IOC Report
I-IN-6757165752-DEL983527_20240416074318.exe

loading gif

Files

File Path
Type
Category
Malicious
I-IN-6757165752-DEL983527_20240416074318.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp2D1A.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\lvPAYFCXxuNokO.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\I-IN-6757165752-DEL983527_20240416074318.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\boqXv.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\lvPAYFCXxuNokO.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fy4khdfo.tog.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3pbfmmf.vvm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xe4mid5n.1eb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xyammjoa.5kc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3CAB.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp6C08.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp8712.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\lvPAYFCXxuNokO.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\I-IN-6757165752-DEL983527_20240416074318.exe
"C:\Users\user\Desktop\I-IN-6757165752-DEL983527_20240416074318.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lvPAYFCXxuNokO.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lvPAYFCXxuNokO" /XML "C:\Users\user\AppData\Local\Temp\tmp2D1A.tmp"
malicious
C:\Users\user\Desktop\I-IN-6757165752-DEL983527_20240416074318.exe
"C:\Users\user\Desktop\I-IN-6757165752-DEL983527_20240416074318.exe"
malicious
C:\Users\user\AppData\Roaming\lvPAYFCXxuNokO.exe
C:\Users\user\AppData\Roaming\lvPAYFCXxuNokO.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lvPAYFCXxuNokO" /XML "C:\Users\user\AppData\Local\Temp\tmp3CAB.tmp"
malicious
C:\Users\user\AppData\Roaming\lvPAYFCXxuNokO.exe
"C:\Users\user\AppData\Roaming\lvPAYFCXxuNokO.exe"
malicious
C:\Users\user\AppData\Roaming\lvPAYFCXxuNokO.exe
"C:\Users\user\AppData\Roaming\lvPAYFCXxuNokO.exe"
malicious
C:\Users\user\AppData\Roaming\lvPAYFCXxuNokO.exe
"C:\Users\user\AppData\Roaming\lvPAYFCXxuNokO.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lvPAYFCXxuNokO" /XML "C:\Users\user\AppData\Local\Temp\tmp6C08.tmp"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lvPAYFCXxuNokO" /XML "C:\Users\user\AppData\Local\Temp\tmp8712.tmp"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://mail.clslk.com
unknown
https://account.dyn.com/
unknown
http://tempuri.org/DataSet1.xsd)Microsoft
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
mail.clslk.com
50.87.253.239
malicious

IPs

IP
Domain
Country
Malicious
50.87.253.239
mail.clslk.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
boqXv

Memdumps

Base Address
Regiontype
Protect
Malicious
315C000
trusted library allocation
page read and write
malicious
3201000
trusted library allocation
page read and write
malicious
325A000
trusted library allocation
page read and write
malicious
31A2000
trusted library allocation
page read and write
malicious
31AA000
trusted library allocation
page read and write
malicious
2AA1000
trusted library allocation
page read and write
malicious
51CD000
trusted library allocation
page read and write
malicious
2AF2000
trusted library allocation
page read and write
malicious
318F000
trusted library allocation
page read and write
malicious
2AFA000
trusted library allocation
page read and write
malicious
469C000
trusted library allocation
page read and write
malicious
3121000
trusted library allocation
page read and write
malicious
4A3C000
trusted library allocation
page read and write
malicious
3252000
trusted library allocation
page read and write
malicious
3197000
trusted library allocation
page read and write
malicious
4237000
trusted library allocation
page read and write
malicious
3523000
trusted library allocation
page read and write
571A000
trusted library allocation
page read and write
1449000
heap
page read and write
4149000
trusted library allocation
page read and write
269B000
trusted library allocation
page read and write
8E39000
trusted library allocation
page read and write
1652000
trusted library allocation
page read and write
6650000
trusted library allocation
page read and write
3568000
trusted library allocation
page read and write
1B00000
trusted library allocation
page execute and read and write
4F9E000
trusted library allocation
page read and write
6974000
heap
page read and write
357E000
trusted library allocation
page read and write
41D9000
trusted library allocation
page read and write
59C0000
heap
page read and write
74E000
stack
page read and write
9E0000
heap
page read and write
342E000
trusted library allocation
page read and write
5590000
heap
page read and write
354E000
trusted library allocation
page read and write
5052000
trusted library allocation
page read and write
5D0F000
stack
page read and write
350A000
trusted library allocation
page read and write
3558000
trusted library allocation
page read and write
2FA0000
heap
page read and write
29CE000
stack
page read and write
3541000
trusted library allocation
page read and write
8C90000
heap
page read and write
421000
remote allocation
page execute and read and write
356A000
trusted library allocation
page read and write
EA7000
heap
page read and write
D0A000
trusted library allocation
page execute and read and write
3598000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
163D000
trusted library allocation
page execute and read and write
1714000
trusted library allocation
page read and write
660E000
stack
page read and write
2B32000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
E64000
trusted library allocation
page read and write
15B0000
heap
page read and write
920000
heap
page read and write
1650000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
1612000
trusted library allocation
page read and write
1500000
heap
page read and write
CDFE000
stack
page read and write
1747000
trusted library allocation
page execute and read and write
143A000
heap
page read and write
58A2000
trusted library allocation
page read and write
341E000
trusted library allocation
page read and write
57E2000
heap
page read and write
3191000
trusted library allocation
page read and write
689E000
stack
page read and write
3596000
trusted library allocation
page read and write
13E0000
heap
page read and write
34DA000
trusted library allocation
page read and write
439000
remote allocation
page execute and read and write
810D000
stack
page read and write
1240000
heap
page read and write
5208000
trusted library allocation
page read and write
F0E000
heap
page read and write
4191000
trusted library allocation
page read and write
417000
remote allocation
page execute and read and write
313C000
trusted library allocation
page read and write
5032000
trusted library allocation
page read and write
1187000
trusted library allocation
page execute and read and write
173B000
trusted library allocation
page execute and read and write
1655000
trusted library allocation
page execute and read and write
354C000
trusted library allocation
page read and write
34E6000
trusted library allocation
page read and write
3AA9000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
5A70000
trusted library allocation
page execute and read and write
423000
remote allocation
page execute and read and write
6087000
trusted library allocation
page read and write
26BD000
trusted library allocation
page read and write
E60000
trusted library allocation
page read and write
8CA0000
heap
page read and write
5721000
trusted library allocation
page read and write
5D48000
heap
page read and write
56FF000
trusted library allocation
page read and write
87BE000
stack
page read and write
2BAE000
unkown
page read and write
11A0000
heap
page read and write
345C000
trusted library allocation
page read and write
57BE000
stack
page read and write
579C000
stack
page read and write
333D000
trusted library allocation
page read and write
56E6000
trusted library allocation
page read and write
35B4000
trusted library allocation
page read and write
57B0000
heap
page read and write
C390000
heap
page read and write
5D5C000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
1394000
trusted library allocation
page read and write
8F7000
stack
page read and write
5210000
trusted library section
page read and write
F7B000
heap
page read and write
1742000
trusted library allocation
page read and write
97F000
stack
page read and write
4CA6000
trusted library allocation
page read and write
5612000
trusted library allocation
page read and write
2A9E000
stack
page read and write
4B0A000
trusted library allocation
page read and write
16AE000
stack
page read and write
570E000
stack
page read and write
412000
remote allocation
page execute and read and write
80CC000
stack
page read and write
4186000
trusted library allocation
page read and write
6754000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
6630000
trusted library allocation
page execute and read and write
5712000
trusted library allocation
page read and write
35C0000
trusted library allocation
page read and write
2BA1000
trusted library allocation
page read and write
17BE000
stack
page read and write
8780000
trusted library section
page read and write
56D8000
trusted library allocation
page read and write
359C000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
3602000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
85C0000
heap
page read and write
6670000
trusted library allocation
page execute and read and write
35FC000
trusted library allocation
page read and write
57C0000
heap
page read and write
65CE000
stack
page read and write
1160000
trusted library allocation
page read and write
CCBD000
stack
page read and write
177A000
heap
page read and write
3316000
trusted library allocation
page read and write
3539000
trusted library allocation
page read and write
4CAA000
trusted library allocation
page read and write
3506000
trusted library allocation
page read and write
3809000
trusted library allocation
page read and write
2990000
heap
page read and write
308E000
stack
page read and write
3B07000
trusted library allocation
page read and write
318D000
trusted library allocation
page read and write
4399000
trusted library allocation
page read and write
6852000
heap
page read and write
679E000
stack
page read and write
3448000
trusted library allocation
page read and write
353B000
trusted library allocation
page read and write
41F9000
trusted library allocation
page read and write
326F000
stack
page read and write
6020000
trusted library allocation
page execute and read and write
162B000
trusted library allocation
page execute and read and write
356E000
trusted library allocation
page read and write
34A4000
trusted library allocation
page read and write
D10000
heap
page read and write
3458000
trusted library allocation
page read and write
F24000
heap
page read and write
402000
remote allocation
page execute and read and write
548C000
stack
page read and write
512E000
stack
page read and write
58AB000
trusted library allocation
page read and write
3525000
trusted library allocation
page read and write
3486000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
F8D000
heap
page read and write
C0B000
trusted library allocation
page execute and read and write
681C000
heap
page read and write
1650000
trusted library allocation
page execute and read and write
1185000
trusted library allocation
page execute and read and write
A35000
heap
page read and write
6160000
trusted library allocation
page read and write
3543000
trusted library allocation
page read and write
56CE000
trusted library allocation
page read and write
C460000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
CF00000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
4151000
trusted library allocation
page read and write
877E000
stack
page read and write
56B4000
trusted library allocation
page read and write
349E000
trusted library allocation
page read and write
34A2000
trusted library allocation
page read and write
650E000
stack
page read and write
CFD000
trusted library allocation
page execute and read and write
35E2000
trusted library allocation
page read and write
6616000
trusted library allocation
page read and write
35AA000
trusted library allocation
page read and write
3600000
trusted library allocation
page read and write
5CFE000
stack
page read and write
3310000
trusted library allocation
page read and write
357C000
trusted library allocation
page read and write
341A000
trusted library allocation
page read and write
2F9E000
stack
page read and write
CEFF000
stack
page read and write
1180000
trusted library allocation
page read and write
2C8C000
trusted library allocation
page read and write
34C0000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
34B4000
trusted library allocation
page read and write
5EFE000
stack
page read and write
32D0000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1670000
heap
page read and write
664E000
stack
page read and write
35CA000
trusted library allocation
page read and write
536C000
stack
page read and write
118B000
trusted library allocation
page execute and read and write
4331000
trusted library allocation
page read and write
41C000
remote allocation
page execute and read and write
4F90000
trusted library allocation
page read and write
2AFE000
stack
page read and write
18BE000
stack
page read and write
4F0E000
stack
page read and write
7FC30000
trusted library allocation
page execute and read and write
2F3A000
trusted library allocation
page read and write
2BE5000
trusted library allocation
page read and write
7F1A0000
trusted library allocation
page execute and read and write
8BB000
heap
page read and write
1395000
heap
page read and write
509C000
stack
page read and write
35E4000
trusted library allocation
page read and write
314A000
heap
page read and write
2F66000
trusted library allocation
page read and write
12AE000
stack
page read and write
675E000
stack
page read and write
2F0E000
stack
page read and write
3504000
trusted library allocation
page read and write
8CA6000
heap
page read and write
5230000
heap
page execute and read and write
5705000
trusted library allocation
page read and write
64D4000
heap
page read and write
346E000
trusted library allocation
page read and write
1585000
heap
page read and write
8DEB000
stack
page read and write
573E000
stack
page read and write
1740000
trusted library allocation
page read and write
C21D000
stack
page read and write
3434000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
4F8E000
stack
page read and write
7F50000
heap
page read and write
41E000
remote allocation
page execute and read and write
403000
remote allocation
page execute and read and write
3100000
trusted library allocation
page read and write
615E000
stack
page read and write
35F0000
trusted library allocation
page read and write
2B06000
trusted library allocation
page read and write
1448000
heap
page read and write
3552000
trusted library allocation
page read and write
5F54000
trusted library allocation
page read and write
35E6000
trusted library allocation
page read and write
334E000
stack
page read and write
419000
remote allocation
page execute and read and write
3502000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
9E9000
heap
page read and write
352D000
trusted library allocation
page read and write
C01E000
stack
page read and write
1AF0000
trusted library allocation
page read and write
5D57000
heap
page read and write
5D20000
trusted library allocation
page read and write
F9A000
stack
page read and write
345A000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
1690000
heap
page read and write
30FE000
stack
page read and write
14F8000
heap
page read and write
1445000
heap
page read and write
2C8A000
trusted library allocation
page read and write
6AF0000
heap
page read and write
3521000
trusted library allocation
page read and write
695E000
stack
page read and write
5EAC000
heap
page read and write
6751000
trusted library allocation
page read and write
8EFD000
stack
page read and write
52BE000
stack
page read and write
BF6000
trusted library allocation
page execute and read and write
5D28000
trusted library allocation
page read and write
10BA000
stack
page read and write
5700000
trusted library allocation
page read and write
3090000
heap
page read and write
356C000
trusted library allocation
page read and write
14DC000
heap
page read and write
CF0000
heap
page read and write
5C4E000
stack
page read and write
34E4000
trusted library allocation
page read and write
8292000
trusted library allocation
page read and write
80A3000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
27FF000
stack
page read and write
144F000
heap
page read and write
5D14000
trusted library allocation
page read and write
5026000
trusted library allocation
page read and write
43C8000
trusted library allocation
page read and write
35B8000
trusted library allocation
page read and write
1260000
heap
page read and write
68DE000
stack
page read and write
921D000
stack
page read and write
35CC000
trusted library allocation
page read and write
5760000
heap
page execute and read and write
2F2B000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
CB00000
heap
page read and write
4201000
trusted library allocation
page read and write
700000
heap
page read and write
66C7000
trusted library allocation
page read and write
6660000
trusted library allocation
page execute and read and write
13D9000
heap
page read and write
7FCC000
stack
page read and write
3476000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
35A0000
trusted library allocation
page read and write
656D000
stack
page read and write
3570000
trusted library allocation
page read and write
1780000
trusted library allocation
page execute and read and write
351B000
trusted library allocation
page read and write
3176000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
5D9000
stack
page read and write
E6D000
trusted library allocation
page execute and read and write
57B0000
heap
page read and write
549E000
stack
page read and write
1150000
trusted library allocation
page read and write
152E000
stack
page read and write
43C000
remote allocation
page execute and read and write
3562000
trusted library allocation
page read and write
14F0000
heap
page read and write
A00000
heap
page read and write
662F000
stack
page read and write
1082000
trusted library allocation
page read and write
4FEF000
trusted library allocation
page read and write
642E000
stack
page read and write
CC7C000
stack
page read and write
834E000
stack
page read and write
1330000
heap
page read and write
6BF000
unkown
page read and write
35B0000
trusted library allocation
page read and write
418000
remote allocation
page execute and read and write
404000
remote allocation
page execute and read and write
7F7E0000
trusted library allocation
page execute and read and write
579B000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
6490000
heap
page read and write
41B6000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
840000
heap
page read and write
34A6000
trusted library allocation
page read and write
3533000
trusted library allocation
page read and write
3117000
heap
page read and write
1430000
heap
page read and write
FB9000
heap
page read and write
D15000
heap
page read and write
3604000
trusted library allocation
page read and write
30EE000
stack
page read and write
863D000
stack
page read and write
CF5000
heap
page read and write
1640000
trusted library allocation
page read and write
D06000
trusted library allocation
page execute and read and write
5041000
trusted library allocation
page read and write
40D000
remote allocation
page execute and read and write
1787000
heap
page read and write
420000
remote allocation
page execute and read and write
335F000
trusted library allocation
page read and write
5F2F000
stack
page read and write
52D0000
trusted library section
page read and write
170D000
trusted library allocation
page execute and read and write
5704000
trusted library allocation
page read and write
3508000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
C1DC000
stack
page read and write
56F0000
trusted library allocation
page read and write
5B7E000
stack
page read and write
3527000
trusted library allocation
page read and write
A3A000
stack
page read and write
35BA000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
3548000
trusted library allocation
page read and write
347E000
trusted library allocation
page read and write
2939000
trusted library allocation
page read and write
F45000
heap
page read and write
2DF8000
trusted library allocation
page read and write
5F3E000
heap
page read and write
14C0000
trusted library allocation
page read and write
7EE40000
trusted library allocation
page execute and read and write
1736000
trusted library allocation
page execute and read and write
8C70000
trusted library allocation
page read and write
1417000
heap
page read and write
3361000
trusted library allocation
page read and write
2B1E000
trusted library allocation
page read and write
446E000
trusted library allocation
page read and write
570B000
trusted library allocation
page read and write
C40B000
stack
page read and write
3424000
trusted library allocation
page read and write
6C20000
trusted library allocation
page execute and read and write
5DAE000
stack
page read and write
5800000
trusted library allocation
page execute and read and write
2B90000
heap
page execute and read and write
1180000
heap
page read and write
844E000
stack
page read and write
422000
remote allocation
page execute and read and write
347C000
trusted library allocation
page read and write
C05E000
stack
page read and write
1090000
trusted library allocation
page read and write
35A8000
trusted library allocation
page read and write
3492000
trusted library allocation
page read and write
16FF000
stack
page read and write
3110000
heap
page read and write
602E000
stack
page read and write
5D38000
heap
page read and write
5390000
heap
page read and write
14AD000
heap
page read and write
3517000
trusted library allocation
page read and write
C70000
heap
page read and write
26F0000
heap
page execute and read and write
1577000
heap
page read and write
352B000
trusted library allocation
page read and write
303A000
stack
page read and write
15FD000
trusted library allocation
page execute and read and write
5726000
trusted library allocation
page read and write
4FF0000
heap
page read and write
6697000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
3110000
heap
page read and write
5FF7000
trusted library allocation
page read and write
3588000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
4E26000
trusted library allocation
page read and write
43B000
remote allocation
page execute and read and write
5E80000
heap
page read and write
3537000
trusted library allocation
page read and write
172A000
trusted library allocation
page execute and read and write
32D4000
trusted library allocation
page read and write
348C000
trusted library allocation
page read and write
C31E000
stack
page read and write
572D000
trusted library allocation
page read and write
5044000
trusted library allocation
page read and write
35C4000
trusted library allocation
page read and write
3488000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
7E5F000
stack
page read and write
648F000
stack
page read and write
5820000
heap
page read and write
357A000
trusted library allocation
page read and write
607D000
stack
page read and write
12B0000
heap
page read and write
1390000
heap
page read and write
1603000
trusted library allocation
page read and write
5DFE000
stack
page read and write
2FD0000
trusted library allocation
page read and write
54DE000
stack
page read and write
86CD000
stack
page read and write
59AC000
stack
page read and write
2F41000
trusted library allocation
page read and write
57A0000
trusted library allocation
page execute and read and write
30F0000
heap
page execute and read and write
48FB000
stack
page read and write
1730000
trusted library allocation
page read and write
29F0000
heap
page read and write
676E000
stack
page read and write
BF8E000
stack
page read and write
51D0000
trusted library allocation
page execute and read and write
311F000
unkown
page read and write
3456000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
B10000
heap
page read and write
2B26000
trusted library allocation
page read and write
CA5E000
stack
page read and write
56DD000
trusted library allocation
page read and write
5BB0000
heap
page read and write
35C6000
trusted library allocation
page read and write
C6E000
stack
page read and write
5F60000
trusted library allocation
page execute and read and write
C07000
trusted library allocation
page execute and read and write
3564000
trusted library allocation
page read and write
3BA1000
trusted library allocation
page read and write
5890000
heap
page read and write
1230000
trusted library allocation
page read and write
C91E000
stack
page read and write
3531000
trusted library allocation
page read and write
3120000
heap
page read and write
30D0000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
35EE000
trusted library allocation
page read and write
561A000
trusted library allocation
page read and write
2FF0000
heap
page execute and read and write
5D58000
trusted library allocation
page read and write
1722000
trusted library allocation
page read and write
1623000
trusted library allocation
page execute and read and write
1622000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
5D53000
heap
page read and write
2BAF000
stack
page read and write
17A0000
heap
page read and write
56CE000
stack
page read and write
5730000
trusted library allocation
page read and write
333F000
trusted library allocation
page read and write
3472000
trusted library allocation
page read and write
E80000
heap
page read and write
D02000
trusted library allocation
page read and write
672E000
stack
page read and write
26AE000
trusted library allocation
page read and write
29D5000
trusted library allocation
page read and write
5ED5000
heap
page read and write
3496000
trusted library allocation
page read and write
161A000
trusted library allocation
page execute and read and write
54CB000
stack
page read and write
A0E000
heap
page read and write
7FB00000
trusted library allocation
page execute and read and write
CE4000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
CE3000
trusted library allocation
page execute and read and write
3375000
trusted library allocation
page read and write
E00000
heap
page read and write
355E000
trusted library allocation
page read and write
8DF0000
heap
page read and write
14BA000
trusted library allocation
page execute and read and write
7AE0000
heap
page read and write
8CC1000
heap
page read and write
1784000
heap
page read and write
503A000
trusted library allocation
page read and write
4D80000
heap
page read and write
3480000
trusted library allocation
page read and write
64CF000
heap
page read and write
BF0000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
15F4000
trusted library allocation
page read and write
3462000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
14B6000
trusted library allocation
page execute and read and write
13B0000
heap
page read and write
5632000
trusted library allocation
page read and write
533F000
stack
page read and write
34DE000
trusted library allocation
page read and write
15F5000
heap
page read and write
5740000
trusted library allocation
page read and write
26C2000
trusted library allocation
page read and write
5C0E000
stack
page read and write
2B21000
trusted library allocation
page read and write
1680000
trusted library allocation
page execute and read and write
1097000
trusted library allocation
page execute and read and write
3250000
trusted library allocation
page read and write
8A03000
trusted library allocation
page read and write
352F000
trusted library allocation
page read and write
348E000
trusted library allocation
page read and write
3468000
trusted library allocation
page read and write
6500000
heap
page read and write
560B000
trusted library allocation
page read and write
34C4000
trusted library allocation
page read and write
3174000
trusted library allocation
page read and write
10F9000
stack
page read and write
3545000
trusted library allocation
page read and write
558E000
stack
page read and write
3130000
trusted library allocation
page read and write
679E000
stack
page read and write
35DC000
trusted library allocation
page read and write
350F000
trusted library allocation
page read and write
3529000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
527E000
stack
page read and write
12F9000
stack
page read and write
C70000
trusted library allocation
page execute and read and write
257D000
stack
page read and write
3050000
heap
page read and write
35D0000
trusted library allocation
page read and write
834B000
stack
page read and write
6930000
heap
page read and write
14E0000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
1092000
trusted library allocation
page read and write
3513000
trusted library allocation
page read and write
672000
unkown
page readonly
DFE000
stack
page read and write
7AF0000
heap
page read and write
400000
remote allocation
page execute and read and write
345E000
trusted library allocation
page read and write
CBE000
stack
page read and write
5D10000
trusted library allocation
page read and write
5823000
heap
page read and write
164A000
trusted library allocation
page execute and read and write
407000
remote allocation
page execute and read and write
1642000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
824E000
stack
page read and write
35EC000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
1703000
trusted library allocation
page execute and read and write
1710000
trusted library allocation
page read and write
35BC000
trusted library allocation
page read and write
C0DC000
stack
page read and write
35F6000
trusted library allocation
page read and write
2890000
heap
page execute and read and write
57A0000
heap
page read and write
4605000
trusted library allocation
page read and write
4F49000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
1713000
trusted library allocation
page execute and read and write
3C9000
stack
page read and write
297E000
stack
page read and write
2835000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
5338000
trusted library allocation
page read and write
14A5000
heap
page read and write
CE0000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
31C1000
trusted library allocation
page read and write
1B10000
heap
page read and write
5046000
trusted library allocation
page read and write
5792000
trusted library allocation
page read and write
69A2000
heap
page read and write
16FE000
stack
page read and write
56A0000
heap
page read and write
2BEF000
unkown
page read and write
287C000
stack
page read and write
1420000
heap
page read and write
3432000
trusted library allocation
page read and write
358F000
trusted library allocation
page read and write
34FF000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
1737000
trusted library allocation
page execute and read and write
C95E000
stack
page read and write
34B8000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
1844000
heap
page read and write
4209000
trusted library allocation
page read and write
26EF000
trusted library allocation
page read and write
2F4F000
stack
page read and write
571E000
trusted library allocation
page read and write
CDBE000
stack
page read and write
56F0000
heap
page execute and read and write
34E8000
trusted library allocation
page read and write
3438000
trusted library allocation
page read and write
32C0000
heap
page execute and read and write
5EB0000
heap
page read and write
1580000
trusted library allocation
page read and write
2845000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
14DE000
heap
page read and write
144E000
heap
page read and write
4DE2000
trusted library allocation
page read and write
134E000
stack
page read and write
D6A000
stack
page read and write
4121000
trusted library allocation
page read and write
436000
remote allocation
page execute and read and write
343E000
trusted library allocation
page read and write
34B6000
trusted library allocation
page read and write
680E000
stack
page read and write
14AE000
stack
page read and write
347A000
trusted library allocation
page read and write
12D0000
heap
page read and write
5756000
trusted library allocation
page read and write
14B0000
heap
page read and write
5640000
trusted library allocation
page read and write
34CA000
trusted library allocation
page read and write
35DE000
trusted library allocation
page read and write
40C000
remote allocation
page execute and read and write
35BE000
trusted library allocation
page read and write
5013000
heap
page read and write
109B000
trusted library allocation
page execute and read and write
11B7000
stack
page read and write
40B000
remote allocation
page execute and read and write
1086000
trusted library allocation
page execute and read and write
3466000
trusted library allocation
page read and write
3331000
trusted library allocation
page read and write
173A000
trusted library allocation
page execute and read and write
BE1D000
stack
page read and write
3428000
trusted library allocation
page read and write
15C3000
heap
page read and write
561E000
trusted library allocation
page read and write
C45E000
stack
page read and write
3482000
trusted library allocation
page read and write
5010000
trusted library allocation
page execute and read and write
1710000
trusted library allocation
page read and write
CB7B000
stack
page read and write
5EF0000
heap
page read and write
5060000
trusted library allocation
page execute and read and write
5020000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
5C0E000
stack
page read and write
16B0000
heap
page read and write
3560000
trusted library allocation
page read and write
5BFE000
stack
page read and write
174B000
trusted library allocation
page execute and read and write
630000
heap
page read and write
800000
heap
page read and write
41F000
remote allocation
page execute and read and write
5010000
heap
page read and write
692E000
stack
page read and write
50EE000
stack
page read and write
350C000
trusted library allocation
page read and write
5B80000
trusted library allocation
page execute and read and write
312C000
stack
page read and write
1764000
heap
page read and write
9AE000
stack
page read and write
7D1E000
stack
page read and write
612F000
stack
page read and write
3490000
trusted library allocation
page read and write
524E000
stack
page read and write
35E0000
trusted library allocation
page read and write
4FA0000
heap
page read and write
14B2000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
DE0000
heap
page read and write
15A0000
heap
page read and write
3AC9000
trusted library allocation
page read and write
349C000
trusted library allocation
page read and write
35F8000
trusted library allocation
page read and write
3801000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
3519000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
6640000
trusted library allocation
page execute and read and write
354A000
trusted library allocation
page read and write
EF8000
heap
page read and write
574E000
stack
page read and write
E7D000
trusted library allocation
page execute and read and write
5F70000
trusted library allocation
page read and write
6637000
trusted library allocation
page read and write
E73000
trusted library allocation
page read and write
5780000
heap
page read and write
523F000
stack
page read and write
3314000
trusted library allocation
page read and write
35C2000
trusted library allocation
page read and write
26B6000
trusted library allocation
page read and write
C40000
heap
page read and write
34D6000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
194F000
stack
page read and write
14CB000
trusted library allocation
page execute and read and write
8B0000
heap
page read and write
56E2000
trusted library allocation
page read and write
3450000
trusted library allocation
page read and write
2A58000
trusted library allocation
page read and write
5AEB000
stack
page read and write
4FE0000
trusted library allocation
page read and write
5986000
trusted library allocation
page read and write
5AAE000
stack
page read and write
58B0000
trusted library allocation
page execute and read and write
15B8000
trusted library allocation
page read and write
3370000
heap
page read and write
5706000
trusted library allocation
page read and write
581F000
trusted library allocation
page read and write
5F0C000
heap
page read and write
BD4000
trusted library allocation
page read and write
5606000
trusted library allocation
page read and write
355C000
trusted library allocation
page read and write
1624000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
413000
remote allocation
page execute and read and write
8640000
heap
page read and write
51CD000
stack
page read and write
34AA000
trusted library allocation
page read and write
34A8000
trusted library allocation
page read and write
A3F000
heap
page read and write
35F4000
trusted library allocation
page read and write
6DE0000
heap
page read and write
34D8000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
52BE000
stack
page read and write
5F3E000
stack
page read and write
438000
remote allocation
page execute and read and write
4DA0000
heap
page execute and read and write
6810000
heap
page read and write
34B0000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
502E000
trusted library allocation
page read and write
2580000
trusted library allocation
page execute and read and write
78C000
heap
page read and write
E8E000
heap
page read and write
2F60000
trusted library allocation
page read and write
6570000
trusted library allocation
page read and write
3454000
trusted library allocation
page read and write
502B000
trusted library allocation
page read and write
59EE000
stack
page read and write
26D6000
trusted library allocation
page read and write
67DE000
stack
page read and write
2984000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
33BF000
stack
page read and write
8450000
heap
page read and write
5F59000
trusted library allocation
page read and write
1590000
heap
page read and write
4159000
trusted library allocation
page read and write
359A000
trusted library allocation
page read and write
3556000
trusted library allocation
page read and write
1189000
heap
page read and write
3585000
trusted library allocation
page read and write
B20000
heap
page read and write
5B90000
trusted library allocation
page read and write
57D0000
heap
page read and write
90DD000
stack
page read and write
6B40000
heap
page read and write
3464000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
631E000
stack
page read and write
1657000
trusted library allocation
page execute and read and write
3106000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
9D9000
stack
page read and write
171D000
trusted library allocation
page execute and read and write
57C3000
heap
page read and write
5D3E000
stack
page read and write
343C000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
A6D000
stack
page read and write
35A2000
trusted library allocation
page read and write
1410000
heap
page read and write
5D7E000
stack
page read and write
408000
remote allocation
page execute and read and write
3440000
trusted library allocation
page read and write
5626000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
3572000
trusted library allocation
page read and write
3576000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
3444000
trusted library allocation
page read and write
31BD000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
8350000
trusted library allocation
page read and write
5CAE000
stack
page read and write
34AC000
trusted library allocation
page read and write
BD3000
trusted library allocation
page execute and read and write
34D0000
trusted library allocation
page read and write
1570000
trusted library allocation
page execute and read and write
6972000
heap
page read and write
C19E000
stack
page read and write
5D70000
heap
page read and write
950000
heap
page read and write
405000
remote allocation
page execute and read and write
172D000
trusted library allocation
page execute and read and write
3446000
trusted library allocation
page read and write
28A8000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
35D2000
trusted library allocation
page read and write
C50C000
stack
page read and write
2801000
trusted library allocation
page read and write
35C8000
trusted library allocation
page read and write
3140000
heap
page read and write
1400000
heap
page read and write
1732000
trusted library allocation
page read and write
13E5000
heap
page read and write
32DB000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
F26000
heap
page read and write
4D45000
trusted library allocation
page read and write
C64E000
stack
page read and write
5BAE000
stack
page read and write
5570000
trusted library allocation
page execute and read and write
5B31000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
5C3E000
stack
page read and write
435000
remote allocation
page execute and read and write
113C000
stack
page read and write
434000
remote allocation
page execute and read and write
3170000
trusted library allocation
page read and write
6004000
trusted library allocation
page read and write
32AC000
stack
page read and write
353F000
trusted library allocation
page read and write
BFA000
trusted library allocation
page execute and read and write
C8E000
stack
page read and write
BDD000
trusted library allocation
page execute and read and write
1735000
trusted library allocation
page execute and read and write
5D3E000
stack
page read and write
3478000
trusted library allocation
page read and write
34DC000
trusted library allocation
page read and write
1439000
heap
page read and write
1300000
heap
page read and write
59FE000
stack
page read and write
E63000
trusted library allocation
page execute and read and write
6650000
trusted library allocation
page read and write
40A000
remote allocation
page execute and read and write
15F0000
heap
page read and write
CF0000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
5024000
trusted library allocation
page read and write
90F0000
heap
page read and write
3511000
trusted library allocation
page read and write
1758000
heap
page read and write
5020000
trusted library allocation
page read and write
3591000
trusted library allocation
page read and write
2F3E000
trusted library allocation
page read and write
344E000
trusted library allocation
page read and write
1650000
heap
page read and write
59A0000
trusted library allocation
page execute and read and write
35D8000
trusted library allocation
page read and write
665C000
trusted library allocation
page read and write
BE3000
trusted library allocation
page read and write
B90000
heap
page read and write
156C000
stack
page read and write
35AE000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
8CDC000
stack
page read and write
59C3000
heap
page read and write
349A000
trusted library allocation
page read and write
50E9000
trusted library allocation
page read and write
13CE000
heap
page read and write
7F570000
trusted library allocation
page execute and read and write
3378000
trusted library allocation
page read and write
4D3E000
stack
page read and write
5D0E000
stack
page read and write
26D0000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
6620000
trusted library allocation
page read and write
1535000
heap
page read and write
56CE000
stack
page read and write
31B6000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
417A000
trusted library allocation
page read and write
4D95000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
5380000
trusted library section
page read and write
B37000
stack
page read and write
6610000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
41B000
remote allocation
page execute and read and write
1463000
heap
page read and write
1720000
trusted library allocation
page read and write
4514000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
56F0000
heap
page execute and read and write
13B8000
heap
page read and write
6B00000
trusted library allocation
page execute and read and write
3365000
trusted library allocation
page read and write
34C8000
trusted library allocation
page read and write
BE20000
heap
page read and write
2694000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
601C000
trusted library allocation
page read and write
5BC0000
heap
page read and write
88E000
unkown
page read and write
5C8E000
stack
page read and write
2FD8000
trusted library allocation
page read and write
424000
remote allocation
page execute and read and write
13AD000
trusted library allocation
page execute and read and write
FCA000
stack
page read and write
F1A000
heap
page read and write
14C5000
trusted library allocation
page execute and read and write
341C000
trusted library allocation
page read and write
C15E000
stack
page read and write
1800000
heap
page read and write
DD0000
heap
page read and write
2680000
trusted library allocation
page read and write
158E000
stack
page read and write
12F7000
stack
page read and write
5F51000
trusted library allocation
page read and write
F21000
heap
page read and write
1640000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
1790000
heap
page read and write
BF2000
trusted library allocation
page read and write
3363000
trusted library allocation
page read and write
1616000
trusted library allocation
page execute and read and write
1182000
trusted library allocation
page read and write
344C000
trusted library allocation
page read and write
5A0E000
stack
page read and write
162D000
trusted library allocation
page execute and read and write
C02000
trusted library allocation
page read and write
14C2000
trusted library allocation
page read and write
1466000
heap
page read and write
15F0000
trusted library allocation
page read and write
3594000
trusted library allocation
page read and write
14FE000
heap
page read and write
6520000
trusted library allocation
page execute and read and write
358D000
trusted library allocation
page read and write
32FD000
trusted library allocation
page read and write
6658000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
ABF000
unkown
page read and write
7ADD000
stack
page read and write
41D000
remote allocation
page execute and read and write
11E0000
heap
page read and write
1537000
heap
page read and write
3140000
heap
page execute and read and write
EEE000
stack
page read and write
5A60000
heap
page execute and read and write
34C6000
trusted library allocation
page read and write
1627000
trusted library allocation
page execute and read and write
263C000
stack
page read and write
1732000
trusted library allocation
page read and write
34EE000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
4266000
trusted library allocation
page read and write
13E3000
heap
page read and write
465F000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
8E30000
trusted library allocation
page read and write
518F000
trusted library allocation
page read and write
EBF000
heap
page read and write
BED000
trusted library allocation
page execute and read and write
5EA2000
heap
page read and write
38D000
stack
page read and write
346C000
trusted library allocation
page read and write
5D30000
heap
page read and write
2B2D000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
4BF5000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page execute and read and write
1B19000
heap
page read and write
5B9E000
stack
page read and write
28E8000
trusted library allocation
page read and write
346A000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
3580000
trusted library allocation
page read and write
6577000
trusted library allocation
page read and write
668E000
stack
page read and write
348A000
trusted library allocation
page read and write
120E000
stack
page read and write
6520000
trusted library allocation
page execute and read and write
34CE000
trusted library allocation
page read and write
5B0C000
stack
page read and write
F63000
heap
page read and write
414000
remote allocation
page execute and read and write
35F2000
trusted library allocation
page read and write
BE8E000
stack
page read and write
AFE000
stack
page read and write
6510000
heap
page read and write
1459000
heap
page read and write
853B000
stack
page read and write
13A0000
trusted library allocation
page read and write
5732000
trusted library allocation
page read and write
503E000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
2DDD000
stack
page read and write
43E000
remote allocation
page execute and read and write
2B73000
heap
page read and write
539D000
stack
page read and write
35FA000
trusted library allocation
page read and write
142D000
stack
page read and write
14D4000
heap
page read and write
CED000
trusted library allocation
page execute and read and write
2B0B000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
1704000
trusted library allocation
page read and write
5EFA000
heap
page read and write
6572000
heap
page read and write
3484000
trusted library allocation
page read and write
7F320000
trusted library allocation
page execute and read and write
5E7F000
stack
page read and write
336E000
trusted library allocation
page read and write
C90000
heap
page read and write
157D000
heap
page read and write
1726000
trusted library allocation
page execute and read and write
5980000
trusted library allocation
page read and write
6644000
trusted library allocation
page read and write
35D4000
trusted library allocation
page read and write
1465000
heap
page read and write
16B0000
heap
page read and write
6BA0000
heap
page read and write
342A000
trusted library allocation
page read and write
34FD000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
1460000
heap
page read and write
2A55000
trusted library allocation
page read and write
35B6000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
2F46000
trusted library allocation
page read and write
4D83000
heap
page read and write
171D000
trusted library allocation
page execute and read and write
5830000
trusted library allocation
page read and write
4EF8000
trusted library allocation
page read and write
770000
heap
page read and write
34AE000
trusted library allocation
page read and write
2FB0000
heap
page read and write
1646000
trusted library allocation
page execute and read and write
AAA000
stack
page read and write
4B9E000
stack
page read and write
3267000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
2FA3000
heap
page read and write
5140000
heap
page execute and read and write
14FE000
heap
page read and write
6C0000
heap
page read and write
35AC000
trusted library allocation
page read and write
35E8000
trusted library allocation
page read and write
E4E000
stack
page read and write
1380000
heap
page read and write
10FE000
stack
page read and write
11C0000
trusted library allocation
page execute and read and write
358B000
trusted library allocation
page read and write
A41000
heap
page read and write
34FB000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
34BA000
trusted library allocation
page read and write
611E000
stack
page read and write
117F000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
5F43000
heap
page read and write
5040000
trusted library allocation
page read and write
3442000
trusted library allocation
page read and write
151C000
heap
page read and write
1723000
trusted library allocation
page read and write
3869000
trusted library allocation
page read and write
5A4E000
stack
page read and write
33CC000
trusted library allocation
page read and write
654C000
heap
page read and write
4339000
trusted library allocation
page read and write
EFA000
stack
page read and write
1420000
trusted library allocation
page read and write
4129000
trusted library allocation
page read and write
1245000
heap
page read and write
8A42000
trusted library allocation
page read and write
2B04000
trusted library allocation
page read and write
35B2000
trusted library allocation
page read and write
66BD000
stack
page read and write
1393000
trusted library allocation
page execute and read and write
8C60000
trusted library allocation
page execute and read and write
526C000
stack
page read and write
3420000
trusted library allocation
page read and write
C650000
trusted library allocation
page read and write
34B2000
trusted library allocation
page read and write
5128000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
43A000
remote allocation
page execute and read and write
5A3E000
stack
page read and write
34C2000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
34EA000
trusted library allocation
page read and write
7FDF0000
trusted library allocation
page execute and read and write
335D000
trusted library allocation
page read and write
EC1000
heap
page read and write
17CD000
heap
page read and write
6510000
trusted library allocation
page execute and read and write
5B34000
trusted library allocation
page read and write
5B4E000
stack
page read and write
8DA000
stack
page read and write
500B000
trusted library allocation
page read and write
3180000
heap
page execute and read and write
35EA000
trusted library allocation
page read and write
569C000
stack
page read and write
4D58000
trusted library allocation
page read and write
34E2000
trusted library allocation
page read and write
7D5E000
stack
page read and write
14E0000
trusted library allocation
page read and write
4265000
trusted library allocation
page read and write
58D000
stack
page read and write
415000
remote allocation
page execute and read and write
2FDC000
stack
page read and write
57C0000
heap
page read and write
3104000
trusted library allocation
page read and write
34CC000
trusted library allocation
page read and write
3480000
trusted library allocation
page read and write
6530000
heap
page read and write
3849000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
160D000
trusted library allocation
page execute and read and write
4DE0000
trusted library allocation
page read and write
3BA9000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
3452000
trusted library allocation
page read and write
F16000
heap
page read and write
139D000
trusted library allocation
page execute and read and write
5D50000
trusted library allocation
page read and write
267E000
stack
page read and write
4C9B000
stack
page read and write
3C09000
trusted library allocation
page read and write
2F2E000
trusted library allocation
page read and write
3574000
trusted library allocation
page read and write
355A000
trusted library allocation
page read and write
5740000
heap
page execute and read and write
56D0000
trusted library allocation
page read and write
108A000
trusted library allocation
page execute and read and write
15F3000
trusted library allocation
page execute and read and write
2539000
trusted library allocation
page read and write
1760000
heap
page read and write
C80000
heap
page read and write
562D000
trusted library allocation
page read and write
351F000
trusted library allocation
page read and write
4179000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
316E000
stack
page read and write
8CE4000
heap
page read and write
2530000
trusted library allocation
page read and write
66CF000
stack
page read and write
D8F000
stack
page read and write
32F6000
trusted library allocation
page read and write
31FF000
stack
page read and write
670000
unkown
page readonly
154E000
stack
page read and write
4379000
trusted library allocation
page read and write
45B9000
trusted library allocation
page read and write
5EA6000
heap
page read and write
25D0000
heap
page read and write
2FE0000
trusted library allocation
page read and write
283E000
stack
page read and write
EF0000
heap
page read and write
E9F000
heap
page read and write
6030000
trusted library allocation
page execute and read and write
672E000
stack
page read and write
4D40000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
A0A000
heap
page read and write
409000
remote allocation
page execute and read and write
315E000
stack
page read and write
58A0000
trusted library allocation
page read and write
4EA4000
trusted library allocation
page read and write
3515000
trusted library allocation
page read and write
1438000
heap
page read and write
41A000
remote allocation
page execute and read and write
26D4000
trusted library allocation
page read and write
137E000
stack
page read and write
6780000
trusted library allocation
page read and write
C29E000
stack
page read and write
3474000
trusted library allocation
page read and write
3606000
trusted library allocation
page read and write
25F0000
heap
page read and write
5002000
trusted library allocation
page read and write
537D000
stack
page read and write
3494000
trusted library allocation
page read and write
5380000
trusted library allocation
page execute and read and write
5150000
heap
page read and write
5C9000
stack
page read and write
560E000
trusted library allocation
page read and write
4DEB000
trusted library allocation
page read and write
3566000
trusted library allocation
page read and write
14C7000
trusted library allocation
page execute and read and write
4E46000
trusted library allocation
page read and write
333B000
trusted library allocation
page read and write
960000
heap
page read and write
359E000
trusted library allocation
page read and write
67E000
unkown
page read and write
4316000
trusted library allocation
page read and write
90E0000
heap
page read and write
1750000
heap
page read and write
160F000
stack
page read and write
34BE000
trusted library allocation
page read and write
157F000
heap
page read and write
1140000
trusted library allocation
page execute and read and write
2980000
trusted library allocation
page execute and read and write
890000
heap
page read and write
35D6000
trusted library allocation
page read and write
6C10000
heap
page read and write
342C000
trusted library allocation
page read and write
4DFE000
trusted library allocation
page read and write
34D4000
trusted library allocation
page read and write
176F000
heap
page read and write
820E000
stack
page read and write
7C1D000
stack
page read and write
35A6000
trusted library allocation
page read and write
165B000
trusted library allocation
page execute and read and write
C54E000
stack
page read and write
35DA000
trusted library allocation
page read and write
3320000
heap
page read and write
2F20000
trusted library allocation
page read and write
504D000
trusted library allocation
page read and write
30A0000
heap
page read and write
4199000
trusted library allocation
page read and write
2C60000
heap
page read and write
32B0000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
57A3000
heap
page read and write
3AA1000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
30CC000
stack
page read and write
4229000
trusted library allocation
page read and write
5CCE000
stack
page read and write
156D000
heap
page read and write
568E000
stack
page read and write
35A4000
trusted library allocation
page read and write
FF9000
stack
page read and write
6B50000
heap
page read and write
4DD0000
heap
page read and write
34EC000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
4F4E000
stack
page read and write
32F1000
trusted library allocation
page read and write
2B70000
heap
page read and write
657A000
heap
page read and write
1430000
heap
page read and write
1610000
trusted library allocation
page read and write
3436000
trusted library allocation
page read and write
2FE0000
heap
page read and write
A20000
heap
page read and write
34E0000
trusted library allocation
page read and write
64C4000
heap
page read and write
A80000
heap
page read and write
8DDD000
stack
page read and write
3550000
trusted library allocation
page read and write
77A000
heap
page read and write
6B50000
trusted library allocation
page execute and read and write
640F000
stack
page read and write
3535000
trusted library allocation
page read and write
3498000
trusted library allocation
page read and write
35FE000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
34BC000
trusted library allocation
page read and write
6934000
heap
page read and write
30DE000
unkown
page read and write
577E000
stack
page read and write
AC2000
heap
page read and write
C35E000
stack
page read and write
31A4000
trusted library allocation
page read and write
1660000
heap
page read and write
451A000
trusted library allocation
page read and write
925000
heap
page read and write
34D2000
trusted library allocation
page read and write
F7F000
heap
page read and write
107F000
stack
page read and write
There are 1318 hidden memdumps, click here to show them.