6C7E70000
unkown
page readonly
39DB000
trusted library allocation
page read and write
3982000
trusted library allocation
page read and write
14BA000
trusted library allocation
page execute and read and write
D48000
heap
page read and write
492C000
heap
page read and write
30E9000
heap
page read and write
87F0000
trusted library allocation
page execute and read and write
7FD0000
trusted library allocation
page execute and read and write
365D000
trusted library allocation
page read and write
3BDB000
trusted library allocation
page read and write
1EA9000
heap
page read and write
76B3000
heap
page read and write
76E9000
heap
page read and write
3330000
trusted library allocation
page read and write
C7E000
stack
page read and write
3831000
trusted library allocation
page read and write
2F7D000
stack
page read and write
3006000
trusted library allocation
page execute and read and write
5465000
heap
page read and write
2B46D710000
heap
page read and write
345D000
trusted library allocation
page read and write
385D000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
503D000
trusted library allocation
page read and write
39BE000
trusted library allocation
page read and write
3842000
trusted library allocation
page read and write
703A000
trusted library allocation
page read and write
5E76000
trusted library allocation
page read and write
253523E0000
heap
page read and write
168B000
stack
page read and write
7047000
trusted library allocation
page read and write
92ED000
stack
page read and write
8900000
trusted library allocation
page read and write
300A000
trusted library allocation
page execute and read and write
3338000
trusted library allocation
page read and write
7B14000
heap
page read and write
1CAE000
stack
page read and write
5510000
trusted library allocation
page read and write
80E1000
trusted library allocation
page read and write
9335000
trusted library allocation
page read and write
6DCA000
trusted library allocation
page execute and read and write
2B46B745000
heap
page read and write
676E000
stack
page read and write
7FFD9B8D3000
trusted library allocation
page execute and read and write
4B55000
heap
page read and write
2B46B577000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
301B000
trusted library allocation
page execute and read and write
2B46B6C0000
heap
page readonly
3BC0000
trusted library allocation
page read and write
75DA000
stack
page read and write
81B0000
trusted library allocation
page execute and read and write
7FF6C8070000
unkown
page readonly
59FA000
trusted library allocation
page read and write
13D0000
heap
page read and write
5A51000
trusted library allocation
page read and write
7FFD9B8EB000
trusted library allocation
page read and write
2F3C000
stack
page read and write
1A10000
trusted library allocation
page execute and read and write
3240000
heap
page execute and read and write
2B46B640000
heap
page read and write
25350A68000
heap
page read and write
5AB0000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
88F8000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
88BE000
stack
page read and write
5DF0000
trusted library allocation
page read and write
253524B6000
heap
page read and write
3139000
trusted library allocation
page read and write
3BBE000
trusted library allocation
page read and write
4FE0000
heap
page readonly
7CDE000
stack
page read and write
89B8000
heap
page read and write
697B000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
D1D000
trusted library allocation
page execute and read and write
345F000
trusted library allocation
page read and write
7648000
heap
page read and write
1884000
trusted library allocation
page read and write
367A000
trusted library allocation
page read and write
39A7000
trusted library allocation
page read and write
6477000
trusted library allocation
page read and write
D77000
heap
page read and write
14F0000
heap
page read and write
82FF000
stack
page read and write
702E000
stack
page read and write
89B4000
heap
page read and write
3BA1000
trusted library allocation
page read and write
1C7ED178000
heap
page read and write
2B46B53A000
heap
page read and write
47D1000
trusted library allocation
page read and write
5DEB000
trusted library allocation
page read and write
96D0000
heap
page execute and read and write
348E000
heap
page read and write
7FF6C8898000
unkown
page readonly
10A6000
heap
page read and write
740E000
stack
page read and write
3280000
heap
page read and write
3F41000
trusted library allocation
page read and write
3366000
trusted library allocation
page read and write
376B000
trusted library allocation
page read and write
3418000
heap
page read and write
767D000
heap
page read and write
64FE000
stack
page read and write
7B02000
heap
page read and write
84D9000
heap
page read and write
3646000
trusted library allocation
page read and write
253508F0000
heap
page read and write
25350A59000
heap
page read and write
7FF6C8848000
unkown
page readonly
384E000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
1680000
heap
page read and write
149F000
stack
page read and write
253525DD000
heap
page read and write
3BA7000
trusted library allocation
page read and write
1C7ED170000
heap
page read and write
9D4D000
stack
page read and write
7FF6C7E70000
unkown
page readonly
1A60000
trusted library allocation
page read and write
3665000
trusted library allocation
page read and write
7F710000
trusted library allocation
page execute and read and write
7FF6C87C5000
unkown
page read and write
7B59000
heap
page read and write
7540000
trusted library allocation
page execute and read and write
81F0000
trusted library allocation
page read and write
3BEA000
trusted library allocation
page read and write
8ED8000
heap
page read and write
334F000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page read and write
36F4000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
8A6E000
heap
page read and write
1390000
heap
page read and write
3412000
trusted library allocation
page read and write
32AD000
trusted library allocation
page read and write
E1D052E000
stack
page read and write
3459000
trusted library allocation
page read and write
17F0000
heap
page read and write
33AE000
stack
page read and write
E02000
unkown
page readonly
E1D04A3000
stack
page read and write
7FFD9BAB2000
trusted library allocation
page read and write
2FEF000
stack
page read and write
78C0000
trusted library allocation
page execute and read and write
52A5000
heap
page read and write
253524B0000
heap
page read and write
5425000
heap
page read and write
3BE1000
trusted library allocation
page read and write
19B0000
trusted library allocation
page read and write
3BA5000
trusted library allocation
page read and write
9304000
trusted library allocation
page read and write
89E2000
heap
page read and write
7C10000
trusted library allocation
page read and write
9596000
heap
page read and write
95B0000
heap
page read and write
7FF6C7E71000
unkown
page execute read
7FF6C8848000
unkown
page readonly
7D50000
trusted library allocation
page read and write
823E000
stack
page read and write
4E17000
heap
page read and write
DAC000
stack
page read and write
7950000
trusted library allocation
page read and write
D3A000
trusted library allocation
page execute and read and write
3347000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
D5E000
heap
page read and write
3012000
trusted library allocation
page read and write
D6A000
heap
page read and write
7DC0000
trusted library allocation
page read and write
32EB000
trusted library allocation
page read and write
4D45000
trusted library allocation
page execute and read and write
6FFF000
stack
page read and write
8351000
trusted library allocation
page read and write
4D42000
trusted library allocation
page read and write
5AAE000
trusted library allocation
page read and write
1350000
heap
page read and write
2B401659000
trusted library allocation
page read and write
172BF8F000
stack
page read and write
566E000
stack
page read and write
253522F0000
heap
page read and write
B00000
heap
page readonly
25352409000
heap
page read and write
3848000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
1EA0000
heap
page read and write
E1D0CFE000
stack
page read and write
84FF000
heap
page read and write
3BA9000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
1CEC000
stack
page read and write
E19A6FE000
stack
page read and write
5AAB000
trusted library allocation
page read and write
839F000
trusted library allocation
page read and write
7640000
heap
page read and write
4DB0000
heap
page execute and read and write
364E000
trusted library allocation
page read and write
5730000
heap
page read and write
3644000
trusted library allocation
page read and write
790E000
stack
page read and write
3251000
trusted library allocation
page read and write
7B38000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
696D000
trusted library allocation
page read and write
1A50000
trusted library allocation
page read and write
8701000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
523B000
trusted library allocation
page execute and read and write
3984000
trusted library allocation
page read and write
362B000
trusted library allocation
page read and write
A82E000
stack
page read and write
6971000
trusted library allocation
page read and write
73C0000
heap
page execute and read and write
19EB000
trusted library allocation
page execute and read and write
1734000
heap
page read and write
32D0000
trusted library allocation
page read and write
32B7000
trusted library allocation
page read and write
52AE000
stack
page read and write
2B46B6D0000
trusted library allocation
page read and write
8000000
trusted library allocation
page execute and read and write
55CF000
trusted library allocation
page read and write
37E6000
trusted library allocation
page read and write
2B46D733000
heap
page read and write
25350A59000
heap
page read and write
5A13000
trusted library allocation
page read and write
1B0F000
stack
page read and write
2D60000
heap
page read and write
53B0000
heap
page read and write
8400000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
7ECA000
heap
page read and write
4D3A000
trusted library allocation
page execute and read and write
3145000
trusted library allocation
page read and write
1980000
heap
page read and write
25350A18000
heap
page read and write
5280000
trusted library allocation
page read and write
4DDD000
heap
page read and write
39A1000
trusted library allocation
page read and write
9C4C000
stack
page read and write
25350A59000
heap
page read and write
895E000
stack
page read and write
25350A60000
heap
page read and write
307E000
stack
page read and write
32ED000
trusted library allocation
page read and write
3298000
trusted library allocation
page read and write
3448000
trusted library allocation
page read and write
8A5C000
heap
page read and write
7FF6C8898000
unkown
page readonly
2535331E000
heap
page read and write
521D000
trusted library allocation
page read and write
3667000
trusted library allocation
page read and write
5AD5000
trusted library allocation
page read and write
6780000
heap
page execute and read and write
6DF0000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
3425000
trusted library allocation
page read and write
329E000
trusted library allocation
page read and write
7E4E000
stack
page read and write
10EE000
heap
page read and write
5410000
heap
page execute and read and write
E1D0E7F000
stack
page read and write
9F0E000
stack
page read and write
7FFD9B8DD000
trusted library allocation
page execute and read and write
3115000
trusted library allocation
page read and write
52D0000
heap
page read and write
400000
remote allocation
page execute and read and write
7EE5000
heap
page read and write
253522B0000
heap
page read and write
7031000
trusted library allocation
page read and write
364C000
trusted library allocation
page read and write
3F2F000
stack
page read and write
6959000
trusted library allocation
page read and write
7AD0000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
88F0000
trusted library allocation
page read and write
E19A2F7000
stack
page read and write
7FFD9BB20000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
1625000
unkown
page readonly
D13000
trusted library allocation
page execute and read and write
1883000
trusted library allocation
page execute and read and write
2B4018B6000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
B50000
heap
page read and write
6DD7000
trusted library allocation
page execute and read and write
13D5000
heap
page read and write
7201000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
323E000
stack
page read and write
3303000
trusted library allocation
page read and write
57AC000
trusted library allocation
page read and write
5E84000
trusted library allocation
page read and write
52BF000
heap
page read and write
1519000
heap
page read and write
5A0A000
trusted library allocation
page read and write
342D000
trusted library allocation
page read and write
3B8C000
trusted library allocation
page read and write
E20000
heap
page readonly
25352360000
heap
page read and write
58B0000
trusted library allocation
page read and write
4FC0000
heap
page read and write
3627000
trusted library allocation
page read and write
329C000
trusted library allocation
page read and write
5E60000
heap
page read and write
1A78000
heap
page read and write
76AC000
trusted library allocation
page read and write
6DA3000
trusted library allocation
page execute and read and write
3360000
trusted library allocation
page read and write
3442000
trusted library allocation
page read and write
1690000
heap
page read and write
39D3000
trusted library allocation
page read and write
6FB1000
trusted library allocation
page read and write
3865000
trusted library allocation
page read and write
14CB000
trusted library allocation
page execute and read and write
5E4E000
stack
page read and write
2B46B6B0000
trusted library allocation
page read and write
3DEF000
stack
page read and write
83D0000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
7FA90000
trusted library allocation
page execute and read and write
5459000
heap
page read and write
25350A59000
heap
page read and write
7C9E000
stack
page read and write
D32000
trusted library allocation
page read and write
3617000
trusted library allocation
page read and write
2B46D610000
heap
page read and write
330F000
trusted library allocation
page read and write
8430000
trusted library allocation
page execute and read and write
8F16000
trusted library allocation
page read and write
30BC000
stack
page read and write
790E000
stack
page read and write
3421000
trusted library allocation
page read and write
52A0000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
14BE000
heap
page read and write
19E0000
trusted library allocation
page read and write
585E000
trusted library allocation
page read and write
3B8E000
trusted library allocation
page read and write
327F000
stack
page read and write
14C2000
trusted library allocation
page read and write
837E000
stack
page read and write
E60000
trusted library allocation
page read and write
5420000
heap
page read and write
3BC8000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
8C70000
trusted library allocation
page read and write
8170000
trusted library allocation
page execute and read and write
37B0000
heap
page read and write
336A000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
19D2000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
3317000
trusted library allocation
page read and write
2B46B575000
heap
page read and write
15EE000
stack
page read and write
3760000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
759E000
stack
page read and write
2D40000
heap
page read and write
1580000
heap
page read and write
D75000
heap
page read and write
32AF000
trusted library allocation
page read and write
343E000
heap
page read and write
1C7ED140000
heap
page read and write
8800000
heap
page read and write
7B90000
trusted library allocation
page read and write
7DB0000
trusted library allocation
page read and write
53AE000
stack
page read and write
2B46B5F0000
heap
page read and write
5DFF000
trusted library allocation
page read and write
367C000
trusted library allocation
page read and write
67E0000
heap
page read and write
1056000
heap
page read and write
7B92000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
195E000
stack
page read and write
79B1000
heap
page read and write
3631000
trusted library allocation
page read and write
7FF6C8070000
unkown
page readonly
3863000
trusted library allocation
page read and write
7AF0000
trusted library section
page read and write
34BF000
heap
page read and write
520D000
trusted library allocation
page execute and read and write
3827000
trusted library allocation
page read and write
3BAE000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
79B9000
trusted library allocation
page read and write
887E000
stack
page read and write
3143000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
1C7ED0A0000
heap
page read and write
39D9000
trusted library allocation
page read and write
36E0000
trusted library allocation
page read and write
2B46B670000
heap
page read and write
5FFE000
stack
page read and write
7C30000
trusted library allocation
page execute and read and write
398F000
trusted library allocation
page read and write
503D000
stack
page read and write
7A50000
trusted library allocation
page execute and read and write
7033000
trusted library allocation
page read and write
8F5E000
stack
page read and write
2B410001000
trusted library allocation
page read and write
4F1C000
trusted library allocation
page read and write
14B2000
trusted library allocation
page read and write
3334000
trusted library allocation
page read and write
335E000
trusted library allocation
page read and write
1C7ED0D0000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
16EF000
stack
page read and write
540E000
heap
page read and write
5DED000
trusted library allocation
page read and write
6DEC000
trusted library allocation
page read and write
39D1000
trusted library allocation
page read and write
122E000
stack
page read and write
253525DF000
heap
page read and write
FA0000
heap
page read and write
E4B000
trusted library allocation
page execute and read and write
384A000
trusted library allocation
page read and write
7C40000
trusted library allocation
page execute and read and write
7C1E000
stack
page read and write
765B000
stack
page read and write
D40000
heap
page read and write
7A30000
trusted library allocation
page read and write
E19A5FD000
stack
page read and write
2B46B400000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
5281000
heap
page read and write
53F8000
heap
page read and write
7B00000
trusted library allocation
page read and write
51FC000
stack
page read and write
8B81000
trusted library allocation
page read and write
6EF0000
heap
page read and write
7B80000
trusted library allocation
page execute and read and write
2B46B740000
heap
page read and write
1390000
heap
page read and write
7500000
trusted library allocation
page read and write
73DE000
stack
page read and write
7FFD9B986000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
3834000
trusted library allocation
page read and write
597B000
trusted library allocation
page read and write
334B000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7660000
heap
page read and write
71F0000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
7B49000
trusted library allocation
page read and write
6954000
trusted library allocation
page read and write
578C000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
57B0000
heap
page read and write
2B401636000
trusted library allocation
page read and write
70D0000
heap
page execute and read and write
398C000
trusted library allocation
page read and write
71EE000
trusted library allocation
page read and write
2B46D510000
heap
page read and write
8DC0000
trusted library allocation
page read and write
47AD000
trusted library allocation
page read and write
1B54000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
2B46D75E000
heap
page read and write
89B0000
heap
page read and write
3360000
heap
page read and write
6770000
trusted library allocation
page execute and read and write
5EB0000
trusted library allocation
page execute and read and write
5DD0000
trusted library allocation
page read and write
25356570000
heap
page read and write
6960000
trusted library allocation
page read and write
4092000
heap
page read and write
5436000
trusted library allocation
page read and write
5A0E000
trusted library allocation
page read and write
3336000
trusted library allocation
page read and write
2B4101B8000
trusted library allocation
page read and write
2F20000
heap
page read and write
3BC4000
trusted library allocation
page read and write
598F000
trusted library allocation
page read and write
2B401B76000
trusted library allocation
page read and write
25352370000
heap
page read and write
30FC000
trusted library allocation
page read and write
E1D08FD000
stack
page read and write
14B0000
heap
page read and write
5204000
trusted library allocation
page read and write
7FF6C8891000
unkown
page readonly
5580000
trusted library allocation
page read and write
562F000
stack
page read and write
7208000
trusted library allocation
page read and write
38CE000
stack
page read and write
401000
unkown
page execute read
4EC0000
heap
page read and write
571E000
stack
page read and write
3BC6000
trusted library allocation
page read and write
5168000
trusted library allocation
page read and write
3017000
trusted library allocation
page execute and read and write
2FF0000
heap
page read and write
51BC000
stack
page read and write
2B46B52C000
heap
page read and write
188D000
trusted library allocation
page execute and read and write
25352310000
heap
page read and write
7A10000
trusted library allocation
page read and write
32B5000
trusted library allocation
page read and write
There are 1397 hidden memdumps, click here to show them.