IOC Report
INVOICE KAD-0138-2024.exe

loading gif

Files

File Path
Type
Category
Malicious
INVOICE KAD-0138-2024.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpFEC6.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\cplIqbJaku.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BjTxJte.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\INVOICE KAD-0138-2024.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cplIqbJaku.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0sl4unly.sqc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3uwfjg24.dnn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ywjizn0.dfj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qedut2jb.sad.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v34gx1jh.tor.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w0sma5fm.0li.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xe0pytzr.ddf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zqrdvolo.1xb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp1F10.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp5E3C.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp8193.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\cplIqbJaku.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\INVOICE KAD-0138-2024.exe
"C:\Users\user\Desktop\INVOICE KAD-0138-2024.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\INVOICE KAD-0138-2024.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cplIqbJaku.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cplIqbJaku" /XML "C:\Users\user\AppData\Local\Temp\tmpFEC6.tmp"
malicious
C:\Users\user\Desktop\INVOICE KAD-0138-2024.exe
"C:\Users\user\Desktop\INVOICE KAD-0138-2024.exe"
malicious
C:\Users\user\AppData\Roaming\cplIqbJaku.exe
C:\Users\user\AppData\Roaming\cplIqbJaku.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cplIqbJaku" /XML "C:\Users\user\AppData\Local\Temp\tmp1F10.tmp"
malicious
C:\Users\user\AppData\Roaming\cplIqbJaku.exe
"C:\Users\user\AppData\Roaming\cplIqbJaku.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cplIqbJaku" /XML "C:\Users\user\AppData\Local\Temp\tmp5E3C.tmp"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cplIqbJaku" /XML "C:\Users\user\AppData\Local\Temp\tmp8193.tmp"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
http://crl.micro
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r3.i.lencr.orb
unknown
http://r3.o.lencr.org0
unknown
http://x1.c.lenc
unknown
http://www.microsoft.c
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://mail.ipr-co.org
unknown
http://microsoft.co8
unknown
http://ipr-co.org
unknown
http://r3.i.lencr.org/0
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.ipr-co.org
unknown
malicious
ipr-co.org
185.55.225.242
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
185.55.225.242
ipr-co.org
Iran (ISLAMIC Republic Of)
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\INVOICE KAD-0138-2024_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
BjTxJte
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cplIqbJaku_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
FileDirectory
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C74000
trusted library allocation
page read and write
malicious
28D4000
trusted library allocation
page read and write
malicious
34D5000
trusted library allocation
page read and write
malicious
2D7C000
trusted library allocation
page read and write
malicious
33AE000
trusted library allocation
page read and write
malicious
2591000
trusted library allocation
page read and write
malicious
28CC000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3141000
trusted library allocation
page read and write
malicious
28A1000
trusted library allocation
page read and write
malicious
2C41000
trusted library allocation
page read and write
malicious
4EE0000
trusted library section
page read and write
malicious
2C6C000
trusted library allocation
page read and write
malicious
29BE000
trusted library allocation
page read and write
malicious
376E000
trusted library allocation
page read and write
malicious
34CD000
trusted library allocation
page read and write
malicious
29FF000
trusted library allocation
page read and write
malicious
3481000
trusted library allocation
page read and write
malicious
27FE000
trusted library allocation
page read and write
malicious
2D51000
trusted library allocation
page read and write
malicious
611E000
stack
page read and write
3C5E000
trusted library allocation
page read and write
2779000
trusted library allocation
page read and write
85AE000
stack
page read and write
2793000
trusted library allocation
page read and write
880000
heap
page read and write
69E0000
heap
page read and write
2FEB000
trusted library allocation
page read and write
48CB000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
26DB000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
2CAE000
stack
page read and write
C0E000
stack
page read and write
27B9000
trusted library allocation
page read and write
1274000
trusted library allocation
page read and write
1610000
heap
page read and write
2380000
heap
page read and write
8FFE000
stack
page read and write
15C4000
trusted library allocation
page read and write
8850000
heap
page read and write
2823000
trusted library allocation
page read and write
CF5000
trusted library allocation
page execute and read and write
668E000
stack
page read and write
2757000
trusted library allocation
page read and write
156D000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page execute and read and write
154E000
trusted library allocation
page read and write
4149000
trusted library allocation
page read and write
53CE000
stack
page read and write
15E0000
trusted library allocation
page read and write
266F000
trusted library allocation
page read and write
380000
heap
page read and write
6610000
trusted library allocation
page read and write
321E000
stack
page read and write
AC2000
heap
page read and write
26F9000
trusted library allocation
page read and write
5DCD000
stack
page read and write
3453000
trusted library allocation
page read and write
5DDF000
stack
page read and write
D36000
heap
page read and write
2731000
trusted library allocation
page read and write
2419000
trusted library allocation
page read and write
61EB000
heap
page read and write
128D000
trusted library allocation
page execute and read and write
64C7000
trusted library allocation
page read and write
99A000
trusted library allocation
page execute and read and write
3001000
trusted library allocation
page read and write
6B8000
heap
page read and write
2689000
trusted library allocation
page read and write
C50000
heap
page read and write
1022000
trusted library allocation
page read and write
CC6000
heap
page read and write
2AF4000
trusted library allocation
page read and write
660E000
stack
page read and write
1420000
heap
page read and write
980000
trusted library allocation
page read and write
1370000
heap
page read and write
1540000
trusted library allocation
page read and write
DEC000
stack
page read and write
4D0C000
trusted library allocation
page read and write
C5B000
stack
page read and write
992000
trusted library allocation
page read and write
A62000
heap
page read and write
2FFE000
trusted library allocation
page read and write
338F000
stack
page read and write
960000
trusted library allocation
page read and write
2781000
trusted library allocation
page read and write
A3E000
stack
page read and write
2739000
trusted library allocation
page read and write
986000
trusted library allocation
page execute and read and write
4920000
trusted library allocation
page read and write
27EB000
trusted library allocation
page read and write
7E0000
heap
page read and write
27AE000
trusted library allocation
page read and write
982000
trusted library allocation
page read and write
1897000
trusted library allocation
page execute and read and write
5035000
trusted library allocation
page read and write
27FB000
trusted library allocation
page read and write
621F000
stack
page read and write
50C0000
heap
page read and write
2683000
trusted library allocation
page read and write
149E000
stack
page read and write
45D0000
trusted library allocation
page read and write
26C9000
trusted library allocation
page read and write
4A4F000
stack
page read and write
635E000
stack
page read and write
56AD000
stack
page read and write
6B7E000
stack
page read and write
3080000
heap
page read and write
26DF000
trusted library allocation
page read and write
449D000
trusted library allocation
page read and write
1385000
heap
page read and write
4600000
trusted library allocation
page execute and read and write
284D000
trusted library allocation
page read and write
4C52000
trusted library allocation
page read and write
6E0B000
heap
page read and write
443B000
stack
page read and write
A40000
trusted library allocation
page read and write
628E000
stack
page read and write
6EFE000
stack
page read and write
3420000
heap
page execute and read and write
2B00000
heap
page read and write
CE0000
heap
page read and write
57C0000
heap
page read and write
964000
trusted library allocation
page read and write
2849000
trusted library allocation
page read and write
26B7000
trusted library allocation
page read and write
2741000
trusted library allocation
page read and write
1790000
heap
page read and write
4A70000
heap
page read and write
BA0000
trusted library allocation
page read and write
3224000
trusted library allocation
page read and write
61AD000
stack
page read and write
6527000
trusted library allocation
page read and write
610000
heap
page read and write
26EB000
trusted library allocation
page read and write
554E000
stack
page read and write
2767000
trusted library allocation
page read and write
5F00000
heap
page read and write
2721000
trusted library allocation
page read and write
BEE000
stack
page read and write
28C8000
trusted library allocation
page read and write
733E000
stack
page read and write
A59000
heap
page read and write
2C26000
trusted library allocation
page read and write
156F000
stack
page read and write
69BE000
stack
page read and write
2727000
trusted library allocation
page read and write
2837000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
2835000
trusted library allocation
page read and write
6A00000
trusted library allocation
page execute and read and write
5EB2000
heap
page read and write
864E000
stack
page read and write
1508000
heap
page read and write
D60000
heap
page read and write
281F000
trusted library allocation
page read and write
283E000
unkown
page read and write
14F0000
heap
page read and write
2B4A000
stack
page read and write
663D000
trusted library allocation
page read and write
26D7000
trusted library allocation
page read and write
29FB000
trusted library allocation
page read and write
31D8000
trusted library allocation
page read and write
2B0000
heap
page read and write
6640000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
688D000
stack
page read and write
2A90000
trusted library allocation
page read and write
C30000
heap
page read and write
26B5000
trusted library allocation
page read and write
445D000
trusted library allocation
page read and write
131A000
heap
page read and write
5A2E000
stack
page read and write
2795000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
898E000
stack
page read and write
B82000
trusted library allocation
page read and write
B55000
heap
page read and write
276B000
trusted library allocation
page read and write
2809000
trusted library allocation
page read and write
2673000
trusted library allocation
page read and write
88CB000
stack
page read and write
507C000
stack
page read and write
1535000
heap
page read and write
1950000
trusted library allocation
page read and write
3006000
trusted library allocation
page read and write
B76000
trusted library allocation
page execute and read and write
A80000
heap
page read and write
5080000
heap
page execute and read and write
832E000
stack
page read and write
2D01000
trusted library allocation
page read and write
303A000
stack
page read and write
282D000
trusted library allocation
page read and write
4943000
heap
page read and write
1137000
stack
page read and write
2777000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
A7B000
trusted library allocation
page execute and read and write
E28000
heap
page read and write
39B5000
trusted library allocation
page read and write
3A32000
trusted library allocation
page read and write
1380000
heap
page read and write
1863000
trusted library allocation
page execute and read and write
58E0000
heap
page execute and read and write
69C0000
trusted library allocation
page read and write
27DB000
trusted library allocation
page read and write
1970000
heap
page read and write
266B000
trusted library allocation
page read and write
7080000
heap
page read and write
66B0000
trusted library allocation
page execute and read and write
1960000
trusted library allocation
page read and write
B43000
trusted library allocation
page execute and read and write
CC3000
trusted library allocation
page execute and read and write
2AD9000
trusted library allocation
page read and write
698E000
stack
page read and write
54D0000
trusted library allocation
page read and write
2699000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
2775000
trusted library allocation
page read and write
85EE000
stack
page read and write
4A4E000
stack
page read and write
2AE5000
trusted library allocation
page read and write
5B9C000
stack
page read and write
888E000
stack
page read and write
1292000
trusted library allocation
page read and write
263F000
trusted library allocation
page read and write
267B000
trusted library allocation
page read and write
877E000
stack
page read and write
2B0D000
stack
page read and write
2697000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
7F410000
trusted library allocation
page execute and read and write
5E9F000
stack
page read and write
98D000
trusted library allocation
page execute and read and write
268F000
trusted library allocation
page read and write
33ED000
stack
page read and write
27F3000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
280F000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
26BB000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
300D000
trusted library allocation
page read and write
2401000
trusted library allocation
page read and write
1339000
stack
page read and write
A77000
trusted library allocation
page execute and read and write
6A0E000
stack
page read and write
270D000
trusted library allocation
page read and write
674F000
stack
page read and write
CE6000
trusted library allocation
page execute and read and write
4DA0000
trusted library allocation
page execute and read and write
623D000
stack
page read and write
15F5000
trusted library allocation
page read and write
31F9000
trusted library allocation
page read and write
134C000
heap
page read and write
10D0000
trusted library allocation
page execute and read and write
2751000
trusted library allocation
page read and write
C92000
trusted library allocation
page read and write
64B5000
trusted library allocation
page read and write
6EC000
heap
page read and write
9AB000
trusted library allocation
page execute and read and write
699B000
trusted library allocation
page read and write
853E000
stack
page read and write
4F8E000
stack
page read and write
280B000
trusted library allocation
page read and write
2D7A000
trusted library allocation
page read and write
31EF000
trusted library allocation
page read and write
27BB000
trusted library allocation
page read and write
283B000
trusted library allocation
page read and write
1614000
heap
page read and write
1566000
trusted library allocation
page read and write
6E67000
heap
page read and write
A66000
trusted library allocation
page execute and read and write
26CF000
trusted library allocation
page read and write
5650000
trusted library allocation
page execute and read and write
81E000
stack
page read and write
CE0000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
27AB000
trusted library allocation
page read and write
6E8E000
heap
page read and write
285C000
trusted library allocation
page read and write
271D000
trusted library allocation
page read and write
BF0000
trusted library allocation
page execute and read and write
4B90000
trusted library allocation
page read and write
93FE000
stack
page read and write
272F000
trusted library allocation
page read and write
69CB000
trusted library allocation
page read and write
CCD000
trusted library allocation
page execute and read and write
2765000
trusted library allocation
page read and write
270B000
trusted library allocation
page read and write
6540000
heap
page read and write
2DED000
stack
page read and write
950000
trusted library allocation
page read and write
2693000
trusted library allocation
page read and write
23C6000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
53FE000
stack
page read and write
5E2F000
stack
page read and write
4D8E000
stack
page read and write
1025000
trusted library allocation
page execute and read and write
4ECC000
stack
page read and write
2745000
trusted library allocation
page read and write
4D5E000
heap
page read and write
2805000
trusted library allocation
page read and write
C64000
trusted library allocation
page read and write
25CE000
stack
page read and write
2813000
trusted library allocation
page read and write
E1F000
heap
page read and write
3030000
heap
page execute and read and write
CCF000
trusted library allocation
page read and write
1573000
heap
page read and write
2799000
trusted library allocation
page read and write
517B000
stack
page read and write
26A3000
trusted library allocation
page read and write
8EFE000
stack
page read and write
15A0000
trusted library allocation
page execute and read and write
8408000
heap
page read and write
2640000
heap
page execute and read and write
62AE000
stack
page read and write
4C70000
trusted library allocation
page read and write
568F000
stack
page read and write
2677000
trusted library allocation
page read and write
1890000
trusted library allocation
page read and write
25F5000
trusted library allocation
page read and write
650000
heap
page read and write
C50000
heap
page read and write
284F000
trusted library allocation
page read and write
28CA000
trusted library allocation
page read and write
48BE000
stack
page read and write
48E1000
trusted library allocation
page read and write
5950000
trusted library section
page read and write
64A0000
trusted library allocation
page read and write
3A6D000
trusted library allocation
page read and write
2709000
trusted library allocation
page read and write
186D000
trusted library allocation
page execute and read and write
27F0000
trusted library allocation
page read and write
3D6C000
trusted library allocation
page read and write
2803000
trusted library allocation
page read and write
6557000
trusted library allocation
page read and write
7D0000
heap
page read and write
602E000
stack
page read and write
15C6000
trusted library allocation
page read and write
26FD000
trusted library allocation
page read and write
5C9F000
stack
page read and write
37C3000
trusted library allocation
page read and write
2A1F000
stack
page read and write
27A1000
trusted library allocation
page read and write
5B6B000
stack
page read and write
8B0E000
stack
page read and write
6D50000
heap
page read and write
2789000
trusted library allocation
page read and write
34EB000
trusted library allocation
page read and write
5954000
heap
page read and write
BD0000
heap
page read and write
7FFD000
stack
page read and write
97D000
trusted library allocation
page execute and read and write
267F000
trusted library allocation
page read and write
23F0000
heap
page read and write
9D0000
heap
page execute and read and write
3230000
trusted library allocation
page read and write
25CE000
trusted library allocation
page read and write
1377000
heap
page read and write
8842000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
BF0000
trusted library allocation
page execute and read and write
540C000
stack
page read and write
276D000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
101A000
trusted library allocation
page execute and read and write
5946000
heap
page read and write
155E000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
1239000
stack
page read and write
1572000
trusted library allocation
page read and write
2C6A000
trusted library allocation
page read and write
6620000
trusted library allocation
page execute and read and write
CD5000
trusted library allocation
page read and write
616E000
stack
page read and write
B85000
trusted library allocation
page execute and read and write
27B3000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
26AF000
stack
page read and write
68FE000
stack
page read and write
860F000
stack
page read and write
650D000
stack
page read and write
233F000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
26E0000
heap
page read and write
2743000
trusted library allocation
page read and write
822D000
stack
page read and write
45CE000
stack
page read and write
830000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
6432000
heap
page read and write
C4E000
stack
page read and write
26B0000
heap
page read and write
3300000
heap
page read and write
4AF0000
trusted library allocation
page execute and read and write
277D000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
4F20000
heap
page execute and read and write
7097000
trusted library allocation
page read and write
26E3000
trusted library allocation
page read and write
8EC000
heap
page read and write
CEA000
trusted library allocation
page execute and read and write
917E000
stack
page read and write
108E000
stack
page read and write
2749000
trusted library allocation
page read and write
CEA000
heap
page read and write
43E000
remote allocation
page execute and read and write
271B000
trusted library allocation
page read and write
31F3000
trusted library allocation
page read and write
2F2A000
heap
page read and write
963000
trusted library allocation
page execute and read and write
649E000
stack
page read and write
13FE000
stack
page read and write
58D0000
trusted library allocation
page execute and read and write
27D9000
trusted library allocation
page read and write
26F1000
trusted library allocation
page read and write
2733000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
1880000
trusted library allocation
page read and write
5ECE000
stack
page read and write
E07000
heap
page read and write
27E0000
trusted library allocation
page read and write
367D000
trusted library allocation
page read and write
2AB4000
trusted library allocation
page read and write
3591000
trusted library allocation
page read and write
89D0000
heap
page read and write
6FFE000
stack
page read and write
814E000
stack
page read and write
27F7000
trusted library allocation
page read and write
507D000
stack
page read and write
4D40000
heap
page execute and read and write
69CE000
stack
page read and write
27FB000
trusted library allocation
page read and write
D5E000
stack
page read and write
2809000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
27A5000
trusted library allocation
page read and write
67FE000
stack
page read and write
26B3000
trusted library allocation
page read and write
990000
heap
page read and write
2829000
trusted library allocation
page read and write
9D8000
heap
page read and write
619E000
heap
page read and write
29DE000
stack
page read and write
2411000
trusted library allocation
page read and write
27E4000
trusted library allocation
page read and write
12E0000
heap
page read and write
3851000
trusted library allocation
page read and write
58EC000
stack
page read and write
3683000
trusted library allocation
page read and write
2D3B000
trusted library allocation
page read and write
1016000
trusted library allocation
page execute and read and write
CB9000
heap
page read and write
A60000
heap
page read and write
8B12000
trusted library allocation
page read and write
280B000
trusted library allocation
page read and write
80A000
heap
page read and write
2FE000
unkown
page read and write
6E58000
heap
page read and write
2BA0000
heap
page read and write
992000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
26F8000
trusted library allocation
page read and write
8A5E000
stack
page read and write
578E000
trusted library allocation
page read and write
527E000
stack
page read and write
26D3000
trusted library allocation
page read and write
27B7000
trusted library allocation
page read and write
2330000
trusted library allocation
page read and write
27E1000
trusted library allocation
page read and write
2785000
trusted library allocation
page read and write
6DC8000
heap
page read and write
5900000
heap
page read and write
5760000
trusted library allocation
page read and write
C8D000
trusted library allocation
page read and write
14EF000
stack
page read and write
8BF000
heap
page read and write
1040000
trusted library allocation
page read and write
26F5000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
2705000
trusted library allocation
page read and write
263B000
trusted library allocation
page read and write
3642000
trusted library allocation
page read and write
4DD0000
heap
page read and write
272D000
trusted library allocation
page read and write
27D2000
trusted library allocation
page read and write
27D7000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
12D5000
heap
page read and write
4526000
trusted library allocation
page read and write
15FE000
stack
page read and write
27CB000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
2D3F000
trusted library allocation
page read and write
4D03000
heap
page read and write
27E3000
trusted library allocation
page read and write
27F9000
trusted library allocation
page read and write
7FAD0000
trusted library allocation
page execute and read and write
4EDE000
stack
page read and write
C80000
heap
page read and write
5660000
trusted library allocation
page read and write
27C1000
trusted library allocation
page read and write
6CBE000
stack
page read and write
4F30000
heap
page read and write
2819000
trusted library allocation
page read and write
D97000
heap
page read and write
27B5000
trusted library allocation
page read and write
C00000
heap
page read and write
27C1000
trusted library allocation
page read and write
B44000
trusted library allocation
page read and write
170E000
stack
page read and write
999000
stack
page read and write
A10000
heap
page read and write
26DD000
trusted library allocation
page read and write
81BE000
stack
page read and write
121E000
stack
page read and write
33A0000
heap
page read and write
A00000
trusted library allocation
page execute and read and write
27D5000
trusted library allocation
page read and write
83A000
stack
page read and write
64EE000
stack
page read and write
334E000
stack
page read and write
1870000
trusted library allocation
page read and write
472C000
stack
page read and write
2627000
trusted library allocation
page read and write
27EF000
trusted library allocation
page read and write
625E000
stack
page read and write
50B0000
trusted library allocation
page read and write
5040000
trusted library allocation
page execute and read and write
2460000
trusted library allocation
page read and write
15EF000
trusted library allocation
page read and write
353E000
trusted library allocation
page read and write
3431000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
282F000
trusted library allocation
page read and write
5914000
heap
page read and write
5CDE000
stack
page read and write
4AD0000
heap
page read and write
188A000
trusted library allocation
page execute and read and write
62EE000
stack
page read and write
4431000
trusted library allocation
page read and write
23FB000
trusted library allocation
page read and write
8CCE000
stack
page read and write
1940000
trusted library allocation
page execute and read and write
2782000
trusted library allocation
page read and write
B7A000
trusted library allocation
page execute and read and write
55E0000
heap
page read and write
26C7000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
927E000
stack
page read and write
3AA8000
trusted library allocation
page read and write
27E5000
trusted library allocation
page read and write
C81000
trusted library allocation
page read and write
2626000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
558E000
stack
page read and write
439E000
stack
page read and write
C10000
heap
page read and write
836E000
stack
page read and write
27C5000
trusted library allocation
page read and write
694E000
stack
page read and write
5078000
trusted library allocation
page read and write
84E000
heap
page read and write
282B000
trusted library allocation
page read and write
875000
heap
page read and write
269D000
trusted library allocation
page read and write
93BC000
stack
page read and write
274B000
trusted library allocation
page read and write
3635000
trusted library allocation
page read and write
882C000
stack
page read and write
7190000
trusted library allocation
page execute and read and write
26F3000
trusted library allocation
page read and write
717E000
stack
page read and write
D68000
heap
page read and write
169E000
stack
page read and write
1882000
trusted library allocation
page read and write
2787000
trusted library allocation
page read and write
F9E000
stack
page read and write
C00000
trusted library allocation
page read and write
4BAE000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
AFE000
stack
page read and write
26E9000
trusted library allocation
page read and write
63EE000
stack
page read and write
26FF000
trusted library allocation
page read and write
6F7000
stack
page read and write
2847000
trusted library allocation
page read and write
84AE000
stack
page read and write
1572000
trusted library allocation
page read and write
12F0000
heap
page read and write
31FF000
unkown
page read and write
2685000
trusted library allocation
page read and write
8A8E000
stack
page read and write
3230000
heap
page read and write
26A1000
trusted library allocation
page read and write
64B7000
trusted library allocation
page read and write
5665000
trusted library allocation
page read and write
26E7000
trusted library allocation
page read and write
781E000
stack
page read and write
2725000
trusted library allocation
page read and write
43A0000
trusted library allocation
page read and write
5782000
trusted library allocation
page read and write
8ADE000
stack
page read and write
7540000
trusted library allocation
page execute and read and write
BA0000
trusted library allocation
page read and write
83FE000
stack
page read and write
305F000
unkown
page read and write
3466000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
4422000
trusted library allocation
page read and write
82FE000
stack
page read and write
A5D000
trusted library allocation
page execute and read and write
30A0000
heap
page read and write
34E0000
trusted library allocation
page read and write
4D90000
trusted library section
page read and write
2735000
trusted library allocation
page read and write
83D0000
heap
page read and write
34CB000
trusted library allocation
page read and write
2737000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
A11000
heap
page read and write
7820000
heap
page read and write
973000
trusted library allocation
page execute and read and write
88BF000
stack
page read and write
5796000
trusted library allocation
page read and write
38BC000
trusted library allocation
page read and write
26A9000
trusted library allocation
page read and write
69C0000
trusted library allocation
page read and write
840000
heap
page read and write
320A000
heap
page read and write
3D01000
trusted library allocation
page read and write
4B33000
heap
page read and write
2707000
trusted library allocation
page read and write
1228000
trusted library allocation
page read and write
8428000
heap
page read and write
3200000
heap
page read and write
B6D000
trusted library allocation
page execute and read and write
2761000
trusted library allocation
page read and write
2369000
trusted library allocation
page read and write
3C19000
trusted library allocation
page read and write
570E000
stack
page read and write
27E8000
trusted library allocation
page read and write
52CC000
stack
page read and write
23D6000
trusted library allocation
page read and write
2F20000
heap
page read and write
232E000
stack
page read and write
193C000
stack
page read and write
3BB3000
trusted library allocation
page read and write
1296000
trusted library allocation
page execute and read and write
4A80000
heap
page read and write
7F4E000
stack
page read and write
25FE000
trusted library allocation
page read and write
27AF000
trusted library allocation
page read and write
25EA000
trusted library allocation
page read and write
C86000
trusted library allocation
page read and write
50BB000
stack
page read and write
C00000
heap
page read and write
A5E000
stack
page read and write
A06000
heap
page read and write
240D000
trusted library allocation
page read and write
27C6000
trusted library allocation
page read and write
24C0000
heap
page read and write
9A7000
trusted library allocation
page execute and read and write
52BE000
stack
page read and write
187D000
trusted library allocation
page execute and read and write
5F0000
heap
page read and write
274D000
trusted library allocation
page read and write
9C0000
trusted library allocation
page execute and read and write
2679000
trusted library allocation
page read and write
652E000
stack
page read and write
95E000
stack
page read and write
2729000
trusted library allocation
page read and write
85F000
heap
page read and write
269F000
trusted library allocation
page read and write
189B000
trusted library allocation
page execute and read and write
2671000
trusted library allocation
page read and write
2759000
trusted library allocation
page read and write
45E3000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
BDA000
heap
page read and write
93E000
stack
page read and write
27FF000
trusted library allocation
page read and write
2628000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
5090000
heap
page read and write
6205000
heap
page read and write
102B000
trusted library allocation
page execute and read and write
27D1000
trusted library allocation
page read and write
2759000
trusted library allocation
page read and write
484C000
stack
page read and write
64F7000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
3759000
trusted library allocation
page read and write
662E000
stack
page read and write
593E000
stack
page read and write
27A3000
trusted library allocation
page read and write
9E0000
heap
page read and write
2C3D000
trusted library allocation
page read and write
C7E000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
2807000
trusted library allocation
page read and write
103A000
stack
page read and write
665000
heap
page read and write
6DC0000
heap
page read and write
10E7000
heap
page read and write
276F000
trusted library allocation
page read and write
A70000
heap
page read and write
B8B000
trusted library allocation
page execute and read and write
273D000
trusted library allocation
page read and write
26EF000
trusted library allocation
page read and write
2769000
trusted library allocation
page read and write
70A0000
trusted library allocation
page execute and read and write
5E1E000
stack
page read and write
767000
stack
page read and write
75F1000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
4D05000
trusted library allocation
page read and write
2FE4000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
48F2000
trusted library allocation
page read and write
26AB000
trusted library allocation
page read and write
913E000
stack
page read and write
6C8F000
stack
page read and write
27AB000
trusted library allocation
page read and write
26E0000
heap
page read and write
8A12000
trusted library allocation
page read and write
69D0000
trusted library allocation
page execute and read and write
B88000
heap
page read and write
31FB000
trusted library allocation
page read and write
983000
trusted library allocation
page read and write
6B3E000
stack
page read and write
2D84000
trusted library allocation
page read and write
5DA000
stack
page read and write
E00000
heap
page read and write
7030000
trusted library allocation
page read and write
848000
heap
page read and write
658000
heap
page read and write
D94000
heap
page read and write
48ED000
trusted library allocation
page read and write
4B9B000
trusted library allocation
page read and write
1012000
trusted library allocation
page read and write
1892000
trusted library allocation
page read and write
127D000
trusted library allocation
page execute and read and write
28A0000
heap
page read and write
5FDD000
stack
page read and write
61F9000
heap
page read and write
3751000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
863E000
stack
page read and write
2719000
trusted library allocation
page read and write
2713000
trusted library allocation
page read and write
6530000
trusted library allocation
page execute and read and write
BF1000
heap
page read and write
88FC000
stack
page read and write
278D000
trusted library allocation
page read and write
2C8A000
trusted library allocation
page read and write
2720000
heap
page read and write
283D000
trusted library allocation
page read and write
6520000
trusted library allocation
page read and write
6A61000
trusted library allocation
page read and write
27CF000
trusted library allocation
page read and write
CE2000
trusted library allocation
page read and write
4CEE000
stack
page read and write
CD0000
trusted library allocation
page read and write
309E000
stack
page read and write
6A3E000
stack
page read and write
2747000
trusted library allocation
page read and write
3240000
heap
page read and write
14A7000
heap
page read and write
2827000
trusted library allocation
page read and write
940000
heap
page read and write
8400000
heap
page read and write
DA0000
heap
page read and write
48C0000
trusted library allocation
page read and write
99B000
trusted library allocation
page execute and read and write
1E2000
unkown
page readonly
840C000
heap
page read and write
8406000
heap
page read and write
64F0000
trusted library allocation
page read and write
26AD000
trusted library allocation
page read and write
8DCE000
stack
page read and write
4CF0000
trusted library allocation
page execute and read and write
707E000
stack
page read and write
1860000
trusted library allocation
page read and write
34C7000
trusted library allocation
page read and write
27C9000
trusted library allocation
page read and write
2797000
trusted library allocation
page read and write
3410000
heap
page execute and read and write
2845000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
DA7000
heap
page read and write
48A000
stack
page read and write
27BD000
trusted library allocation
page read and write
2675000
trusted library allocation
page read and write
27E6000
trusted library allocation
page read and write
27C7000
trusted library allocation
page read and write
54CE000
stack
page read and write
277F000
trusted library allocation
page read and write
26CD000
trusted library allocation
page read and write
60DE000
stack
page read and write
6150000
heap
page read and write
BB6000
heap
page read and write
1500000
heap
page read and write
281B000
trusted library allocation
page read and write
6510000
heap
page read and write
850E000
stack
page read and write
57A2000
trusted library allocation
page read and write
27DF000
trusted library allocation
page read and write
8F0000
heap
page read and write
43A5000
trusted library allocation
page read and write
10E0000
heap
page read and write
68BE000
stack
page read and write
55D0000
heap
page read and write
2711000
trusted library allocation
page read and write
27AD000
trusted library allocation
page read and write
26AF000
trusted library allocation
page read and write
FED000
trusted library allocation
page execute and read and write
2B18000
trusted library allocation
page read and write
3361000
trusted library allocation
page read and write
240F000
trusted library allocation
page read and write
6A10000
heap
page read and write
26CB000
trusted library allocation
page read and write
28DF000
trusted library allocation
page read and write
26A7000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
35C5000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
94FE000
stack
page read and write
2763000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
65FE000
stack
page read and write
2BB0000
heap
page read and write
FF0000
heap
page read and write
27B1000
trusted library allocation
page read and write
686000
heap
page read and write
CF7000
trusted library allocation
page execute and read and write
3BF1000
trusted library allocation
page read and write
4F10000
heap
page read and write
6647000
trusted library allocation
page read and write
A75000
heap
page read and write
4F30000
heap
page read and write
62A0000
heap
page read and write
1E0000
unkown
page readonly
523C000
stack
page read and write
B87000
trusted library allocation
page execute and read and write
1577000
trusted library allocation
page execute and read and write
701F000
trusted library allocation
page read and write
96D000
trusted library allocation
page execute and read and write
2691000
trusted library allocation
page read and write
653D000
stack
page read and write
27ED000
trusted library allocation
page read and write
4141000
trusted library allocation
page read and write
26A5000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
48E7000
trusted library allocation
page read and write
31ED000
trusted library allocation
page read and write
6F3000
heap
page read and write
3258000
trusted library allocation
page read and write
8F9000
stack
page read and write
4AE0000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
2805000
trusted library allocation
page read and write
5B2E000
stack
page read and write
4B30000
heap
page read and write
15C0000
trusted library allocation
page read and write
4BC2000
trusted library allocation
page read and write
26AA000
stack
page read and write
615000
heap
page read and write
4E8E000
stack
page read and write
26BF000
trusted library allocation
page read and write
63F8000
heap
page read and write
A53000
trusted library allocation
page read and write
7FFE000
stack
page read and write
26BD000
trusted library allocation
page read and write
27B2000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
CFB000
trusted library allocation
page execute and read and write
D8A000
heap
page read and write
3843000
trusted library allocation
page read and write
48F0000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
280D000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
274F000
stack
page read and write
26C3000
trusted library allocation
page read and write
26D1000
trusted library allocation
page read and write
70F000
heap
page read and write
BAA000
heap
page read and write
27A1000
trusted library allocation
page read and write
4CD0000
heap
page execute and read and write
6DBF000
stack
page read and write
5840000
heap
page read and write
4AA0000
trusted library allocation
page execute and read and write
2831000
trusted library allocation
page read and write
64A8000
trusted library allocation
page read and write
2604000
trusted library allocation
page read and write
C1D000
heap
page read and write
5778000
trusted library allocation
page read and write
C84000
trusted library allocation
page read and write
3012000
trusted library allocation
page read and write
65CE000
stack
page read and write
4233000
trusted library allocation
page read and write
3DE000
stack
page read and write
9F0000
heap
page read and write
4498000
trusted library allocation
page read and write
AAE000
stack
page read and write
278F000
trusted library allocation
page read and write
BC4000
trusted library allocation
page read and write
544E000
stack
page read and write
27FF000
trusted library allocation
page read and write
2687000
trusted library allocation
page read and write
590A000
heap
page read and write
A72000
trusted library allocation
page read and write
1561000
trusted library allocation
page read and write
B72000
trusted library allocation
page read and write
2833000
trusted library allocation
page read and write
27FD000
trusted library allocation
page read and write
35E7000
trusted library allocation
page read and write
10CC000
stack
page read and write
825000
heap
page read and write
57A0000
heap
page read and write
CC4000
trusted library allocation
page read and write
31F7000
trusted library allocation
page read and write
273B000
trusted library allocation
page read and write
574D000
stack
page read and write
4BD5000
trusted library allocation
page read and write
5190000
heap
page read and write
92BB000
stack
page read and write
63EE000
stack
page read and write
269B000
trusted library allocation
page read and write
4BB1000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
260B000
stack
page read and write
27DD000
trusted library allocation
page read and write
4BB6000
trusted library allocation
page read and write
5F2B000
stack
page read and write
D19000
heap
page read and write
313F000
stack
page read and write
14A0000
heap
page read and write
1283000
trusted library allocation
page read and write
7EFD000
stack
page read and write
2BF1000
trusted library allocation
page read and write
502F000
stack
page read and write
2638000
trusted library allocation
page read and write
CC3000
heap
page read and write
2663000
trusted library allocation
page read and write
20D000
stack
page read and write
23CE000
stack
page read and write
27E7000
trusted library allocation
page read and write
65BE000
stack
page read and write
7020000
trusted library allocation
page read and write
260B000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
4C40000
heap
page read and write
4F20000
trusted library allocation
page execute and read and write
2665000
trusted library allocation
page read and write
698E000
stack
page read and write
2AC0000
trusted library allocation
page read and write
266D000
trusted library allocation
page read and write
15D0000
heap
page read and write
89FC000
stack
page read and write
2717000
trusted library allocation
page read and write
74FE000
stack
page read and write
2350000
heap
page read and write
8ACE000
stack
page read and write
ABF000
stack
page read and write
135E000
heap
page read and write
7550000
heap
page read and write
CB0000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
6C0F000
stack
page read and write
1533000
heap
page read and write
6E74000
heap
page read and write
51C0000
heap
page read and write
87BE000
stack
page read and write
5670000
trusted library allocation
page execute and read and write
287F000
unkown
page read and write
64BD000
trusted library allocation
page read and write
C57000
heap
page read and write
C4C000
stack
page read and write
587000
stack
page read and write
26D9000
trusted library allocation
page read and write
27B6000
trusted library allocation
page read and write
A13000
heap
page read and write
453B000
stack
page read and write
26C5000
trusted library allocation
page read and write
165E000
stack
page read and write
55F2000
trusted library allocation
page read and write
27EB000
trusted library allocation
page read and write
713E000
stack
page read and write
275F000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
82BE000
stack
page read and write
5590000
trusted library allocation
page read and write
34E6000
trusted library allocation
page read and write
639E000
stack
page read and write
53BE000
stack
page read and write
4900000
trusted library allocation
page read and write
CF2000
trusted library allocation
page read and write
2361000
trusted library allocation
page read and write
7018000
trusted library allocation
page read and write
27A7000
trusted library allocation
page read and write
7025000
trusted library allocation
page read and write
2624000
trusted library allocation
page read and write
2D78000
trusted library allocation
page read and write
BEE000
stack
page read and write
4FE0000
trusted library allocation
page read and write
CAE000
heap
page read and write
63F0000
heap
page read and write
86EF000
stack
page read and write
258F000
stack
page read and write
5770000
trusted library allocation
page read and write
271F000
trusted library allocation
page read and write
903E000
stack
page read and write
48C4000
trusted library allocation
page read and write
DD2000
heap
page read and write
275A000
heap
page read and write
27C6000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page execute and read and write
4F0E000
stack
page read and write
81FE000
stack
page read and write
5EB7000
heap
page read and write
2803000
trusted library allocation
page read and write
2817000
trusted library allocation
page read and write
973000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
2703000
trusted library allocation
page read and write
69E1000
trusted library allocation
page read and write
2695000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
6B0F000
stack
page read and write
5791000
trusted library allocation
page read and write
1348000
heap
page read and write
8B10000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
600000
heap
page read and write
2821000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
9DE000
heap
page read and write
31F1000
trusted library allocation
page read and write
C6B000
trusted library allocation
page read and write
2F0E000
unkown
page read and write
275B000
trusted library allocation
page read and write
28A7000
heap
page read and write
245E000
stack
page read and write
4A70000
trusted library allocation
page read and write
2843000
trusted library allocation
page read and write
267D000
trusted library allocation
page read and write
882000
heap
page read and write
18FE000
stack
page read and write
266D000
stack
page read and write
27D3000
trusted library allocation
page read and write
702D000
trusted library allocation
page read and write
275B000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
279F000
trusted library allocation
page read and write
2797000
trusted library allocation
page read and write
4F30000
heap
page read and write
938000
stack
page read and write
26D5000
trusted library allocation
page read and write
6C40000
heap
page read and write
236B000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
2681000
trusted library allocation
page read and write
1529000
heap
page read and write
4D30000
trusted library allocation
page read and write
2C43000
trusted library allocation
page read and write
7F660000
trusted library allocation
page execute and read and write
A6F000
heap
page read and write
26C1000
trusted library allocation
page read and write
874E000
stack
page read and write
6330000
heap
page read and write
30DF000
stack
page read and write
C90000
heap
page read and write
55D3000
heap
page read and write
281D000
trusted library allocation
page read and write
A6A000
trusted library allocation
page execute and read and write
2791000
trusted library allocation
page read and write
283F000
trusted library allocation
page read and write
6DC6000
heap
page read and write
69FE000
stack
page read and write
45E0000
trusted library allocation
page read and write
2715000
trusted library allocation
page read and write
270F000
trusted library allocation
page read and write
E18000
heap
page read and write
2CB0000
trusted library allocation
page read and write
129A000
trusted library allocation
page execute and read and write
1430000
heap
page execute and read and write
1886000
trusted library allocation
page execute and read and write
54BD000
stack
page read and write
154B000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
27FD000
trusted library allocation
page read and write
26B9000
trusted library allocation
page read and write
3369000
trusted library allocation
page read and write
A62000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
529D000
stack
page read and write
867000
heap
page read and write
55F0000
trusted library allocation
page read and write
C17000
heap
page read and write
5F0E000
stack
page read and write
2807000
trusted library allocation
page read and write
27A9000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
268D000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
12AE000
heap
page read and write
153E000
stack
page read and write
11DE000
stack
page read and write
A4D000
trusted library allocation
page execute and read and write
2753000
trusted library allocation
page read and write
2345000
trusted library allocation
page read and write
275D000
trusted library allocation
page read and write
2661000
trusted library allocation
page read and write
2A8E000
stack
page read and write
2D4D000
trusted library allocation
page read and write
7037000
trusted library allocation
page read and write
2839000
trusted library allocation
page read and write
89B000
stack
page read and write
ABC000
heap
page read and write
591B000
heap
page read and write
27B5000
trusted library allocation
page read and write
390000
heap
page read and write
2C68000
trusted library allocation
page read and write
8DC000
heap
page read and write
5950000
heap
page read and write
4D00000
heap
page read and write
FA0000
heap
page read and write
683000
heap
page read and write
83E1000
heap
page read and write
274F000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
1850000
trusted library allocation
page read and write
3AE3000
trusted library allocation
page read and write
31BE000
unkown
page read and write
89CC000
stack
page read and write
7027000
trusted library allocation
page read and write
2815000
trusted library allocation
page read and write
73FE000
unkown
page read and write
CD0000
trusted library allocation
page read and write
3879000
trusted library allocation
page read and write
28E5000
trusted library allocation
page read and write
FE3000
trusted library allocation
page execute and read and write
347D000
trusted library allocation
page read and write
27CD000
trusted library allocation
page read and write
AB0000
heap
page read and write
4F7B000
stack
page read and write
2FE0000
trusted library allocation
page read and write
F5F000
stack
page read and write
5B9E000
stack
page read and write
A73000
heap
page read and write
67CE000
stack
page read and write
960000
trusted library allocation
page read and write
273F000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
23A7000
trusted library allocation
page read and write
48DE000
trusted library allocation
page read and write
58F0000
heap
page read and write
277B000
trusted library allocation
page read and write
4BBD000
trusted library allocation
page read and write
97D000
trusted library allocation
page execute and read and write
800000
heap
page read and write
6C7D000
stack
page read and write
1600000
heap
page read and write
3D07000
trusted library allocation
page read and write
272F000
stack
page read and write
431E000
trusted library allocation
page read and write
1273000
trusted library allocation
page execute and read and write
CA0000
heap
page read and write
27F5000
trusted library allocation
page read and write
9B0000
trusted library allocation
page read and write
2783000
trusted library allocation
page read and write
31A000
stack
page read and write
6560000
trusted library allocation
page execute and read and write
26ED000
trusted library allocation
page read and write
2723000
trusted library allocation
page read and write
CDD000
trusted library allocation
page execute and read and write
663E000
stack
page read and write
872B000
stack
page read and write
4A92000
trusted library allocation
page read and write
9C0000
trusted library allocation
page read and write
2413000
trusted library allocation
page read and write
878E000
stack
page read and write
3226000
trusted library allocation
page read and write
C98000
heap
page read and write
5600000
trusted library allocation
page execute and read and write
9D0000
heap
page read and write
2825000
trusted library allocation
page read and write
2CF0000
heap
page execute and read and write
4AB0000
trusted library allocation
page read and write
346F000
trusted library allocation
page read and write
9A2000
trusted library allocation
page read and write
3D29000
trusted library allocation
page read and write
BC6000
trusted library allocation
page read and write
26F0000
heap
page read and write
2887000
trusted library allocation
page read and write
C29000
heap
page read and write
678E000
stack
page read and write
8B5F000
stack
page read and write
2392000
trusted library allocation
page read and write
A44000
trusted library allocation
page read and write
5EDE000
stack
page read and write
2667000
trusted library allocation
page read and write
B80000
heap
page read and write
98A000
trusted library allocation
page execute and read and write
56CE000
stack
page read and write
12C0000
trusted library allocation
page read and write
6650000
trusted library allocation
page execute and read and write
1977000
heap
page read and write
1799000
heap
page read and write
4B94000
trusted library allocation
page read and write
64C0000
trusted library allocation
page read and write
7F3C0000
trusted library allocation
page execute and read and write
26FB000
trusted library allocation
page read and write
4C90000
heap
page read and write
8A10000
trusted library allocation
page read and write
2853000
trusted library allocation
page read and write
2880000
heap
page read and write
50A0000
heap
page execute and read and write
4F34000
heap
page read and write
260F000
trusted library allocation
page read and write
DF0000
trusted library allocation
page execute and read and write
2811000
trusted library allocation
page read and write
600E000
stack
page read and write
5070000
trusted library allocation
page read and write
5917000
heap
page read and write
4D00000
trusted library allocation
page read and write
2755000
trusted library allocation
page read and write
174E000
stack
page read and write
1864000
trusted library allocation
page read and write
2C2F000
trusted library allocation
page read and write
8A00000
heap
page read and write
268B000
trusted library allocation
page read and write
4EB0000
heap
page execute and read and write
4D50000
heap
page read and write
33F000
unkown
page read and write
638D000
stack
page read and write
FE4000
trusted library allocation
page read and write
604D000
stack
page read and write
2AC4000
trusted library allocation
page read and write
15BF000
heap
page read and write
2AF0000
trusted library allocation
page read and write
5EA0000
heap
page read and write
222E000
stack
page read and write
1180000
heap
page read and write
646C000
heap
page read and write
31EB000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
4459000
trusted library allocation
page read and write
614F000
stack
page read and write
997000
trusted library allocation
page execute and read and write
970000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
594E000
heap
page read and write
157B000
trusted library allocation
page execute and read and write
15BC000
stack
page read and write
27A0000
trusted library allocation
page read and write
12AA000
heap
page read and write
4FDB000
stack
page read and write
5820000
trusted library allocation
page read and write
12A0000
heap
page read and write
4AE2000
trusted library allocation
page read and write
50B0000
heap
page read and write
A43000
trusted library allocation
page execute and read and write
3746000
trusted library allocation
page read and write
1552000
trusted library allocation
page read and write
265F000
trusted library allocation
page read and write
B8F000
stack
page read and write
606E000
stack
page read and write
C10000
heap
page execute and read and write
2D36000
trusted library allocation
page read and write
272B000
trusted library allocation
page read and write
2669000
trusted library allocation
page read and write
392E000
trusted library allocation
page read and write
23B1000
trusted library allocation
page read and write
27C3000
trusted library allocation
page read and write
18B0000
trusted library allocation
page read and write
2773000
trusted library allocation
page read and write
5B8E000
stack
page read and write
1290000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
11EE000
stack
page read and write
C85000
heap
page read and write
5EF1000
heap
page read and write
15F0000
trusted library allocation
page read and write
27CD000
trusted library allocation
page read and write
BCF000
stack
page read and write
2840000
heap
page execute and read and write
241E000
stack
page read and write
284B000
trusted library allocation
page read and write
278B000
trusted library allocation
page read and write
12E3000
heap
page read and write
2601000
trusted library allocation
page read and write
31F5000
trusted library allocation
page read and write
2620000
trusted library allocation
page read and write
241B000
trusted library allocation
page read and write
57B0000
heap
page read and write
D04000
heap
page read and write
24A000
stack
page read and write
1027000
trusted library allocation
page execute and read and write
1820000
heap
page read and write
BB3000
heap
page read and write
279B000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
B50000
heap
page read and write
36B8000
trusted library allocation
page read and write
7EBD000
stack
page read and write
4D90000
heap
page read and write
579D000
trusted library allocation
page read and write
4C60000
trusted library allocation
page execute and read and write
1190000
heap
page read and write
288F000
trusted library allocation
page read and write
2BD0000
heap
page read and write
1250000
heap
page read and write
2415000
trusted library allocation
page read and write
974000
trusted library allocation
page read and write
820000
heap
page read and write
867E000
stack
page read and write
178C000
stack
page read and write
C07000
heap
page read and write
669000
stack
page read and write
577B000
trusted library allocation
page read and write
2BC0000
heap
page read and write
DF5000
heap
page read and write
26F7000
trusted library allocation
page read and write
7D0000
heap
page read and write
6D4E000
stack
page read and write
8830000
heap
page read and write
846E000
stack
page read and write
85E000
stack
page read and write
26E5000
trusted library allocation
page read and write
8B7000
heap
page read and write
27BE000
trusted library allocation
page read and write
B4D000
trusted library allocation
page execute and read and write
1895000
trusted library allocation
page execute and read and write
68BE000
stack
page read and write
3599000
trusted library allocation
page read and write
996000
trusted library allocation
page execute and read and write
3B36000
trusted library allocation
page read and write
2750000
heap
page read and write
6990000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
2F7E000
stack
page read and write
D65000
heap
page read and write
289D000
trusted library allocation
page read and write
2AF6000
trusted library allocation
page read and write
241D000
trusted library allocation
page read and write
4940000
heap
page read and write
2701000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page execute and read and write
36F3000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
45A3000
trusted library allocation
page read and write
4D10000
trusted library allocation
page execute and read and write
5100000
trusted library allocation
page execute and read and write
27BF000
trusted library allocation
page read and write
938000
heap
page read and write
There are 1376 hidden memdumps, click here to show them.