IOC Report
UGS - CRO REQ - KHIDUBAI (OPL-841724).scr

loading gif

Files

File Path
Type
Category
Malicious
UGS - CRO REQ - KHIDUBAI (OPL-841724).scr
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Kbojz.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Buyeg.tmpdb
SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Temp\Cocwtjozfrv.tmpdb
SQLite 3.x database, last written using SQLite version 3008001, file counter 24, database pages 5, cookie 0xf, schema 4, UTF-8, version-valid-for 24
dropped
C:\Users\user\AppData\Local\Temp\Eiakizpyayx.tmpdb
SQLite 3.x database, user version 35, last written using SQLite version 3008001, page size 32768, writer version 2, read version 2, file counter 3, database pages 35, cookie 0x1d, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Eyyfpwdpwe.tmpdb
SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 3, database pages 20, cookie 0x15, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Jalcxg.tmpdb
SQLite 3.x database, last written using SQLite version 3008001, file counter 24, database pages 5, cookie 0xf, schema 4, UTF-8, version-valid-for 24
dropped
C:\Users\user\AppData\Local\Temp\Kcidab.tmpdb
SQLite 3.x database, last written using SQLite version 3008001, file counter 13, database pages 30, 1st free page 27, free pages 1, cookie 0x1e, schema 4, UTF-8, version-valid-for 13
dropped
C:\Users\user\AppData\Local\Temp\Mwcft.tmpdb
SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 3, database pages 20, cookie 0x15, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Nqzztyyufmf.tmp
SQLite 3.x database, last written using SQLite version 3008001, file counter 24, database pages 5, cookie 0xf, schema 4, UTF-8, version-valid-for 24
dropped
C:\Users\user\AppData\Local\Temp\Ntxfuk.tmpdb
SQLite 3.x database, last written using SQLite version 3008001, file counter 13, database pages 30, 1st free page 27, free pages 1, cookie 0x1e, schema 4, UTF-8, version-valid-for 13
dropped
C:\Users\user\AppData\Local\Temp\Oazzuwge.tmpdb
SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Temp\Opnjh.tmpdb
SQLite 3.x database, user version 7, last written using SQLite version 3008001, page size 32768, writer version 2, read version 2, file counter 5, database pages 4, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\Owotczgukzq.tmpdb
SQLite 3.x database, last written using SQLite version 3008001, file counter 13, database pages 30, 1st free page 27, free pages 1, cookie 0x1e, schema 4, UTF-8, version-valid-for 13
dropped
C:\Users\user\AppData\Local\Temp\Pxmvdvdnhp.tmpdb
SQLite 3.x database, user version 7, last written using SQLite version 3008001, page size 32768, writer version 2, read version 2, file counter 5, database pages 4, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\Rdlgtuxmdrq.tmpdb
SQLite 3.x database, last written using SQLite version 3008001, file counter 13, database pages 30, 1st free page 27, free pages 1, cookie 0x1e, schema 4, UTF-8, version-valid-for 13
dropped
C:\Users\user\AppData\Local\Temp\Rgcgvjqbqci.tmpdb
SQLite 3.x database, last written using SQLite version 3008001, file counter 13, database pages 30, 1st free page 27, free pages 1, cookie 0x1e, schema 4, UTF-8, version-valid-for 13
dropped
C:\Users\user\AppData\Local\Temp\Stygcpda.tmpdb
SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Temp\Urmvri.tmpdb
SQLite 3.x database, last written using SQLite version 3008001, file counter 13, database pages 30, 1st free page 27, free pages 1, cookie 0x1e, schema 4, UTF-8, version-valid-for 13
dropped
C:\Users\user\AppData\Local\Temp\Uwdvtizbx.tmpdb
SQLite 3.x database, user version 35, last written using SQLite version 3008001, page size 32768, writer version 2, read version 2, file counter 3, database pages 35, cookie 0x1d, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Vloljy\7xwghk55.default\key3.db
Berkeley DB 1.85 (Hash, version 2, native byte-order)
dropped
C:\Users\user\AppData\Local\Temp\Zfpoqrkrnxm.tmp
SQLite 3.x database, last written using SQLite version 3008001, file counter 24, database pages 5, cookie 0xf, schema 4, UTF-8, version-valid-for 24
dropped
C:\Users\user\AppData\Local\Temp\Zlxloj.tmpdb
SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Temp\Zpbxo\7xwghk55.default\key3.db
Berkeley DB 1.85 (Hash, version 2, native byte-order)
dropped
C:\Users\user\AppData\Roaming\Kbojz.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UGS - CRO REQ - KHIDUBAI (OPL-841724).scr
"C:\Users\user\Desktop\UGS - CRO REQ - KHIDUBAI (OPL-841724).scr" /S
malicious
C:\Users\user\Desktop\UGS - CRO REQ - KHIDUBAI (OPL-841724).scr
"C:\Users\user\Desktop\UGS - CRO REQ - KHIDUBAI (OPL-841724).scr"
malicious
C:\Users\user\AppData\Roaming\Kbojz.exe
"C:\Users\user\AppData\Roaming\Kbojz.exe"
malicious
C:\Users\user\AppData\Roaming\Kbojz.exe
"C:\Users\user\AppData\Roaming\Kbojz.exe"
malicious
C:\Users\user\AppData\Roaming\Kbojz.exe
"C:\Users\user\AppData\Roaming\Kbojz.exe"
malicious
C:\Users\user\AppData\Roaming\Kbojz.exe
"C:\Users\user\AppData\Roaming\Kbojz.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/search%3Fq%3Dwmf%2B5.1%26oq%3Dwmf
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://onedrive.live.com/download?resid=26943FEBC022618F%21481&authkey=
unknown
http://ocsp.entrust.net03
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
https://utqurw.am.files.1drv.com/y4mFbMW97TPAIW_iquyB-Ao69Foeiu4Lp0Em3x5_9O_Ik0LysS9rZcK8ox-X1Eantad
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://skydrive.live.com/redir.aspx?resid=26943FEBC022618F%21481&avres=Infected&averror=SUCCESS&vin
unknown
https://github.com/mgravell/protobuf-neti
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.google.com/search?q=wmf
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
http://ocsp.entrust.net0D
unknown
https://onedrive.live.com/download?resid=26943FEBC022618F%21479&authkey=!APRD0RAPKJuy4WE
13.107.137.11
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://public.am.files.1drv.com/y4msme9eT8kXrOR-7wV9kiBohdMur1Lbs151ysdQuqKOSsl3mAiWGdSV3LP6WqYY9va
unknown
http://onedrive.live.com
unknown
https://onedrive.live.com/download?resid=26943FEBC022618F%21481&authkey=!AJjxgOKv6NEIF-A
13.107.137.11
https://stackoverflow.com/q/14436606/23354
unknown
http://crl.entrust.net/server1.crl0
unknown
https://onedrive.live.com
unknown
https://www.google.com/search?q=test&oq=test&aqs=chrome..69i57j46j0l3j46j0.427j0j7&sourceid=chrome&i
unknown
http://ocsp.thawte.com0
unknown
https://github.com/mgravell/protobuf-net
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://onedrive.live.com/download?resid=26943FEBC022618F%21479&authkey=
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
http://www.symauth.com/cps0(
unknown
https://public.am.files.1drv.com/y4mQE8Cn-ey22tLqFzNP6Bvc0YOHW16UYVvHKAtb_HbiHHBX320gCSUBo3NE91NAaiU
unknown
https://www.google.com/favicon.ico
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://www.google.com/sorry/index
unknown
https://onedrive.live.com/download?resid=26943FEBC022618F
unknown
https://skydrive.live.com
unknown
http://www.symauth.com/rpa00
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://utqurw.am.files.1drv.com
unknown
https://public.am.files.1drv.com/y4mAdtlexFWsAsM5m_v175jQDQZ3JlPlheZX222y4JutpDgoqJHt5wLr_wX4GD45dXi
unknown
http://www.codeplex.com/DotNetZip
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/search%3Fq%3Dtest%26oq%3Dtest%26a
unknown
https://www.google.com/search?q=net
unknown
https://www.google.com/sorry/indextest
unknown
https://public.am.files.1drv.com
unknown
https://utqurw.am.files.1drv.com/y4ms_vWzniFUJaBcF0Y1jNwvuu_3iedMM7s1JmtuLb_AtOzVrcYjTWzJYemZ-gol7I6
unknown
https://secure.comodo.com/CPS0
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://utqurw.am.files.1drv.com
unknown
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
There are 42 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dual-spov-0006.spov-msedge.net
13.107.137.11
dual-spov-0006.spov-dc-msedge.net
150.171.41.11
public.am.files.1drv.com
unknown
utqurw.am.files.1drv.com
unknown
onedrive.live.com
unknown
skydrive.live.com
unknown
63.155.11.0.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
150.171.41.11
dual-spov-0006.spov-dc-msedge.net
United States
13.107.137.11
dual-spov-0006.spov-msedge.net
United States
80.85.152.161
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\UGS - CRO REQ - KHIDUBAI (OPL-841724)_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\UGS - CRO REQ - KHIDUBAI (OPL-841724)_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\UGS - CRO REQ - KHIDUBAI (OPL-841724)_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\UGS - CRO REQ - KHIDUBAI (OPL-841724)_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\UGS - CRO REQ - KHIDUBAI (OPL-841724)_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\UGS - CRO REQ - KHIDUBAI (OPL-841724)_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\UGS - CRO REQ - KHIDUBAI (OPL-841724)_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\UGS - CRO REQ - KHIDUBAI (OPL-841724)_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\UGS - CRO REQ - KHIDUBAI (OPL-841724)_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\UGS - CRO REQ - KHIDUBAI (OPL-841724)_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\UGS - CRO REQ - KHIDUBAI (OPL-841724)_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\UGS - CRO REQ - KHIDUBAI (OPL-841724)_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Kbojz
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\Kbojz_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\Kbojz_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\Kbojz_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\Kbojz_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\Kbojz_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\Kbojz_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\Kbojz_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\Kbojz_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\Kbojz_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\Kbojz_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\Kbojz_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Tracing\Kbojz_RASMANCS
FileDirectory
There are 17 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2271000
trusted library allocation
page read and write
malicious
4250000
trusted library section
page read and write
malicious
640000
trusted library section
page read and write
malicious
3925000
trusted library allocation
page read and write
malicious
3EDF000
trusted library allocation
page read and write
malicious
2362000
trusted library allocation
page read and write
malicious
2384000
trusted library allocation
page read and write
malicious
25FD000
trusted library allocation
page read and write
malicious
3C53000
trusted library allocation
page read and write
malicious
2577000
trusted library allocation
page read and write
malicious
392F000
trusted library allocation
page read and write
malicious
2251000
trusted library allocation
page read and write
malicious
22E5000
trusted library allocation
page read and write
malicious
3990000
trusted library allocation
page read and write
malicious
46B0000
trusted library section
page read and write
malicious
21F5000
trusted library allocation
page read and write
malicious
7180000
trusted library section
page read and write
malicious
6010000
trusted library section
page read and write
malicious
32F1000
trusted library allocation
page read and write
malicious
3351000
trusted library allocation
page read and write
malicious
4CF0000
trusted library section
page read and write
malicious
2436000
trusted library allocation
page read and write
malicious
1AA000
trusted library allocation
page execute and read and write
1EA6000
trusted library allocation
page read and write
1A0000
trusted library allocation
page read and write
162000
trusted library allocation
page read and write
50F000
heap
page read and write
37E8000
trusted library allocation
page read and write
152000
trusted library allocation
page read and write
5D9E000
stack
page read and write
582000
trusted library allocation
page read and write
566D000
heap
page read and write
200D000
trusted library allocation
page read and write
D3000
trusted library allocation
page execute and read and write
56BD000
heap
page read and write
253C000
trusted library allocation
page read and write
909E000
stack
page read and write
53FE000
stack
page read and write
3F66000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
60C4000
heap
page read and write
1CC000
stack
page read and write
3DB8000
trusted library allocation
page read and write
1F40000
trusted library allocation
page read and write
1E0000
trusted library allocation
page execute and read and write
7F3000
heap
page read and write
221D000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
7C7000
trusted library allocation
page read and write
372000
trusted library allocation
page read and write
4DAE000
stack
page read and write
134000
trusted library allocation
page read and write
59EE000
stack
page read and write
A36000
heap
page read and write
7A2000
heap
page read and write
4E6E000
stack
page read and write
55CC000
stack
page read and write
233E000
trusted library allocation
page read and write
32E5000
trusted library allocation
page read and write
1F10000
trusted library allocation
page execute and read and write
58CE000
stack
page read and write
231F000
trusted library allocation
page read and write
25A9000
trusted library allocation
page read and write
36E8000
trusted library allocation
page read and write
470000
heap
page read and write
241C000
trusted library allocation
page read and write
665F000
stack
page read and write
582E000
stack
page read and write
8C83000
trusted library allocation
page read and write
1B0000
trusted library allocation
page read and write
2416000
trusted library allocation
page read and write
937000
heap
page read and write
7F0000
trusted library allocation
page execute and read and write
770000
trusted library allocation
page read and write
581E000
stack
page read and write
2421000
trusted library allocation
page read and write
1E0000
trusted library allocation
page execute and read and write
2344000
trusted library allocation
page read and write
6CFE000
stack
page read and write
24E6000
trusted library allocation
page read and write
4E7000
heap
page read and write
2430000
trusted library allocation
page read and write
3A55000
trusted library allocation
page read and write
21DE000
stack
page read and write
6FF000
trusted library allocation
page read and write
1F00000
trusted library allocation
page execute and read and write
42D0000
heap
page read and write
96EF000
stack
page read and write
3D0000
trusted library allocation
page read and write
20E6000
trusted library allocation
page read and write
503E000
stack
page read and write
229000
heap
page read and write
864000
heap
page read and write
592C000
stack
page read and write
50D0000
heap
page read and write
193000
trusted library allocation
page read and write
213C000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
4EBB000
stack
page read and write
480000
heap
page read and write
2115000
trusted library allocation
page read and write
3F66000
trusted library allocation
page read and write
221B000
trusted library allocation
page read and write
5E1D000
heap
page read and write
24DA000
trusted library allocation
page read and write
5B5E000
stack
page read and write
22EF000
stack
page read and write
2200000
trusted library allocation
page read and write
38000
heap
page read and write
ABE000
trusted library allocation
page read and write
8F50000
heap
page read and write
249E000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
803000
unkown
page execute read
210000
trusted library allocation
page execute and read and write
225A000
trusted library allocation
page read and write
24F1000
trusted library allocation
page read and write
6E6E000
stack
page read and write
50AE000
stack
page read and write
511E000
stack
page read and write
1A6000
trusted library allocation
page execute and read and write
B08000
heap
page read and write
1FD0000
trusted library allocation
page execute and read and write
25B1000
trusted library allocation
page read and write
53FE000
stack
page read and write
6C7C000
stack
page read and write
2521000
trusted library allocation
page read and write
3E9000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
2481000
trusted library allocation
page read and write
60E000
stack
page read and write
71D000
stack
page read and write
80000
unkown
page readonly
23AB000
trusted library allocation
page read and write
24E6000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
548D000
stack
page read and write
536D000
stack
page read and write
675E000
stack
page read and write
162000
trusted library allocation
page read and write
6180000
trusted library section
page read and write
3DF000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
4E2D000
stack
page read and write
51DE000
stack
page read and write
1DF0000
trusted library allocation
page read and write
1E70000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
32AF000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page execute and read and write
B97000
heap
page read and write
3FF1000
trusted library allocation
page read and write
2312000
trusted library allocation
page read and write
20C0000
heap
page read and write
9A6000
heap
page read and write
42D0000
trusted library allocation
page read and write
2538000
trusted library allocation
page read and write
B00000
heap
page read and write
3CCA000
trusted library allocation
page read and write
50AE000
stack
page read and write
24D2000
trusted library allocation
page read and write
7F8000
heap
page read and write
460000
trusted library allocation
page read and write
2594000
trusted library allocation
page read and write
241A000
trusted library allocation
page read and write
3B88000
trusted library allocation
page read and write
2124000
trusted library allocation
page read and write
B90000
heap
page read and write
1FF000
trusted library allocation
page read and write
1F20000
trusted library allocation
page read and write
220F000
stack
page read and write
4190000
trusted library section
page read and write
59AE000
stack
page read and write
2252000
trusted library allocation
page read and write
16A000
trusted library allocation
page execute and read and write
5B20000
heap
page read and write
1F30000
heap
page read and write
20B0000
trusted library allocation
page read and write
50DE000
stack
page read and write
350000
trusted library allocation
page read and write
196000
trusted library allocation
page execute and read and write
70D000
stack
page read and write
720000
heap
page read and write
25D1000
trusted library allocation
page read and write
4D00000
trusted library allocation
page execute and read and write
566F000
heap
page read and write
630000
trusted library allocation
page read and write
246E000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
184000
trusted library allocation
page read and write
3C7F000
trusted library allocation
page read and write
2323000
trusted library allocation
page read and write
5D2F000
stack
page read and write
1F60000
trusted library allocation
page execute and read and write
1B0000
trusted library allocation
page read and write
2380000
trusted library allocation
page read and write
5B0000
trusted library allocation
page read and write
88F000
heap
page read and write
120000
trusted library allocation
page read and write
368000
trusted library allocation
page read and write
606000
heap
page read and write
4BF000
heap
page read and write
445E000
stack
page read and write
B1E000
stack
page read and write
580000
trusted library allocation
page read and write
248B000
trusted library allocation
page read and write
2128000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page execute and read and write
7023000
trusted library allocation
page read and write
253E000
trusted library allocation
page read and write
4DB0000
heap
page read and write
60D4000
heap
page read and write
2557000
trusted library allocation
page read and write
32C5000
trusted library allocation
page read and write
3617000
trusted library allocation
page read and write
24A3000
trusted library allocation
page read and write
9A0000
heap
page read and write
2787000
trusted library allocation
page read and write
2504000
trusted library allocation
page read and write
50FE000
stack
page read and write
220E000
stack
page read and write | page guard
5C8C000
stack
page read and write
6044000
heap
page read and write
177000
trusted library allocation
page execute and read and write
3FA8000
trusted library allocation
page read and write
1B7000
trusted library allocation
page execute and read and write
4E7E000
stack
page read and write
402000
remote allocation
page execute and read and write
3E3F000
trusted library allocation
page read and write
3D1C000
trusted library allocation
page read and write
410000
trusted library allocation
page read and write
2355000
trusted library allocation
page read and write
1EA0000
trusted library allocation
page read and write
2359000
trusted library allocation
page read and write
3F86000
trusted library allocation
page read and write
5AD000
heap
page read and write
2428000
trusted library allocation
page read and write
24E9000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
5160000
heap
page read and write
508E000
stack
page read and write | page guard
5D0000
trusted library allocation
page read and write
664E000
stack
page read and write
500000
trusted library allocation
page read and write
3C33000
trusted library allocation
page read and write
3C2A000
trusted library allocation
page read and write
2247000
trusted library allocation
page read and write
6390000
heap
page read and write
616F000
stack
page read and write
51B000
heap
page read and write
2471000
trusted library allocation
page read and write
2925000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
2210000
heap
page read and write
504E000
stack
page read and write
2283000
trusted library allocation
page read and write
4CAD000
heap
page read and write
25C2000
trusted library allocation
page read and write
4E00000
trusted library allocation
page execute and read and write
1E90000
trusted library allocation
page read and write
800000
unkown
page readonly
2211000
trusted library allocation
page read and write
3E0000
heap
page read and write
8E8000
heap
page read and write
143000
trusted library allocation
page execute and read and write
4D0000
trusted library allocation
page read and write
586E000
stack
page read and write
93EE000
stack
page read and write
840000
heap
page read and write
30F1000
trusted library allocation
page read and write
83000
unkown
page execute read
4C0000
heap
page read and write
144000
trusted library allocation
page read and write
2598000
trusted library allocation
page read and write
144000
trusted library allocation
page read and write
20B000
heap
page read and write
1E0000
trusted library allocation
page execute and read and write
3EFF000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
730000
heap
page execute and read and write
4CC0000
heap
page read and write
1EB0000
heap
page execute and read and write
1E60000
trusted library allocation
page execute and read and write
50A000
heap
page read and write
235D000
trusted library allocation
page read and write
790000
trusted library allocation
page read and write
415C000
trusted library allocation
page read and write
420000
trusted library allocation
page read and write
25AD000
trusted library allocation
page read and write
177000
trusted library allocation
page execute and read and write
16A000
trusted library allocation
page execute and read and write
3C4A000
trusted library allocation
page read and write
2525000
trusted library allocation
page read and write
430000
trusted library allocation
page read and write
768E000
stack
page read and write
58D8000
stack
page read and write
3D0000
heap
page read and write
3FA2000
trusted library allocation
page read and write
24DC000
trusted library allocation
page read and write
20000
heap
page read and write
1EF0000
trusted library allocation
page execute and read and write
15A000
trusted library allocation
page execute and read and write
2508000
trusted library allocation
page read and write
10000
heap
page read and write
510000
heap
page read and write
484F000
stack
page read and write
4C0000
trusted library allocation
page execute and read and write
2927000
trusted library allocation
page read and write
760000
heap
page read and write
7A0000
trusted library allocation
page read and write
275B000
trusted library allocation
page read and write
2353000
trusted library allocation
page read and write
330D000
trusted library allocation
page read and write
6FDE000
stack
page read and write
56B3000
heap
page read and write
680000
trusted library allocation
page read and write
4700000
heap
page execute and read and write
3F98000
trusted library allocation
page read and write
5654000
heap
page read and write
3BE0000
trusted library allocation
page read and write
15D000
trusted library allocation
page execute and read and write
AA0000
trusted library allocation
page read and write
2219000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
4D7E000
stack
page read and write
459000
trusted library allocation
page read and write
7A4000
trusted library allocation
page read and write
5230000
heap
page read and write
3301000
trusted library allocation
page read and write
338000
stack
page read and write
591E000
stack
page read and write
2405000
trusted library allocation
page read and write
165000
trusted library allocation
page execute and read and write
2300000
trusted library allocation
page read and write
24ED000
trusted library allocation
page read and write
1B0000
heap
page read and write
3B0000
trusted library allocation
page read and write
62BE000
stack
page read and write
2140000
trusted library allocation
page read and write
2230000
heap
page execute and read and write
409C000
trusted library allocation
page read and write
7D7000
heap
page read and write
232B000
trusted library allocation
page read and write
25DF000
trusted library allocation
page read and write
1E00000
trusted library allocation
page read and write
3C0000
heap
page read and write
221B000
heap
page read and write
60CE000
stack
page read and write
B9B000
heap
page read and write
4C7000
heap
page read and write
2465000
trusted library allocation
page read and write
2349000
trusted library allocation
page read and write
175000
trusted library allocation
page execute and read and write
5F0000
trusted library allocation
page execute and read and write
51FE000
stack
page read and write
4ECF000
stack
page read and write
35FE000
trusted library allocation
page read and write
330000
trusted library allocation
page execute and read and write
56ED000
stack
page read and write
4E4000
heap
page read and write
54AE000
stack
page read and write | page guard
25F1000
trusted library allocation
page read and write
650000
heap
page read and write
2547000
trusted library allocation
page read and write
19A000
trusted library allocation
page execute and read and write
544E000
stack
page read and write
24D6000
trusted library allocation
page read and write
6040000
heap
page read and write
1E0000
trusted library allocation
page execute and read and write
4D80000
trusted library allocation
page execute and read and write
358000
stack
page read and write
3E7F000
trusted library allocation
page read and write
140000
trusted library allocation
page read and write
340000
trusted library allocation
page read and write
4EEE000
stack
page read and write
2523000
trusted library allocation
page read and write
720000
trusted library allocation
page read and write
167000
trusted library allocation
page execute and read and write
39C5000
trusted library allocation
page read and write
2449000
trusted library allocation
page read and write
2489000
trusted library allocation
page read and write
1B5000
trusted library allocation
page execute and read and write
5DFF000
stack
page read and write
5D50000
heap
page read and write
7F7000
trusted library allocation
page read and write
52BE000
stack
page read and write
3C6A000
trusted library allocation
page read and write
700000
trusted library allocation
page read and write
511D000
stack
page read and write
1E80000
trusted library allocation
page read and write
2444000
trusted library allocation
page read and write
334E000
trusted library allocation
page read and write
3FB7000
trusted library allocation
page read and write
82000
unkown
page execute read
390000
heap
page execute and read and write
24ED000
trusted library allocation
page read and write
3830000
trusted library allocation
page read and write
712000
trusted library allocation
page read and write
4B0000
trusted library allocation
page read and write
166000
trusted library allocation
page execute and read and write
1E40000
trusted library allocation
page read and write
51E000
stack
page read and write
57E8000
stack
page read and write
2923000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
AA9000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
20E1000
trusted library allocation
page read and write
338000
stack
page read and write
7700000
heap
page read and write
55B000
heap
page read and write
3C08000
trusted library allocation
page read and write
219E000
stack
page read and write
DC000
stack
page read and write
664000
heap
page read and write
3BC000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
596E000
stack
page read and write
14D000
trusted library allocation
page execute and read and write
231A000
trusted library allocation
page read and write
80000
unkown
page readonly
780000
heap
page execute and read and write
20BE000
stack
page read and write | page guard
67E2000
heap
page read and write
6F0000
trusted library allocation
page read and write
640000
heap
page execute and read and write
2209000
trusted library allocation
page read and write
521E000
stack
page read and write
4D5F000
stack
page read and write
9AD000
heap
page read and write
1FF8000
trusted library allocation
page read and write
B38000
heap
page read and write
7C0000
trusted library allocation
page read and write
546F000
stack
page read and write
2357000
trusted library allocation
page read and write
7C9000
trusted library allocation
page read and write
46ED000
stack
page read and write
520000
trusted library allocation
page read and write
58B0000
trusted library allocation
page execute and read and write
20C000
trusted library allocation
page read and write
4DC1000
heap
page read and write
611C000
heap
page read and write
847000
heap
page read and write
253A000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
696E000
stack
page read and write
25CE000
trusted library allocation
page read and write
250A000
trusted library allocation
page read and write
2466000
trusted library allocation
page read and write
244C000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
2090000
trusted library allocation
page read and write
8F4E000
stack
page read and write
246A000
trusted library allocation
page read and write
58E0000
heap
page read and write
3E1F000
trusted library allocation
page read and write
87A1000
trusted library allocation
page read and write
246E000
trusted library allocation
page read and write
210F000
trusted library allocation
page read and write
220000
trusted library allocation
page read and write
24B6000
trusted library allocation
page read and write
619000
trusted library allocation
page read and write
7C0000
trusted library allocation
page read and write
1B7000
trusted library allocation
page execute and read and write
4C30000
trusted library allocation
page read and write
2589000
trusted library allocation
page read and write
5E5F000
stack
page read and write
3CC6000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page execute and read and write
563000
heap
page read and write
3E0000
trusted library allocation
page execute and read and write
2321000
trusted library allocation
page read and write
41E000
stack
page read and write
57FE000
stack
page read and write
600E000
stack
page read and write | page guard
2A0000
trusted library allocation
page read and write
7EF30000
trusted library allocation
page execute and read and write
1A0000
trusted library allocation
page read and write
25BC000
trusted library allocation
page read and write
11C000
stack
page read and write
43DE000
stack
page read and write
D0000
trusted library allocation
page read and write
780000
trusted library allocation
page execute and read and write
3CB3000
trusted library allocation
page read and write
600000
heap
page execute and read and write
60CA000
heap
page read and write
160000
trusted library allocation
page read and write
6F43000
trusted library allocation
page read and write
20C0000
trusted library allocation
page read and write
84000
unkown
page readonly
170000
trusted library allocation
page read and write
440E000
stack
page read and write
5F0000
trusted library allocation
page execute and read and write
35F000
trusted library allocation
page read and write
750000
trusted library allocation
page read and write
4C3E000
stack
page read and write
633E000
stack
page read and write
5B4E000
stack
page read and write
16B000
trusted library allocation
page execute and read and write
5F2E000
stack
page read and write
192000
trusted library allocation
page read and write
3FC0000
trusted library allocation
page read and write
30E8000
trusted library allocation
page read and write
4EDE000
stack
page read and write
55C0000
heap
page read and write
150000
trusted library allocation
page read and write
55D2000
heap
page read and write
6CBE000
stack
page read and write
4DEE000
stack
page read and write
22C4000
trusted library allocation
page read and write
568000
heap
page read and write
1FF0000
trusted library allocation
page read and write
20E9000
trusted library allocation
page read and write
52C0000
trusted library allocation
page execute and read and write
5B3D000
heap
page read and write
386F000
trusted library allocation
page read and write
D4000
trusted library allocation
page read and write
254F000
trusted library allocation
page read and write
241E000
trusted library allocation
page read and write
3FBA000
trusted library allocation
page read and write
640000
heap
page read and write
5D0000
trusted library allocation
page read and write
5620000
heap
page read and write
BE0000
trusted library allocation
page read and write
717E000
stack
page read and write
520000
trusted library allocation
page read and write
6D0000
trusted library allocation
page read and write
418E000
stack
page read and write
175000
trusted library allocation
page execute and read and write
586E000
stack
page read and write
596F000
stack
page read and write
B20000
trusted library allocation
page execute and read and write
803000
unkown
page execute read
78E000
stack
page read and write
3D51000
trusted library allocation
page read and write
5B44000
heap
page read and write
7971000
trusted library allocation
page read and write
2559000
trusted library allocation
page read and write
18D000
trusted library allocation
page execute and read and write
414D000
stack
page read and write
22C0000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
22EE000
stack
page read and write | page guard
25CA000
trusted library allocation
page read and write
5D0000
trusted library allocation
page read and write
174000
trusted library allocation
page read and write
170000
heap
page read and write
1AB000
trusted library allocation
page execute and read and write
58F2000
heap
page read and write
6230000
heap
page read and write
400000
trusted library allocation
page read and write
2197000
trusted library allocation
page read and write
2343000
trusted library allocation
page read and write
4F5E000
stack
page read and write
3C46000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page execute and read and write
451000
heap
page read and write
5BEE000
stack
page read and write
162000
trusted library allocation
page read and write
193000
trusted library allocation
page read and write
3945000
trusted library allocation
page read and write
4B6E000
stack
page read and write
23F8000
trusted library allocation
page read and write
140000
trusted library allocation
page read and write
67D0000
heap
page read and write
20B8000
trusted library allocation
page read and write
30EB000
trusted library allocation
page read and write
20DF000
stack
page read and write
7DD000
stack
page read and write
6B0000
trusted library allocation
page execute and read and write
14D000
trusted library allocation
page execute and read and write
550000
heap
page read and write
340000
trusted library allocation
page read and write
5190000
heap
page read and write
24EB000
trusted library allocation
page read and write
1BB000
trusted library allocation
page execute and read and write
190000
trusted library allocation
page read and write
3211000
trusted library allocation
page read and write
6971000
trusted library allocation
page read and write
7E53000
trusted library allocation
page read and write
52DE000
stack
page read and write
790000
trusted library allocation
page read and write
120000
trusted library allocation
page read and write
2327000
trusted library allocation
page read and write
6CE000
stack
page read and write
647000
heap
page read and write
4F3D000
stack
page read and write
500000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
3F78000
trusted library allocation
page read and write
33BF000
trusted library allocation
page read and write
4E9E000
stack
page read and write
800000
unkown
page readonly
156000
trusted library allocation
page execute and read and write
49FD000
stack
page read and write
4BED000
stack
page read and write
3271000
trusted library allocation
page read and write
6080000
heap
page read and write
56CD000
heap
page read and write
506E000
stack
page read and write
1B2000
trusted library allocation
page read and write
3E72000
trusted library allocation
page read and write
6D3000
heap
page read and write
616C000
stack
page read and write
1B5000
trusted library allocation
page execute and read and write
4E7E000
stack
page read and write
30000
heap
page read and write
4C7E000
stack
page read and write
440000
heap
page read and write
587F000
stack
page read and write
C0000
trusted library allocation
page read and write
2120000
trusted library allocation
page read and write
62FE000
stack
page read and write
685E000
stack
page read and write
10000
heap
page read and write
235B000
trusted library allocation
page read and write
20BF000
stack
page read and write
172000
trusted library allocation
page read and write
7AF000
heap
page read and write
4EBD000
heap
page read and write
5400000
trusted library allocation
page execute and read and write
380000
heap
page execute and read and write
7E0000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
24D8000
trusted library allocation
page read and write
75BE000
stack
page read and write
370000
trusted library allocation
page read and write
720000
trusted library allocation
page read and write
B30000
heap
page read and write
671E000
stack
page read and write
1BC000
stack
page read and write
2256000
trusted library allocation
page read and write
4B5F000
stack
page read and write
5D6F000
stack
page read and write
170000
trusted library allocation
page read and write
4E0000
heap
page read and write
AE0000
trusted library allocation
page read and write
4FFE000
stack
page read and write
7A2000
trusted library allocation
page read and write
700000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
2445000
trusted library allocation
page read and write
6530000
heap
page read and write
521E000
stack
page read and write
24EF000
trusted library allocation
page read and write
2010000
trusted library allocation
page execute and read and write
551E000
stack
page read and write
166000
trusted library allocation
page execute and read and write
8DEC000
stack
page read and write
1FE0000
trusted library allocation
page read and write
64E000
stack
page read and write
74E000
stack
page read and write
557F000
stack
page read and write
610000
trusted library allocation
page execute and read and write
5B1E000
stack
page read and write
507000
trusted library allocation
page read and write
183000
trusted library allocation
page execute and read and write
130000
trusted library allocation
page read and write
525E000
stack
page read and write
6E70000
heap
page read and write
226D000
trusted library allocation
page read and write
6600000
heap
page read and write
5AD000
stack
page read and write
565A000
heap
page read and write
92DE000
stack
page read and write
42EE000
stack
page read and write
9A7000
heap
page read and write
400000
remote allocation
page execute and read and write
26BF000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
252D000
trusted library allocation
page read and write
10000
heap
page read and write
2451000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
602E000
stack
page read and write
450000
trusted library allocation
page read and write
A88000
heap
page read and write
485F000
stack
page read and write
990E000
stack
page read and write
53CE000
stack
page read and write
247E000
trusted library allocation
page read and write
2408000
trusted library allocation
page read and write
200000
trusted library allocation
page read and write
3C80000
trusted library allocation
page read and write
3E0000
trusted library allocation
page read and write
3BB0000
trusted library allocation
page read and write
543D000
stack
page read and write
882000
heap
page read and write
2342000
trusted library allocation
page read and write
150000
trusted library allocation
page read and write
600000
trusted library allocation
page execute and read and write
186000
trusted library allocation
page read and write
7AC000
heap
page read and write
51B0000
trusted library section
page read and write
1E0000
heap
page read and write
32D1000
trusted library allocation
page read and write
630000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
1E20000
trusted library allocation
page read and write
22F1000
trusted library allocation
page read and write
20DE000
stack
page read and write | page guard
4C10000
trusted library allocation
page execute and read and write
4EE0000
trusted library allocation
page execute and read and write
4F0000
trusted library allocation
page execute and read and write
2533000
trusted library allocation
page read and write
2346000
trusted library allocation
page read and write
3C00000
trusted library allocation
page read and write
56F8000
heap
page read and write
190000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
1F78000
trusted library allocation
page read and write
5150000
heap
page read and write
347000
trusted library allocation
page read and write
91F000
heap
page read and write
5D4E000
stack
page read and write
508F000
stack
page read and write
1F47000
trusted library allocation
page read and write
140000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
494000
heap
page read and write
2490000
trusted library allocation
page read and write
133000
trusted library allocation
page execute and read and write
26C000
stack
page read and write
207E000
stack
page read and write
711E000
stack
page read and write
5F8E000
stack
page read and write
1F0000
trusted library allocation
page read and write
46F000
stack
page read and write
4C90000
heap
page read and write
2009000
trusted library allocation
page read and write
21EE000
stack
page read and write
7ED000
stack
page read and write
531E000
stack
page read and write
60F2000
heap
page read and write
600000
heap
page read and write
7D0000
trusted library allocation
page execute and read and write
47D0000
heap
page execute and read and write
26C000
stack
page read and write
3F7000
trusted library allocation
page read and write
3251000
trusted library allocation
page read and write
5870000
heap
page read and write
760000
trusted library allocation
page read and write
25CC000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
56BB000
heap
page read and write
1E30000
trusted library allocation
page read and write
22CE000
stack
page read and write | page guard
224F000
stack
page read and write
2020000
trusted library allocation
page read and write
328F000
trusted library allocation
page read and write
25A7000
trusted library allocation
page read and write
250E000
trusted library allocation
page read and write
1A6000
trusted library allocation
page execute and read and write
2473000
trusted library allocation
page read and write
5874000
heap
page read and write
7A0000
trusted library allocation
page read and write
328000
stack
page read and write
2453000
trusted library allocation
page read and write
7200000
trusted library allocation
page execute and read and write
24F8000
trusted library allocation
page read and write
2596000
trusted library allocation
page read and write
3A0000
trusted library allocation
page read and write
10000
heap
page read and write
2325000
trusted library allocation
page read and write
233A000
trusted library allocation
page read and write
22D1000
trusted library allocation
page read and write
4BEE000
stack
page read and write
251D000
trusted library allocation
page read and write
600F000
stack
page read and write
1A7000
trusted library allocation
page execute and read and write
25AB000
trusted library allocation
page read and write
568E000
stack
page read and write
2929000
trusted library allocation
page read and write
160000
trusted library allocation
page read and write
24DC000
trusted library allocation
page read and write
610000
trusted library allocation
page read and write
4D2E000
stack
page read and write
610D000
heap
page read and write
BF0000
trusted library allocation
page execute and read and write
710000
trusted library allocation
page read and write
3CE8000
trusted library allocation
page read and write
477000
heap
page read and write
564C000
stack
page read and write
173000
trusted library allocation
page execute and read and write
7C83000
trusted library allocation
page read and write
143000
trusted library allocation
page execute and read and write
4C90000
heap
page read and write
5C5E000
stack
page read and write
2542000
trusted library allocation
page read and write
4D8E000
stack
page read and write
9C4000
heap
page read and write
54FE000
stack
page read and write
710000
trusted library allocation
page read and write
56B7000
heap
page read and write
5A4E000
stack
page read and write
6104000
heap
page read and write
202E000
stack
page read and write
4A2D000
stack
page read and write
241E000
trusted library allocation
page read and write
2240000
trusted library allocation
page read and write
67CE000
stack
page read and write
232D000
trusted library allocation
page read and write
10000
heap
page read and write
409A000
trusted library allocation
page read and write
54EE000
stack
page read and write
360000
trusted library allocation
page read and write
2527000
trusted library allocation
page read and write
6D5F000
stack
page read and write
91CE000
stack
page read and write
780000
trusted library allocation
page read and write
2403000
trusted library allocation
page read and write
5E00000
heap
page read and write
2329000
trusted library allocation
page read and write
24D4000
trusted library allocation
page read and write
150000
trusted library allocation
page read and write
4A6E000
stack
page read and write
184000
trusted library allocation
page read and write
561E000
stack
page read and write
2307000
trusted library allocation
page read and write
4C80000
trusted library allocation
page execute and read and write
5CF000
trusted library allocation
page read and write
646E000
stack
page read and write
5F8E000
stack
page read and write
535E000
stack
page read and write
554E000
stack
page read and write
4960000
heap
page read and write
200000
heap
page read and write
3F0000
trusted library allocation
page execute and read and write
233C000
trusted library allocation
page read and write
60C8000
heap
page read and write
1E47000
trusted library allocation
page read and write
9EF000
heap
page read and write
4EA0000
heap
page read and write
790000
trusted library allocation
page read and write
250C000
trusted library allocation
page read and write
579E000
stack
page read and write
632C000
stack
page read and write
3CF000
trusted library allocation
page read and write
10000
heap
page read and write
20AE000
stack
page read and write
3FBA000
trusted library allocation
page read and write
2006000
trusted library allocation
page read and write
2544000
trusted library allocation
page read and write
2442000
trusted library allocation
page read and write
581E000
stack
page read and write
49A0000
heap
page execute and read and write
20A0000
trusted library allocation
page read and write
217D000
stack
page read and write
7EF20000
trusted library allocation
page execute and read and write
21EF000
trusted library allocation
page read and write
20F0000
trusted library allocation
page execute and read and write
68F000
heap
page read and write
7D7000
trusted library allocation
page read and write
39E000
stack
page read and write
25C4000
trusted library allocation
page read and write
510000
trusted library allocation
page read and write
528E000
stack
page read and write
16C000
stack
page read and write
21AE000
stack
page read and write | page guard
767000
heap
page read and write
46A0000
trusted library allocation
page execute and read and write
6062000
heap
page read and write
77A1000
trusted library allocation
page read and write
2592000
trusted library allocation
page read and write
2510000
trusted library allocation
page read and write
240000
trusted library allocation
page read and write
2418000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
1E8000
heap
page read and write
21A0000
trusted library allocation
page execute and read and write
690000
trusted library allocation
page read and write
50B0000
heap
page read and write
25AF000
trusted library allocation
page read and write
72EE000
stack
page read and write
6E53000
trusted library allocation
page read and write
2100000
heap
page execute and read and write
3B0000
trusted library allocation
page read and write
24F3000
trusted library allocation
page read and write
BB9000
heap
page read and write
200F000
trusted library allocation
page read and write
670000
heap
page read and write
4E5D000
stack
page read and write
17B000
trusted library allocation
page execute and read and write
220B000
trusted library allocation
page read and write
25A5000
trusted library allocation
page read and write
258E000
trusted library allocation
page read and write
50CD000
heap
page read and write
245B000
trusted library allocation
page read and write
56FE000
stack
page read and write
1E10000
trusted library allocation
page read and write
3C73000
trusted library allocation
page read and write
5C4E000
stack
page read and write
380000
trusted library allocation
page read and write
5D54000
heap
page read and write
20F0000
heap
page read and write
3A8000
stack
page read and write
252F000
trusted library allocation
page read and write
7F9000
trusted library allocation
page read and write
2150000
trusted library allocation
page execute and read and write
54AF000
stack
page read and write
420000
heap
page read and write
1FDE000
stack
page read and write
524E000
stack
page read and write
1BB000
trusted library allocation
page execute and read and write
235F000
trusted library allocation
page read and write
5650000
heap
page read and write
220000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5A2E000
stack
page read and write
50BB000
stack
page read and write
24F5000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
4C8F000
stack
page read and write
4C3E000
trusted library allocation
page read and write
6220000
heap
page read and write
6FC000
heap
page read and write
7D0000
trusted library allocation
page read and write
130000
trusted library allocation
page read and write
530E000
stack
page read and write
14D000
trusted library allocation
page execute and read and write
506D000
stack
page read and write
587E000
stack
page read and write | page guard
1F0000
trusted library allocation
page read and write
17B000
trusted library allocation
page execute and read and write
340000
trusted library allocation
page read and write
1A2000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
AC0000
trusted library allocation
page execute and read and write
25DD000
trusted library allocation
page read and write
2418000
trusted library allocation
page read and write
25C6000
trusted library allocation
page read and write
206E000
stack
page read and write
172000
trusted library allocation
page read and write
9A0000
heap
page read and write
21AF000
stack
page read and write
3AEE000
trusted library allocation
page read and write
25C8000
trusted library allocation
page read and write
252A000
trusted library allocation
page read and write
677D000
stack
page read and write
4F7F000
stack
page read and write
24A7000
trusted library allocation
page read and write
6A0000
trusted library allocation
page read and write
3B6E000
trusted library allocation
page read and write
4D4000
remote allocation
page execute and read and write
58DE000
stack
page read and write
2423000
trusted library allocation
page read and write
1AA000
trusted library allocation
page execute and read and write
5BAF000
stack
page read and write
555000
heap
page read and write
3AD5000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
13D000
trusted library allocation
page execute and read and write
290000
trusted library allocation
page execute and read and write
7B0000
trusted library allocation
page read and write
DD000
trusted library allocation
page execute and read and write
4FDE000
stack
page read and write
388000
stack
page read and write
63B5000
trusted library allocation
page read and write
2118000
trusted library allocation
page read and write
4CEF000
stack
page read and write
4E0000
trusted library allocation
page read and write
1A2000
trusted library allocation
page read and write
54DE000
stack
page read and write
1EA9000
trusted library allocation
page read and write
2432000
trusted library allocation
page read and write
501E000
stack
page read and write
60D0000
heap
page read and write
622B000
heap
page read and write
2030000
trusted library allocation
page execute and read and write
84D000
heap
page read and write
470000
heap
page read and write
232D000
trusted library allocation
page read and write
1B2000
trusted library allocation
page read and write
6D82000
trusted library allocation
page read and write
82E000
stack
page read and write
760F000
stack
page read and write
620000
trusted library allocation
page read and write
43EE000
stack
page read and write
5A7B000
stack
page read and write
2316000
trusted library allocation
page read and write
1F70000
trusted library allocation
page read and write
784000
heap
page read and write
25B3000
trusted library allocation
page read and write
5B1E000
stack
page read and write
3D0000
trusted library allocation
page read and write
2000000
trusted library allocation
page read and write
20D0000
trusted library allocation
page read and write
5D9000
trusted library allocation
page read and write
60E2000
heap
page read and write
22CF000
stack
page read and write
2486000
trusted library allocation
page read and write
20E0000
trusted library allocation
page read and write
There are 985 hidden memdumps, click here to show them.