IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RegisteredChannels\hwrtalnmj\TypeId.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RegisteredChannels\hwrtalnmj\TypeId.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\txxbiwtbs.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TypeId.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\txxbiwtbs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2f4b4zfu.lqx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hrglc3bl.2fc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lgrg4qxr.1pw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lkpqi1bm.t4x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nzoyyr3e.srp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ue3xfck3.ofe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xiv0j5rn.pb1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ymi0bnsn.sm1.psm1
ASCII text, with no line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABqAG8AbgBlAHMAXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVAB5AHAAZQBJAGQALgBlAHgAZQA7AA==
malicious
C:\Users\user\AppData\Local\RegisteredChannels\hwrtalnmj\TypeId.exe
C:\Users\user\AppData\Local\RegisteredChannels\hwrtalnmj\TypeId.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABqAG8AbgBlAHMAXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVAB5AHAAZQBJAGQALgBlAHgAZQA7AA==
malicious
C:\Users\user\AppData\Local\Temp\txxbiwtbs.exe
C:\Users\user\AppData\Local\Temp\txxbiwtbs.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://f.r14n788iocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2i.farm/don2-m/Dllzeadr.pdf
188.114.96.3
malicious
https://f.r14n788iocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2i.farm/don2/Qlxywcbxa.mp4
188.114.96.3
malicious
https://f.r14n788iocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2i.farm/don2-m/kr/Wudbiu.exe
188.114.96.3
malicious
http://nuget.org/NuGet.exe
unknown
http://f.r14n788iocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2i.farm
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
http://www.microsoft.
unknown
https://ion=v4.5T
unknown
https://github.com/Pester/Pester
unknown
http://schemas.microso
unknown
https://f.r14n788iocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2i.farm/don2-m/kr/Wudbi
unknown
http://crl.m
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://aka.ms/pscore68
unknown
http://f.r14n788iocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2i.farm8
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://f.r14n788iocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2i.
unknown
https://f.r14n788iocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2i.farm
unknown
http://schemas.microsoft
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
f.r14n788iocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2i.farm
188.114.96.3
malicious
1.r14n788iocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2i.farm
77.221.140.76

IPs

IP
Domain
Country
Malicious
188.114.96.3
f.r14n788iocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2i.farm
European Union
malicious
77.221.140.76
1.r14n788iocyo5epmpy6klmejchjtzddoekjlnt6mu3qh4de2i.farm
Russian Federation

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TypeId_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\70BF266386FAE183A207
70BF266386FAE183A207
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\txxbiwtbs_RASMANCS
FileDirectory
There are 47 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
83C0000
trusted library allocation
page read and write
malicious
3AB1000
trusted library allocation
page read and write
malicious
4AB7000
trusted library allocation
page read and write
malicious
309D000
trusted library allocation
page read and write
malicious
7520000
trusted library section
page read and write
malicious
33C0000
trusted library allocation
page read and write
malicious
7491000
trusted library allocation
page read and write
malicious
8F40000
trusted library section
page read and write
malicious
47F2000
trusted library allocation
page read and write
malicious
3200000
trusted library allocation
page read and write
malicious
29BF000
trusted library allocation
page read and write
malicious
7C40000
trusted library section
page read and write
malicious
6B60000
trusted library section
page read and write
malicious
478C000
trusted library allocation
page read and write
malicious
4131000
trusted library allocation
page read and write
malicious
6D60000
trusted library section
page read and write
malicious
4A62000
trusted library allocation
page read and write
malicious
9049000
trusted library allocation
page read and write
malicious
4659000
trusted library allocation
page read and write
malicious
459C000
trusted library allocation
page read and write
malicious
94C0000
trusted library section
page read and write
malicious
289B000
trusted library allocation
page read and write
malicious
4058000
trusted library allocation
page read and write
malicious
4C76000
trusted library allocation
page read and write
malicious
3526000
trusted library allocation
page read and write
malicious
4378000
trusted library allocation
page read and write
malicious
B070000
trusted library section
page read and write
malicious
5266000
trusted library allocation
page read and write
malicious
32A9000
trusted library allocation
page read and write
malicious
7CB1000
trusted library allocation
page read and write
malicious
7FFD9B9CC000
trusted library allocation
page execute and read and write
5EDE000
stack
page read and write
62BE000
stack
page read and write
9380000
trusted library allocation
page read and write
5ABE000
stack
page read and write
A80000
heap
page read and write
36E1000
trusted library allocation
page read and write
7023000
heap
page read and write
ADF0000
trusted library allocation
page execute and read and write
8070000
trusted library allocation
page execute and read and write
27C0000
trusted library allocation
page read and write
6899000
heap
page read and write
80E8000
trusted library allocation
page read and write
182B8246000
trusted library allocation
page read and write
8F1D000
heap
page read and write
5DCE000
stack
page read and write
81D0000
trusted library allocation
page execute and read and write
718C000
heap
page read and write
73F0000
trusted library allocation
page read and write
182B6A70000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
7AD0000
trusted library allocation
page read and write
60BC000
stack
page read and write
9240000
trusted library allocation
page read and write
182B842D000
trusted library allocation
page read and write
36AD000
trusted library allocation
page read and write
1330000
heap
page read and write
AC40000
trusted library allocation
page execute and read and write
53B0000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
21116AC0000
trusted library allocation
page read and write
326DE7E000
stack
page read and write
622E000
stack
page read and write
2C84000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
1620000
heap
page read and write
616C000
stack
page read and write
21118582000
trusted library allocation
page read and write
9F93000
trusted library allocation
page read and write
678A000
heap
page read and write
182B6A90000
heap
page read and write
17BF000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
3110000
heap
page execute and read and write
21116C25000
heap
page read and write
636C000
stack
page read and write
211162F0000
heap
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
5C0F000
stack
page read and write
182B6A78000
heap
page read and write
182B74C1000
trusted library allocation
page read and write
6122000
heap
page read and write
5C4D000
stack
page read and write
646C000
stack
page read and write
3A08000
trusted library allocation
page read and write
310E000
stack
page read and write
382B000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
19E7000
heap
page read and write
CD146BB000
stack
page read and write
3814000
trusted library allocation
page read and write
288A000
trusted library allocation
page read and write
182B92A0000
trusted library allocation
page read and write
7631000
heap
page read and write
A3E000
stack
page read and write
182C77B4000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
80DD000
trusted library allocation
page read and write
56AD000
stack
page read and write
710C000
trusted library allocation
page execute and read and write
33A8000
trusted library allocation
page read and write
182CF838000
heap
page read and write
2112F0BE000
heap
page read and write
2112F42E000
heap
page read and write
386C000
trusted library allocation
page read and write
182C77CE000
trusted library allocation
page read and write
642D000
stack
page read and write
A730000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
326DC78000
stack
page read and write
7DF4E67F0000
trusted library allocation
page execute and read and write
518C000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page execute and read and write
595E000
stack
page read and write
3170000
trusted library allocation
page read and write
79D0000
trusted library allocation
page read and write
CD1463E000
stack
page read and write
38B3000
trusted library allocation
page read and write
330E000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
67EE000
stack
page read and write
A93E000
stack
page read and write
182B6A42000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
170E000
stack
page read and write
8030000
trusted library allocation
page read and write
83B8000
trusted library allocation
page read and write
33B4000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
69E8000
heap
page read and write
15F6000
heap
page read and write
DF2000
unkown
page readonly
4121000
trusted library allocation
page read and write
83B0000
trusted library allocation
page execute and read and write
39DC000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
CD13E72000
stack
page read and write
92A0000
trusted library allocation
page read and write
76B5000
heap
page read and write
182B8D52000
trusted library allocation
page read and write
7658000
heap
page read and write
182B92C5000
trusted library allocation
page read and write
3F2D000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
182B6A7E000
heap
page read and write
7F40000
trusted library allocation
page read and write
1230000
heap
page read and write
66EF000
stack
page read and write
326DD7F000
stack
page read and write
15F8000
heap
page read and write
C6E000
heap
page read and write
37C4000
trusted library allocation
page read and write
8190000
trusted library allocation
page read and write
594E000
stack
page read and write
81A0000
trusted library allocation
page read and write
21116A90000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
9F8D000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page execute and read and write
83E0000
trusted library allocation
page read and write
7FFD9BCC3000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
21117D56000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page execute and read and write
1800000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
A9C0000
trusted library allocation
page execute and read and write
5F2F000
stack
page read and write
715C000
trusted library allocation
page read and write
ADC0000
trusted library allocation
page read and write
182CFA22000
heap
page read and write
2112F2F0000
heap
page read and write
7A70000
trusted library allocation
page execute and read and write
8090000
trusted library allocation
page read and write
7F3E0000
trusted library allocation
page execute and read and write
6988000
heap
page read and write
15D0000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
A770000
trusted library allocation
page read and write
1677000
heap
page read and write
17A0000
trusted library allocation
page read and write
9DF6000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page execute and read and write
7120000
trusted library allocation
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
62CE000
stack
page read and write
7110000
trusted library allocation
page read and write
C60000
heap
page read and write
326DB76000
stack
page read and write
331D000
stack
page read and write
5150000
trusted library allocation
page read and write
6A5E000
stack
page read and write
2112F0D8000
heap
page read and write
60C0000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
7C93000
trusted library allocation
page read and write
CD13EFF000
stack
page read and write
69AC000
heap
page read and write
685E000
stack
page read and write
185C000
stack
page read and write
182B8422000
trusted library allocation
page read and write
7FFD9BB72000
trusted library allocation
page read and write
9390000
trusted library allocation
page read and write
68F0000
heap
page read and write
35FB000
trusted library allocation
page read and write
15C0000
trusted library allocation
page execute and read and write
887F000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
82E0000
trusted library allocation
page read and write
21117E95000
trusted library allocation
page read and write
4FDE000
stack
page read and write
50E1000
trusted library allocation
page read and write
21116508000
heap
page read and write
1330000
trusted library allocation
page read and write
7FFD9BCDC000
trusted library allocation
page read and write
9F80000
trusted library allocation
page read and write
A1B0000
trusted library allocation
page execute and read and write
7FFD9BB58000
trusted library allocation
page read and write
7FFD9B97D000
trusted library allocation
page execute and read and write
2112F124000
heap
page read and write
7970000
trusted library allocation
page read and write
326EA4C000
stack
page read and write
3A7C000
trusted library allocation
page read and write
6E00000
trusted library allocation
page execute and read and write
6706000
heap
page read and write
1324000
trusted library allocation
page read and write
21116C31000
trusted library allocation
page read and write
15F0000
heap
page read and write
516B000
trusted library allocation
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
7155000
trusted library allocation
page read and write
9F1D000
trusted library allocation
page read and write
671D000
stack
page read and write
7287000
heap
page read and write
182B7547000
trusted library allocation
page read and write
27DB000
trusted library allocation
page read and write
182B6A00000
heap
page read and write
9EFA000
trusted library allocation
page read and write
3030000
heap
page read and write
5AFE000
stack
page read and write
326EACC000
stack
page read and write
80C6000
trusted library allocation
page execute and read and write
7F380000
trusted library allocation
page execute and read and write
7B20000
trusted library allocation
page execute and read and write
182CF89C000
heap
page read and write
1480000
heap
page read and write
7ED0000
trusted library allocation
page read and write
69B8000
heap
page read and write
15D4000
trusted library allocation
page read and write
60DD000
heap
page read and write
21116625000
heap
page read and write
5F4E000
stack
page read and write
7FFD9BC40000
trusted library allocation
page read and write
52FD000
stack
page read and write
9230000
trusted library allocation
page read and write
478B000
trusted library allocation
page read and write
9EE7000
stack
page read and write
3830000
trusted library allocation
page read and write
CD14177000
stack
page read and write
11E5000
heap
page read and write
85B0000
trusted library allocation
page read and write
6FF0000
heap
page read and write
80B0000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
729B000
heap
page read and write
AE20000
trusted library allocation
page read and write
8B25000
trusted library allocation
page read and write
2112F411000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
AFA7000
stack
page read and write
36F6000
trusted library allocation
page read and write
37BA000
trusted library allocation
page read and write
676E000
stack
page read and write
5187000
trusted library allocation
page read and write
15F2000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
138A000
heap
page read and write
608E000
stack
page read and write
7FFD9BC10000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
2112F490000
heap
page read and write
3689000
trusted library allocation
page read and write
76F6000
heap
page read and write
182B6D10000
heap
page read and write
6470000
direct allocation
page execute read
56B0000
trusted library allocation
page execute and read and write
AA0000
trusted library allocation
page read and write
182B7F13000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
15A7000
trusted library allocation
page execute and read and write
7FFD9BD00000
trusted library allocation
page read and write
7AE3000
trusted library allocation
page read and write
33D8000
trusted library allocation
page read and write
59EE000
stack
page read and write
15C0000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
38AE000
trusted library allocation
page read and write
7C70000
trusted library allocation
page execute and read and write
15FA000
heap
page read and write
1320000
trusted library allocation
page read and write
9EF0000
trusted library allocation
page read and write
9650000
direct allocation
page execute read
6FD0000
trusted library allocation
page read and write
21118A33000
trusted library allocation
page read and write
2112EC33000
heap
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
7170000
trusted library allocation
page read and write
719F000
trusted library allocation
page read and write
182B80BA000
trusted library allocation
page read and write
9F14000
trusted library allocation
page read and write
9B50000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
717C000
heap
page read and write
5840000
trusted library allocation
page read and write
17B0000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
2C86000
trusted library allocation
page read and write
2FCF000
stack
page read and write
6DF2000
trusted library allocation
page read and write
182C74E1000
trusted library allocation
page read and write
7FFD9BD90000
trusted library allocation
page read and write
1275000
heap
page read and write
182B6ABE000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
21117C28000
trusted library allocation
page read and write
326D97F000
stack
page read and write
7FFD9BD10000
trusted library allocation
page read and write
A9D0000
trusted library allocation
page read and write
12F7000
stack
page read and write
5090000
trusted library allocation
page read and write
803F000
trusted library allocation
page read and write
582E000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
AE5000
heap
page read and write
95C0000
trusted library allocation
page execute and read and write
77FB000
trusted library allocation
page read and write
15D6000
heap
page read and write
5FDE000
stack
page read and write
77A6000
heap
page read and write
A780000
trusted library allocation
page read and write
133B000
trusted library allocation
page read and write
12E0000
heap
page read and write
8F7000
stack
page read and write
AD6000
trusted library allocation
page execute and read and write
182B8533000
trusted library allocation
page read and write
7266000
heap
page read and write
CD141FD000
stack
page read and write
32DF000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
772D000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
7EBB000
trusted library allocation
page read and write
5D8C000
stack
page read and write
57FE000
stack
page read and write
3121000
trusted library allocation
page read and write
335F000
stack
page read and write
326D6FE000
stack
page read and write
6A1E000
heap
page read and write
82D0000
trusted library allocation
page read and write
56EE000
stack
page read and write
3826000
trusted library allocation
page read and write
8180000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
47EC000
trusted library allocation
page read and write
182CFAA3000
heap
page read and write
7726000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
6020000
heap
page read and write
73B0000
heap
page read and write
182B84B6000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
80CC000
trusted library allocation
page execute and read and write
2810000
trusted library allocation
page read and write
21118A0E000
trusted library allocation
page read and write
211183B5000
trusted library allocation
page read and write
1600000
heap
page read and write
380B000
trusted library allocation
page read and write
2805000
trusted library allocation
page read and write
8DC0000
trusted library allocation
page execute and read and write
57ED000
stack
page read and write
4051000
trusted library allocation
page read and write
7F00000
trusted library allocation
page execute and read and write
182CFA20000
heap
page read and write
182B8887000
trusted library allocation
page read and write
182B6A30000
heap
page read and write
8AF0000
trusted library allocation
page execute and read and write
7FFD9BDD0000
trusted library allocation
page read and write
7FFD9BCD8000
trusted library allocation
page read and write
3698000
trusted library allocation
page read and write
637E000
stack
page read and write
182B6D75000
heap
page read and write
512000
unkown
page readonly
2112F32A000
heap
page read and write
9420000
trusted library allocation
page execute and read and write
57AE000
stack
page read and write
77E5000
heap
page read and write
326D8FA000
stack
page read and write
9DD5000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
47B7000
trusted library allocation
page read and write
1200000
heap
page read and write
211179A8000
trusted library allocation
page read and write
80C9000
trusted library allocation
page execute and read and write
7FFD9BBF0000
trusted library allocation
page read and write
797F000
trusted library allocation
page read and write
21116B80000
heap
page execute and read and write
5ECE000
stack
page read and write
656D000
stack
page read and write
9290000
trusted library allocation
page read and write
1258000
heap
page read and write
51ED000
stack
page read and write
211164C7000
heap
page read and write
CD1518C000
stack
page read and write
9DC2000
trusted library allocation
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
599E000
stack
page read and write
A3A0000
trusted library allocation
page read and write
59BD000
stack
page read and write
7FFD9BB4A000
trusted library allocation
page read and write
19E0000
heap
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
5C9F000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
2112F3F2000
heap
page read and write
1323000
trusted library allocation
page execute and read and write
3A57000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
21116489000
heap
page read and write
E5F000
stack
page read and write
525F000
stack
page read and write
5B0D000
stack
page read and write
85B4000
trusted library allocation
page read and write
ABD000
trusted library allocation
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
60E0000
trusted library allocation
page execute and read and write
33A0000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
7035000
heap
page read and write
182C7537000
trusted library allocation
page read and write
3A62000
trusted library allocation
page read and write
1592000
trusted library allocation
page read and write
CD1520C000
stack
page read and write
38F4000
trusted library allocation
page read and write
1130000
heap
page read and write
211179B1000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
CD14338000
stack
page read and write
6E90000
trusted library allocation
page read and write
182B80BC000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
182B6A72000
heap
page read and write
182CFA38000
heap
page read and write
6ED0000
trusted library allocation
page read and write
7FFD9BD60000
trusted library allocation
page read and write
7DF4BEAD0000
trusted library allocation
page execute and read and write
FB0000
heap
page read and write
7174000
trusted library allocation
page read and write
21126F2E000
trusted library allocation
page read and write
182B74B0000
heap
page execute and read and write
9260000
trusted library allocation
page execute and read and write
6130000
trusted library section
page read and write
5F8E000
stack
page read and write
135B000
trusted library allocation
page execute and read and write
7FFD9BCE4000
trusted library allocation
page read and write
3F24000
trusted library allocation
page read and write
566E000
stack
page read and write
6DF6000
trusted library allocation
page read and write
6F70000
trusted library allocation
page execute and read and write
21117CF3000
trusted library allocation
page read and write
D33000
heap
page read and write
6EC0000
trusted library allocation
page read and write
211164CD000
heap
page read and write
6D4E000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
33C3000
trusted library allocation
page read and write
CD1453E000
stack
page read and write
182CFB2E000
heap
page read and write
A1C1000
trusted library allocation
page read and write
3724000
trusted library allocation
page read and write
182B8429000
trusted library allocation
page read and write
7103000
trusted library allocation
page read and write
5183000
trusted library allocation
page read and write
15A2000
trusted library allocation
page read and write
182B84BA000
trusted library allocation
page read and write
308C000
trusted library allocation
page read and write
63BE000
stack
page read and write
182B845A000
trusted library allocation
page read and write
7120000
trusted library allocation
page execute and read and write
6040000
heap
page read and write
AB0000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
182B7120000
heap
page readonly
1590000
trusted library allocation
page read and write
9DC5000
trusted library allocation
page read and write
5E2E000
stack
page read and write
6F80000
trusted library section
page read and write
A840000
trusted library allocation
page execute and read and write
6010000
heap
page read and write
9F0000
heap
page read and write
7C99000
trusted library allocation
page execute and read and write
326DA7D000
stack
page read and write
61D0000
trusted library allocation
page read and write
15DD000
trusted library allocation
page execute and read and write
17D4000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
7749000
heap
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
44B0000
trusted library allocation
page read and write
DF0000
unkown
page readonly
30FE000
stack
page read and write
622E000
stack
page read and write
211163F0000
heap
page read and write
182B7130000
trusted library allocation
page read and write
3412000
trusted library allocation
page read and write
12D9000
heap
page read and write
7B70000
trusted library allocation
page read and write
ABE0000
trusted library allocation
page read and write
17DE000
trusted library allocation
page read and write
1607000
heap
page read and write
A750000
trusted library allocation
page read and write
A050000
heap
page read and write
326D87F000
stack
page read and write
33A1000
trusted library allocation
page read and write
617E000
stack
page read and write
C6A000
heap
page read and write
3A52000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
9F26000
trusted library allocation
page read and write
182B84F5000
trusted library allocation
page read and write
182CF940000
heap
page read and write
2112F48B000
heap
page read and write
6700000
heap
page read and write
7729000
heap
page read and write
15F6000
trusted library allocation
page execute and read and write
7FFD9BDF0000
trusted library allocation
page read and write
7D63000
trusted library allocation
page read and write
278E000
stack
page read and write
A87000
heap
page read and write
7190000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
33EE000
trusted library allocation
page read and write
1811000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page execute and read and write
5B4E000
stack
page read and write
165E000
heap
page read and write
AB3000
trusted library allocation
page execute and read and write
7FFD9BB78000
trusted library allocation
page read and write
9370000
trusted library allocation
page read and write
73AE000
trusted library allocation
page read and write
9F93000
trusted library allocation
page read and write
71A6000
heap
page read and write
182B798F000
trusted library allocation
page read and write
17CB000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
39D7000
trusted library allocation
page read and write
7FFD9B974000
trusted library allocation
page read and write
33EA000
trusted library allocation
page read and write
6100000
trusted library allocation
page execute and read and write
498D000
stack
page read and write
82E4000
trusted library allocation
page read and write
7695000
heap
page read and write
5AEE000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7F3F8000
trusted library allocation
page execute and read and write
108C000
stack
page read and write
21116E58000
trusted library allocation
page read and write
32F5000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
6AC0000
heap
page read and write
9DED000
trusted library allocation
page read and write
6920000
heap
page read and write
BF2000
trusted library allocation
page read and write
182B823D000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
9700000
direct allocation
page read and write
182B72B0000
heap
page read and write
7621000
heap
page read and write
27F1000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
79E0000
trusted library allocation
page execute and read and write
61C0000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
373C000
trusted library allocation
page read and write
1355000
heap
page read and write
158E000
stack
page read and write
133D000
trusted library allocation
page execute and read and write
7FFD9BBC0000
trusted library allocation
page read and write
7840000
trusted library allocation
page execute and read and write
67B0000
trusted library allocation
page read and write
6460000
trusted library allocation
page read and write
182C74C1000
trusted library allocation
page read and write
3040000
heap
page execute and read and write
617E000
stack
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
7401000
trusted library allocation
page read and write
21126CA8000
trusted library allocation
page read and write
6B5E000
stack
page read and write
159A000
trusted library allocation
page execute and read and write
CD1508E000
stack
page read and write
9622000
trusted library allocation
page read and write
72D2000
heap
page read and write
15D8000
heap
page read and write
733E000
heap
page read and write
72F4000
heap
page read and write
72B3000
heap
page read and write
6FC7000
stack
page read and write
76FA000
heap
page read and write
61ED000
trusted library allocation
page read and write
6DEB000
trusted library allocation
page read and write
5E4E000
stack
page read and write
9360000
trusted library allocation
page read and write
147B000
trusted library allocation
page read and write
3876000
trusted library allocation
page read and write
5D8D000
stack
page read and write
2112F437000
heap
page read and write
7B40000
trusted library allocation
page read and write
CD1510D000
stack
page read and write
3010000
trusted library allocation
page read and write
7106000
trusted library allocation
page execute and read and write
7FFD9BC70000
trusted library allocation
page read and write
9DCC000
trusted library allocation
page read and write
2112F1E0000
heap
page execute and read and write
1485000
heap
page read and write
7193000
trusted library allocation
page read and write
690D000
heap
page read and write
1867000
heap
page read and write
15F0000
trusted library allocation
page read and write
21116470000
trusted library allocation
page read and write
5D4F000
stack
page read and write
7F930000
trusted library allocation
page execute and read and write
3835000
trusted library allocation
page read and write
7ADB000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
182B8621000
trusted library allocation
page read and write
6915000
heap
page read and write
AE0000
heap
page read and write
4F9E000
stack
page read and write
723E000
heap
page read and write
3A17000
trusted library allocation
page read and write
3110000
trusted library allocation
page execute and read and write
326E8CE000
stack
page read and write
38C6000
trusted library allocation
page read and write
182B6A39000
heap
page read and write
9210000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
6940000
heap
page read and write
1265000
heap
page read and write
8BF1000
trusted library allocation
page read and write
CD1528C000
stack
page read and write
610F000
heap
page read and write
72E6000
heap
page read and write
182CF917000
heap
page execute and read and write
451A000
trusted library allocation
page read and write
182B72CE000
heap
page read and write
82D0000
trusted library allocation
page execute and read and write
68EE000
stack
page read and write
6786000
heap
page read and write
7761000
heap
page read and write
7666000
heap
page read and write
50C5000
trusted library allocation
page read and write
7FFD9BD20000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
5C4E000
stack
page read and write
7198000
trusted library allocation
page read and write
652D000
stack
page read and write
376F000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
6E61000
trusted library allocation
page read and write
182B8434000
trusted library allocation
page read and write
80E0000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
CD143B8000
stack
page read and write
50D0000
trusted library allocation
page read and write
1360000
heap
page read and write
CD144BE000
stack
page read and write
9280000
trusted library allocation
page read and write
77D0000
heap
page read and write
7FFD9BCA3000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
182CFBA4000
heap
page read and write
7FFD9BC76000
trusted library allocation
page read and write
675E000
stack
page read and write
37BF000
trusted library allocation
page read and write
67AC000
stack
page read and write
3360000
heap
page execute and read and write
182B76E9000
trusted library allocation
page read and write
7FFD9B9AB000
trusted library allocation
page read and write
21126F26000
trusted library allocation
page read and write
5F0E000
stack
page read and write
1710000
trusted library allocation
page read and write
BEF000
stack
page read and write
1650000
heap
page read and write
ADA000
trusted library allocation
page execute and read and write
8260000
trusted library allocation
page execute and read and write
632E000
stack
page read and write
9DE0000
trusted library allocation
page read and write
77EA000
heap
page read and write
7FFD9BA46000
trusted library allocation
page read and write
BFB000
trusted library allocation
page execute and read and write
2C74000
trusted library allocation
page read and write
8CD3000
trusted library allocation
page read and write
509B000
trusted library allocation
page read and write
CD13FFF000
stack
page read and write
2897000
trusted library allocation
page read and write
1630000
heap
page read and write
182CF836000
heap
page read and write
51B1000
trusted library allocation
page read and write
A870000
trusted library allocation
page execute and read and write
7FFD9BCD0000
trusted library allocation
page read and write
76E3000
heap
page read and write
33E6000
trusted library allocation
page read and write
661E000
stack
page read and write
211164CB000
heap
page read and write
7304000
heap
page read and write
56F0000
heap
page execute and read and write
35EA000
trusted library allocation
page read and write
6C4E000
stack
page read and write
21117FF6000
trusted library allocation
page read and write
82F0000
trusted library allocation
page read and write
6D60000
trusted library allocation
page execute and read and write
6A91000
trusted library allocation
page read and write
17E1000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
5C8C000
stack
page read and write
1780000
trusted library allocation
page read and write
9F8B000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
186E000
heap
page read and write
9EA0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
9430000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
182CFB9E000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
6900000
heap
page read and write
6120000
heap
page read and write
5840000
heap
page execute and read and write
79B0000
trusted library allocation
page execute and read and write
7FFD9BE00000
trusted library allocation
page read and write
1596000
trusted library allocation
page execute and read and write
73E0000
trusted library allocation
page read and write
4128000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
CFC000
heap
page read and write
182B869D000
trusted library allocation
page read and write
A033000
trusted library allocation
page read and write
9DE3000
trusted library allocation
page read and write
16DB000
heap
page read and write
7AF0000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
775F000
heap
page read and write
17D0000
trusted library allocation
page read and write
211184C0000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
DCC000
stack
page read and write
81B0000
trusted library allocation
page read and write
21126C61000
trusted library allocation
page read and write
1453000
trusted library allocation
page execute and read and write
83DC000
stack
page read and write
5070000
trusted library allocation
page read and write
5B9E000
stack
page read and write
10F7000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1346000
trusted library allocation
page execute and read and write
7FFD9BC70000
trusted library allocation
page read and write
60D0000
trusted library allocation
page read and write
1620000
trusted library allocation
page execute and read and write
7FFD9BC50000
trusted library allocation
page read and write
182CF8C6000
heap
page read and write
326DEFB000
stack
page read and write
38A9000
trusted library allocation
page read and write
1809000
trusted library allocation
page read and write
8010000
trusted library allocation
page read and write
146E000
stack
page read and write
1350000
trusted library allocation
page read and write
7FFD9BB54000
trusted library allocation
page read and write
3196000
heap
page read and write
7800000
trusted library allocation
page read and write
7141000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page execute and read and write
182B7280000
heap
page execute and read and write
569C000
stack
page read and write
A3B0000
trusted library allocation
page execute and read and write
381D000
trusted library allocation
page read and write
80C3000
trusted library allocation
page read and write
3085000
trusted library allocation
page read and write
4E8E000
stack
page read and write
CD13F7F000
stack
page read and write
21116480000
heap
page read and write
50B1000
trusted library allocation
page read and write
182B8769000
trusted library allocation
page read and write
69A4000
heap
page read and write
7FFD9B98B000
trusted library allocation
page read and write
3190000
heap
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
35F5000
trusted library allocation
page read and write
17C6000
trusted library allocation
page read and write
2840000
heap
page execute and read and write
BF7000
trusted library allocation
page execute and read and write
211164DF000
heap
page read and write
CD14279000
stack
page read and write
AD90000
trusted library allocation
page read and write
A790000
trusted library allocation
page read and write
EE7000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
71D7000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
539E000
stack
page read and write
7FFD9BB70000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
7316000
heap
page read and write
82C0000
trusted library allocation
page execute and read and write
5AC000
stack
page read and write
9630000
trusted library allocation
page read and write
71D0000
trusted library allocation
page execute and read and write
81E0000
trusted library allocation
page read and write
211165B0000
heap
page read and write
5E8E000
stack
page read and write
9410000
trusted library allocation
page read and write
182CFB6A000
heap
page read and write
5120000
trusted library allocation
page read and write
7109000
trusted library allocation
page execute and read and write
182B7190000
heap
page read and write
211170FF000
trusted library allocation
page read and write
8B27000
trusted library allocation
page read and write
2112F210000
heap
page read and write
7FFD9BCFC000
trusted library allocation
page read and write
910000
heap
page read and write
21118459000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
1397000
heap
page read and write
75FA000
heap
page read and write
6ECC000
stack
page read and write
9E50000
trusted library allocation
page execute and read and write
182C77BD000
trusted library allocation
page read and write
7FFD9BD00000
trusted library allocation
page read and write
182B6D50000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
399E000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
7172000
heap
page read and write
7140000
heap
page read and write
7B60000
trusted library allocation
page read and write
11F0000
heap
page read and write
556E000
stack
page read and write
15DA000
heap
page read and write
33AB000
trusted library allocation
page read and write
182B71A0000
trusted library allocation
page read and write
3895000
trusted library allocation
page read and write
4922000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
ADA0000
trusted library allocation
page execute and read and write
7037000
heap
page read and write
32E9000
trusted library allocation
page read and write
7014000
heap
page read and write
69DE000
heap
page read and write
27B0000
trusted library allocation
page read and write
7279000
heap
page read and write
6932000
heap
page read and write
3A77000
trusted library allocation
page read and write
A880000
trusted library allocation
page read and write
1350000
heap
page read and write
182B71D0000
trusted library allocation
page read and write
A830000
trusted library allocation
page read and write
7B92000
trusted library allocation
page read and write
21118A53000
trusted library allocation
page read and write
AD8B000
stack
page read and write
4E90000
heap
page execute and read and write
6792000
heap
page read and write
AC8E000
stack
page read and write
A50000
heap
page read and write
7F30000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page execute and read and write
8B51000
trusted library allocation
page read and write
1467000
heap
page read and write
21116506000
heap
page read and write
3999000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
1860000
heap
page read and write
77C1000
heap
page read and write
CA2000
heap
page read and write
21117C54000
trusted library allocation
page read and write
57CE000
stack
page read and write
491C000
trusted library allocation
page read and write
3917000
trusted library allocation
page read and write
326D7FE000
stack
page read and write
7309000
heap
page read and write
72FF000
heap
page read and write
6EE0000
trusted library allocation
page read and write
7FFD9BB52000
trusted library allocation
page read and write
666D000
stack
page read and write
6DD0000
trusted library allocation
page read and write
7009000
heap
page read and write
7FFD9BCE9000
trusted library allocation
page read and write
7FF0000
trusted library allocation
page read and write
39C8000
trusted library allocation
page read and write
7788000
heap
page read and write
9350000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
3371000
trusted library allocation
page read and write
8F7F000
heap
page read and write
33BC000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
7C4C000
stack
page read and write
396C000
trusted library allocation
page read and write
371A000
trusted library allocation
page read and write
21117E0C000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
764D000
heap
page read and write
1627000
heap
page read and write
326DCFE000
stack
page read and write
568E000
stack
page read and write
329D000
stack
page read and write
50B7000
trusted library allocation
page read and write
68F7000
heap
page read and write
845E000
stack
page read and write
AB4000
trusted library allocation
page read and write
6E10000
trusted library section
page read and write
4C3E000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
7FFD9BA26000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page read and write
32DE000
stack
page read and write
15C0000
trusted library allocation
page read and write
3984000
trusted library allocation
page read and write
76F2000
heap
page read and write
9F5A000
trusted library allocation
page read and write
75E0000
heap
page read and write
E70000
trusted library allocation
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
A97E000
stack
page read and write
9620000
trusted library allocation
page read and write
7980000
trusted library allocation
page execute and read and write
93A0000
trusted library allocation
page execute and read and write
9F10000
trusted library allocation
page read and write
510000
unkown
page readonly
182CF800000
heap
page read and write
21116CB2000
trusted library allocation
page read and write
3F2A000
trusted library allocation
page read and write
9F96000
trusted library allocation
page read and write
33AD000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
604F000
heap
page read and write
77BA000
heap
page read and write
1712000
trusted library allocation
page read and write
7970000
heap
page read and write
A9E0000
heap
page read and write
FFE000
stack
page read and write
3783000
trusted library allocation
page read and write
6046000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page execute and read and write
8360000
trusted library allocation
page read and write
182C74F1000
trusted library allocation
page read and write
182B6D30000
trusted library section
page read and write
27F7000
trusted library allocation
page read and write
3912000
trusted library allocation
page read and write
27DE000
trusted library allocation
page read and write
776A000
heap
page read and write
694F000
heap
page read and write
ADB0000
trusted library allocation
page execute and read and write
3120000
trusted library allocation
page read and write
9400000
trusted library allocation
page execute and read and write
9EF4000
trusted library allocation
page read and write
7FFD9BD80000
trusted library allocation
page read and write
7AE6000
trusted library allocation
page read and write
1357000
trusted library allocation
page execute and read and write
1454000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
2112F457000
heap
page read and write
39C3000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
726F000
heap
page read and write
182B6C00000
heap
page read and write
182CFB50000
heap
page read and write
9F5D000
trusted library allocation
page read and write
7BDE000
trusted library allocation
page read and write
77CB000
heap
page read and write
2112F1A0000
trusted library allocation
page read and write
647E000
stack
page read and write
3971000
trusted library allocation
page read and write
714C000
heap
page read and write
ACD000
trusted library allocation
page execute and read and write
182B8E14000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
182B8C46000
trusted library allocation
page read and write
7165000
trusted library allocation
page read and write
540E000
stack
page read and write
516E000
trusted library allocation
page read and write
123E000
heap
page read and write
580E000
stack
page read and write
8040000
trusted library allocation
page execute and read and write
9F1F000
trusted library allocation
page read and write
2111849A000
trusted library allocation
page read and write
7FFD9BB32000
trusted library allocation
page read and write
71D1000
heap
page read and write
5850000
heap
page execute and read and write
7FFD9BD70000
trusted library allocation
page read and write
7FFD9BB2A000
trusted library allocation
page read and write
7616000
heap
page read and write
8B10000
trusted library allocation
page read and write
93D0000
trusted library allocation
page execute and read and write
21116590000
trusted library allocation
page read and write
2112F080000
heap
page read and write
606E000
stack
page read and write
184F000
stack
page read and write
316C000
trusted library allocation
page read and write
2112F34D000
heap
page read and write
6C60000
heap
page read and write
21117E45000
trusted library allocation
page read and write
5195000
trusted library allocation
page read and write
8020000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
6ABD000
stack
page read and write
9DBE000
trusted library allocation
page read and write
A9A0000
trusted library allocation
page execute and read and write
714B000
trusted library allocation
page read and write
7FFD9BCF2000
trusted library allocation
page read and write
15AB000
trusted library allocation
page execute and read and write
182B6AB9000
heap
page read and write
161E000
stack
page read and write
7FFD9BC00000
trusted library allocation
page read and write
768D000
heap
page read and write
3788000
trusted library allocation
page read and write
7C8E000
stack
page read and write
7C96000
trusted library allocation
page execute and read and write
38B8000
trusted library allocation
page read and write
8310000
trusted library allocation
page execute and read and write
CD145BC000
stack
page read and write
7F948000
trusted library allocation
page execute and read and write
6B0C000
stack
page read and write
7B10000
trusted library allocation
page read and write
17F5000
trusted library allocation
page read and write
939F000
trusted library allocation
page read and write
145D000
trusted library allocation
page execute and read and write
627D000
stack
page read and write
5DF0000
trusted library allocation
page read and write
3851000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
34A4000
trusted library allocation
page read and write
2112F323000
heap
page read and write
703C000
heap
page read and write
559E000
stack
page read and write
5BFE000
stack
page read and write
82C0000
trusted library allocation
page read and write
7FFD9BD80000
trusted library allocation
page read and write
132D000
trusted library allocation
page execute and read and write
5DDE000
stack
page read and write
589E000
stack
page read and write
182CF84E000
heap
page read and write
3A20000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
326D77E000
stack
page read and write
9F63000
trusted library allocation
page read and write
6280000
trusted library allocation
page read and write
300C000
stack
page read and write
71AB000
heap
page read and write
A860000
trusted library allocation
page read and write
719D000
trusted library allocation
page read and write
83BC000
trusted library allocation
page read and write
3A2A000
trusted library allocation
page read and write
326DDFC000
stack
page read and write
7FFD9BA2C000
trusted library allocation
page execute and read and write
7FFD9BCC4000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
8B40000
trusted library allocation
page read and write
182B7110000
trusted library allocation
page read and write
600F000
stack
page read and write
33AE000
trusted library allocation
page read and write
182CF8C3000
heap
page read and write
7FFD9B992000
trusted library allocation
page read and write
3908000
trusted library allocation
page read and write
9DE8000
trusted library allocation
page read and write
6880000
heap
page read and write
384A000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
7FFD9B973000
trusted library allocation
page execute and read and write
7775000
heap
page read and write
1684000
heap
page read and write
69B0000
heap
page read and write
21118A58000
trusted library allocation
page read and write
80C0000
trusted library allocation
page read and write
7FFD9B972000
trusted library allocation
page read and write
6713000
heap
page read and write
182B84C4000
trusted library allocation
page read and write
9B75000
trusted library allocation
page read and write
2112F0C4000
heap
page read and write
6FF6000
heap
page read and write
21117EDA000
trusted library allocation
page read and write
371F000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
627E000
stack
page read and write
9F00000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
7152000
trusted library allocation
page read and write
211165C0000
trusted library allocation
page read and write
182B6A10000
heap
page read and write
21117CC7000
trusted library allocation
page read and write
8536000
trusted library allocation
page read and write
50B3000
trusted library allocation
page read and write
921B000
trusted library allocation
page read and write
182B87CA000
trusted library allocation
page read and write
182B84FB000
trusted library allocation
page read and write
182CF870000
heap
page read and write
182B8584000
trusted library allocation
page read and write
389A000
trusted library allocation
page read and write
68EF000
heap
page read and write
575E000
stack
page read and write
9DD8000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
21117F3C000
trusted library allocation
page read and write
7870000
trusted library allocation
page read and write
81C0000
trusted library allocation
page read and write
3418000
trusted library allocation
page read and write
182B6A7A000
heap
page read and write
182B85E6000
trusted library allocation
page read and write
21126C51000
trusted library allocation
page read and write
38FE000
trusted library allocation
page read and write
21116620000
heap
page read and write
326E9C7000
stack
page read and write
51FC000
stack
page read and write
76D6000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
2112F486000
heap
page read and write
778E000
heap
page read and write
8370000
trusted library allocation
page execute and read and write
182B6D70000
heap
page read and write
182B84AC000
trusted library allocation
page read and write
1180000
heap
page read and write
830F000
trusted library allocation
page read and write
8000000
trusted library allocation
page read and write
7326000
heap
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
21117685000
trusted library allocation
page read and write
515D000
stack
page read and write
70BE000
stack
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
8E20000
heap
page read and write
5261000
trusted library allocation
page read and write
182B87FE000
trusted library allocation
page read and write
EE0000
heap
page read and write
7FFD9BB41000
trusted library allocation
page read and write
6110000
trusted library allocation
page read and write
9EB1000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page execute and read and write
717A000
trusted library allocation
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
182B857F000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
17E7000
trusted library allocation
page read and write
E90000
heap
page read and write
9F30000
heap
page read and write
488C000
stack
page read and write
550F000
stack
page read and write
8AE0000
trusted library allocation
page read and write
E60000
trusted library allocation
page execute and read and write
56C0000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
32F9000
trusted library allocation
page read and write
315F000
trusted library allocation
page read and write
714E000
trusted library allocation
page read and write
211164BF000
heap
page read and write
6C17000
trusted library section
page read and write
59A0000
trusted library allocation
page read and write
1190000
heap
page read and write
2B0B000
trusted library allocation
page read and write
6DED000
trusted library allocation
page read and write
5C8E000
stack
page read and write
71A6000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
4E4E000
stack
page read and write
69BE000
stack
page read and write
7FFD9BCC9000
trusted library allocation
page read and write
1460000
heap
page read and write
D23000
heap
page read and write
35E9000
trusted library allocation
page read and write
21117F74000
trusted library allocation
page read and write
509E000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
38F9000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
7FFD9BCF8000
trusted library allocation
page read and write
C94000
heap
page read and write
9DEF000
trusted library allocation
page read and write
2112F14C000
heap
page read and write
FA0000
heap
page read and write
7FFD9BB21000
trusted library allocation
page read and write
36B2000
trusted library allocation
page read and write
3779000
trusted library allocation
page read and write
5D8C000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
7DF4BEAC0000
trusted library allocation
page execute and read and write
21126F21000
trusted library allocation
page read and write
AA81000
heap
page read and write
182B92E5000
trusted library allocation
page read and write
7DF4BEAE0000
trusted library allocation
page execute and read and write
21116B60000
heap
page execute and read and write
6FE0000
trusted library allocation
page execute and read and write
7100000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
15D3000
trusted library allocation
page execute and read and write
7F398000
trusted library allocation
page execute and read and write
EDE000
stack
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
CD1443D000
stack
page read and write
8E10000
trusted library allocation
page read and write
6E80000
trusted library allocation
page execute and read and write
529E000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
583E000
stack
page read and write
6330000
trusted library allocation
page read and write
17CE000
trusted library allocation
page read and write
317E000
stack
page read and write
80D0000
trusted library allocation
page read and write
CD140FE000
stack
page read and write
7641000
heap
page read and write
9F72000
trusted library allocation
page read and write
326DAF9000
stack
page read and write
6EA0000
trusted library allocation
page read and write
2111782E000
trusted library allocation
page read and write
37B5000
trusted library allocation
page read and write
9270000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
5181000
trusted library allocation
page read and write
73D2000
trusted library allocation
page read and write
1717000
trusted library allocation
page execute and read and write
7FFD9BD90000
trusted library allocation
page execute and read and write
7159000
heap
page read and write
7390000
trusted library allocation
page execute and read and write
182B8426000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
211165A0000
heap
page readonly
5700000
trusted library allocation
page read and write
9DAE000
stack
page read and write
9DB0000
trusted library allocation
page read and write
7860000
trusted library allocation
page read and write
182B92EA000
trusted library allocation
page read and write
65DD000
stack
page read and write
71C2000
trusted library allocation
page read and write
7F510000
trusted library allocation
page execute and read and write
182B843B000
trusted library allocation
page read and write
385E000
trusted library allocation
page read and write
368B000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
9F18000
trusted library allocation
page read and write
702D000
heap
page read and write
21126F3F000
trusted library allocation
page read and write
140E000
stack
page read and write
7168000
trusted library allocation
page read and write
394F000
trusted library allocation
page read and write
A810000
trusted library allocation
page execute and read and write
4E0E000
stack
page read and write
3E49000
trusted library allocation
page read and write
7100000
trusted library allocation
page execute and read and write
7FFD9BD9C000
trusted library allocation
page read and write
F3C000
stack
page read and write
15D0000
heap
page read and write
7BA0000
trusted library allocation
page read and write
9F70000
trusted library allocation
page read and write
3858000
trusted library allocation
page read and write
CD14079000
stack
page read and write
ADD0000
trusted library allocation
page read and write
5CDD000
stack
page read and write
7ADD000
trusted library allocation
page read and write
4D0D000
stack
page read and write
8300000
trusted library allocation
page read and write
182B84C8000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
A820000
trusted library allocation
page read and write
71B9000
heap
page read and write
182CF910000
heap
page execute and read and write
182B72B5000
heap
page read and write
7B90000
trusted library allocation
page execute and read and write
7F528000
trusted library allocation
page execute and read and write
1696000
heap
page read and write
3646000
trusted library allocation
page read and write
66AC000
stack
page read and write
7FFD9BC90000
trusted library allocation
page read and write
8530000
trusted library allocation
page execute and read and write
70FF000
stack
page read and write
21116430000
heap
page read and write
82E0000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
80A0000
trusted library allocation
page execute and read and write
762B000
heap
page read and write
7C90000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page execute and read and write
7FFD9BC40000
trusted library allocation
page read and write
585E000
stack
page read and write
182B8D2C000
trusted library allocation
page read and write
63CE000
stack
page read and write
182CFB74000
heap
page read and write
15AE000
stack
page read and write
326D9F9000
stack
page read and write
695E000
heap
page read and write
9624000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
6C0C000
stack
page read and write
56E0000
trusted library allocation
page read and write
3AB8000
trusted library allocation
page read and write
15FA000
trusted library allocation
page execute and read and write
326D3CF000
stack
page read and write
5FBE000
stack
page read and write
21116C20000
heap
page read and write
1321000
heap
page read and write
15BE000
stack
page read and write
6E70000
trusted library allocation
page read and write
C5E000
stack
page read and write
8340000
trusted library allocation
page execute and read and write
3859000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
3A2F000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
703A000
heap
page read and write
3903000
trusted library allocation
page read and write
39CD000
trusted library allocation
page read and write
1197000
heap
page read and write
156F000
stack
page read and write
67AE000
stack
page read and write
309A000
trusted library allocation
page read and write
171B000
trusted library allocation
page execute and read and write
182C783A000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
182B6D40000
trusted library section
page read and write
326DBF9000
stack
page read and write
8210000
trusted library allocation
page read and write
182C77B0000
trusted library allocation
page read and write
6860000
heap
page read and write
85C0000
heap
page read and write
841E000
stack
page read and write
67C4000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
326DC7E000
stack
page read and write
679E000
heap
page read and write
1352000
trusted library allocation
page read and write
182B7460000
trusted library allocation
page read and write
75F0000
trusted library allocation
page execute and read and write
8E65000
heap
page read and write
147D000
trusted library allocation
page execute and read and write
7FFD9BB74000
trusted library allocation
page read and write
377E000
trusted library allocation
page read and write
326D673000
stack
page read and write
A760000
trusted library allocation
page execute and read and write
15ED000
trusted library allocation
page execute and read and write
1238000
heap
page read and write
393F000
trusted library allocation
page read and write
134A000
trusted library allocation
page execute and read and write
71C0000
trusted library allocation
page read and write
8540000
trusted library allocation
page execute and read and write
818B000
trusted library allocation
page read and write
7B50000
trusted library allocation
page execute and read and write
A850000
trusted library allocation
page read and write
4371000
trusted library allocation
page read and write
8B35000
trusted library allocation
page read and write
56F0000
trusted library allocation
page execute and read and write
3421000
trusted library allocation
page read and write
39E1000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
17C0000
trusted library allocation
page read and write
A088000
trusted library allocation
page read and write
1187000
stack
page read and write
2112F1F0000
heap
page read and write
8DA3000
trusted library allocation
page read and write
2112F1E6000
heap
page execute and read and write
7F20000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
27F3000
trusted library allocation
page read and write
211163D0000
heap
page read and write
15E0000
trusted library allocation
page read and write
AA62000
heap
page read and write
1450000
trusted library allocation
page read and write
64DE000
stack
page read and write
7B80000
trusted library allocation
page execute and read and write
326E94D000
stack
page read and write
3954000
trusted library allocation
page read and write
177E000
stack
page read and write
5DE0000
trusted library allocation
page read and write
9DBB000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
21126C31000
trusted library allocation
page read and write
182B8DB5000
trusted library allocation
page read and write
7DF4E67E0000
trusted library allocation
page execute and read and write
CD142BF000
stack
page read and write
11E0000
heap
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
2112F116000
heap
page read and write
578F000
stack
page read and write
7C9C000
trusted library allocation
page execute and read and write
8B22000
trusted library allocation
page read and write
182CFB60000
heap
page read and write
598E000
stack
page read and write
AD2000
trusted library allocation
page read and write
632F000
stack
page read and write
3152000
trusted library allocation
page read and write
65EE000
stack
page read and write
13D7000
heap
page read and write
2112F119000
heap
page read and write
There are 1414 hidden memdumps, click here to show them.