IOC Report
z1E-catalogSamples.exe

loading gif

Files

File Path
Type
Category
Malicious
z1E-catalogSamples.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp9244.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\vZkoWbol.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vZkoWbol.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\z1E-catalogSamples.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0h2twhjl.00o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3nf4p0d0.wfo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lgw5mrw1.0fe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oy10pnqk.srv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA1D5.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\vZkoWbol.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z1E-catalogSamples.exe
"C:\Users\user\Desktop\z1E-catalogSamples.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vZkoWbol.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vZkoWbol" /XML "C:\Users\user\AppData\Local\Temp\tmp9244.tmp"
malicious
C:\Users\user\Desktop\z1E-catalogSamples.exe
"C:\Users\user\Desktop\z1E-catalogSamples.exe"
malicious
C:\Users\user\AppData\Roaming\vZkoWbol.exe
C:\Users\user\AppData\Roaming\vZkoWbol.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vZkoWbol" /XML "C:\Users\user\AppData\Local\Temp\tmpA1D5.tmp"
malicious
C:\Users\user\AppData\Roaming\vZkoWbol.exe
"C:\Users\user\AppData\Roaming\vZkoWbol.exe"
malicious
C:\Users\user\AppData\Roaming\vZkoWbol.exe
"C:\Users\user\AppData\Roaming\vZkoWbol.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.telegram
unknown
malicious
https://api.ipify.org/
104.26.12.205
https://api.telegram.org/bot7177134832:AAFZbBRZvrMTexyCCRWrTRyGHf8Nct0rg7g/sendDocument
149.154.167.220
https://api.ipify.org
unknown
https://api.telegram.org/bot7177134832:AAFZbBRZvrMTexyCCRWrTRyGHf8Nct0rg7g/
unknown
https://account.dyn.com/
unknown
https://api.telegram.org
unknown
https://api.ipify.org/t
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.orgDAh
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ipify.org
104.26.12.205
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z1E-catalogSamples_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\vZkoWbol_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3157000
trusted library allocation
page read and write
malicious
3131000
trusted library allocation
page read and write
malicious
4400000
trusted library allocation
page read and write
malicious
324B000
trusted library allocation
page read and write
malicious
437F000
trusted library allocation
page read and write
malicious
42A000
remote allocation
page execute and read and write
malicious
422000
remote allocation
page execute and read and write
77AD000
trusted library allocation
page read and write
78A1000
trusted library allocation
page read and write
326F000
trusted library allocation
page read and write
77EA000
trusted library allocation
page read and write
7984000
trusted library allocation
page read and write
773B000
trusted library allocation
page read and write
77D1000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
3201000
trusted library allocation
page read and write
446F000
trusted library allocation
page read and write
5B1D000
stack
page read and write
782E000
trusted library allocation
page read and write
16B5000
trusted library allocation
page read and write
554D000
trusted library allocation
page read and write
789F000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
772C000
trusted library allocation
page read and write
2EE7000
trusted library allocation
page execute and read and write
41CB000
trusted library allocation
page read and write
41C1000
trusted library allocation
page read and write
414A000
trusted library allocation
page read and write
79E9000
trusted library allocation
page read and write
77C7000
trusted library allocation
page read and write
7941000
trusted library allocation
page read and write
77D7000
trusted library allocation
page read and write
655D000
stack
page read and write
7867000
trusted library allocation
page read and write
7AD7000
trusted library allocation
page read and write
5580000
heap
page read and write
7F180000
trusted library allocation
page execute and read and write
7927000
trusted library allocation
page read and write
1334000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
10F7000
stack
page read and write
7A6D000
trusted library allocation
page read and write
1540000
heap
page read and write
1307000
heap
page read and write
7904000
trusted library allocation
page read and write
7A13000
trusted library allocation
page read and write
171A000
trusted library allocation
page execute and read and write
426B000
trusted library allocation
page read and write
429000
remote allocation
page execute and read and write
14CC000
stack
page read and write
790A000
trusted library allocation
page read and write
7430000
heap
page read and write
1487000
heap
page read and write
6CBB000
stack
page read and write
8563000
heap
page read and write
94ED000
stack
page read and write
7792000
trusted library allocation
page read and write
16C0000
heap
page read and write
78AD000
trusted library allocation
page read and write
78CC000
trusted library allocation
page read and write
41E5000
trusted library allocation
page read and write
1712000
trusted library allocation
page read and write
64EE000
stack
page read and write
6B5E000
stack
page read and write
651B000
stack
page read and write
169B000
stack
page read and write
78A7000
trusted library allocation
page read and write
99C0000
heap
page read and write
658E000
heap
page read and write
56CE000
stack
page read and write
77B5000
trusted library allocation
page read and write
713E000
stack
page read and write
30B4000
trusted library allocation
page read and write
7812000
trusted library allocation
page read and write
78A3000
trusted library allocation
page read and write
5783000
heap
page read and write
77DD000
trusted library allocation
page read and write
77C1000
trusted library allocation
page read and write
753E000
stack
page read and write
EA9000
stack
page read and write
98BB000
stack
page read and write
7859000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
165C000
stack
page read and write
2FF0000
heap
page read and write
8E2E000
stack
page read and write
5760000
heap
page read and write
5CE8000
trusted library allocation
page read and write
1760000
heap
page read and write
7A74000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
6CC6000
trusted library allocation
page read and write
7742000
trusted library allocation
page read and write
93EE000
stack
page read and write
77F0000
trusted library allocation
page read and write
6B5E000
stack
page read and write
151F000
heap
page read and write
7509000
heap
page read and write
7AFC000
trusted library allocation
page read and write
418B000
trusted library allocation
page read and write
7910000
trusted library allocation
page read and write
976E000
stack
page read and write
5CBC000
stack
page read and write
763E000
stack
page read and write
527C000
stack
page read and write
5C3B000
stack
page read and write
781D000
trusted library allocation
page read and write
7842000
trusted library allocation
page read and write
95EE000
stack
page read and write
4201000
trusted library allocation
page read and write
9B3E000
stack
page read and write
436C000
trusted library allocation
page read and write
77C9000
trusted library allocation
page read and write
7A15000
trusted library allocation
page read and write
125E000
heap
page read and write
14E0000
trusted library allocation
page read and write
7798000
trusted library allocation
page read and write
932D000
stack
page read and write
78ED000
trusted library allocation
page read and write
7814000
trusted library allocation
page read and write
1460000
heap
page read and write
13D2000
trusted library allocation
page read and write
77AA000
trusted library allocation
page read and write
3306000
trusted library allocation
page read and write
1352000
trusted library allocation
page read and write
962E000
stack
page read and write
5734000
heap
page read and write
77F8000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
5CA0000
trusted library section
page read and write
2A37000
heap
page read and write
1409000
heap
page read and write
99FC000
stack
page read and write
785F000
trusted library allocation
page read and write
7962000
trusted library allocation
page read and write
DA0000
heap
page read and write
15F3000
heap
page read and write
83A000
stack
page read and write
1716000
trusted library allocation
page execute and read and write
16B0000
trusted library allocation
page read and write
3160000
heap
page execute and read and write
56CC000
stack
page read and write
966E000
stack
page read and write
168E000
stack
page read and write
124E000
stack
page read and write
7795000
trusted library allocation
page read and write
7AD1000
trusted library allocation
page read and write
421000
remote allocation
page execute and read and write
1286000
heap
page read and write
7744000
trusted library allocation
page read and write
776D000
trusted library allocation
page read and write
652E000
stack
page read and write
76B7000
trusted library allocation
page read and write
3456000
trusted library allocation
page read and write
78E5000
trusted library allocation
page read and write
307E000
trusted library allocation
page read and write
8520000
heap
page read and write
31B0000
heap
page read and write
8082000
heap
page read and write
788C000
trusted library allocation
page read and write
7706000
trusted library allocation
page read and write
79C5000
trusted library allocation
page read and write
962E000
stack
page read and write
77E0000
trusted library allocation
page read and write
134D000
trusted library allocation
page execute and read and write
788E000
trusted library allocation
page read and write
78A7000
trusted library allocation
page read and write
126A000
heap
page read and write
1870000
heap
page read and write
7969000
trusted library allocation
page read and write
77CF000
trusted library allocation
page read and write
369D000
trusted library allocation
page read and write
3156000
trusted library allocation
page read and write
7ACA000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
76C7000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
76EB000
trusted library allocation
page read and write
782C000
trusted library allocation
page read and write
785B000
trusted library allocation
page read and write
560F000
trusted library allocation
page read and write
76C9000
trusted library allocation
page read and write
187E000
heap
page read and write
5BB0000
trusted library allocation
page read and write
785F000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
669D000
stack
page read and write
77BF000
trusted library allocation
page read and write
7943000
trusted library allocation
page read and write
76DA000
trusted library allocation
page read and write
74EB000
stack
page read and write
4233000
trusted library allocation
page read and write
77C5000
trusted library allocation
page read and write
43EF000
trusted library allocation
page read and write
5615000
trusted library allocation
page read and write
785B000
trusted library allocation
page read and write
7AD9000
trusted library allocation
page read and write
7A58000
trusted library allocation
page read and write
76E1000
trusted library allocation
page read and write
774C000
trusted library allocation
page read and write
665F000
stack
page read and write
778E000
trusted library allocation
page read and write
7765000
trusted library allocation
page read and write
5A7E000
stack
page read and write
9130000
heap
page read and write
1250000
heap
page read and write
785D000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
798E000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
1138000
stack
page read and write
161C000
stack
page read and write
77AB000
trusted library allocation
page read and write
1527000
heap
page read and write
3091000
trusted library allocation
page read and write
77A3000
trusted library allocation
page read and write
56F0000
heap
page execute and read and write
7AE7000
trusted library allocation
page read and write
3388000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
6CC8000
trusted library allocation
page read and write
7929000
trusted library allocation
page read and write
303C000
stack
page read and write
1640000
heap
page read and write
79E4000
trusted library allocation
page read and write
79D6000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
1503000
trusted library allocation
page execute and read and write
7B08000
trusted library allocation
page read and write
788A000
trusted library allocation
page read and write
773D000
trusted library allocation
page read and write
6606000
heap
page read and write
3141000
trusted library allocation
page read and write
5BCE000
stack
page read and write
7AF2000
trusted library allocation
page read and write
7908000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
3129000
trusted library allocation
page read and write
679E000
stack
page read and write
171C000
stack
page read and write
43C000
remote allocation
page execute and read and write
77BB000
trusted library allocation
page read and write
7874000
trusted library allocation
page read and write
1362000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
5B7E000
stack
page read and write
778D000
trusted library allocation
page read and write
7708000
trusted library allocation
page read and write
16CB000
heap
page read and write
780D000
trusted library allocation
page read and write
7796000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
77F1000
trusted library allocation
page read and write
7986000
trusted library allocation
page read and write
6660000
heap
page read and write
307B000
trusted library allocation
page read and write
2A0E000
stack
page read and write
7AAB000
trusted library allocation
page read and write
7967000
trusted library allocation
page read and write
77CF000
trusted library allocation
page read and write
5900000
trusted library section
page read and write
55E1000
trusted library allocation
page read and write
1365000
trusted library allocation
page execute and read and write
5B4C000
heap
page read and write
7AEB000
trusted library allocation
page read and write
778A000
trusted library allocation
page read and write
52FE000
stack
page read and write
7948000
trusted library allocation
page read and write
79FC000
trusted library allocation
page read and write
2A6F000
stack
page read and write
7A4A000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
4141000
trusted library allocation
page read and write
56EE000
stack
page read and write
8FAD000
stack
page read and write
4528000
trusted library allocation
page read and write
68E0000
heap
page read and write
31EB000
trusted library allocation
page read and write
77C9000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
5C40000
trusted library allocation
page execute and read and write
7744000
trusted library allocation
page read and write
7763000
trusted library allocation
page read and write
9154000
heap
page read and write
79C0000
trusted library allocation
page read and write
162E000
stack
page read and write
779F000
trusted library allocation
page read and write
796F000
trusted library allocation
page read and write
7A5F000
trusted library allocation
page read and write
7723000
trusted library allocation
page read and write
CAE000
unkown
page readonly
3243000
trusted library allocation
page read and write
6CAE000
stack
page read and write
43BE000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
7AF9000
trusted library allocation
page read and write
7804000
trusted library allocation
page read and write
77C5000
trusted library allocation
page read and write
770C000
trusted library allocation
page read and write
7A7E000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
770A000
trusted library allocation
page read and write
7A37000
trusted library allocation
page read and write
5BBC000
stack
page read and write
7AD3000
trusted library allocation
page read and write
32EA000
trusted library allocation
page read and write
1290000
heap
page read and write
7821000
trusted library allocation
page read and write
430C000
trusted library allocation
page read and write
777E000
trusted library allocation
page read and write
6D36000
trusted library allocation
page read and write
77E4000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1330000
trusted library allocation
page read and write
78AF000
trusted library allocation
page read and write
133D000
trusted library allocation
page execute and read and write
5520000
trusted library allocation
page read and write
77A9000
trusted library allocation
page read and write
9C80000
heap
page read and write
77CB000
trusted library allocation
page read and write
3211000
trusted library allocation
page read and write
772A000
trusted library allocation
page read and write
787E000
trusted library allocation
page read and write
78A9000
trusted library allocation
page read and write
7757000
trusted library allocation
page read and write
5B27000
heap
page read and write
2EE2000
trusted library allocation
page read and write
3247000
trusted library allocation
page read and write
7791000
trusted library allocation
page read and write
51DE000
stack
page read and write
439000
remote allocation
page execute and read and write
76DE000
trusted library allocation
page read and write
952E000
stack
page read and write
7704000
trusted library allocation
page read and write
36A3000
trusted library allocation
page read and write
83E000
unkown
page read and write
3170000
trusted library allocation
page read and write
779D000
trusted library allocation
page read and write
787C000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
7FB80000
trusted library allocation
page execute and read and write
31E2000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
77FC000
trusted library allocation
page read and write
7ADB000
trusted library allocation
page read and write
79A3000
trusted library allocation
page read and write
78A9000
trusted library allocation
page read and write
5C60000
trusted library section
page read and write
7880000
trusted library allocation
page read and write
4530000
trusted library allocation
page read and write
1767000
heap
page read and write
5740000
heap
page execute and read and write
77A0000
trusted library allocation
page read and write
32F6000
trusted library allocation
page read and write
6CE7000
trusted library allocation
page read and write
74AC000
stack
page read and write
3707000
trusted library allocation
page read and write
368D000
trusted library allocation
page read and write
79B6000
trusted library allocation
page read and write
7A45000
trusted library allocation
page read and write
14ED000
trusted library allocation
page execute and read and write
329A000
trusted library allocation
page read and write
7861000
trusted library allocation
page read and write
9146000
heap
page read and write
5750000
heap
page read and write
7ACC000
trusted library allocation
page read and write
699A000
heap
page read and write
311E000
trusted library allocation
page read and write
77A2000
trusted library allocation
page read and write
770A000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
7A32000
trusted library allocation
page read and write
5B60000
trusted library allocation
page read and write
1245000
heap
page read and write
807B000
heap
page read and write
7790000
trusted library allocation
page read and write
76D9000
trusted library allocation
page read and write
5A10000
heap
page read and write
7A85000
trusted library allocation
page read and write
7840000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
5610000
heap
page execute and read and write
433E000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
428000
remote allocation
page execute and read and write
552B000
trusted library allocation
page read and write
5B50000
heap
page read and write
319D000
trusted library allocation
page read and write
7977000
trusted library allocation
page read and write
7A95000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
78FA000
trusted library allocation
page read and write
6935000
heap
page read and write
31E9000
trusted library allocation
page read and write
77E8000
trusted library allocation
page read and write
6630000
trusted library allocation
page execute and read and write
13F0000
heap
page read and write
781F000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
77FC000
trusted library allocation
page read and write
9B0F000
stack
page read and write
2EEB000
trusted library allocation
page execute and read and write
78A3000
trusted library allocation
page read and write
7B04000
trusted library allocation
page read and write
783E000
trusted library allocation
page read and write
7786000
trusted library allocation
page read and write
78F8000
trusted library allocation
page read and write
14E4000
trusted library allocation
page read and write
7A0F000
trusted library allocation
page read and write
30F0000
heap
page execute and read and write
6DEE000
stack
page read and write
76DB000
trusted library allocation
page read and write
6530000
trusted library section
page read and write
344E000
trusted library allocation
page read and write
7A34000
trusted library allocation
page read and write
13D7000
trusted library allocation
page execute and read and write
1722000
trusted library allocation
page read and write
773B000
trusted library allocation
page read and write
8B6D000
stack
page read and write
3247000
trusted library allocation
page read and write
78DB000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
13E7000
heap
page read and write
2ED2000
trusted library allocation
page read and write
553E000
trusted library allocation
page read and write
3082000
trusted library allocation
page read and write
172B000
trusted library allocation
page execute and read and write
1466000
heap
page read and write
1520000
heap
page read and write
43A000
remote allocation
page execute and read and write
77CD000
trusted library allocation
page read and write
5A10000
trusted library allocation
page execute and read and write
5740000
heap
page read and write
42EB000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
7ADF000
trusted library allocation
page read and write
635F000
stack
page read and write
76FA000
trusted library allocation
page read and write
778F000
trusted library allocation
page read and write
64EF000
stack
page read and write
7500000
heap
page read and write
58A000
stack
page read and write
77D9000
trusted library allocation
page read and write
7A26000
trusted library allocation
page read and write
7ABE000
trusted library allocation
page read and write
79E8000
trusted library allocation
page read and write
87F000
unkown
page read and write
6B60000
heap
page read and write
78D9000
trusted library allocation
page read and write
3349000
trusted library allocation
page read and write
58FE000
stack
page read and write
561A000
trusted library allocation
page read and write
79A6000
trusted library allocation
page read and write
9C90000
trusted library allocation
page read and write
8AAD000
stack
page read and write
7770000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
5B80000
trusted library allocation
page execute and read and write
3249000
trusted library allocation
page read and write
427000
remote allocation
page execute and read and write
15C8000
heap
page read and write
D4A000
stack
page read and write
7869000
trusted library allocation
page read and write
7823000
trusted library allocation
page read and write
76DF000
trusted library allocation
page read and write
135A000
trusted library allocation
page execute and read and write
5D30000
trusted library allocation
page execute and read and write
7954000
trusted library allocation
page read and write
15FE000
stack
page read and write
77BF000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
78D1000
trusted library allocation
page read and write
31FE000
stack
page read and write
13BD000
trusted library allocation
page execute and read and write
77CB000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
8550000
heap
page read and write
5541000
trusted library allocation
page read and write
78CE000
trusted library allocation
page read and write
76F3000
trusted library allocation
page read and write
777A000
trusted library allocation
page read and write
1290000
heap
page read and write
7800000
trusted library allocation
page read and write
7995000
trusted library allocation
page read and write
428C000
trusted library allocation
page read and write
7B0A000
trusted library allocation
page read and write
78AB000
trusted library allocation
page read and write
5CC0000
heap
page read and write
80A7000
heap
page read and write
5C30000
trusted library allocation
page read and write
334D000
trusted library allocation
page read and write
5546000
trusted library allocation
page read and write
7794000
trusted library allocation
page read and write
9B20000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
44F0000
trusted library allocation
page read and write
77B2000
trusted library allocation
page read and write
6A5E000
stack
page read and write
7AFE000
trusted library allocation
page read and write
2A0E000
stack
page read and write
76EE000
trusted library allocation
page read and write
76DD000
trusted library allocation
page read and write
1258000
heap
page read and write
517B000
stack
page read and write
9132000
heap
page read and write
774B000
trusted library allocation
page read and write
787A000
trusted library allocation
page read and write
12DE000
stack
page read and write
7ABC000
trusted library allocation
page read and write
2A20000
heap
page read and write
1385000
heap
page read and write
783C000
trusted library allocation
page read and write
77B7000
trusted library allocation
page read and write
79F9000
trusted library allocation
page read and write
6903000
heap
page read and write
136B000
trusted library allocation
page execute and read and write
77B9000
trusted library allocation
page read and write
3466000
trusted library allocation
page read and write
76CD000
trusted library allocation
page read and write
7A0A000
trusted library allocation
page read and write
7A91000
trusted library allocation
page read and write
7848000
trusted library allocation
page read and write
7802000
trusted library allocation
page read and write
70FE000
stack
page read and write
1480000
heap
page read and write
1710000
trusted library allocation
page read and write
2BEA000
heap
page read and write
5750000
heap
page read and write
77D3000
trusted library allocation
page read and write
77DB000
trusted library allocation
page read and write
76E2000
trusted library allocation
page read and write
76BD000
trusted library allocation
page read and write
880000
heap
page read and write
6560000
heap
page read and write
63B0000
heap
page read and write
16A0000
trusted library allocation
page read and write
78AD000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
3345000
trusted library allocation
page read and write
7923000
trusted library allocation
page read and write
1500000
heap
page read and write
761A000
heap
page read and write
5C90000
trusted library section
page read and write
67A0000
heap
page read and write
326D000
trusted library allocation
page read and write
76E9000
trusted library allocation
page read and write
7ADF000
trusted library allocation
page read and write
7B0C000
trusted library allocation
page read and write
6CD8000
trusted library allocation
page read and write
76B9000
trusted library allocation
page read and write
FA7000
stack
page read and write
902D000
stack
page read and write
76E4000
trusted library allocation
page read and write
4229000
trusted library allocation
page read and write
796B000
trusted library allocation
page read and write
7975000
trusted library allocation
page read and write
73AC000
stack
page read and write
77A1000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
77AF000
trusted library allocation
page read and write
7A5D000
trusted library allocation
page read and write
30D0000
heap
page execute and read and write
78B1000
trusted library allocation
page read and write
76F2000
trusted library allocation
page read and write
76F8000
trusted library allocation
page read and write
2A80000
heap
page read and write
7780000
trusted library allocation
page read and write
1492000
heap
page read and write
1367000
trusted library allocation
page execute and read and write
12C6000
heap
page read and write
7A30000
trusted library allocation
page read and write
8CAE000
stack
page read and write
7769000
trusted library allocation
page read and write
779A000
trusted library allocation
page read and write
79BC000
trusted library allocation
page read and write
6DBE000
stack
page read and write
775C000
trusted library allocation
page read and write
2F18000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
7AED000
trusted library allocation
page read and write
8B0000
heap
page read and write
79A1000
trusted library allocation
page read and write
7722000
trusted library allocation
page read and write
7AF4000
trusted library allocation
page read and write
15D5000
heap
page read and write
7906000
trusted library allocation
page read and write
6B1E000
stack
page read and write
7A39000
trusted library allocation
page read and write
151D000
trusted library allocation
page execute and read and write
33E3000
trusted library allocation
page read and write
59D0000
trusted library allocation
page execute and read and write
35F0000
trusted library allocation
page read and write
70A0000
trusted library allocation
page execute and read and write
3238000
trusted library allocation
page read and write
65B0000
trusted library allocation
page execute and read and write
157C000
heap
page read and write
77EE000
trusted library allocation
page read and write
7746000
trusted library allocation
page read and write
7886000
trusted library allocation
page read and write
7AEF000
trusted library allocation
page read and write
138E000
stack
page read and write
7AD5000
trusted library allocation
page read and write
93AE000
stack
page read and write
3341000
trusted library allocation
page read and write
6A1E000
stack
page read and write
3263000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
45A4000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
7863000
trusted library allocation
page read and write
76E3000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
779B000
trusted library allocation
page read and write
5F0000
heap
page read and write
3452000
trusted library allocation
page read and write
55E6000
trusted library allocation
page read and write
552E000
trusted library allocation
page read and write
12E3000
heap
page read and write
145E000
stack
page read and write
7892000
trusted library allocation
page read and write
1528000
heap
page read and write
128E000
stack
page read and write
32FE000
trusted library allocation
page read and write
7724000
trusted library allocation
page read and write
790C000
trusted library allocation
page read and write
151C000
unkown
page read and write
5CC0000
trusted library allocation
page read and write
7809000
trusted library allocation
page read and write
78CA000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
54D000
stack
page read and write
7AFA000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
796D000
trusted library allocation
page read and write
69DE000
heap
page read and write
13B0000
trusted library allocation
page read and write
9C7F000
stack
page read and write
52BC000
stack
page read and write
593C000
stack
page read and write
77F3000
trusted library allocation
page read and write
7923000
trusted library allocation
page read and write
7829000
trusted library allocation
page read and write
6CD3000
trusted library allocation
page read and write
1535000
heap
page read and write
1350000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
76EC000
trusted library allocation
page read and write
13C6000
trusted library allocation
page execute and read and write
6C6D000
trusted library allocation
page read and write
597E000
stack
page read and write
9840000
heap
page read and write
78A1000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
772D000
trusted library allocation
page read and write
5BFE000
stack
page read and write
14F0000
heap
page read and write
76E7000
trusted library allocation
page read and write
7806000
trusted library allocation
page read and write
DC0000
heap
page read and write
1490000
heap
page read and write
7886000
trusted library allocation
page read and write
7AE1000
trusted library allocation
page read and write
78F1000
trusted library allocation
page read and write
7964000
trusted library allocation
page read and write
7857000
trusted library allocation
page read and write
150A000
heap
page read and write
78BA000
trusted library allocation
page read and write
13E0000
heap
page read and write
12CB000
heap
page read and write
972F000
stack
page read and write
8B0D000
stack
page read and write
30C0000
trusted library allocation
page read and write
78C2000
trusted library allocation
page read and write
778C000
trusted library allocation
page read and write
4620000
trusted library allocation
page read and write
7530000
heap
page read and write
776E000
trusted library allocation
page read and write
7827000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
7782000
trusted library allocation
page read and write
794A000
trusted library allocation
page read and write
2F4E000
stack
page read and write
69CD000
heap
page read and write
7AF6000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page execute and read and write
8B2D000
stack
page read and write
432C000
trusted library allocation
page read and write
13A4000
trusted library allocation
page read and write
6D2D000
stack
page read and write
697C000
heap
page read and write
3196000
trusted library allocation
page read and write
76F4000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
9A3D000
stack
page read and write
2ED0000
trusted library allocation
page read and write
2EE5000
trusted library allocation
page execute and read and write
1300000
heap
page read and write
788C000
trusted library allocation
page read and write
317B000
trusted library allocation
page read and write
40E1000
trusted library allocation
page read and write
7ADD000
trusted library allocation
page read and write
573B000
stack
page read and write
77E3000
trusted library allocation
page read and write
77FE000
stack
page read and write
30BE000
stack
page read and write
792B000
trusted library allocation
page read and write
6D50000
trusted library allocation
page execute and read and write
1610000
trusted library allocation
page execute and read and write
7A93000
trusted library allocation
page read and write
77D5000
trusted library allocation
page read and write
76FE000
trusted library allocation
page read and write
30C5000
trusted library allocation
page read and write
7B02000
trusted library allocation
page read and write
694F000
heap
page read and write
5CB0000
trusted library allocation
page execute and read and write
55ED000
trusted library allocation
page read and write
345E000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
77F2000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
76D7000
trusted library allocation
page read and write
3447000
trusted library allocation
page read and write
4145000
trusted library allocation
page read and write
7703000
trusted library allocation
page read and write
DB5000
heap
page read and write
7180000
heap
page read and write
77FA000
trusted library allocation
page read and write
136E000
stack
page read and write
7610000
heap
page read and write
784C000
trusted library allocation
page read and write
783C000
trusted library allocation
page read and write
5C8F000
stack
page read and write
7880000
trusted library allocation
page read and write
645C000
stack
page read and write
7651000
trusted library allocation
page read and write
6FEC000
stack
page read and write
790E000
trusted library allocation
page read and write
14FE000
stack
page read and write
148E000
stack
page read and write
79C7000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
77BD000
trusted library allocation
page read and write
94EF000
stack
page read and write
31C1000
trusted library allocation
page read and write
3040000
trusted library allocation
page execute and read and write
9143000
heap
page read and write
3120000
trusted library allocation
page execute and read and write
17CE000
stack
page read and write
798C000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
926E000
stack
page read and write
70B0000
heap
page read and write
8DAF000
stack
page read and write
76F6000
trusted library allocation
page read and write
7774000
trusted library allocation
page read and write
77AC000
trusted library allocation
page read and write
76E6000
trusted library allocation
page read and write
5680000
heap
page execute and read and write
7863000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
792D000
trusted library allocation
page read and write
15CD000
heap
page read and write
1276000
heap
page read and write
120E000
stack
page read and write
76EA000
trusted library allocation
page read and write
132E000
stack
page read and write
17E0000
trusted library allocation
page read and write
78DD000
trusted library allocation
page read and write
9030000
heap
page read and write
77F6000
trusted library allocation
page read and write
77E1000
trusted library allocation
page read and write
936E000
stack
page read and write
772B000
trusted library allocation
page read and write
7AA9000
trusted library allocation
page read and write
327E000
trusted library allocation
page read and write
9880000
heap
page read and write
76D1000
trusted library allocation
page read and write
8D2F000
stack
page read and write
2FB0000
heap
page read and write
77A6000
trusted library allocation
page read and write
78AB000
trusted library allocation
page read and write
77E2000
trusted library allocation
page read and write
776C000
trusted library allocation
page read and write
77FA000
trusted library allocation
page read and write
776B000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7982000
trusted library allocation
page read and write
1248000
heap
page read and write
7861000
trusted library allocation
page read and write
774D000
trusted library allocation
page read and write
7884000
trusted library allocation
page read and write
79E6000
trusted library allocation
page read and write
656E000
stack
page read and write
42B3000
trusted library allocation
page read and write
13A3000
trusted library allocation
page execute and read and write
32F2000
trusted library allocation
page read and write
7A4C000
trusted library allocation
page read and write
771A000
trusted library allocation
page read and write
4109000
trusted library allocation
page read and write
77A4000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
779E000
trusted library allocation
page read and write
33DD000
trusted library allocation
page read and write
7AB9000
trusted library allocation
page read and write
6D7E000
stack
page read and write
6600000
trusted library allocation
page read and write
186C000
stack
page read and write
91EE000
stack
page read and write
2980000
heap
page read and write
7721000
trusted library allocation
page read and write
91AD000
stack
page read and write
7827000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
5532000
trusted library allocation
page read and write
7A11000
trusted library allocation
page read and write
16FE000
stack
page read and write
7A5A000
trusted library allocation
page read and write
7AF8000
trusted library allocation
page read and write
77A5000
trusted library allocation
page read and write
8FB0000
heap
page read and write
76BB000
trusted library allocation
page read and write
5C10000
heap
page read and write
7F590000
trusted library allocation
page execute and read and write
1200000
heap
page read and write
76C3000
trusted library allocation
page read and write
5753000
heap
page read and write
5A7C000
stack
page read and write
1322000
heap
page read and write
7A8F000
trusted library allocation
page read and write
318E000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
1380000
heap
page read and write
780B000
trusted library allocation
page read and write
C02000
unkown
page readonly
7855000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
780F000
trusted library allocation
page read and write
3130000
heap
page execute and read and write
76F5000
trusted library allocation
page read and write
5B3E000
stack
page read and write
3192000
trusted library allocation
page read and write
78DF000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
1720000
heap
page read and write
1333000
trusted library allocation
page execute and read and write
7AE3000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
56F4000
heap
page read and write
150D000
trusted library allocation
page execute and read and write
7788000
trusted library allocation
page read and write
5B20000
heap
page read and write
79DF000
trusted library allocation
page read and write
33DF000
trusted library allocation
page read and write
7AF1000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
42CC000
trusted library allocation
page read and write
7844000
trusted library allocation
page read and write
312D000
trusted library allocation
page read and write
798A000
trusted library allocation
page read and write
5ACE000
stack
page read and write
78AF000
trusted library allocation
page read and write
782A000
trusted library allocation
page read and write
7929000
trusted library allocation
page read and write
5FD000
stack
page read and write
158B000
heap
page read and write
774A000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
7B0E000
trusted library allocation
page read and write
7736000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
76E5000
trusted library allocation
page read and write
76C5000
trusted library allocation
page read and write
75D1000
trusted library allocation
page read and write
7A1D000
trusted library allocation
page read and write
78E1000
trusted library allocation
page read and write
2D20000
heap
page read and write
76BF000
trusted library allocation
page read and write
7A2E000
trusted library allocation
page read and write
922E000
stack
page read and write
78C6000
trusted library allocation
page read and write
7733000
trusted library allocation
page read and write
7AF6000
trusted library allocation
page read and write
76D3000
trusted library allocation
page read and write
12E0000
heap
page read and write
2ECC000
stack
page read and write
781D000
trusted library allocation
page read and write
65C0000
heap
page read and write
30B6000
trusted library allocation
page read and write
17CE000
stack
page read and write
79EB000
trusted library allocation
page read and write
8040000
heap
page read and write
785D000
trusted library allocation
page read and write
5CF0000
heap
page read and write
7878000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
76DC000
trusted library allocation
page read and write
3302000
trusted library allocation
page read and write
5A30000
heap
page read and write
7F4E0000
trusted library allocation
page execute and read and write
C00000
unkown
page readonly
12E1000
heap
page read and write
2EDA000
trusted library allocation
page execute and read and write
78A5000
trusted library allocation
page read and write
789D000
trusted library allocation
page read and write
786B000
trusted library allocation
page read and write
56FE000
stack
page read and write
7912000
trusted library allocation
page read and write
641C000
stack
page read and write
6CDD000
trusted library allocation
page read and write
1340000
heap
page read and write
79FE000
trusted library allocation
page read and write
1413000
heap
page read and write
78A5000
trusted library allocation
page read and write
103A000
stack
page read and write
7AB5000
trusted library allocation
page read and write
13C2000
trusted library allocation
page read and write
2ED6000
trusted library allocation
page execute and read and write
13D0000
trusted library allocation
page execute and read and write
3050000
trusted library allocation
page read and write
76D5000
trusted library allocation
page read and write
1690000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
178E000
stack
page read and write
1416000
heap
page read and write
80CD000
heap
page read and write
7784000
trusted library allocation
page read and write
420B000
trusted library allocation
page read and write
7956000
trusted library allocation
page read and write
8F2F000
stack
page read and write
7840000
trusted library allocation
page read and write
79D9000
trusted library allocation
page read and write
76C1000
trusted library allocation
page read and write
76FC000
trusted library allocation
page read and write
7702000
trusted library allocation
page read and write
311E000
stack
page read and write
567C000
stack
page read and write
1740000
trusted library allocation
page read and write
8EAE000
stack
page read and write
78EF000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
345A000
trusted library allocation
page read and write
7965000
trusted library allocation
page read and write
1230000
heap
page read and write
293E000
unkown
page read and write
7AE9000
trusted library allocation
page read and write
78C4000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
346A000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
7ADD000
trusted library allocation
page read and write
7925000
trusted library allocation
page read and write
16AF000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
7AE5000
trusted library allocation
page read and write
4197000
trusted library allocation
page read and write
6E2C000
stack
page read and write
7B15000
trusted library allocation
page read and write
6F7D000
stack
page read and write
786F000
trusted library allocation
page read and write
7876000
trusted library allocation
page read and write
13CA000
trusted library allocation
page execute and read and write
1235000
heap
page read and write
2A30000
heap
page read and write
5B6D000
heap
page read and write
7904000
trusted library allocation
page read and write
7865000
trusted library allocation
page read and write
556E000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
1240000
heap
page read and write
55DE000
trusted library allocation
page read and write
13DB000
trusted library allocation
page execute and read and write
782D000
trusted library allocation
page read and write
FD9000
stack
page read and write
93AE000
stack
page read and write
5CD0000
trusted library allocation
page read and write
7B06000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
76E8000
trusted library allocation
page read and write
7A96000
trusted library allocation
page read and write
76D8000
trusted library allocation
page read and write
70C0000
heap
page read and write
7906000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
779C000
trusted library allocation
page read and write
7AB7000
trusted library allocation
page read and write
6C5E000
stack
page read and write
7A0C000
trusted library allocation
page read and write
7A98000
trusted library allocation
page read and write
56F0000
heap
page read and write
16D0000
trusted library allocation
page read and write
77AE000
trusted library allocation
page read and write
78F3000
trusted library allocation
page read and write
7AFE000
trusted library allocation
page read and write
77D3000
trusted library allocation
page read and write
1543000
heap
page read and write
3150000
trusted library allocation
page read and write
6605000
trusted library allocation
page read and write
1356000
trusted library allocation
page execute and read and write
7933000
trusted library allocation
page read and write
788A000
trusted library allocation
page read and write
3462000
trusted library allocation
page read and write
125E000
heap
page read and write
5A0C000
stack
page read and write
5552000
trusted library allocation
page read and write
65F0000
trusted library allocation
page read and write
7A72000
trusted library allocation
page read and write
7842000
trusted library allocation
page read and write
7793000
trusted library allocation
page read and write
781F000
trusted library allocation
page read and write
42AB000
trusted library allocation
page read and write
7802000
trusted library allocation
page read and write
170D000
trusted library allocation
page execute and read and write
32C9000
trusted library allocation
page read and write
1160000
heap
page read and write
7AE1000
trusted library allocation
page read and write
7821000
trusted library allocation
page read and write
148B000
heap
page read and write
7640000
trusted library allocation
page read and write
149D000
heap
page read and write
17E5000
trusted library allocation
page read and write
3339000
trusted library allocation
page read and write
78FC000
trusted library allocation
page read and write
7A6B000
trusted library allocation
page read and write
6CCE000
trusted library allocation
page read and write
308E000
trusted library allocation
page read and write
78BE000
trusted library allocation
page read and write
99BC000
stack
page read and write
62F0000
heap
page read and write
7A56000
trusted library allocation
page read and write
7912000
trusted library allocation
page read and write
3178000
trusted library allocation
page read and write
5730000
heap
page read and write
7884000
trusted library allocation
page read and write
3173000
trusted library allocation
page read and write
6C77000
trusted library allocation
page read and write
7714000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
2BE0000
heap
page read and write
77C3000
trusted library allocation
page read and write
306E000
stack
page read and write
7825000
trusted library allocation
page read and write
7888000
trusted library allocation
page read and write
936E000
stack
page read and write
8A0000
heap
page read and write
14E3000
trusted library allocation
page execute and read and write
29CE000
stack
page read and write
776F000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
8530000
heap
page read and write
76CF000
trusted library allocation
page read and write
7882000
trusted library allocation
page read and write
7988000
trusted library allocation
page read and write
77FE000
trusted library allocation
page read and write
79A5000
trusted library allocation
page read and write
9B7D000
stack
page read and write
333D000
trusted library allocation
page read and write
774E000
trusted library allocation
page read and write
EDA000
stack
page read and write
55CE000
trusted library allocation
page read and write
79DB000
trusted library allocation
page read and write
98FC000
stack
page read and write
77F4000
trusted library allocation
page read and write
1727000
trusted library allocation
page execute and read and write
32FA000
trusted library allocation
page read and write
783E000
trusted library allocation
page read and write
781B000
trusted library allocation
page read and write
442F000
trusted library allocation
page read and write
7888000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
182E000
stack
page read and write
77EC000
trusted library allocation
page read and write
43AC000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
652E000
stack
page read and write
790C000
trusted library allocation
page read and write
7712000
trusted library allocation
page read and write
297F000
unkown
page read and write
6C60000
trusted library allocation
page read and write
1293000
heap
page read and write
77D1000
trusted library allocation
page read and write
424C000
trusted library allocation
page read and write
76CB000
trusted library allocation
page read and write
DB0000
heap
page read and write
323F000
trusted library allocation
page read and write
77CD000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
77C1000
trusted library allocation
page read and write
7882000
trusted library allocation
page read and write
5B2F000
heap
page read and write
1278000
heap
page read and write
14F0000
trusted library allocation
page read and write
78C8000
trusted library allocation
page read and write
660A000
trusted library allocation
page read and write
5680000
heap
page read and write
41C5000
trusted library allocation
page read and write
777C000
trusted library allocation
page read and write
77B3000
trusted library allocation
page read and write
150E000
heap
page read and write
592E000
stack
page read and write
77A7000
trusted library allocation
page read and write
79D8000
trusted library allocation
page read and write
8540000
heap
page read and write
9A0E000
stack
page read and write
698E000
heap
page read and write
1240000
heap
page read and write
3174000
trusted library allocation
page read and write
79B7000
trusted library allocation
page read and write
187B000
heap
page read and write
7780000
trusted library allocation
page read and write
7190000
heap
page read and write
5730000
trusted library allocation
page read and write
79BA000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
5B70000
heap
page read and write
6BAE000
stack
page read and write
77C3000
trusted library allocation
page read and write
94AE000
stack
page read and write
78EB000
trusted library allocation
page read and write
3096000
trusted library allocation
page read and write
77E6000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
77A8000
trusted library allocation
page read and write
1504000
trusted library allocation
page read and write
30AE000
stack
page read and write
77B1000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page execute and read and write
1740000
trusted library allocation
page read and write
787E000
stack
page read and write
77C7000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
7772000
trusted library allocation
page read and write
310E000
stack
page read and write
7951000
trusted library allocation
page read and write
5A00000
heap
page read and write
13AD000
trusted library allocation
page execute and read and write
786D000
trusted library allocation
page read and write
16BA000
trusted library allocation
page read and write
7B10000
trusted library allocation
page read and write
5780000
heap
page read and write
7170000
trusted library allocation
page execute and read and write
5C20000
trusted library allocation
page read and write
788E000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
13CE000
stack
page read and write
7754000
trusted library allocation
page read and write
43B000
remote allocation
page execute and read and write
655D000
stack
page read and write
6D40000
trusted library allocation
page execute and read and write
There are 1146 hidden memdumps, click here to show them.