IOC Report
FOR JOBREF OC-SEAEXP YFC EXPORT-SEA BOOKING853IPN0006279.exe

loading gif

Files

File Path
Type
Category
Malicious
FOR JOBREF OC-SEAEXP YFC EXPORT-SEA BOOKING853IPN0006279.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FOR JOBREF OC-SEAEXP YFC EXPORT-SEA BOOKING853IPN0006279.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp378C.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Local\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\BhTdjGetAH.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\BhTdjGetAH.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BhTdjGetAH.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\XClient.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_05rkeint.eww.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0k3h4b40.2ii.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_42cakj3r.j5p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bvx0z5a0.vuc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fmpueysj.t3c.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g2py01up.kow.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h04lvzop.whv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hdj1mpcu.qlj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hekmxnry.tv5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ipezphyi.uvv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mzzxvptr.0s0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n2ehbdei.3dt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o1vw4y2q.ccb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qnncyxbn.blk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qpmwiqf5.g0e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r2uoltdj.4s4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t10loqb1.1su.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tkufpj2r.epl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tuek0iwo.iba.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vbktwajr.uyr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wyi3t2nd.cqd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x5ag45ok.nft.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ysrpx5lg.alv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zaqmp0xi.rw5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp125.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp5296.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpDDBF.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jul 2 19:32:36 2024, mtime=Tue Jul 2 19:32:36 2024, atime=Tue Jul 2 19:32:36 2024, length=525312, window=hide
dropped
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FOR JOBREF OC-SEAEXP YFC EXPORT-SEA BOOKING853IPN0006279.exe
"C:\Users\user\Desktop\FOR JOBREF OC-SEAEXP YFC EXPORT-SEA BOOKING853IPN0006279.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FOR JOBREF OC-SEAEXP YFC EXPORT-SEA BOOKING853IPN0006279.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\BhTdjGetAH.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BhTdjGetAH" /XML "C:\Users\user\AppData\Local\Temp\tmp378C.tmp"
malicious
C:\Users\user\Desktop\FOR JOBREF OC-SEAEXP YFC EXPORT-SEA BOOKING853IPN0006279.exe
"C:\Users\user\Desktop\FOR JOBREF OC-SEAEXP YFC EXPORT-SEA BOOKING853IPN0006279.exe"
malicious
C:\Users\user\Desktop\FOR JOBREF OC-SEAEXP YFC EXPORT-SEA BOOKING853IPN0006279.exe
"C:\Users\user\Desktop\FOR JOBREF OC-SEAEXP YFC EXPORT-SEA BOOKING853IPN0006279.exe"
malicious
C:\Users\user\AppData\Roaming\BhTdjGetAH.exe
C:\Users\user\AppData\Roaming\BhTdjGetAH.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\FOR JOBREF OC-SEAEXP YFC EXPORT-SEA BOOKING853IPN0006279.exe'
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BhTdjGetAH" /XML "C:\Users\user\AppData\Local\Temp\tmp5296.tmp"
malicious
C:\Users\user\AppData\Roaming\BhTdjGetAH.exe
"C:\Users\user\AppData\Roaming\BhTdjGetAH.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FOR JOBREF OC-SEAEXP YFC EXPORT-SEA BOOKING853IPN0006279.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\XClient.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Users\user\AppData\Local\XClient.exe
"C:\Users\user\AppData\Local\XClient.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BhTdjGetAH" /XML "C:\Users\user\AppData\Local\Temp\tmpDDBF.tmp"
malicious
C:\Users\user\AppData\Local\XClient.exe
"C:\Users\user\AppData\Local\XClient.exe"
malicious
C:\Users\user\AppData\Local\XClient.exe
"C:\Users\user\AppData\Local\XClient.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BhTdjGetAH" /XML "C:\Users\user\AppData\Local\Temp\tmp125.tmp"
malicious
C:\Users\user\AppData\Local\XClient.exe
"C:\Users\user\AppData\Local\XClient.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
futurist2.ddns.net
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://go.mic
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.fontbureau.com/designers?
unknown
https://go.micro
unknown
http://www.microsoft.coXd
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://github.com/Pester/Pester
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://crl.microso
unknown
https://aka.ms/pscore6lB
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://crl.micro$
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
futurist2.ddns.net
102.90.42.110
malicious

IPs

IP
Domain
Country
Malicious
102.90.42.110
futurist2.ddns.net
Nigeria
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
XClient

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
30BE000
trusted library allocation
page read and write
malicious
2FE1000
trusted library allocation
page read and write
malicious
2801000
trusted library allocation
page read and write
malicious
62A0000
heap
page read and write
33DF000
stack
page read and write
4EFE000
stack
page read and write
4D68000
trusted library allocation
page read and write
557D000
trusted library allocation
page read and write
4CC0000
trusted library section
page readonly
2B5B000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
26FE000
stack
page read and write
6FFE000
stack
page read and write
4FD0000
heap
page execute and read and write
71D6000
heap
page read and write
2BBB000
trusted library allocation
page read and write
7050000
trusted library allocation
page read and write
5054000
trusted library allocation
page read and write
727F000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
29F0000
heap
page execute and read and write
287D000
stack
page read and write
6C9E000
stack
page read and write
2B97000
trusted library allocation
page read and write
E05000
heap
page read and write
2B4D000
stack
page read and write
BC2000
unkown
page readonly
E57000
heap
page read and write
6EF0000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
B50000
heap
page read and write
6EFA000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
F1B000
heap
page read and write
E8E000
stack
page read and write
8D5000
heap
page read and write
11C4000
trusted library allocation
page read and write
800E000
stack
page read and write
46C1000
trusted library allocation
page read and write
530B000
trusted library allocation
page read and write
51A0000
trusted library allocation
page execute and read and write
56C1000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
733A000
trusted library allocation
page read and write
4537000
heap
page read and write
6C1F000
stack
page read and write
7ADE000
stack
page read and write
2B6F000
trusted library allocation
page read and write
8187000
heap
page read and write
5308000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
804E000
stack
page read and write
53CE000
stack
page read and write
8360000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
4A73000
trusted library allocation
page read and write
876E000
stack
page read and write
11D0000
trusted library allocation
page read and write
52DE000
stack
page read and write
3809000
trusted library allocation
page read and write
4450000
trusted library allocation
page read and write
6ED2000
heap
page read and write
2B4D000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2C01000
heap
page read and write
68E0000
trusted library allocation
page execute and read and write
71C0000
trusted library allocation
page read and write
2A3E000
trusted library allocation
page read and write
6FFF000
stack
page read and write
2BEE000
heap
page read and write
2850000
trusted library allocation
page execute and read and write
2950000
trusted library section
page read and write
6ECC000
heap
page read and write
5A20000
heap
page read and write
5E6E000
trusted library allocation
page read and write
35C0000
heap
page read and write
2B8B000
trusted library allocation
page read and write
6DDC000
heap
page read and write
82F0000
trusted library allocation
page execute and read and write
10B0000
heap
page read and write
2AAE000
stack
page read and write
7D62000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
537C000
trusted library allocation
page read and write
69FE000
stack
page read and write
297D000
trusted library allocation
page execute and read and write
66BE000
stack
page read and write
273F000
stack
page read and write
2B42000
heap
page read and write
12C0000
heap
page read and write
2960000
heap
page read and write
7150000
trusted library allocation
page read and write
8089000
heap
page read and write
866E000
stack
page read and write
73FE000
stack
page read and write
3A78000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
69FE000
stack
page read and write
7450000
trusted library allocation
page read and write
1060000
heap
page read and write
8330000
trusted library allocation
page execute and read and write
DD3000
trusted library allocation
page execute and read and write
70E0000
trusted library allocation
page read and write
C67000
heap
page read and write
6E70000
trusted library allocation
page read and write
2930000
heap
page read and write
DD4000
trusted library allocation
page read and write
2B39000
trusted library allocation
page read and write
7BAD000
stack
page read and write
27A4000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
3388000
trusted library allocation
page read and write
7DF8000
heap
page read and write
4110000
heap
page readonly
75DF000
stack
page read and write
7D0000
heap
page read and write
723D000
stack
page read and write
444D000
trusted library allocation
page execute and read and write
68C0000
heap
page read and write
5BF5000
heap
page read and write
1620000
trusted library allocation
page read and write
44D0000
heap
page read and write
5E99000
trusted library allocation
page read and write
324A000
heap
page read and write
2CAD000
trusted library allocation
page read and write
54EE000
stack
page read and write
564E000
stack
page read and write
11C2000
heap
page read and write
7170000
trusted library allocation
page read and write
4300000
heap
page read and write
32F8000
trusted library allocation
page read and write
7D5A000
heap
page read and write
586E000
trusted library allocation
page read and write
3280000
heap
page read and write
4068000
trusted library allocation
page read and write
2B5D000
trusted library allocation
page read and write
7FDE000
stack
page read and write
7282000
heap
page read and write
4F10000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
8057000
trusted library allocation
page read and write
7CDD000
trusted library allocation
page read and write
D535000
trusted library allocation
page read and write
774E000
stack
page read and write
8192000
heap
page read and write
FE8000
heap
page read and write
29EE000
stack
page read and write
1480000
trusted library allocation
page read and write
709F000
trusted library allocation
page read and write
2920000
heap
page read and write
FFED000
stack
page read and write
8EB000
stack
page read and write
3801000
trusted library allocation
page read and write
7F430000
trusted library allocation
page execute and read and write
655C000
stack
page read and write
69AA000
stack
page read and write
6AFE000
stack
page read and write
4CD0000
heap
page read and write
44E0000
heap
page read and write
44DE000
stack
page read and write
7220000
trusted library allocation
page read and write
CA0000
heap
page read and write
29FB000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
11C3000
trusted library allocation
page execute and read and write
56CE000
stack
page read and write
840E000
stack
page read and write
5877000
trusted library allocation
page read and write
70E0000
heap
page read and write
11C0000
trusted library allocation
page read and write
4963000
trusted library allocation
page read and write
7C1E000
stack
page read and write
6F6E000
stack
page read and write
2E94000
trusted library allocation
page read and write
29F9000
trusted library allocation
page read and write
7279000
trusted library allocation
page read and write
1270000
heap
page read and write
6C4E000
stack
page read and write
11E2000
trusted library allocation
page read and write
722E000
stack
page read and write
5703000
heap
page read and write
7CCC000
heap
page read and write
43E4000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
72AC000
heap
page read and write
8070000
trusted library allocation
page read and write
6D70000
heap
page read and write
167E000
trusted library allocation
page read and write
6E4D000
heap
page read and write
4F42000
trusted library allocation
page read and write
104E000
heap
page read and write
6F3E000
stack
page read and write
289E000
stack
page read and write
4180000
trusted library allocation
page read and write
4F2E000
trusted library allocation
page read and write
1080000
heap
page read and write
56D5000
trusted library allocation
page read and write
6F26000
heap
page read and write
500D000
trusted library allocation
page read and write
488F000
trusted library allocation
page read and write
2997000
heap
page read and write
50E4000
trusted library allocation
page read and write
7AA000
stack
page read and write
11C4000
heap
page read and write
83CE000
stack
page read and write
1154000
trusted library allocation
page read and write
681E000
stack
page read and write
4466000
trusted library allocation
page read and write
702D000
stack
page read and write
3220000
heap
page read and write
7CDB000
trusted library allocation
page read and write
520B000
stack
page read and write
CA1000
heap
page read and write
4EFE000
stack
page read and write
2B95000
trusted library allocation
page read and write
29FB000
trusted library allocation
page read and write
1221000
heap
page read and write
4ED0000
heap
page read and write
29F9000
trusted library allocation
page read and write
50B9000
trusted library allocation
page read and write
1160000
heap
page read and write
50BE000
stack
page read and write
319C000
trusted library allocation
page read and write
71E0000
trusted library allocation
page read and write
4E7E000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
6F92000
heap
page read and write
2789000
trusted library allocation
page read and write
689A000
stack
page read and write
742C000
heap
page read and write
111E000
stack
page read and write
818E000
heap
page read and write
71D0000
heap
page read and write
1040000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
4A7D000
stack
page read and write
E00000
heap
page read and write
3B0D000
trusted library allocation
page read and write
148A000
trusted library allocation
page execute and read and write
9B0000
trusted library allocation
page read and write
68EE000
stack
page read and write
6D80000
heap
page read and write
2BAF000
trusted library allocation
page read and write
7DEE000
stack
page read and write
4220000
heap
page readonly
4DB0000
heap
page read and write
5CF0000
heap
page read and write
52A3000
heap
page read and write
28E0000
heap
page execute and read and write
4676000
trusted library allocation
page read and write
32E6000
trusted library allocation
page read and write
5180000
heap
page read and write
4238000
trusted library allocation
page read and write
694E000
stack
page read and write
2A1E000
trusted library allocation
page read and write
4162000
trusted library allocation
page read and write
5E62000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
2BB7000
trusted library allocation
page read and write
3B63000
trusted library allocation
page read and write
2FA0000
heap
page read and write
11CD000
trusted library allocation
page execute and read and write
507E000
stack
page read and write
DDE000
stack
page read and write
5A4E000
heap
page read and write
DE0000
trusted library allocation
page read and write
101B000
trusted library allocation
page execute and read and write
837D000
stack
page read and write
1174000
trusted library allocation
page read and write
269E000
stack
page read and write
A34000
heap
page read and write
2A03000
trusted library allocation
page read and write
CDA000
stack
page read and write
2A01000
trusted library allocation
page read and write
4C90000
trusted library allocation
page execute and read and write
5610000
heap
page read and write
1260000
trusted library allocation
page execute and read and write
5AD5000
heap
page read and write
10DE000
stack
page read and write
7F370000
trusted library allocation
page execute and read and write
7248000
heap
page read and write
6F9E000
stack
page read and write
4239000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
6E05000
heap
page read and write
3237000
trusted library allocation
page read and write
7138000
heap
page read and write
15DE000
stack
page read and write
6920000
heap
page read and write
270B000
trusted library allocation
page read and write
EC5000
heap
page read and write
72A0000
trusted library allocation
page read and write
6BBF000
stack
page read and write
7CD0000
trusted library allocation
page read and write
6DE1000
heap
page read and write
46B0000
heap
page execute and read and write
461F000
trusted library allocation
page read and write
514E000
stack
page read and write
6250000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
7CB4000
heap
page read and write
A0E000
heap
page read and write
72E2000
heap
page read and write
4DD6000
trusted library allocation
page read and write
5339000
trusted library allocation
page read and write
4165000
trusted library allocation
page execute and read and write
6F54000
heap
page read and write
4C2C000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
D90000
heap
page read and write
6CE2000
heap
page read and write
83FE000
stack
page read and write
7F048000
trusted library allocation
page execute and read and write
428C000
stack
page read and write
55E0000
heap
page read and write
7FCC0000
trusted library allocation
page execute and read and write
8040000
trusted library allocation
page read and write
5683000
heap
page read and write
2905000
trusted library allocation
page read and write
877F000
stack
page read and write
DF6000
trusted library allocation
page execute and read and write
7ED0000
trusted library allocation
page read and write
805E000
stack
page read and write
7CB0000
heap
page read and write
7B2C000
stack
page read and write
520000
heap
page read and write
30B9000
stack
page read and write
54CF000
stack
page read and write
41DE000
trusted library allocation
page read and write
2DC000
stack
page read and write
80E0000
heap
page read and write
71FD000
heap
page read and write
425C000
trusted library allocation
page read and write
4A25000
trusted library allocation
page read and write
8060000
heap
page read and write
1050000
trusted library allocation
page execute and read and write
282E000
stack
page read and write
56CD000
trusted library allocation
page read and write
2B81000
trusted library allocation
page read and write
125E000
stack
page read and write
1170000
trusted library allocation
page read and write
11D3000
trusted library allocation
page read and write
2C88000
heap
page read and write
2B4F000
trusted library allocation
page read and write
56F0000
trusted library allocation
page execute and read and write
31EE000
stack
page read and write
6A8D000
stack
page read and write
7DFE000
stack
page read and write
3BB9000
trusted library allocation
page read and write
307D000
stack
page read and write
43F9000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
54AE000
stack
page read and write
7EF0000
trusted library allocation
page read and write
7F2D0000
trusted library allocation
page execute and read and write
5E5B000
trusted library allocation
page read and write
1635000
trusted library allocation
page read and write
6520000
trusted library allocation
page read and write
EE3000
trusted library allocation
page execute and read and write
53C5000
heap
page read and write
7B10000
trusted library allocation
page read and write
7453000
heap
page read and write
1460000
trusted library allocation
page execute and read and write
70B0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page execute and read and write
7130000
trusted library allocation
page read and write
107E000
stack
page read and write
71F0000
trusted library allocation
page read and write
2B57000
trusted library allocation
page read and write
27DB000
heap
page read and write
400000
remote allocation
page execute and read and write
12CF000
heap
page read and write
3A58000
trusted library allocation
page read and write
2B50000
heap
page read and write
2B25000
trusted library allocation
page read and write
470F000
trusted library allocation
page read and write
515E000
stack
page read and write
53B0000
trusted library allocation
page execute and read and write
8B0000
heap
page read and write
4A29000
trusted library allocation
page read and write
7C42000
trusted library allocation
page read and write
6FAE000
stack
page read and write
87AF000
stack
page read and write
11D0000
trusted library allocation
page read and write
81D0000
trusted library allocation
page read and write
4444000
trusted library allocation
page read and write
3A7000
heap
page read and write
299E000
stack
page read and write
271E000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
7BEF000
stack
page read and write
3090000
heap
page read and write
2B3A000
heap
page read and write
811E000
heap
page read and write
7470000
trusted library allocation
page read and write
321E000
unkown
page read and write
141E000
stack
page read and write
27C7000
trusted library allocation
page execute and read and write
11F7000
trusted library allocation
page execute and read and write
80D8000
heap
page read and write
54C8000
trusted library allocation
page read and write
BC9000
heap
page read and write
2B46000
heap
page read and write
1197000
trusted library allocation
page execute and read and write
7F10000
heap
page read and write
4ED0000
trusted library allocation
page read and write
86ED000
stack
page read and write
48AD000
trusted library allocation
page read and write
4BBE000
trusted library allocation
page read and write
42B6000
trusted library allocation
page read and write
C4B0000
trusted library allocation
page read and write
1681000
trusted library allocation
page read and write
5E5E000
trusted library allocation
page read and write
11E0000
heap
page read and write
5161000
trusted library allocation
page read and write
2FD0000
heap
page execute and read and write
11EE000
heap
page read and write
78DE000
stack
page read and write
82BD000
stack
page read and write
490000
heap
page read and write
13DD000
stack
page read and write
6E80000
heap
page execute and read and write
6A4B000
stack
page read and write
4ED5000
trusted library allocation
page read and write
872D000
stack
page read and write
5620000
heap
page read and write
862B000
stack
page read and write
4210000
heap
page execute and read and write
4A20000
trusted library allocation
page read and write
4DE000
stack
page read and write
670E000
stack
page read and write
D9E000
stack
page read and write
F0F000
stack
page read and write
6FE2000
heap
page read and write
574E000
stack
page read and write
4FA0000
trusted library allocation
page read and write
2990000
heap
page read and write
7242000
trusted library allocation
page read and write
4140000
trusted library allocation
page execute and read and write
55F2000
trusted library allocation
page read and write
AD6000
heap
page read and write
5700000
heap
page read and write
7FD50000
trusted library allocation
page execute and read and write
1486000
trusted library allocation
page execute and read and write
43ED000
trusted library allocation
page execute and read and write
277D000
trusted library allocation
page execute and read and write
7B7D000
stack
page read and write
7F2E000
stack
page read and write
6F5F000
stack
page read and write
6DFB000
stack
page read and write
2B8D000
trusted library allocation
page read and write
7D67000
heap
page read and write
6F00000
trusted library allocation
page read and write
6BBE000
stack
page read and write
546000
heap
page read and write
2B7B000
trusted library allocation
page read and write
88FE000
stack
page read and write
3180000
heap
page read and write
8D0000
heap
page read and write
105E000
heap
page read and write
70C0000
trusted library allocation
page read and write
67CE000
stack
page read and write
700A000
trusted library allocation
page read and write
8530000
trusted library allocation
page execute and read and write
808D000
heap
page read and write
452E000
stack
page read and write
7A9E000
stack
page read and write
149B000
trusted library allocation
page execute and read and write
5890000
heap
page read and write
45AC000
stack
page read and write
122E000
stack
page read and write
5E40000
trusted library allocation
page read and write
815A000
heap
page read and write
3200000
heap
page read and write
BFE000
stack
page read and write
3FE9000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
27B8000
heap
page read and write
C80000
heap
page read and write
7007000
trusted library allocation
page read and write
26E0000
heap
page read and write
2B59000
trusted library allocation
page read and write
FEAF000
stack
page read and write
72DD000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
39A1000
trusted library allocation
page read and write
B4E000
stack
page read and write
1180000
trusted library allocation
page read and write
E98000
heap
page read and write
314C000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
81E0000
trusted library allocation
page read and write
1039000
stack
page read and write
11C0000
trusted library allocation
page read and write
7F1A0000
trusted library allocation
page execute and read and write
767000
stack
page read and write
1160000
trusted library allocation
page read and write
1004000
heap
page read and write
7CF2000
heap
page read and write
2FC0000
trusted library allocation
page execute and read and write
6F8E000
heap
page read and write
27E7000
heap
page read and write
6D92000
heap
page read and write
F06000
trusted library allocation
page execute and read and write
8112000
heap
page read and write
2B1F000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
2B37000
trusted library allocation
page read and write
2DB9000
stack
page read and write
80BE000
stack
page read and write
6FBE000
stack
page read and write
4FA2000
trusted library allocation
page read and write
822E000
stack
page read and write
4F50000
trusted library allocation
page read and write
305D000
stack
page read and write
4EC0000
trusted library allocation
page execute and read and write
2B4B000
trusted library allocation
page read and write
70BC000
stack
page read and write
1120000
heap
page read and write
120E000
heap
page read and write
4C90000
trusted library allocation
page read and write
9AD000
trusted library allocation
page execute and read and write
4490000
trusted library allocation
page read and write
DFD000
stack
page read and write
7D45000
heap
page read and write
9C2000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
802E000
stack
page read and write
CFE000
stack
page read and write
7F30000
trusted library allocation
page read and write
747E000
stack
page read and write
512D000
trusted library allocation
page read and write
8070000
heap
page read and write
494E000
trusted library allocation
page read and write
7D80000
trusted library allocation
page execute and read and write
3239000
trusted library allocation
page read and write
8503000
trusted library allocation
page read and write
7448000
trusted library allocation
page read and write
7752000
heap
page read and write
2793000
trusted library allocation
page execute and read and write
7000000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
4521000
trusted library allocation
page read and write
4160000
trusted library allocation
page read and write
6B4D000
stack
page read and write
FC2E000
stack
page read and write
49F0000
trusted library allocation
page read and write
6B7E000
stack
page read and write
45F0000
trusted library allocation
page execute and read and write
6AA4000
heap
page read and write
7AEF000
stack
page read and write
7C2E000
stack
page read and write
7440000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
4ABD000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
29F5000
trusted library allocation
page read and write
146D000
trusted library allocation
page execute and read and write
EA0000
heap
page read and write
5060000
trusted library allocation
page execute and read and write
87BB000
stack
page read and write
1470000
trusted library allocation
page read and write
1437000
trusted library allocation
page execute and read and write
6A7B000
heap
page read and write
7E22000
heap
page read and write
F15000
heap
page read and write
48E7000
trusted library allocation
page read and write
3070000
heap
page read and write
5857000
trusted library allocation
page read and write
2BAC000
trusted library allocation
page read and write
4C54000
trusted library allocation
page read and write
3120000
heap
page read and write
2AB0000
heap
page execute and read and write
33EE000
stack
page read and write
7BA0000
heap
page read and write
40BE000
stack
page read and write
2B31000
trusted library allocation
page read and write
BC0000
unkown
page readonly
1186000
trusted library allocation
page execute and read and write
7030000
trusted library allocation
page execute and read and write
7510000
trusted library allocation
page read and write
5571000
trusted library allocation
page read and write
282C000
heap
page read and write
5576000
trusted library allocation
page read and write
4B8C000
stack
page read and write
E30000
heap
page read and write
4F20000
heap
page execute and read and write
2BC1000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
4150000
heap
page read and write
29F7000
trusted library allocation
page read and write
2989000
trusted library allocation
page read and write
7D6F000
stack
page read and write
115E000
stack
page read and write
86AD000
stack
page read and write
11FB000
trusted library allocation
page execute and read and write
6290000
trusted library allocation
page execute and read and write
4EC7000
trusted library allocation
page read and write
27F0000
heap
page execute and read and write
6749000
stack
page read and write
847E000
stack
page read and write
4C56000
trusted library allocation
page read and write
118A000
heap
page read and write
4CA0000
trusted library allocation
page read and write
442000
heap
page read and write
306E000
unkown
page read and write
6E5E000
stack
page read and write
12C5000
heap
page read and write
6FAE000
stack
page read and write
7EAF000
stack
page read and write
52A0000
heap
page read and write
11D0000
trusted library allocation
page read and write
843D000
stack
page read and write
5E82000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
EC8000
heap
page read and write
4C40000
trusted library allocation
page read and write
5880000
heap
page read and write
70D0000
trusted library allocation
page read and write
4F03000
heap
page read and write
9D7000
trusted library allocation
page execute and read and write
722C000
stack
page read and write
ACB000
stack
page read and write
AF7000
stack
page read and write
7D90000
heap
page read and write
72AD000
stack
page read and write
DE0000
heap
page read and write
FD6E000
stack
page read and write
489C000
trusted library allocation
page read and write
6DBD000
stack
page read and write
71B0000
trusted library allocation
page read and write
5AE0000
heap
page read and write
11E6000
trusted library allocation
page execute and read and write
438000
stack
page read and write
5E50000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
6F7C000
stack
page read and write
6CBD000
stack
page read and write
2B55000
trusted library allocation
page read and write
2B71000
trusted library allocation
page read and write
6268000
trusted library allocation
page read and write
8669000
stack
page read and write
4F1B000
trusted library allocation
page read and write
4060000
trusted library allocation
page read and write
6247000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
84B0000
trusted library allocation
page read and write
42E0000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
4DB3000
heap
page read and write
727D000
heap
page read and write
6CCE000
stack
page read and write
2A88000
heap
page read and write
1660000
trusted library allocation
page read and write
733B000
stack
page read and write
2F40000
heap
page read and write
469F000
stack
page read and write
7160000
trusted library allocation
page read and write
5AF0000
heap
page read and write
1260000
heap
page read and write
84F0000
trusted library allocation
page execute and read and write
7E2A000
heap
page read and write
47B3000
trusted library allocation
page read and write
1290000
heap
page read and write
143B000
trusted library allocation
page execute and read and write
B90000
heap
page read and write
2E70000
trusted library allocation
page execute and read and write
71CE000
heap
page read and write
79EE000
stack
page read and write
7D7A000
heap
page read and write
6EDE000
stack
page read and write
2B65000
trusted library allocation
page read and write
6B8B000
stack
page read and write
326E000
stack
page read and write
747B000
heap
page read and write
1432000
trusted library allocation
page read and write
7FC0000
trusted library allocation
page execute and read and write
10C0000
heap
page read and write
1497000
trusted library allocation
page execute and read and write
75FE000
heap
page read and write
7EF0000
trusted library allocation
page read and write
4F3D000
trusted library allocation
page read and write
16B0000
trusted library allocation
page read and write
495000
heap
page read and write
27A5000
trusted library allocation
page execute and read and write
2852000
heap
page read and write
DFA000
trusted library allocation
page execute and read and write
1090000
heap
page read and write
5540000
heap
page execute and read and write
7FE0000
heap
page read and write
27A2000
trusted library allocation
page read and write
73CE000
stack
page read and write
54A7000
trusted library allocation
page read and write
6E0A000
heap
page read and write
4C42000
trusted library allocation
page read and write
4450000
heap
page readonly
6DFE000
heap
page read and write
1692000
trusted library allocation
page read and write
834C000
stack
page read and write
3020000
heap
page read and write
5360000
trusted library allocation
page read and write
70EE000
stack
page read and write
28C6000
trusted library allocation
page read and write
80E7000
heap
page read and write
6F5E000
stack
page read and write
32CC000
heap
page read and write
4CC4000
trusted library section
page readonly
1296000
heap
page read and write
2774000
trusted library allocation
page read and write
6AFB000
heap
page read and write
4898000
trusted library allocation
page read and write
2744000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
4B7E000
stack
page read and write
10B0000
trusted library allocation
page execute and read and write
2B6D000
trusted library allocation
page read and write
40FE000
stack
page read and write
E9F000
stack
page read and write
6EF7000
trusted library allocation
page read and write
2C70000
trusted library section
page read and write
6ECE000
heap
page read and write
309A000
stack
page read and write
EF0000
trusted library allocation
page read and write
5175000
heap
page read and write
2A1B000
trusted library allocation
page read and write
7DF0000
heap
page read and write
7490000
trusted library allocation
page read and write
6AB0000
heap
page read and write
4A62000
trusted library allocation
page read and write
302C000
stack
page read and write
283C000
stack
page read and write
560F000
stack
page read and write
8060000
trusted library allocation
page read and write
5A10000
heap
page read and write
1422000
trusted library allocation
page read and write
5170000
heap
page read and write
2F8E000
stack
page read and write
2773000
trusted library allocation
page execute and read and write
5E7D000
trusted library allocation
page read and write
317000
stack
page read and write
6639000
stack
page read and write
5055000
trusted library allocation
page read and write
594E000
stack
page read and write
5B70000
heap
page read and write
4582000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
335F000
unkown
page read and write
4437000
heap
page read and write
80D4000
heap
page read and write
7115000
heap
page read and write
40F8000
trusted library allocation
page read and write
C8E000
stack
page read and write
80E8000
heap
page read and write
56E0000
trusted library allocation
page read and write
A0A000
heap
page read and write
5868000
trusted library allocation
page read and write
3E8000
heap
page read and write
70A2000
heap
page read and write
32BA000
heap
page read and write
51D000
stack
page read and write
67DE000
stack
page read and write
4540000
heap
page readonly
6F48000
heap
page read and write
7FAF000
stack
page read and write
11CD000
trusted library allocation
page execute and read and write
1070000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
7C5E000
stack
page read and write
6CDE000
stack
page read and write
70F0000
trusted library allocation
page read and write
4875000
trusted library allocation
page read and write
7B80000
heap
page read and write
6BFA000
stack
page read and write
C210000
trusted library allocation
page read and write
6ABE000
stack
page read and write
707E000
stack
page read and write
2DA8000
heap
page read and write
27C0000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
717E000
heap
page read and write
6F7E000
stack
page read and write
EF4000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page execute and read and write
4600000
trusted library allocation
page read and write
C30000
heap
page read and write
3071000
trusted library allocation
page read and write
2B7F000
trusted library allocation
page read and write
789E000
stack
page read and write
429F000
trusted library allocation
page read and write
79B000
stack
page read and write
30F0000
heap
page read and write
1170000
heap
page read and write
6DD8000
heap
page read and write
7156000
heap
page read and write
7D1E000
stack
page read and write
3520000
heap
page read and write
CCA000
heap
page read and write
D3E000
stack
page read and write
80D0000
heap
page read and write
7FD68000
trusted library allocation
page execute and read and write
26C9000
heap
page read and write
C53000
heap
page read and write
3050000
trusted library allocation
page read and write
7E69000
heap
page read and write
136F000
stack
page read and write
795F000
stack
page read and write
5E39000
stack
page read and write
2B47000
trusted library allocation
page read and write
66A000
stack
page read and write
122A000
heap
page read and write
8350000
trusted library allocation
page read and write
4F1B000
stack
page read and write
7459000
heap
page read and write
40D8000
trusted library allocation
page read and write
2B1B000
trusted library allocation
page read and write
29A1000
trusted library allocation
page read and write
141D000
stack
page read and write
2C80000
heap
page read and write
7C60000
trusted library allocation
page read and write
16AF000
stack
page read and write
2E60000
trusted library allocation
page read and write
4459000
trusted library allocation
page read and write
4443000
trusted library allocation
page execute and read and write
6C3E000
stack
page read and write
4120000
trusted library allocation
page read and write
3170000
heap
page read and write
6DC4000
heap
page read and write
7DF4000
heap
page read and write
7EFE000
stack
page read and write
7F6E000
stack
page read and write
4D90000
trusted library allocation
page read and write
4F00000
heap
page read and write
686D000
stack
page read and write
420E000
stack
page read and write
6C7E000
stack
page read and write
833E000
stack
page read and write
9DB000
trusted library allocation
page execute and read and write
6975000
heap
page execute and read and write
5FDD000
stack
page read and write
6D1E000
stack
page read and write
2B10000
heap
page read and write
51BE000
stack
page read and write
5220000
heap
page read and write
5311000
trusted library allocation
page read and write
4430000
heap
page read and write
65BE000
stack
page read and write
29EF000
stack
page read and write
2760000
trusted library allocation
page read and write
28A7000
stack
page read and write
3196000
trusted library allocation
page read and write
F0A000
trusted library allocation
page execute and read and write
100F000
stack
page read and write
7F388000
trusted library allocation
page execute and read and write
43D0000
trusted library allocation
page read and write
9BD000
trusted library allocation
page execute and read and write
1430000
trusted library allocation
page read and write
BA0000
heap
page read and write
7198000
heap
page read and write
84F0000
trusted library allocation
page read and write
42D0000
trusted library allocation
page execute and read and write
2BCF000
stack
page read and write
1492000
trusted library allocation
page read and write
2B93000
trusted library allocation
page read and write
44B8000
trusted library allocation
page read and write
2B90000
heap
page execute and read and write
58A0000
trusted library allocation
page read and write
920000
heap
page read and write
7260000
trusted library allocation
page execute and read and write
7DAE000
stack
page read and write
58D0000
trusted library allocation
page execute and read and write
71C0000
heap
page read and write
2E96000
trusted library allocation
page read and write
4F7E000
stack
page read and write
4400000
trusted library allocation
page read and write
760D000
stack
page read and write
88BC000
stack
page read and write
9E7000
stack
page read and write
5CE0000
trusted library allocation
page execute and read and write
82BF000
stack
page read and write
6D9A000
heap
page read and write
48A4000
trusted library allocation
page read and write
31AF000
unkown
page read and write
6F2C000
heap
page read and write
71D0000
trusted library allocation
page read and write
5600000
trusted library section
page readonly
48A0000
trusted library allocation
page read and write
837E000
stack
page read and write
D7B000
stack
page read and write
556E000
trusted library allocation
page read and write
4A70000
trusted library allocation
page execute and read and write
4128000
trusted library allocation
page read and write
6AE0000
heap
page read and write
784E000
stack
page read and write
7270000
heap
page read and write
50E0000
trusted library allocation
page read and write
59F0000
trusted library section
page read and write
1137000
stack
page read and write
2B79000
trusted library allocation
page read and write
C38000
heap
page read and write
4EE0000
trusted library allocation
page read and write
6A7E000
stack
page read and write
54DE000
stack
page read and write
2750000
trusted library allocation
page read and write
6B25000
heap
page execute and read and write
7D7F000
heap
page read and write
4311000
trusted library allocation
page read and write
11EA000
trusted library allocation
page execute and read and write
4A3E000
trusted library allocation
page read and write
7DEC000
heap
page read and write
2894000
heap
page read and write
15AE000
stack
page read and write
1280000
heap
page read and write
BD3000
heap
page read and write
5B6D000
stack
page read and write
11B0000
trusted library allocation
page read and write
11C4000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
6ACB000
stack
page read and write
4161000
trusted library allocation
page read and write
FDAE000
stack
page read and write
8050000
trusted library allocation
page read and write
5D3A000
stack
page read and write
68F0000
trusted library allocation
page read and write
AEC000
heap
page read and write
2A07000
trusted library allocation
page read and write
5BF0000
heap
page read and write
4AA1000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
4530000
heap
page read and write
7C9D000
stack
page read and write
675D000
stack
page read and write
321D000
trusted library allocation
page read and write
4F90000
heap
page read and write
2EFA000
stack
page read and write
74F0000
trusted library allocation
page read and write
490000
heap
page read and write
7E89000
heap
page read and write
86EE000
stack
page read and write
A97000
heap
page read and write
348F000
stack
page read and write
6D3E000
stack
page read and write
7040000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
5600000
trusted library allocation
page execute and read and write
55A0000
trusted library allocation
page read and write
2A29000
trusted library allocation
page read and write
26A0000
heap
page read and write
C4B4000
trusted library allocation
page read and write
2B89000
heap
page read and write
6E65000
heap
page read and write
4885000
trusted library allocation
page read and write
121B000
heap
page read and write
5824000
trusted library section
page readonly
98DB000
trusted library allocation
page read and write
7C2C000
stack
page read and write
16E7000
heap
page read and write
4071000
trusted library allocation
page read and write
E3D000
stack
page read and write
2BB9000
trusted library allocation
page read and write
B5E000
stack
page read and write
3045000
trusted library allocation
page read and write
7448000
heap
page read and write
740E000
stack
page read and write
7070000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
7EAC000
heap
page read and write
572B000
trusted library allocation
page read and write
5C9E000
stack
page read and write
7F9D000
stack
page read and write
B60000
heap
page read and write
86AE000
stack
page read and write
6260000
trusted library allocation
page read and write
39F9000
trusted library allocation
page read and write
2849000
heap
page read and write
75F0000
heap
page read and write
1450000
heap
page read and write
926B000
trusted library allocation
page read and write
1209000
heap
page read and write
2B53000
trusted library allocation
page read and write
6B0A000
heap
page read and write
4A35000
trusted library allocation
page read and write
F06000
heap
page read and write
7337000
trusted library allocation
page read and write
2BA0000
heap
page read and write
4100000
heap
page read and write
5630000
trusted library allocation
page read and write
7CBC000
heap
page read and write
6230000
trusted library allocation
page read and write
1160000
heap
page read and write
444B000
trusted library allocation
page read and write
6C70000
heap
page read and write
29A0000
heap
page read and write
111E000
stack
page read and write
A00000
heap
page read and write
323C000
heap
page read and write
619C000
stack
page read and write
7AE0000
heap
page read and write
1224000
heap
page read and write
692E000
heap
page read and write
70AE000
stack
page read and write
2AFC000
stack
page read and write
6F6E000
stack
page read and write
3240000
heap
page read and write
1017000
trusted library allocation
page execute and read and write
1153000
trusted library allocation
page execute and read and write
370000
heap
page read and write
520C000
stack
page read and write
817A000
heap
page read and write
4475000
trusted library allocation
page execute and read and write
5190000
heap
page read and write
51FE000
stack
page read and write
DD5000
heap
page read and write
5210000
trusted library section
page readonly
7140000
trusted library allocation
page execute and read and write
2B18000
heap
page read and write
7CB8000
heap
page read and write
294F000
stack
page read and write
FEED000
stack
page read and write
C3B000
stack
page read and write
5169000
trusted library allocation
page read and write
737E000
stack
page read and write
56B5000
trusted library allocation
page read and write
7CB0000
heap
page read and write
6E4F000
heap
page read and write
761E000
stack
page read and write
4FE0000
trusted library allocation
page read and write
68AB000
stack
page read and write
2860000
heap
page read and write
342F000
stack
page read and write
8198000
heap
page read and write
6D7F000
stack
page read and write
2A50000
heap
page read and write
775E000
stack
page read and write
31DC000
trusted library allocation
page read and write
14A0000
heap
page read and write
823E000
stack
page read and write
1190000
trusted library allocation
page read and write
4837000
trusted library allocation
page read and write
2C9F000
stack
page read and write
1040000
heap
page read and write
6A3D000
stack
page read and write
6B20000
heap
page execute and read and write
4F60000
trusted library allocation
page read and write
40F3000
trusted library allocation
page read and write
B00000
heap
page read and write
279A000
trusted library allocation
page execute and read and write
1170000
heap
page read and write
6BFE000
stack
page read and write
657E000
stack
page read and write
29EB000
trusted library allocation
page read and write
41BB000
trusted library allocation
page read and write
74F2000
trusted library allocation
page read and write
724F000
heap
page read and write
10A0000
trusted library allocation
page read and write
3E49000
trusted library allocation
page read and write
471B000
trusted library allocation
page read and write
FC6E000
stack
page read and write
7CC0000
heap
page read and write
FB0000
heap
page read and write
5A4E000
stack
page read and write
26C0000
heap
page read and write
54BB000
trusted library allocation
page read and write
6A3B000
stack
page read and write
2A05000
trusted library allocation
page read and write
7732000
heap
page read and write
2B99000
trusted library allocation
page read and write
E35000
heap
page read and write
8053000
trusted library allocation
page read and write
6D5E000
stack
page read and write
71FC000
stack
page read and write
4A64000
trusted library allocation
page read and write
48D3000
trusted library allocation
page read and write
2B3D000
trusted library allocation
page read and write
27B0000
heap
page read and write
1686000
trusted library allocation
page read and write
2CF6000
trusted library allocation
page read and write
48FC000
stack
page read and write
4A78000
trusted library allocation
page read and write
2CA9000
trusted library allocation
page read and write
11C3000
trusted library allocation
page execute and read and write
33E0000
heap
page read and write
3100000
heap
page read and write
322B000
heap
page read and write
696D000
stack
page read and write
2D7D000
stack
page read and write
3376000
trusted library allocation
page read and write
F20000
heap
page read and write
BC7000
stack
page read and write
5E54000
trusted library allocation
page read and write
6FEE000
stack
page read and write
6219000
stack
page read and write
8500000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
6CFB000
stack
page read and write
7FD90000
trusted library allocation
page execute and read and write
70AE000
stack
page read and write
5160000
trusted library allocation
page read and write
6B60000
heap
page read and write
2A9D000
trusted library allocation
page read and write
261E000
stack
page read and write
81BE000
stack
page read and write
11AE000
stack
page read and write
58AA000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
440A000
trusted library allocation
page execute and read and write
45EC000
stack
page read and write
813D000
stack
page read and write
6B01000
heap
page read and write
8095000
heap
page read and write
7FB0000
heap
page read and write
685D000
stack
page read and write
50F0000
trusted library allocation
page execute and read and write
451E000
stack
page read and write
13DE000
stack
page read and write
74E0000
trusted library allocation
page read and write
2B89000
trusted library allocation
page read and write
B70000
heap
page read and write
C66000
heap
page read and write
4948000
trusted library allocation
page read and write
80C0000
trusted library allocation
page execute and read and write
990000
trusted library allocation
page read and write
2965000
heap
page read and write
4157000
heap
page read and write
47E2000
trusted library allocation
page read and write
2721000
trusted library allocation
page read and write
81FD000
stack
page read and write
706E000
stack
page read and write
84C3000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
159F000
stack
page read and write
2B6B000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
8142000
heap
page read and write
142A000
trusted library allocation
page execute and read and write
3A01000
trusted library allocation
page read and write
73BE000
stack
page read and write
850E000
stack
page read and write
6EE1000
heap
page read and write
5230000
heap
page read and write
5E76000
trusted library allocation
page read and write
7CA0000
trusted library section
page read and write
AF7000
stack
page read and write
323F000
trusted library allocation
page read and write
480B000
trusted library allocation
page read and write
7CC0000
heap
page read and write
837F000
stack
page read and write
3FC000
heap
page read and write
DC0000
trusted library allocation
page read and write
4B9E000
stack
page read and write
7195000
heap
page read and write
48E9000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
7DE4000
heap
page read and write
74D0000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
39A000
heap
page read and write
4460000
heap
page execute and read and write
71BD000
stack
page read and write
2B85000
trusted library allocation
page read and write
7487000
trusted library allocation
page read and write
876E000
stack
page read and write
2973000
trusted library allocation
page execute and read and write
3287000
heap
page read and write
43F0000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
2990000
heap
page read and write
3F8000
heap
page read and write
2B83000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
296E000
stack
page read and write
6EEE000
stack
page read and write
A79000
heap
page read and write
7EE0000
trusted library allocation
page execute and read and write
801E000
stack
page read and write
6A7E000
stack
page read and write
6EA0000
trusted library allocation
page execute and read and write
43E3000
trusted library allocation
page execute and read and write
7C30000
trusted library allocation
page read and write
2B49000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
29A8000
heap
page read and write
16E0000
heap
page read and write
8520000
trusted library allocation
page read and write
7230000
trusted library allocation
page read and write
816B000
heap
page read and write
740E000
stack
page read and write
EE4000
trusted library allocation
page read and write
678E000
stack
page read and write
7F20000
trusted library allocation
page execute and read and write
52CE000
stack
page read and write
1482000
trusted library allocation
page read and write
89FE000
stack
page read and write
29FF000
trusted library allocation
page read and write
729B000
heap
page read and write
7200000
trusted library allocation
page read and write
8080000
trusted library allocation
page read and write
4070000
heap
page execute and read and write
51DF000
stack
page read and write
2B27000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
67D0000
heap
page execute and read and write
74F0000
trusted library allocation
page read and write
6E35000
heap
page read and write
2B69000
trusted library allocation
page read and write
2B73000
trusted library allocation
page read and write
4415000
trusted library allocation
page execute and read and write
7F740000
trusted library allocation
page execute and read and write
6D5E000
stack
page read and write
7290000
trusted library allocation
page execute and read and write
2BB5000
trusted library allocation
page read and write
785E000
stack
page read and write
659C000
stack
page read and write
7080000
trusted library allocation
page read and write
667E000
stack
page read and write
84C0000
heap
page read and write
3030000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
1473000
trusted library allocation
page read and write
DED000
trusted library allocation
page execute and read and write
80E4000
heap
page read and write
4E3E000
stack
page read and write
2B21000
trusted library allocation
page read and write
84BE000
stack
page read and write
7B0D000
trusted library allocation
page read and write
5215000
trusted library section
page readonly
4FC0000
trusted library allocation
page read and write
2BBF000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page execute and read and write
1650000
heap
page read and write
50DA000
trusted library allocation
page read and write
518E000
stack
page read and write
5AC0000
trusted library allocation
page read and write
25E0000
heap
page read and write
B75000
heap
page read and write
732E000
stack
page read and write
2750000
trusted library section
page read and write
7C10000
trusted library allocation
page read and write
2D61000
trusted library allocation
page read and write
B95000
heap
page read and write
5810000
trusted library section
page read and write
329F000
unkown
page read and write
2DA0000
heap
page read and write
82CE000
stack
page read and write
1426000
trusted library allocation
page execute and read and write
2830000
heap
page read and write
91E000
stack
page read and write
2B41000
trusted library allocation
page read and write
2B43000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
446A000
trusted library allocation
page execute and read and write
679B000
stack
page read and write
DAE000
stack
page read and write
7F030000
trusted library allocation
page execute and read and write
5076000
trusted library allocation
page read and write
82FE000
stack
page read and write
1CC000
stack
page read and write
1080000
heap
page execute and read and write
1450000
trusted library allocation
page read and write
4C50000
trusted library allocation
page execute and read and write
611C000
stack
page read and write
30BE000
trusted library allocation
page read and write
803E000
stack
page read and write
7B0B000
trusted library allocation
page read and write
7EFB000
trusted library allocation
page read and write
2B9B000
trusted library allocation
page read and write
322C000
trusted library allocation
page read and write
2740000
trusted library section
page read and write
2B2F000
trusted library allocation
page read and write
550E000
stack
page read and write
2B2D000
trusted library allocation
page read and write
2C5E000
stack
page read and write
7479000
trusted library allocation
page read and write
6DC1000
heap
page read and write
125A000
heap
page read and write
3D61000
trusted library allocation
page read and write
292D000
stack
page read and write
81E3000
trusted library allocation
page read and write
310E000
trusted library allocation
page read and write
7460000
trusted library allocation
page execute and read and write
DA0000
heap
page read and write
265E000
stack
page read and write
32B0000
heap
page read and write
D37000
stack
page read and write
5830000
heap
page execute and read and write
723A000
heap
page read and write
2765000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
7FF0000
heap
page read and write
3233000
trusted library allocation
page read and write
6A39000
stack
page read and write
323B000
trusted library allocation
page read and write
4DFA000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
7DFC000
heap
page read and write
54F0000
trusted library allocation
page execute and read and write
5521000
trusted library allocation
page read and write
4CF2000
trusted library allocation
page read and write
2A37000
trusted library allocation
page read and write
E50000
heap
page read and write
11E0000
trusted library allocation
page read and write
44AE000
stack
page read and write
2B29000
trusted library allocation
page read and write
9C6D000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
7B6E000
stack
page read and write
4FA0000
heap
page read and write
1490000
heap
page read and write
726E000
stack
page read and write
771E000
stack
page read and write
3235000
trusted library allocation
page read and write
DF2000
trusted library allocation
page read and write
9D2000
trusted library allocation
page read and write
E40000
heap
page read and write
DDD000
trusted library allocation
page execute and read and write
11B5000
heap
page read and write
5C3E000
stack
page read and write
555B000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page execute and read and write
FFE000
heap
page read and write
119B000
trusted library allocation
page execute and read and write
53C0000
heap
page read and write
166B000
trusted library allocation
page read and write
1170000
heap
page read and write
4C60000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
7178000
heap
page read and write
3CA1000
trusted library allocation
page read and write
3500000
heap
page read and write
4710000
trusted library allocation
page read and write
46F2000
trusted library allocation
page read and write
1012000
trusted library allocation
page read and write
2C50000
heap
page read and write
9A4000
trusted library allocation
page read and write
72FE000
stack
page read and write
3241000
trusted library allocation
page read and write
7F00000
trusted library allocation
page read and write
82D2000
trusted library allocation
page read and write
540000
heap
page read and write
72C8000
heap
page read and write
799E000
stack
page read and write
80BB000
heap
page read and write
1630000
trusted library allocation
page read and write
5200000
heap
page execute and read and write
CC3000
heap
page read and write
27A0000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
2D1C000
stack
page read and write
2A7E000
stack
page read and write
2AC8000
trusted library allocation
page read and write
4817000
trusted library allocation
page read and write
C4E000
heap
page read and write
6D7B000
stack
page read and write
65FD000
stack
page read and write
4410000
trusted library allocation
page read and write
7212000
trusted library allocation
page read and write
12A0000
heap
page read and write
2970000
trusted library allocation
page read and write
2974000
trusted library allocation
page read and write
2C0E000
stack
page read and write
2B23000
trusted library allocation
page read and write
71E0000
trusted library allocation
page read and write
6715000
heap
page execute and read and write
84BE000
stack
page read and write
4F3E000
stack
page read and write
43D000
stack
page read and write
56E1000
trusted library allocation
page read and write
6A0E000
stack
page read and write
67D5000
heap
page execute and read and write
415A000
trusted library allocation
page execute and read and write
750E000
stack
page read and write
5E90000
trusted library allocation
page read and write
5840000
heap
page execute and read and write
53DE000
stack
page read and write
6DF1000
heap
page read and write
7180000
trusted library allocation
page read and write
53CF000
stack
page read and write
6E00000
heap
page read and write
D90000
heap
page read and write
BA8000
heap
page read and write
6C0E000
stack
page read and write
42CC000
stack
page read and write
7EBE000
heap
page read and write
11F2000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
2B3B000
trusted library allocation
page read and write
46E1000
trusted library allocation
page read and write
5220000
heap
page read and write
7CC8000
heap
page read and write
7D50000
trusted library allocation
page read and write
7CAD000
stack
page read and write
7EEE000
stack
page read and write
6A40000
heap
page read and write
2832000
heap
page read and write
2B1D000
trusted library allocation
page read and write
E00000
heap
page read and write
4F6D000
stack
page read and write
6DF8000
heap
page read and write
102F000
stack
page read and write
70FC000
stack
page read and write
28B0000
trusted library allocation
page read and write
8085000
heap
page read and write
7E8B000
heap
page read and write
3060000
heap
page execute and read and write
805A000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
733E000
stack
page read and write
9CA000
trusted library allocation
page execute and read and write
6710000
heap
page execute and read and write
5610000
heap
page read and write
1640000
trusted library allocation
page read and write
4A7A000
trusted library allocation
page read and write
9C6000
trusted library allocation
page execute and read and write
4ABA000
trusted library allocation
page read and write
5E71000
trusted library allocation
page read and write
27B6000
trusted library allocation
page execute and read and write
4472000
trusted library allocation
page read and write
872F000
stack
page read and write
4894000
trusted library allocation
page read and write
EBA000
heap
page read and write
2B3F000
trusted library allocation
page read and write
7C7E000
stack
page read and write
715A000
heap
page read and write
5620000
trusted library allocation
page read and write
27CB000
trusted library allocation
page execute and read and write
5582000
trusted library allocation
page read and write
DD0000
heap
page read and write
2FB0000
trusted library allocation
page read and write
296F000
stack
page read and write
692F000
stack
page read and write
5EDE000
stack
page read and write
480000
heap
page read and write
2B77000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
42E3000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
72DB000
trusted library allocation
page read and write
2B2B000
trusted library allocation
page read and write
4430000
trusted library allocation
page read and write
8081000
heap
page read and write
72B0000
heap
page execute and read and write
71F0000
trusted library allocation
page read and write
1160000
heap
page read and write
E90000
heap
page read and write
5B4E000
stack
page read and write
54CE000
stack
page read and write
69BF000
stack
page read and write
49DF000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
494C000
trusted library allocation
page read and write
465E000
stack
page read and write
2960000
trusted library allocation
page read and write
7610000
heap
page read and write
11B0000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page execute and read and write
6F1E000
stack
page read and write
4460000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
D50000
heap
page read and write
1464000
trusted library allocation
page read and write
6C8A000
stack
page read and write
587B000
stack
page read and write
7187000
heap
page read and write
F17000
trusted library allocation
page execute and read and write
6E2E000
heap
page read and write
109E000
stack
page read and write
74B0000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
2794000
trusted library allocation
page read and write
6F4C000
heap
page read and write
74D0000
trusted library allocation
page read and write
2B45000
trusted library allocation
page read and write
744D000
stack
page read and write
2C4D000
stack
page read and write
CD7000
heap
page read and write
FE0000
heap
page read and write
2B91000
trusted library allocation
page read and write
11DD000
trusted library allocation
page execute and read and write
29AE000
stack
page read and write
50D0000
heap
page read and write
4D80000
heap
page read and write
3490000
heap
page read and write
2970000
heap
page read and write
B10000
heap
page read and write
8145000
heap
page read and write
61DC000
stack
page read and write
511D000
stack
page read and write
54B8000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
1230000
heap
page read and write
7EFD000
trusted library allocation
page read and write
6F3E000
heap
page read and write
2D08000
trusted library allocation
page read and write
82CE000
stack
page read and write
1283000
heap
page read and write
2FEE000
stack
page read and write
5A60000
heap
page read and write
11C0000
trusted library allocation
page execute and read and write
5A7D000
stack
page read and write
6BCE000
stack
page read and write
4DF8000
trusted library allocation
page read and write
3E09000
trusted library allocation
page read and write
5A00000
heap
page read and write
732E000
stack
page read and write
6FA8000
heap
page read and write
6C3E000
stack
page read and write
833E000
stack
page read and write
2B06000
trusted library allocation
page read and write
448000
heap
page read and write
55F0000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
2B33000
trusted library allocation
page read and write
4EC9000
trusted library allocation
page read and write
C5A000
heap
page read and write
1015000
heap
page read and write
2F70000
heap
page read and write
6ACE000
heap
page read and write
6D73000
heap
page read and write
F1B000
trusted library allocation
page execute and read and write
555B000
stack
page read and write
80D4000
heap
page read and write
FDF000
stack
page read and write
6E4B000
heap
page read and write
84C0000
trusted library allocation
page read and write
5FE0000
heap
page read and write
2AC5000
trusted library allocation
page read and write
FAF000
stack
page read and write
7520000
trusted library allocation
page read and write
4B2F000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
2B75000
trusted library allocation
page read and write
27E0000
heap
page read and write
7BDE000
stack
page read and write
6AC0000
heap
page read and write
6C71000
heap
page read and write
6240000
trusted library allocation
page read and write
8154000
heap
page read and write
2B87000
trusted library allocation
page read and write
11DD000
trusted library allocation
page execute and read and write
8270000
trusted library allocation
page read and write
27BA000
trusted library allocation
page execute and read and write
BD6000
heap
page read and write
737E000
stack
page read and write
2BBD000
trusted library allocation
page read and write
FB2E000
stack
page read and write
7261000
heap
page read and write
8380000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
9A3000
trusted library allocation
page execute and read and write
2EEE000
stack
page read and write
564E000
stack
page read and write
2A7B000
heap
page read and write
2CA1000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
71A0000
heap
page execute and read and write
118A000
trusted library allocation
page execute and read and write
CA7000
heap
page read and write
6DE9000
heap
page read and write
4F36000
trusted library allocation
page read and write
6EFF000
heap
page read and write
7C6D000
stack
page read and write
6ABB000
stack
page read and write
FFF0000
heap
page read and write
29A9000
trusted library allocation
page read and write
A7F000
heap
page read and write
3AB4000
trusted library allocation
page read and write
1180000
heap
page read and write
1457000
heap
page read and write
2879000
stack
page read and write
44B0000
trusted library allocation
page read and write
71DD000
heap
page read and write
7460000
trusted library allocation
page read and write
4365000
trusted library allocation
page read and write
2AEF000
stack
page read and write
168D000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
1009000
heap
page read and write
4F00000
trusted library allocation
page read and write
71C6000
heap
page read and write
8050000
trusted library allocation
page read and write
2B35000
trusted library allocation
page read and write
7FFD000
stack
page read and write
7160000
heap
page read and write
4B0F000
trusted library allocation
page read and write
66CF000
stack
page read and write
7DE0000
heap
page read and write
517C000
stack
page read and write
5549000
trusted library allocation
page read and write
4137000
trusted library allocation
page read and write
DD7000
stack
page read and write
323D000
trusted library allocation
page read and write
5E56000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
40AA000
trusted library allocation
page read and write
7DE8000
heap
page read and write
74A0000
trusted library allocation
page read and write
6D3D000
stack
page read and write
C9C000
heap
page read and write
6DF3000
heap
page read and write
118E000
heap
page read and write
2A58000
heap
page read and write
C4D0000
trusted library allocation
page execute and read and write
2BC7000
heap
page read and write
6F20000
heap
page execute and read and write
2746000
trusted library allocation
page read and write
7C00000
trusted library allocation
page execute and read and write
A40000
heap
page read and write
6D91000
heap
page read and write
4A31000
trusted library allocation
page read and write
8147000
heap
page read and write
6EB0000
heap
page read and write
74C0000
trusted library allocation
page read and write
DE3000
trusted library allocation
page read and write
4FF0000
trusted library section
page read and write
41E3000
trusted library allocation
page read and write
27C0000
heap
page execute and read and write
857E000
stack
page read and write
54E0000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
5181000
trusted library allocation
page read and write
2A09000
trusted library allocation
page read and write
5680000
heap
page read and write
5AD0000
heap
page read and write
D80000
trusted library allocation
page execute and read and write
70BD000
trusted library allocation
page read and write
7E84000
heap
page read and write
51C0000
heap
page execute and read and write
853D000
stack
page read and write
2ACA000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
6D0D000
stack
page read and write
1460000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
5189000
trusted library allocation
page read and write
71EF000
stack
page read and write
5820000
trusted library section
page readonly
5000000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
8080000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
4558000
trusted library allocation
page read and write
8091000
heap
page read and write
2726000
trusted library allocation
page read and write
29FD000
trusted library allocation
page read and write
28AC000
stack
page read and write
712D000
stack
page read and write
7490000
trusted library allocation
page read and write
2B8F000
trusted library allocation
page read and write
96E000
stack
page read and write
46EA000
trusted library allocation
page read and write
8011000
heap
page read and write
7ED0000
heap
page read and write
70EE000
stack
page read and write
6ABE000
stack
page read and write
6A8A000
heap
page read and write
4079000
trusted library allocation
page read and write
2FFF000
unkown
page read and write
6D90000
heap
page read and write
827E000
stack
page read and write
2D99000
trusted library allocation
page read and write
8000000
heap
page read and write
F71000
heap
page read and write
339E000
stack
page read and write
5090000
trusted library allocation
page read and write
5190000
heap
page read and write
1216000
heap
page read and write
316E000
unkown
page read and write
6A80000
heap
page read and write
28E0000
heap
page read and write
28C0000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
58CE000
stack
page read and write
4440000
trusted library allocation
page read and write
59ED000
stack
page read and write
6A7B000
stack
page read and write
161B000
stack
page read and write
7490000
trusted library allocation
page read and write
826E000
stack
page read and write
83BB000
stack
page read and write
41CE000
stack
page read and write
2FB2000
trusted library allocation
page read and write
2B19000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
7F1B8000
trusted library allocation
page execute and read and write
72E0000
trusted library allocation
page execute and read and write
6FA0000
heap
page read and write
A42000
heap
page read and write
54C0000
trusted library allocation
page read and write
828C000
stack
page read and write
5380000
trusted library allocation
page execute and read and write
5650000
trusted library allocation
page execute and read and write
3FE1000
trusted library allocation
page read and write
6970000
heap
page execute and read and write
7060000
trusted library allocation
page read and write
272D000
trusted library allocation
page read and write
7A6E000
stack
page read and write
7CBE000
stack
page read and write
7EC0000
trusted library allocation
page execute and read and write
56C9000
trusted library allocation
page read and write
7183000
heap
page read and write
560000
trusted library section
page read and write
823B000
stack
page read and write
4D9A000
trusted library allocation
page read and write
6CBD000
stack
page read and write
5800000
trusted library allocation
page execute and read and write
2B63000
trusted library allocation
page read and write
322F000
stack
page read and write
4F31000
trusted library allocation
page read and write
286C000
stack
page read and write
668E000
stack
page read and write
57CF000
stack
page read and write
2B61000
trusted library allocation
page read and write
1463000
trusted library allocation
page execute and read and write
1177000
heap
page read and write
867E000
stack
page read and write
378000
heap
page read and write
2FBE000
unkown
page read and write
4DD8000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
2B8E000
stack
page read and write
72B0000
heap
page read and write
7480000
trusted library allocation
page read and write
83BE000
stack
page read and write
7400000
heap
page read and write
2B67000
trusted library allocation
page read and write
818B000
stack
page read and write
7485000
heap
page read and write
2EBD000
stack
page read and write
2A01000
trusted library allocation
page read and write
4412000
trusted library allocation
page read and write
1265000
heap
page read and write
6F3B000
heap
page read and write
11E0000
heap
page read and write
5460000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
738E000
stack
page read and write
9B3000
trusted library allocation
page read and write
7264000
heap
page read and write
6B50000
heap
page read and write
4440000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
5B80000
heap
page read and write
74C3000
trusted library allocation
page read and write
2732000
trusted library allocation
page read and write
56C6000
trusted library allocation
page read and write
2B7D000
trusted library allocation
page read and write
10C7000
heap
page read and write
290E000
stack
page read and write
6EDA000
heap
page read and write
7EC0000
trusted library allocation
page read and write
147D000
trusted library allocation
page execute and read and write
5319000
trusted library allocation
page read and write
6992000
heap
page read and write
8070000
trusted library allocation
page read and write
2EA0000
heap
page read and write
80EC000
heap
page read and write
9C0000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
7BF0000
heap
page read and write
71E4000
heap
page read and write
2B5F000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page read and write
2B45000
heap
page read and write
5A29000
heap
page read and write
BBE000
heap
page read and write
743D000
stack
page read and write
6C5E000
stack
page read and write
827D000
stack
page read and write
4A60000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
4150000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
872E000
stack
page read and write
2A40000
trusted library section
page read and write
2BB3000
trusted library allocation
page read and write
There are 1783 hidden memdumps, click here to show them.