IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\LgAmARwZ\Application.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\GOLD1234[1].exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\new_v8[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\RDX123456[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\stealc_default2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\random[2].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\splwow64[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\Offnewhere[1].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\shop[1].exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000833001\f55899dae2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000857001\550b7cfe5f.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001096001\RDX123456.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001425001\shop.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001471001\c8908bf20d.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001472001\2dc588f7b5.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\5C4X2NVYNV2E9BIIRWD89LJFJIM.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\AAKAL78BRQNYOCIR09Y.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\TPKOcaeSvfBbrcMznKuF.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LgAmARwZ.url
MS Windows 95 Internet shortcut text (URL=<"C:\ProgramData\LgAmARwZ\Application.exe">), ASCII text
dropped
malicious
C:\ProgramData\BGCAFHCAKFBFIECAFIIJ
ASCII text, with very long lines (1769), with CRLF line terminators
modified
C:\ProgramData\DAFBGHCAKKFCAKEBKJKK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DBKFIDAA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\DBKFIDAAEHIEGCBFIDBFHCGDAK
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\FIDHCFBAKFBGDGDHJKJJEGIDAA
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\FIIJJKKFHIEHJKECGCGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HIJEGDBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HIJEGDBGDBFIJKECBAKFBFIDGC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JEBFIIIEHCFHJKFHDHDAAFBGDB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x859d285a, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\ClipSVC\tokens.dat
data
dropped
C:\ProgramData\Microsoft\Windows\ClipSvc\tokens.dat.bak (copy)
data
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft_Windows-10-Pro.swidtag
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GreenTech Dynamics\O
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\f55899dae2.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\1001172001\Set-up.exe
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\197036\T
data
dropped
C:\Users\user\AppData\Local\Temp\Beijing
ASCII text, with very long lines (1251), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Beijing.bat
ASCII text, with very long lines (1251), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Fitting
data
dropped
C:\Users\user\AppData\Local\Temp\Molecular
data
dropped
C:\Users\user\AppData\Local\Temp\Mtv
data
dropped
C:\Users\user\AppData\Local\Temp\See
data
dropped
C:\Users\user\AppData\Local\Temp\Spirit
data
dropped
C:\Users\user\AppData\Local\Temp\Sponsorship
data
dropped
C:\Users\user\AppData\Local\Temp\Sweet
data
dropped
C:\Users\user\AppData\Local\Temp\Twisted
data
dropped
C:\Users\user\AppData\Local\Temp\Various
data
dropped
C:\Users\user\AppData\Local\Temp\Witch
data
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js" >), ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\Tasks\axplong.job
data
dropped
There are 73 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe
"C:\Users\user~1\AppData\Local\Temp\1000066001\stealc_default2.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe
"C:\Users\user~1\AppData\Local\Temp\1000477001\Offnewhere.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Beijing Beijing.bat & Beijing.bat
malicious
C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe
"C:\Users\user~1\AppData\Local\Temp\1000828001\new_v8.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 197036
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "CRAWFORDFILLEDVERIFYSCALE" Mtv
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Twisted + ..\Molecular + ..\Sponsorship + ..\Various + ..\Witch + ..\Spirit + ..\See + ..\Fitting T
malicious
C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif
Jurisdiction.pif T
malicious
C:\Users\user\AppData\Local\Temp\1000833001\f55899dae2.exe
"C:\Users\user~1\AppData\Local\Temp\1000833001\f55899dae2.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & echo URL="C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & exit
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js"
malicious
C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr
"C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr" "C:\Users\user\AppData\Local\GreenTech Dynamics\O"
malicious
C:\Users\user\AppData\Local\Temp\1000857001\550b7cfe5f.exe
"C:\Users\user~1\AppData\Local\Temp\1000857001\550b7cfe5f.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js"
malicious
C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe
"C:\Users\user~1\AppData\Local\Temp\1000965001\GOLD1234.exe"
malicious
C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr
"C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr" "C:\Users\user\AppData\Local\GreenTech Dynamics\O"
malicious
C:\Users\user\AppData\Local\Temp\1001096001\RDX123456.exe
"C:\Users\user~1\AppData\Local\Temp\1001096001\RDX123456.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Windows\System32\sppsvc.exe
C:\Windows\system32\sppsvc.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe
"C:\Users\user~1\AppData\Local\Temp\1000817001\splwow64.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 37 hidden processes, click here to show them.

URLs

Name
IP
Malicious
opposezmny.site
malicious
http://185.215.113.17/2fb6c2cc8dce150a.phpro
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&amp;l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&amp;l=engli
unknown
http://185.215.113.16/luma/random.exe2q
unknown
http://185.215.113.16/Jo89Ku7d/index.phpoft
unknown
http://anglebug.com/6929
unknown
https://sosipisos.cc/shop.exezKU
unknown
https://store.steampowere&
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://steamcommunity.com/profiles/76561199724331900
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&amp;
unknown
https://anglebug.com/7489
unknown
http://185.215.113.16/216e50adc2dd0a1bfe522b3effbbd4e64e3aa636b77#
unknown
http://crl.ver)
unknown
https://issuetracker.google.com/161903006
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&amp;
unknown
https://www.ecosia.org/newtab/
unknown
http://home.sevjoi17sr.top/TCQEoezkVqyvrJjqBhZs12
unknown
https://lv.queniujq.cn
unknown
https://villagedguy.cyou/api(ws
unknown
https://villagedguy.cyou:443/api4
unknown
https://steamcommunity.com/profiles/76561199724331900bf
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
http://185.215.113.16/dobre/splwow64.exe
unknown
http://185.215.113.17/2fb6c2cc8dce150a.php5
unknown
http://185.215.113.17/2fb6c2cc8dce150a.php)
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://checkout.steampowered.com/
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpEdge
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
http://185.215.113.16/off/def.exe
unknown
http://185.215.113.16/ows
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&amp;l=engli
unknown
http://185.215.113.17/2fb6c2cc8dce150a.php?
unknown
http://html4/loose.dtd
unknown
http://185.215.113.17/f1ddeb6592c03206/msvcp140.dllwa
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://help.steampowered.com/en/
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://cdn.discordapp.com/
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpY
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&amp;l=englis
unknown
https://villagedguy.cyou/s
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://anglebug.com/3970
unknown
http://185.215.113.16/dobre/random.exe9
unknown
https://steamcommunity.com/workshop/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
http://185.215.113.17/f1ddeb6592c03206/freebl3.dll;fx#
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&amp;l=en
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/R
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
https://anglebug.com/7161
unknown
https://anglebug.com/7162
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&amp;
unknown
https://issuetracker.google.com/166809097
unknown
https://villagedguy.cyou/6
unknown
http://185.215.113.16/steam/random.exe5I
unknown
https://lens.google.com/v3/upload
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://necklacedmny.store/
unknown
http://anglebug.com/3832
unknown
https://www.google.com/complete/
unknown
https://api.steampowered.com/
unknown
https://store.steampowered.com/mobile
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
http://anglebug.com/6651
unknown
http://185.215.113.16/Jo89Ku7d/index.phpdedCd
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious
185.215.113.17
unknown
Portugal
malicious
1.1.1.1
unknown
Australia
185.215.113.36
unknown
Portugal
2.59.161.36
unknown
Russian Federation
20.101.57.9
unknown
United States
172.67.154.113
unknown
United States
162.159.133.233
unknown
United States
188.114.97.3
unknown
European Union
239.255.255.250
unknown
Reserved
104.102.49.254
unknown
United States
184.28.90.27
unknown
United States
127.0.0.1
unknown
unknown
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
STATE
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
c8908bf20d.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
2dc588f7b5.exe
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform
ServiceSessionId
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
LastKnownGoodTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C51000
unkown
page execute and read and write
malicious
A01000
unkown
page execute and read and write
malicious
C51000
unkown
page execute and read and write
malicious
5000000
direct allocation
page read and write
malicious
4BE0000
direct allocation
page read and write
malicious
DEB000
heap
page read and write
malicious
CEE000
heap
page read and write
malicious
4880000
direct allocation
page read and write
malicious
C51000
unkown
page execute and read and write
malicious
771000
unkown
page execute and write copy
malicious
78E000
unkown
page readonly
malicious
78E000
unkown
page readonly
malicious
DEB000
heap
page read and write
malicious
51B0000
direct allocation
page read and write
malicious
771000
unkown
page execute and write copy
malicious
BFD000
heap
page read and write
3D4F000
stack
page read and write
3372000
heap
page read and write
3A0E000
stack
page read and write
597B5FE000
unkown
page readonly
20504A33000
heap
page read and write
1C7F2000
heap
page read and write
597CDFE000
stack
page read and write
BF6000
heap
page read and write
4E3D000
stack
page read and write
3E27000
trusted library allocation
page read and write
1E28A1E5000
heap
page read and write
53B0000
direct allocation
page execute and read and write
2B3C00164000
trusted library allocation
page read and write
859000
heap
page read and write
F63000
heap
page read and write
855000
heap
page read and write
21225000
heap
page read and write
CB9000
unkown
page write copy
3E44000
trusted library allocation
page read and write
337A000
heap
page read and write
590FFFE000
stack
page read and write
2B3C002E0000
trusted library allocation
page read and write
3465000
heap
page read and write
3E2C000
trusted library allocation
page read and write
20506120000
heap
page read and write
2861203D000
heap
page read and write
7FFAAC350000
trusted library allocation
page execute and read and write
18D5000
heap
page read and write
597ADFD000
stack
page read and write
3DF6000
trusted library allocation
page read and write
4751000
heap
page read and write
5D9000
stack
page read and write
FD4000
heap
page read and write
590EFFE000
stack
page read and write
4821000
heap
page read and write
1026000
heap
page read and write
F6C000
heap
page read and write
40B000
unkown
page write copy
9C0000
heap
page read and write
BEA000
heap
page read and write
3E15000
trusted library allocation
page read and write
670000
unkown
page readonly
29989447000
heap
page read and write
A69000
unkown
page write copy
F6D000
heap
page read and write
3E15000
trusted library allocation
page read and write
1E28E557000
unclassified section
page read and write
51FE000
stack
page read and write
BF3000
heap
page read and write
57BE000
trusted library allocation
page read and write
BFD000
heap
page read and write
CBB000
unkown
page execute and read and write
1E289C5A000
heap
page read and write
438A000
trusted library allocation
page read and write
F56000
heap
page read and write
37A800230000
trusted library allocation
page read and write
851000
heap
page read and write
2115AA02000
trusted library allocation
page read and write
F66000
heap
page read and write
337E000
heap
page read and write
3E15000
trusted library allocation
page read and write
4120000
trusted library allocation
page read and write
2B3C006B4000
trusted library allocation
page read and write
1B290000
trusted library allocation
page read and write
42CA000
trusted library allocation
page read and write
2B3C00FC8000
trusted library allocation
page read and write
22980069C000
trusted library allocation
page read and write
2B3C0046C000
trusted library allocation
page read and write
703CF000
unkown
page readonly
2B3C00F74000
trusted library allocation
page read and write
2B5E000
stack
page read and write
1320000
trusted library allocation
page read and write
299894C3000
heap
page read and write
59635FE000
unkown
page readonly
6A9000
unkown
page readonly
2DAC000
stack
page read and write
4B71000
heap
page read and write
4B50000
heap
page read and write
26C0000
heap
page read and write
2BB0000
direct allocation
page read and write
4751000
heap
page read and write
EF8000
heap
page read and write
1D50000
heap
page read and write
C08000
heap
page read and write
304E000
stack
page read and write
2B3C0100C000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
3E66000
trusted library allocation
page read and write
2B3C0022C000
trusted library allocation
page read and write
C50000
heap
page read and write
FDB8BFE000
unkown
page readonly
205049F0000
heap
page read and write
3DEC000
trusted library allocation
page read and write
3B80000
trusted library allocation
page read and write
1105000
heap
page read and write
28611FB0000
heap
page read and write
42D8000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
585D000
trusted library allocation
page read and write
2121E000
heap
page read and write
57C0000
trusted library allocation
page read and write
DDB000
heap
page read and write
2919000
heap
page read and write
FFE000
heap
page read and write
2B3C00198000
trusted library allocation
page read and write
4B71000
heap
page read and write
3DDD000
heap
page read and write
32FE000
heap
page read and write
FDB9AFE000
unkown
page readonly
5905FFE000
stack
page read and write
4751000
heap
page read and write
6C810000
unkown
page readonly
746000
heap
page read and write
1396000
heap
page read and write
12961000
trusted library allocation
page read and write
1E28A1F5000
heap
page read and write
1022000
heap
page read and write
47DD000
heap
page read and write
2919000
heap
page read and write
C30000
heap
page read and write
703CD000
unkown
page read and write
57E1000
trusted library allocation
page read and write
2DF0000
direct allocation
page read and write
3DEF000
stack
page read and write
F72000
heap
page read and write
51D0000
direct allocation
page execute and read and write
28FD000
stack
page read and write
39CF000
stack
page read and write
3D71000
heap
page read and write
2DF0000
direct allocation
page read and write
3E4C000
trusted library allocation
page read and write
5912FFE000
stack
page read and write
BD0000
heap
page read and write
57FB000
trusted library allocation
page read and write
DE8000
heap
page read and write
2B3C00350000
trusted library allocation
page read and write
443D000
trusted library allocation
page read and write
703B0000
unkown
page readonly
22980075C000
trusted library allocation
page read and write
20504A68000
heap
page read and write
29989310000
trusted library allocation
page read and write
453F000
trusted library allocation
page read and write
EC5000
heap
page read and write
5230000
direct allocation
page execute and read and write
42EF000
stack
page read and write
57B1000
trusted library allocation
page read and write
3D3D000
heap
page read and write
42EF000
stack
page read and write
590E7FE000
unkown
page readonly
12E9000
heap
page read and write
5B16000
trusted library allocation
page read and write
5902FFD000
stack
page read and write
3380000
heap
page read and write
106E000
heap
page read and write
3DE7000
trusted library allocation
page read and write
FEA000
heap
page read and write
23C29677000
heap
page read and write
2B3C00298000
trusted library allocation
page read and write
131B000
heap
page read and write
29988713000
heap
page read and write
4751000
heap
page read and write
11C000
stack
page read and write
6BC000
stack
page read and write
710000
direct allocation
page read and write
37A8002A0000
trusted library allocation
page read and write
4120000
trusted library allocation
page read and write
2B3C002BA000
trusted library allocation
page read and write
4751000
heap
page read and write
45AE000
stack
page read and write
2B3C001D0000
trusted library allocation
page read and write
10B3000
heap
page read and write
59735FE000
unkown
page readonly
105C000
heap
page read and write
44B8000
trusted library allocation
page read and write
10F9000
heap
page read and write
55BF000
stack
page read and write
5970DFE000
stack
page read and write
4E60000
direct allocation
page execute and read and write
B5A000
heap
page read and write
562E000
stack
page read and write
442F000
stack
page read and write
1E290720000
trusted library section
page read and write
23C29600000
heap
page read and write
FDB91FE000
stack
page read and write
2B3C00EF4000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
F56000
heap
page read and write
21241000
heap
page read and write
1180000
heap
page read and write
59625FE000
unkown
page readonly
4B71000
heap
page read and write
4751000
heap
page read and write
1E290680000
trusted library section
page read and write
45BC000
trusted library allocation
page read and write
44F2000
trusted library allocation
page read and write
1337000
heap
page read and write
2BB34171000
heap
page read and write
585C000
trusted library allocation
page read and write
3379000
heap
page read and write
2998D600000
trusted library allocation
page read and write
2B3C00644000
trusted library allocation
page read and write
5CEE000
stack
page read and write
4401000
heap
page read and write
4751000
heap
page read and write
994000
heap
page read and write
4B71000
heap
page read and write
2B3C00647000
trusted library allocation
page read and write
1E286960000
trusted library section
page readonly
4B71000
heap
page read and write
B50000
heap
page read and write
105F000
heap
page read and write
4215000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
BED000
heap
page read and write
2B3C00AE8000
trusted library allocation
page read and write
D1000
unkown
page execute read
28612043000
heap
page read and write
3E12000
trusted library allocation
page read and write
29987DF0000
heap
page read and write
2115A22F000
heap
page read and write
186000
unkown
page write copy
37A8002D8000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
3376000
heap
page read and write
4751000
heap
page read and write
2FDC000
heap
page read and write
4483000
trusted library allocation
page read and write
5849000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
2B3C00104000
trusted library allocation
page read and write
428E000
stack
page read and write
27334000
heap
page read and write
3DF7000
trusted library allocation
page read and write
F10000
heap
page read and write
2940000
heap
page read and write
291D000
heap
page read and write
4B71000
heap
page read and write
2B3C0041C000
trusted library allocation
page read and write
57C9000
trusted library allocation
page read and write
13AD000
heap
page read and write
2B3C00380000
trusted library allocation
page read and write
586E000
trusted library allocation
page read and write
2B3C00C50000
trusted library allocation
page read and write
12BE000
stack
page read and write
2298006E8000
trusted library allocation
page read and write
4491000
trusted library allocation
page read and write
BD3000
heap
page read and write
5000000
direct allocation
page read and write
4B94000
heap
page read and write
9CC000
unkown
page readonly
587D000
trusted library allocation
page read and write
5965DFC000
stack
page read and write
2BB0000
direct allocation
page read and write
30CF000
stack
page read and write
2298007B4000
trusted library allocation
page read and write
851000
heap
page read and write
29987E2B000
heap
page read and write
34CE000
stack
page read and write
80E000
heap
page read and write
21037DD0000
trusted library allocation
page read and write
2BB3417F000
heap
page read and write
3DFA000
trusted library allocation
page read and write
C08000
heap
page read and write
59765FE000
unkown
page readonly
1480000
heap
page read and write
28E8000
heap
page read and write
3DFC000
trusted library allocation
page read and write
670000
unkown
page readonly
3DFA000
trusted library allocation
page read and write
2DF0000
direct allocation
page read and write
21217000
heap
page read and write
2C7E000
stack
page read and write
25DD000
stack
page read and write
587E000
trusted library allocation
page read and write
29987E75000
heap
page read and write
4DEF000
stack
page read and write
7FFB226B1000
unkown
page execute read
28612043000
heap
page read and write
58B8000
trusted library allocation
page read and write
4AA0000
direct allocation
page execute and read and write
587D000
trusted library allocation
page read and write
4386000
trusted library allocation
page read and write
33EF000
stack
page read and write
44AF000
trusted library allocation
page read and write
2D5AA000
heap
page read and write
6520000
heap
page read and write
58B0000
trusted library allocation
page read and write
46EE000
stack
page read and write
20505386000
heap
page read and write
4B71000
heap
page read and write
6C9EE000
unkown
page read and write
1032000
heap
page read and write
131000
unkown
page execute read
B71000
heap
page read and write
51C0000
direct allocation
page execute and read and write
2B3C00684000
trusted library allocation
page read and write
21037E02000
heap
page read and write
3371000
heap
page read and write
4751000
heap
page read and write
4B82000
heap
page read and write
36AE000
stack
page read and write
229800280000
trusted library allocation
page read and write
994000
heap
page read and write
D17000
unkown
page execute and write copy
2B3C00A74000
trusted library allocation
page read and write
EE9000
heap
page read and write
4751000
heap
page read and write
3680000
heap
page read and write
368C00230000
direct allocation
page read and write
FDB8CFE000
unkown
page readonly
2BB34158000
heap
page read and write
58A4000
trusted library allocation
page read and write
53D0000
direct allocation
page execute and read and write
2A5F000
stack
page read and write
851000
heap
page read and write
37A8002B0000
trusted library allocation
page read and write
710000
direct allocation
page read and write
45E1000
trusted library allocation
page read and write
703B0000
unkown
page readonly
3E05000
trusted library allocation
page read and write
219F000
stack
page read and write
229800720000
trusted library allocation
page read and write
84F000
heap
page read and write
F62000
heap
page read and write
EE9000
heap
page read and write
4751000
heap
page read and write
32AF000
stack
page read and write
229800364000
trusted library allocation
page read and write
2122D000
heap
page read and write
2D317000
heap
page read and write
87B000
heap
page read and write
5815000
trusted library allocation
page read and write
1497000
heap
page read and write
352F000
stack
page read and write
3377000
heap
page read and write
229800700000
trusted library allocation
page read and write
4751000
heap
page read and write
2EAF000
stack
page read and write
1E286610000
heap
page read and write
994000
heap
page read and write
4424000
trusted library allocation
page read and write
2298002C0000
trusted library allocation
page read and write
BD2000
heap
page read and write
2B3C00694000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
85C000
stack
page read and write
2B3C00C3C000
trusted library allocation
page read and write
994000
heap
page read and write
F66000
unkown
page execute and read and write
710000
direct allocation
page read and write
CD7000
heap
page read and write
438E000
trusted library allocation
page read and write
2B3C00674000
trusted library allocation
page read and write
7A0000
heap
page read and write
26C5000
heap
page read and write
F70000
heap
page read and write
FA4000
heap
page read and write
314E000
stack
page read and write
4D70000
direct allocation
page execute and read and write
3B6F000
stack
page read and write
2B1F000
stack
page read and write
2121A000
heap
page read and write
ACB000
unkown
page execute and write copy
10A9000
heap
page read and write
2205FE02000
trusted library allocation
page read and write
337B000
heap
page read and write
2B3C00040000
trusted library allocation
page read and write
4546000
trusted library allocation
page read and write
4479000
trusted library allocation
page read and write
BF3000
heap
page read and write
44DF000
trusted library allocation
page read and write
3E15000
trusted library allocation
page read and write
A99000
stack
page read and write
3378000
heap
page read and write
2205FD30000
remote allocation
page read and write
366F000
stack
page read and write
38EF000
stack
page read and write
44BC000
trusted library allocation
page read and write
23C2964B000
heap
page read and write
DE1000
heap
page read and write
105F000
stack
page read and write
85F000
unkown
page read and write
A011DFF000
stack
page read and write
58A4000
trusted library allocation
page read and write
2B3C00CBC000
trusted library allocation
page read and write
11C3000
heap
page read and write
FDB8D7E000
stack
page read and write
21212000
heap
page read and write
BCF000
heap
page read and write
3E4C000
trusted library allocation
page read and write
1328000
heap
page read and write
381000
unkown
page execute read
53D000
unkown
page write copy
1378000
heap
page read and write
2298006AC000
trusted library allocation
page read and write
F66000
unkown
page execute and read and write
584A000
trusted library allocation
page read and write
AD0000
heap
page read and write
1E289E90000
heap
page read and write
1348000
heap
page read and write
3E0C000
trusted library allocation
page read and write
703C6000
unkown
page readonly
3340000
heap
page read and write
21224000
heap
page read and write
3D8E000
stack
page read and write
5878000
trusted library allocation
page read and write
21216000
heap
page read and write
299892B0000
trusted library allocation
page read and write
3D71000
heap
page read and write
334F000
stack
page read and write
D21000
heap
page read and write
4B71000
heap
page read and write
D83000
unkown
page execute and write copy
56A0000
heap
page read and write
1338000
heap
page read and write
290E000
stack
page read and write
584B000
trusted library allocation
page read and write
703CD000
unkown
page read and write
3E19000
trusted library allocation
page read and write
2B3C00E54000
trusted library allocation
page read and write
2B3C00D20000
trusted library allocation
page read and write
BEE000
stack
page read and write
1E28A225000
heap
page read and write
5190000
direct allocation
page execute and read and write
10A4000
heap
page read and write
589D000
stack
page read and write
15550600000
heap
page read and write
368C0025C000
direct allocation
page read and write
229800320000
trusted library allocation
page read and write
4751000
heap
page read and write
3DE1000
trusted library allocation
page read and write
1E80000
heap
page read and write
58A4000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
4C70000
trusted library allocation
page read and write
338F000
stack
page read and write
490E000
stack
page read and write
2120C000
heap
page read and write
449E000
trusted library allocation
page read and write
696000
unkown
page readonly
CB1000
unkown
page execute and write copy
59097FE000
unkown
page readonly
57C9000
trusted library allocation
page read and write
20504A7F000
heap
page read and write
6A0C000
stack
page read and write
7BA000
unkown
page read and write
21219000
heap
page read and write
584B000
trusted library allocation
page read and write
585C000
trusted library allocation
page read and write
64EF000
stack
page read and write
2B3C00A18000
trusted library allocation
page read and write
32CE000
heap
page read and write
D54797B000
stack
page read and write
360C000
stack
page read and write
4E50000
direct allocation
page execute and read and write
B71000
heap
page read and write
D3C000
unkown
page execute and read and write
450F000
stack
page read and write
3DF2000
trusted library allocation
page read and write
2BB341BA000
heap
page read and write
3E1A000
trusted library allocation
page read and write
FDB86FC000
stack
page read and write
20504A13000
heap
page read and write
9CC000
unkown
page readonly
29989600000
trusted library allocation
page read and write
4B71000
heap
page read and write
59725FE000
unkown
page readonly
4E30000
direct allocation
page execute and read and write
4B71000
heap
page read and write
7FFB226C6000
unkown
page readonly
BEB000
heap
page read and write
58B7000
trusted library allocation
page read and write
4520000
trusted library allocation
page read and write
5C3C000
stack
page read and write
D6B000
heap
page read and write
F6E000
heap
page read and write
2BB0000
direct allocation
page read and write
2B3C00FB4000
trusted library allocation
page read and write
1453EFE000
unkown
page readonly
299892E0000
trusted library allocation
page read and write
3E1A000
trusted library allocation
page read and write
2B3C0026C000
trusted library allocation
page read and write
20504A37000
heap
page read and write
336000
unkown
page readonly
4B71000
heap
page read and write
29988700000
heap
page read and write
4B4F000
stack
page read and write
2F76000
trusted library allocation
page read and write
4751000
heap
page read and write
2B3C00790000
trusted library allocation
page read and write
CD1000
unkown
page execute and read and write
4850000
trusted library allocation
page read and write
3DF7000
trusted library allocation
page read and write
FEB000
heap
page read and write
5E1000
unkown
page execute read
3E04000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
61EB7000
direct allocation
page readonly
2B3C001D8000
trusted library allocation
page read and write
57BE000
trusted library allocation
page read and write
21225000
heap
page read and write
5969DFE000
stack
page read and write
46EE000
stack
page read and write
F68000
heap
page read and write
BDE000
heap
page read and write
210397D0000
remote allocation
page read and write
BD0000
heap
page read and write
508F000
stack
page read and write
3E70000
trusted library allocation
page read and write
48CF000
stack
page read and write
2B3C00E64000
trusted library allocation
page read and write
3D71000
heap
page read and write
368C0024C000
direct allocation
page read and write
1270000
heap
page read and write
5170000
direct allocation
page execute and read and write
4B71000
heap
page read and write
754000
unkown
page readonly
DD1000
heap
page read and write
587D000
trusted library allocation
page read and write
3E37000
trusted library allocation
page read and write
37A8002B0000
trusted library allocation
page read and write
5960DFE000
stack
page read and write
1E2869A3000
heap
page read and write
380000
unkown
page readonly
349F000
heap
page read and write
41F000
unkown
page read and write
994000
heap
page read and write
229800788000
trusted library allocation
page read and write
1AEDC000
stack
page read and write
2BB34010000
heap
page read and write
5868000
trusted library allocation
page read and write
880000
heap
page read and write
C51000
unkown
page execute and write copy
37A8002A0000
trusted library allocation
page read and write
5E1000
unkown
page execute read
2ECF000
stack
page read and write
BF3000
heap
page read and write
4D10000
direct allocation
page read and write
368C00210000
direct allocation
page read and write
FDF000
heap
page read and write
1484000
heap
page read and write
28612043000
heap
page read and write
B71000
heap
page read and write
447B000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
A0120FF000
stack
page read and write
310F000
stack
page read and write
2B3C00FC0000
trusted library allocation
page read and write
4383000
trusted library allocation
page read and write
3E2E000
stack
page read and write
4A90000
direct allocation
page execute and read and write
C08000
heap
page read and write
3E81000
trusted library allocation
page read and write
29989310000
trusted library allocation
page read and write
4821000
heap
page read and write
2B3C00294000
trusted library allocation
page read and write
2BB341B1000
heap
page read and write
3E14000
trusted library allocation
page read and write
780000
heap
page read and write
1189000
heap
page read and write
2B3C00830000
trusted library allocation
page read and write
5857000
trusted library allocation
page read and write
851000
heap
page read and write
2B3C00E30000
trusted library allocation
page read and write
2115A23F000
heap
page read and write
4CEB000
stack
page read and write
994000
heap
page read and write
4437000
trusted library allocation
page read and write
1E2902E0000
trusted library section
page read and write
125F000
heap
page read and write
58A4000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
AD4000
unkown
page execute and write copy
3ECF000
stack
page read and write
5310000
remote allocation
page read and write
360E000
stack
page read and write
F56000
heap
page read and write
BCF000
heap
page read and write
30A8000
heap
page read and write
4388000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
2B3C00B64000
trusted library allocation
page read and write
CD0000
heap
page read and write
7FFB226D2000
unkown
page readonly
229800320000
trusted library allocation
page read and write
62AF000
stack
page read and write
16D8000
trusted library allocation
page read and write
2B3C00A0C000
trusted library allocation
page read and write
84B000
heap
page read and write
58A4000
trusted library allocation
page read and write
2B3C003A4000
trusted library allocation
page read and write
357E000
stack
page read and write
7FFB226C6000
unkown
page readonly
1C7FB000
heap
page read and write
14533FE000
unkown
page readonly
3FE8000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
6A0000
unkown
page write copy
59645FE000
unkown
page readonly
4382000
trusted library allocation
page read and write
2B3C00CAC000
trusted library allocation
page read and write
47EE000
stack
page read and write
F85000
heap
page read and write
337B000
heap
page read and write
3DF2000
trusted library allocation
page read and write
3B4E000
stack
page read and write
4751000
heap
page read and write
28E0000
heap
page read and write
130000
unkown
page readonly
B10000
trusted library allocation
page read and write
27290000
heap
page read and write
802000
unkown
page read and write
2B3C00D78000
trusted library allocation
page read and write
157F000
stack
page read and write
302F000
stack
page read and write
4D50000
direct allocation
page execute and read and write
229800760000
trusted library allocation
page read and write
4050000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
4400000
heap
page read and write
615E000
stack
page read and write
4B71000
heap
page read and write
7FFB226C6000
unkown
page readonly
2B3C00DA8000
trusted library allocation
page read and write
229800390000
trusted library allocation
page read and write
2BB341B8000
heap
page read and write
14BE000
stack
page read and write
145B000
heap
page read and write
4B90000
heap
page read and write
79B000
unkown
page write copy
58A4000
trusted library allocation
page read and write
462D000
trusted library allocation
page read and write
438B000
trusted library allocation
page read and write
281000
unkown
page execute read
21216000
heap
page read and write
20504A00000
heap
page read and write
5160000
direct allocation
page execute and read and write
F46000
heap
page read and write
368C002D0000
direct allocation
page read and write
2CD5000
heap
page read and write
DD4000
heap
page read and write
F66000
heap
page read and write
21216000
heap
page read and write
1E289C58000
heap
page read and write
2924000
heap
page read and write
4E40000
direct allocation
page execute and read and write
F6D000
heap
page read and write
4751000
heap
page read and write
286121C0000
heap
page read and write
59127FE000
unkown
page readonly
4E00000
direct allocation
page execute and read and write
3DEE000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
380000
unkown
page readonly
6A4000
unkown
page write copy
5180000
direct allocation
page execute and read and write
1143000
heap
page read and write
2B3C00564000
trusted library allocation
page read and write
344000
unkown
page write copy
3374000
heap
page read and write
126C000
stack
page read and write
584F000
trusted library allocation
page read and write
34CF000
stack
page read and write
F41000
heap
page read and write
229800624000
trusted library allocation
page read and write
3DF2000
trusted library allocation
page read and write
21212000
heap
page read and write
1022000
heap
page read and write
5900FFE000
stack
page read and write
4481000
trusted library allocation
page read and write
CDB000
unkown
page execute and read and write
58A4000
trusted library allocation
page read and write
59A000
stack
page read and write
C6B000
unkown
page execute and write copy
72E000
heap
page read and write
4B71000
heap
page read and write
4120000
trusted library allocation
page read and write
2205F613000
heap
page read and write
4D21000
heap
page read and write
28612028000
heap
page read and write
595CDFE000
unkown
page read and write
2BB0000
direct allocation
page read and write
2B3C0045C000
trusted library allocation
page read and write
21225000
heap
page read and write
4751000
heap
page read and write
58A4000
trusted library allocation
page read and write
4B71000
heap
page read and write
337C000
heap
page read and write
3F00000
trusted library allocation
page read and write
586E000
trusted library allocation
page read and write
F80000
heap
page execute and read and write
4B71000
heap
page read and write
E8E000
heap
page read and write
1B3F0000
heap
page read and write
4380000
trusted library allocation
page read and write
2205F5E0000
trusted library allocation
page read and write
2B3C00CD8000
trusted library allocation
page read and write
2205F702000
heap
page read and write
5AF6000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
21242000
heap
page read and write
37A800274000
trusted library allocation
page read and write
3E3A000
trusted library allocation
page read and write
994000
heap
page read and write
280000
unkown
page readonly
3CAF000
stack
page read and write
2B3C001AC000
trusted library allocation
page read and write
2205FD30000
remote allocation
page read and write
11CE000
heap
page read and write
851000
heap
page read and write
CB9000
unkown
page read and write
3E05000
trusted library allocation
page read and write
424F000
stack
page read and write
EC1000
heap
page read and write
2B3C004C4000
trusted library allocation
page read and write
2B3C00C0C000
trusted library allocation
page read and write
145357D000
stack
page read and write
2BB340F0000
heap
page read and write
2A90000
heap
page read and write
11CE000
heap
page read and write
7FFAAC2E6000
trusted library allocation
page read and write
3B6F000
stack
page read and write
2B3C00DCC000
trusted library allocation
page read and write
21216000
heap
page read and write
586D000
trusted library allocation
page read and write
7FFAAC316000
trusted library allocation
page execute and read and write
3E3B000
trusted library allocation
page read and write
11B9000
heap
page read and write
272D4000
heap
page read and write
BEA000
unkown
page execute and read and write
51B0000
direct allocation
page read and write
2630000
heap
page read and write
764000
heap
page read and write
AD6000
unkown
page execute and read and write
121F000
heap
page read and write
1484000
heap
page read and write
3E04000
trusted library allocation
page read and write
1E28A20D000
heap
page read and write
EF8000
heap
page read and write
438A000
trusted library allocation
page read and write
F1E000
stack
page read and write
4A00000
direct allocation
page execute and read and write
585C000
trusted library allocation
page read and write
37AF000
stack
page read and write
342A000
heap
page read and write
4385000
trusted library allocation
page read and write
595FDFE000
stack
page read and write
C50000
unkown
page read and write
3E33000
trusted library allocation
page read and write
F6F000
heap
page read and write
3D71000
heap
page read and write
36CC000
heap
page read and write
F6D000
heap
page read and write
445E000
trusted library allocation
page read and write
4751000
heap
page read and write
13B6000
heap
page read and write
2B3C00294000
trusted library allocation
page read and write
F46000
heap
page read and write
1B191000
heap
page read and write
1727000
heap
page read and write
1192000
heap
page read and write
ECE000
heap
page read and write
39CE000
stack
page read and write
107F000
heap
page read and write
26C7000
heap
page read and write
FA0000
heap
page read and write
1B500000
heap
page read and write
104A000
heap
page read and write
368C0023C000
direct allocation
page read and write
4A10000
direct allocation
page execute and read and write
4751000
heap
page read and write
2298006E4000
trusted library allocation
page read and write
1910000
heap
page read and write
2298002D4000
trusted library allocation
page read and write
797000
heap
page read and write
2BB341A3000
heap
page read and write
584F000
trusted library allocation
page read and write
133E000
stack
page read and write
3E04000
trusted library allocation
page read and write
308D000
stack
page read and write
155505F0000
trusted library allocation
page read and write
2861204B000
heap
page read and write
5390000
direct allocation
page execute and read and write
2B3C00874000
trusted library allocation
page read and write
2B3C000F4000
trusted library allocation
page read and write
3E15000
trusted library allocation
page read and write
34CF000
stack
page read and write
584C000
trusted library allocation
page read and write
1484000
heap
page read and write
1E2866EC000
heap
page read and write
1E290B50000
trusted library section
page read and write
5978DFE000
stack
page read and write
63AF000
stack
page read and write
5816000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
4BEE000
stack
page read and write
20504A16000
heap
page read and write
438A000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
BF0000
heap
page read and write
4388000
trusted library allocation
page read and write
F68000
heap
page read and write
4B71000
heap
page read and write
5ADE000
stack
page read and write
229800770000
trusted library allocation
page read and write
1484000
heap
page read and write
3C0F000
stack
page read and write
132B000
heap
page read and write
4751000
heap
page read and write
4AAE000
stack
page read and write
11C0000
heap
page read and write
131000
unkown
page execute read
4D10000
direct allocation
page read and write
703C6000
unkown
page readonly
1112000
unkown
page write copy
4385000
trusted library allocation
page read and write
174B000
heap
page read and write
D501000
heap
page read and write
58A4000
trusted library allocation
page read and write
1166000
heap
page read and write
590BFFE000
stack
page read and write
1B3E5000
heap
page read and write
21216000
heap
page read and write
585C000
trusted library allocation
page read and write
1E28FEF2000
trusted library section
page read and write
F51000
heap
page read and write
3BAE000
stack
page read and write
4439000
trusted library allocation
page read and write
59107FE000
unkown
page readonly
32EC000
heap
page read and write
44D9000
trusted library allocation
page read and write
D0A000
unkown
page execute and write copy
2B3C00064000
trusted library allocation
page read and write
14CF000
stack
page read and write
2B3C00F04000
trusted library allocation
page read and write
1E28A22F000
heap
page read and write
4751000
heap
page read and write
FC9000
heap
page read and write
102C000
heap
page read and write
438C000
trusted library allocation
page read and write
3C8E000
stack
page read and write
586E000
trusted library allocation
page read and write
4751000
heap
page read and write
F63000
heap
page read and write
3E04000
trusted library allocation
page read and write
2298006B8000
trusted library allocation
page read and write
4751000
heap
page read and write
2B3C00D9C000
trusted library allocation
page read and write
B43000
heap
page read and write
3D71000
heap
page read and write
D8F000
stack
page read and write
587D000
trusted library allocation
page read and write
D9C000
heap
page read and write
C63BFFF000
stack
page read and write
CD7000
heap
page read and write
16E8000
heap
page read and write
3E15000
trusted library allocation
page read and write
B32000
heap
page read and write
F63000
heap
page read and write
3EE1000
heap
page read and write
C63C3FF000
stack
page read and write
3E15000
trusted library allocation
page read and write
4DD0000
direct allocation
page execute and read and write
7FFAAC25B000
trusted library allocation
page execute and read and write
3B7E000
stack
page read and write
764000
heap
page read and write
B71000
heap
page read and write
2B3C00370000
trusted library allocation
page read and write
770000
unkown
page readonly
4751000
heap
page read and write
3D71000
heap
page read and write
5972DFB000
stack
page read and write
2B3C0000C000
trusted library allocation
page read and write
5904FFE000
stack
page read and write
2BB0000
direct allocation
page read and write
4B71000
heap
page read and write
11DF000
heap
page read and write
2B2F000
stack
page read and write
2115A222000
heap
page read and write
1573000
heap
page read and write
4810000
direct allocation
page read and write
3DE7000
trusted library allocation
page read and write
4AB0000
direct allocation
page execute and read and write
2B3C006E8000
trusted library allocation
page read and write
28612030000
heap
page read and write
FDB85FE000
unkown
page readonly
994000
heap
page read and write
12D0000
heap
page read and write
47EF000
stack
page read and write
98E000
stack
page read and write
4751000
heap
page read and write
5061000
direct allocation
page read and write
3E1A000
trusted library allocation
page read and write
2B3C005E0000
trusted library allocation
page read and write
F46000
heap
page read and write
1E28A280000
trusted library section
page read and write
3D71000
heap
page read and write
59037FE000
unkown
page readonly
2B3C001AC000
trusted library allocation
page read and write
42FE000
stack
page read and write
EE9000
heap
page read and write
585D000
trusted library allocation
page read and write
3E25000
trusted library allocation
page read and write
59147FE000
unkown
page readonly
F43000
heap
page read and write
21232000
heap
page read and write
57CF000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
C6A000
unkown
page execute and read and write
127F000
stack
page read and write
4B71000
heap
page read and write
366B000
heap
page read and write
333E000
unkown
page read and write
6D161000
unkown
page execute read
1040000
heap
page read and write
726000
heap
page read and write
4B71000
heap
page read and write
FE8000
heap
page read and write
58A4000
trusted library allocation
page read and write
4BE0000
direct allocation
page read and write
4388000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
1007000
heap
page read and write
360F000
stack
page read and write
4B71000
heap
page read and write
6FB000
stack
page read and write
28612043000
heap
page read and write
1E2866C2000
heap
page read and write
2998D610000
trusted library allocation
page read and write
4226000
trusted library allocation
page read and write
1B190000
heap
page read and write
2998D670000
remote allocation
page read and write
FC0000
heap
page read and write
5911FFE000
stack
page read and write
F46000
heap
page read and write
2BB34110000
heap
page read and write
3A80000
trusted library allocation
page read and write
3E15000
trusted library allocation
page read and write
596EDFE000
stack
page read and write
585D000
trusted library allocation
page read and write
EC9000
heap
page read and write
3E7E000
trusted library allocation
page read and write
1040000
heap
page read and write
2B3C00940000
trusted library allocation
page read and write
BFD000
heap
page read and write
1395000
heap
page read and write
2B3C001D4000
trusted library allocation
page read and write
356E000
stack
page read and write
2370000
heap
page read and write
BEE000
heap
page read and write
7FFAAC230000
trusted library allocation
page read and write
B51000
heap
page read and write
2DF0000
direct allocation
page read and write
37A8002BC000
trusted library allocation
page read and write
102C000
heap
page read and write
1484000
heap
page read and write
229800734000
trusted library allocation
page read and write
3DFE000
stack
page read and write
6A6F8000
direct allocation
page read and write
3E34000
trusted library allocation
page read and write
58E8000
trusted library allocation
page read and write
28612028000
heap
page read and write
4890000
heap
page read and write
6A9000
unkown
page readonly
4E30000
direct allocation
page execute and read and write
57CF000
trusted library allocation
page read and write
1026000
heap
page read and write
132E000
heap
page read and write
44A2000
trusted library allocation
page read and write
1109000
unkown
page execute and write copy
2998D659000
trusted library allocation
page read and write
2998E000000
heap
page read and write
994000
heap
page read and write
590CFFE000
stack
page read and write
2B3C0043C000
trusted library allocation
page read and write
4B71000
heap
page read and write
2BB0000
direct allocation
page read and write
29987D10000
heap
page read and write
3EE1000
trusted library allocation
page read and write
370F000
stack
page read and write
C32000
heap
page read and write
57C3000
trusted library allocation
page read and write
C08000
heap
page read and write
A49000
heap
page read and write
5CB0000
remote allocation
page read and write
51B0000
direct allocation
page read and write
BEA000
heap
page read and write
2B3C003E0000
trusted library allocation
page read and write
4B71000
heap
page read and write
3626000
heap
page read and write
58A4000
trusted library allocation
page read and write
38FE000
stack
page read and write
99C000
stack
page read and write
BEA000
heap
page read and write
29988B40000
trusted library allocation
page read and write
2BB35F40000
heap
page read and write
29989465000
heap
page read and write
2B3C00298000
trusted library allocation
page read and write
4387000
trusted library allocation
page read and write
1E286800000
heap
page read and write
37A800250000
trusted library allocation
page read and write
4751000
heap
page read and write
3DF5000
trusted library allocation
page read and write
443E000
trusted library allocation
page read and write
29987EB3000
heap
page read and write
45BE000
trusted library allocation
page read and write
2BB3418E000
heap
page read and write
BF1000
heap
page read and write
115D000
heap
page read and write
2B3C00BE4000
trusted library allocation
page read and write
21F5000
heap
page read and write
4B71000
heap
page read and write
BBB000
heap
page read and write
C5C000
heap
page read and write
F1E000
unkown
page execute and read and write
F6D000
heap
page read and write
28612028000
heap
page read and write
103E000
heap
page read and write
3DF5000
trusted library allocation
page read and write
3DE3000
trusted library allocation
page read and write
84B000
heap
page read and write
696000
unkown
page readonly
BCB000
heap
page read and write
4120000
trusted library allocation
page read and write
23C2964E000
heap
page read and write
C00000
heap
page read and write
4020000
trusted library allocation
page read and write
2DF0000
direct allocation
page read and write
2D0C000
stack
page read and write
3512000
heap
page read and write
1E2866BE000
heap
page read and write
3E0B000
trusted library allocation
page read and write
4B71000
heap
page read and write
2B3C0033C000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
619E000
stack
page read and write
337F000
heap
page read and write
83F000
heap
page read and write
A50000
heap
page read and write
3E77000
trusted library allocation
page read and write
754000
stack
page read and write
710000
direct allocation
page read and write
BF1000
heap
page read and write
4385000
trusted library allocation
page read and write
11A4000
heap
page read and write
3E1D000
trusted library allocation
page read and write
F4F000
heap
page read and write
4810000
direct allocation
page read and write
6A9000
unkown
page readonly
21243000
heap
page read and write
4751000
heap
page read and write
44BB000
trusted library allocation
page read and write
1E289C65000
heap
page read and write
2B3C0029E000
trusted library allocation
page read and write
CD5000
heap
page read and write
1B3E0000
heap
page read and write
B7D000
heap
page read and write
459D000
trusted library allocation
page read and write
2B3C00EB4000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
438D000
trusted library allocation
page read and write
2B3C00664000
trusted library allocation
page read and write
32BE000
stack
page read and write
1AC2E000
stack
page read and write
4D60000
direct allocation
page execute and read and write
349000
unkown
page readonly
124D000
stack
page read and write
F57000
unkown
page execute and read and write
58A4000
trusted library allocation
page read and write
59665FE000
unkown
page readonly
4D70000
direct allocation
page execute and read and write
1E2865D0000
heap
page read and write
3E4C000
trusted library allocation
page read and write
12D0000
heap
page read and write
7FFAAC2E0000
trusted library allocation
page read and write
4384000
trusted library allocation
page read and write
37A8002F4000
trusted library allocation
page read and write
710000
direct allocation
page read and write
596A5FE000
unkown
page readonly
8E0000
heap
page read and write
256D87B000
stack
page read and write
2A5E000
unkown
page read and write
2B3C004B8000
trusted library allocation
page read and write
44AA000
trusted library allocation
page read and write
83F000
heap
page read and write
BF4000
heap
page read and write
2B3C009E0000
trusted library allocation
page read and write
CB9000
unkown
page write copy
F46000
heap
page read and write
A62000
unkown
page execute and read and write
BCF000
heap
page read and write
445D000
trusted library allocation
page read and write
3E2B000
trusted library allocation
page read and write
A40000
heap
page read and write
2E00000
heap
page read and write
5964DFE000
stack
page read and write
2B3C00790000
trusted library allocation
page read and write
DF7000
heap
page read and write
21037DA0000
heap
page read and write
2B3C00304000
trusted library allocation
page read and write
21037E40000
heap
page read and write
57E7000
trusted library allocation
page read and write
2F77000
trusted library allocation
page read and write
1484000
heap
page read and write
4E00000
direct allocation
page execute and read and write
2205F660000
heap
page read and write
44DD000
trusted library allocation
page read and write
2998950A000
heap
page read and write
2298007D0000
trusted library allocation
page read and write
76E000
unkown
page readonly
4383000
trusted library allocation
page read and write
2B3C0000C000
trusted library allocation
page read and write
29989458000
heap
page read and write
59775FE000
unkown
page readonly
254B6FD000
stack
page read and write
4751000
heap
page read and write
5975DFD000
stack
page read and write
3407000
heap
page read and write
17E000
unkown
page read and write
BD0000
heap
page read and write
44A4000
trusted library allocation
page read and write
2B3C0021C000
trusted library allocation
page read and write
4B90000
heap
page read and write
994000
heap
page read and write
1E28DFD0000
heap
page read and write
88B000
unkown
page read and write
3E52000
trusted library allocation
page read and write
4228000
trusted library allocation
page read and write
3DE7000
trusted library allocation
page read and write
58E7000
trusted library allocation
page read and write
F43000
heap
page read and write
6C3000
stack
page read and write
3E63000
trusted library allocation
page read and write
EF8000
heap
page read and write
2910000
heap
page read and write
BE3000
heap
page read and write
BE4000
heap
page read and write
4D70000
direct allocation
page execute and read and write
68FC000
stack
page read and write
79B000
unkown
page write copy
67C000
stack
page read and write
2B3C0058C000
trusted library allocation
page read and write
2298006B4000
trusted library allocation
page read and write
2B3C00344000
trusted library allocation
page read and write
4020000
trusted library allocation
page read and write
5000000
direct allocation
page read and write
597D5FE000
unkown
page readonly
3DE9000
trusted library allocation
page read and write
2298006B0000
trusted library allocation
page read and write
EEE000
stack
page read and write
3B80000
trusted library allocation
page read and write
2B3C001F0000
trusted library allocation
page read and write
368C00215000
direct allocation
page read and write
F1E000
unkown
page execute and read and write
3DF2000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
5090000
heap
page read and write
BE4000
heap
page read and write
272B1000
heap
page read and write
2B3C00B84000
trusted library allocation
page read and write
EB9000
unkown
page execute and write copy
2BB3419E000
heap
page read and write
3D71000
heap
page read and write
4465000
trusted library allocation
page read and write
FDA000
heap
page read and write
438C000
trusted library allocation
page read and write
7FFAAC232000
trusted library allocation
page read and write
586E000
trusted library allocation
page read and write
4751000
heap
page read and write
E60000
heap
page read and write
DDC000
heap
page read and write
3C21000
heap
page read and write
5E0000
unkown
page readonly
310E000
stack
page read and write
3497000
heap
page read and write
C48000
unkown
page execute and read and write
23C29C02000
heap
page read and write
4D10000
direct allocation
page read and write
2B3C006DD000
trusted library allocation
page read and write
4C9E000
stack
page read and write
2121E000
heap
page read and write
2B3C00C1C000
trusted library allocation
page read and write
17D000
unkown
page execute and read and write
51B0000
direct allocation
page execute and read and write
1309000
heap
page read and write
1E28A211000
heap
page read and write
4380000
trusted library allocation
page read and write
57FB000
trusted library allocation
page read and write
23C29664000
heap
page read and write
5901FFE000
stack
page read and write
994000
heap
page read and write
F43000
heap
page read and write
58A4000
trusted library allocation
page read and write
183000
unkown
page readonly
2298002F4000
trusted library allocation
page read and write
84EC000
stack
page read and write
3FF0000
trusted library allocation
page read and write
EE0000
heap
page read and write
4A60000
direct allocation
page execute and read and write
107A000
heap
page read and write
29989314000
trusted library allocation
page read and write
2B3C00D54000
trusted library allocation
page read and write
FE6000
heap
page read and write
3E04000
trusted library allocation
page read and write
37A8002C0000
trusted library allocation
page read and write
3DEC000
trusted library allocation
page read and write
4F4000
unkown
page readonly
23C29C00000
heap
page read and write
1E289C53000
heap
page read and write
5908FFE000
stack
page read and write
3E15000
trusted library allocation
page read and write
4751000
heap
page read and write
5849000
trusted library allocation
page read and write
3E37000
trusted library allocation
page read and write
7AE000
stack
page read and write
871000
heap
page read and write
3DFC000
trusted library allocation
page read and write
A60000
heap
page read and write
110C000
heap
page read and write
710000
direct allocation
page read and write
1E28FC40000
heap
page read and write
34BB000
heap
page read and write
BE8000
heap
page read and write
3B0E000
stack
page read and write
3B80000
trusted library allocation
page read and write
4B71000
heap
page read and write
229800730000
trusted library allocation
page read and write
584F000
trusted library allocation
page read and write
585D000
trusted library allocation
page read and write
29987EEB000
heap
page read and write
4381000
trusted library allocation
page read and write
4821000
heap
page read and write
3B80000
trusted library allocation
page read and write
3371000
heap
page read and write
4A70000
direct allocation
page execute and read and write
44B4000
trusted library allocation
page read and write
299894F1000
heap
page read and write
313E000
stack
page read and write
229800784000
trusted library allocation
page read and write
D8B000
heap
page read and write
BFD000
heap
page read and write
7FFB226D5000
unkown
page readonly
2B3C00E24000
trusted library allocation
page read and write
1049000
heap
page read and write
2B3C00A4C000
trusted library allocation
page read and write
3FEE000
trusted library allocation
page read and write
2B3C00228000
trusted library allocation
page read and write
4751000
heap
page read and write
42CE000
stack
page read and write
8512000
heap
page read and write
3E2D000
stack
page read and write
3E8F000
stack
page read and write
492F000
stack
page read and write
3248000
heap
page read and write
13B5000
heap
page read and write
2205F5B0000
heap
page read and write
C63C6FE000
stack
page read and write
3C6000
unkown
page readonly
3DF5000
trusted library allocation
page read and write
EE0000
heap
page read and write
EF0000
heap
page read and write
367F000
stack
page read and write
BD3000
heap
page read and write
585D000
trusted library allocation
page read and write
67FB000
stack
page read and write
703B1000
unkown
page execute read
2B3C00A7C000
trusted library allocation
page read and write
1359000
heap
page read and write
29989513000
heap
page read and write
FCC000
heap
page read and write
272F0000
heap
page read and write
5350000
direct allocation
page execute and read and write
37A8002BC000
trusted library allocation
page read and write
F68000
heap
page read and write
58A4000
trusted library allocation
page read and write
4389000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
3E4E000
trusted library allocation
page read and write
5976DFC000
stack
page read and write
4385000
trusted library allocation
page read and write
29988EC0000
trusted library section
page readonly
2B3C004B0000
trusted library allocation
page read and write
456F000
stack
page read and write
37D1000
heap
page read and write
3E1B000
trusted library allocation
page read and write
1037000
heap
page read and write
1E28A1EC000
heap
page read and write
BEB000
heap
page read and write
2B3C00F10000
trusted library allocation
page read and write
3D71000
heap
page read and write
CE7000
unkown
page execute and write copy
3DFA000
trusted library allocation
page read and write
4B71000
heap
page read and write
31F0000
remote allocation
page read and write
229800601000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
292E000
heap
page read and write
1E2904F1000
trusted library section
page read and write
DD5D000
heap
page read and write
BCE000
heap
page read and write
3A6E000
stack
page read and write
EE0000
heap
page read and write
1E28A23E000
heap
page read and write
FAB000
heap
page read and write
3370000
heap
page read and write
1589000
heap
page read and write
368C0026C000
direct allocation
page read and write
2DF0000
direct allocation
page read and write
2B3C0004C000
trusted library allocation
page read and write
589D000
trusted library allocation
page read and write
84B000
heap
page read and write
A0124FF000
stack
page read and write
4821000
heap
page read and write
37A8002BC000
trusted library allocation
page read and write
459A000
trusted library allocation
page read and write
2B3C00C01000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
30A0000
heap
page read and write
1E2866F4000
heap
page read and write
AE4000
heap
page read and write
6C811000
unkown
page execute read
368C00290000
direct allocation
page read and write
2B3C009D8000
trusted library allocation
page read and write
29988E70000
trusted library section
page readonly
FDB8DFE000
unkown
page readonly
2B3C00867000
trusted library allocation
page read and write
4609000
trusted library allocation
page read and write
890000
heap
page read and write
6D1EE000
unkown
page read and write
4B71000
heap
page read and write
53C0000
direct allocation
page execute and read and write
2F0E000
stack
page read and write
696000
unkown
page readonly
229800380000
trusted library allocation
page read and write
2B3C001C4000
trusted library allocation
page read and write
400F000
stack
page read and write
448F000
trusted library allocation
page read and write
5E6000
heap
page read and write
4751000
heap
page read and write
299892C0000
trusted library allocation
page read and write
1E28DFFC000
heap
page read and write
57B8000
trusted library allocation
page read and write
146D000
heap
page read and write
442A000
trusted library allocation
page read and write
3E04000
trusted library allocation
page read and write
446E000
trusted library allocation
page read and write
2B3C000E4000
trusted library allocation
page read and write
2D510000
trusted library allocation
page read and write
349000
unkown
page readonly
51F0000
direct allocation
page execute and read and write
4751000
heap
page read and write
21037E00000
heap
page read and write
1723000
heap
page read and write
21242000
heap
page read and write
2B3C00924000
trusted library allocation
page read and write
2050539D000
heap
page read and write
22980035C000
trusted library allocation
page read and write
2B3C00134000
trusted library allocation
page read and write
4E30000
direct allocation
page execute and read and write
454E000
stack
page read and write
4387000
trusted library allocation
page read and write
4751000
heap
page read and write
3566000
heap
page read and write
299892E1000
trusted library allocation
page read and write
2B3C01030000
trusted library allocation
page read and write
5E1000
unkown
page execute read
2B3C00D54000
trusted library allocation
page read and write
4751000
heap
page read and write
4751000
heap
page read and write
EE9000
heap
page read and write
587D000
trusted library allocation
page read and write
3E3B000
trusted library allocation
page read and write
59715FE000
unkown
page readonly
23C29602000
heap
page read and write
15550E02000
trusted library allocation
page read and write
29987EA3000
heap
page read and write
3D71000
heap
page read and write
229800648000
trusted library allocation
page read and write
496E000
stack
page read and write
7FFB226B0000
unkown
page readonly
3DE7000
trusted library allocation
page read and write
1A84E000
stack
page read and write
1453FFD000
stack
page read and write
2115A22B000
heap
page read and write
186000
unkown
page write copy
2205F62B000
heap
page read and write
4751000
heap
page read and write
1E28A1F9000
heap
page read and write
58A4000
trusted library allocation
page read and write
2998D670000
remote allocation
page read and write
272EB000
heap
page read and write
3DE1000
trusted library allocation
page read and write
3FE3000
trusted library allocation
page read and write
3FE5000
trusted library allocation
page read and write
114A000
heap
page read and write
2B3C00D18000
trusted library allocation
page read and write
418B000
trusted library allocation
page read and write
75F000
stack
page read and write
585D000
trusted library allocation
page read and write
1052000
heap
page read and write
750000
heap
page read and write
29987E98000
heap
page read and write
1E28A236000
heap
page read and write
103F000
heap
page read and write
447F000
trusted library allocation
page read and write
3071000
heap
page read and write
FE8000
heap
page read and write
317E000
stack
page read and write
4B71000
heap
page read and write
4751000
heap
page read and write
310000
unkown
page readonly
4751000
heap
page read and write
3E05000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
340000
unkown
page write copy
2115A4F0000
heap
page read and write
4388000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
464E000
stack
page read and write
83F000
heap
page read and write
44A0000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
2115A202000
heap
page read and write
384F000
stack
page read and write
4383000
trusted library allocation
page read and write
1E28DFF4000
heap
page read and write
80A000
heap
page read and write
28611FC0000
heap
page read and write
4751000
heap
page read and write
585C000
trusted library allocation
page read and write
2120B000
heap
page read and write
368C00280000
direct allocation
page read and write
5842000
trusted library allocation
page read and write
2D5B6000
heap
page read and write
3E20000
trusted library allocation
page read and write
1540000
heap
page read and write
7FFAAC24D000
trusted library allocation
page execute and read and write
58E1000
trusted library allocation
page read and write
21200000
heap
page read and write
1320000
trusted library allocation
page read and write
2115A1F0000
heap
page read and write
4D70000
direct allocation
page execute and read and write
760000
heap
page read and write
58F0000
trusted library allocation
page read and write
4751000
heap
page read and write
2B3C0020C000
trusted library allocation
page read and write
F67000
unkown
page execute and write copy
3D71000
heap
page read and write
3E04000
trusted library allocation
page read and write
4D21000
heap
page read and write
20505380000
heap
page read and write
3DEC000
trusted library allocation
page read and write
595DDFF000
stack
page read and write
3C6000
unkown
page readonly
586E000
trusted library allocation
page read and write
21225000
heap
page read and write
1107000
unkown
page execute and read and write
2DBE000
stack
page read and write
1E2866A0000
heap
page read and write
2B3C00B00000
trusted library allocation
page read and write
4474000
trusted library allocation
page read and write
B39000
heap
page read and write
16D3000
trusted library allocation
page read and write
12951000
trusted library allocation
page read and write
D6D000
unkown
page execute and write copy
37A800294000
trusted library allocation
page read and write
272E7000
heap
page read and write
58A1000
trusted library allocation
page read and write
F59000
heap
page read and write
363F000
stack
page read and write
7FFAAC240000
trusted library allocation
page read and write
CE0000
heap
page read and write
292E000
heap
page read and write
400000
unkown
page readonly
4444000
trusted library allocation
page read and write
33FE000
stack
page read and write
851000
heap
page read and write
61ECC000
direct allocation
page read and write
2DEE000
stack
page read and write
2B3C000AC000
trusted library allocation
page read and write
3EE7000
trusted library allocation
page read and write
2B3C00890000
trusted library allocation
page read and write
229800354000
trusted library allocation
page read and write
2B3C00D9C000
trusted library allocation
page read and write
BE5000
heap
page read and write
FF6000
heap
page read and write
61B000
unkown
page readonly
4401000
heap
page read and write
3375000
heap
page read and write
C2F000
heap
page read and write
4B71000
heap
page read and write
1E289C65000
heap
page read and write
4751000
heap
page read and write
328E000
stack
page read and write
4B71000
heap
page read and write
5907FFC000
stack
page read and write
2B3C00E01000
trusted library allocation
page read and write
4751000
heap
page read and write
28611FF0000
heap
page read and write
BF0000
heap
page read and write
28FF000
heap
page read and write
1E290500000
trusted library section
page read and write
29989506000
heap
page read and write
3E70000
trusted library allocation
page read and write
16D9000
heap
page read and write
26CA000
heap
page read and write
5B9E000
trusted library allocation
page read and write
3370000
heap
page read and write
4821000
heap
page read and write
1176000
heap
page read and write
5851000
trusted library allocation
page read and write
4481000
trusted library allocation
page read and write
20505351000
heap
page read and write
3371000
heap
page read and write
589D000
trusted library allocation
page read and write
1195000
heap
page read and write
4D20000
heap
page read and write
451E000
trusted library allocation
page read and write
F73000
heap
page read and write
2B3C00E48000
trusted library allocation
page read and write
2B3C00D28000
trusted library allocation
page read and write
4120000
trusted library allocation
page read and write
20505383000
heap
page read and write
2B3C00B15000
trusted library allocation
page read and write
3DF1000
trusted library allocation
page read and write
3DFC000
trusted library allocation
page read and write
2B3C002FB000
trusted library allocation
page read and write
1089000
heap
page read and write
49B000
stack
page read and write
4B71000
heap
page read and write
58D7000
trusted library allocation
page read and write
3E1E000
trusted library allocation
page read and write
320F000
stack
page read and write
5B66000
trusted library allocation
page read and write
37A8002BC000
trusted library allocation
page read and write
1E290550000
trusted library section
page read and write
6C9000
stack
page read and write
DBF000
stack
page read and write
4D10000
direct allocation
page read and write
586E000
trusted library allocation
page read and write
3DF0000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
4FD000
stack
page read and write
2050538E000
heap
page read and write
4B71000
heap
page read and write
57D2000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
350E000
stack
page read and write
300F000
stack
page read and write
3C20000
heap
page read and write
4B71000
heap
page read and write
21039802000
trusted library allocation
page read and write
585C000
trusted library allocation
page read and write
5906FFA000
stack
page read and write
5876000
trusted library allocation
page read and write
D1000
unkown
page execute read
4A10000
direct allocation
page execute and read and write
351D000
heap
page read and write
4386000
trusted library allocation
page read and write
4387000
trusted library allocation
page read and write
29988EB0000
trusted library section
page readonly
4751000
heap
page read and write
1266000
heap
page read and write
2B3C00EA8000
trusted library allocation
page read and write
595BDEF000
stack
page read and write
6590000
heap
page read and write
3374000
heap
page read and write
4120000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
1267000
heap
page read and write
44E9000
trusted library allocation
page read and write
38EF000
stack
page read and write
5340000
direct allocation
page execute and read and write
3E06000
trusted library allocation
page read and write
2B3C00A0C000
trusted library allocation
page read and write
2BB34179000
heap
page read and write
51B0000
direct allocation
page read and write
FC9000
heap
page read and write
2B3C00790000
trusted library allocation
page read and write
5211000
direct allocation
page read and write
CDA000
unkown
page execute and write copy
FB0000
heap
page read and write
587D000
trusted library allocation
page read and write
3E4C000
trusted library allocation
page read and write
1E286820000
trusted library allocation
page read and write
29989400000
heap
page read and write
3D71000
heap
page read and write
428F000
stack
page read and write
353C000
heap
page read and write
7FFAAC250000
trusted library allocation
page read and write
3E70000
trusted library allocation
page read and write
F49000
heap
page read and write
21222000
heap
page read and write
83C000
heap
page read and write
49E0000
direct allocation
page execute and read and write
20505300000
heap
page read and write
5360000
direct allocation
page execute and read and write
1197000
heap
page read and write
4401000
heap
page read and write
F67000
heap
page read and write
855000
heap
page read and write
3210000
heap
page read and write
FDB7DF7000
stack
page read and write
880000
heap
page read and write
FD4000
heap
page read and write
2B3C009B0000
trusted library allocation
page read and write
229800220000
trusted library allocation
page read and write
3E49000
trusted library allocation
page read and write
575E000
stack
page read and write
21212000
heap
page read and write
23C29700000
heap
page read and write
A70000
unkown
page read and write
6D1F2000
unkown
page readonly
4751000
heap
page read and write
12953000
trusted library allocation
page read and write
83F000
heap
page read and write
57EA000
trusted library allocation
page read and write
41BE000
stack
page read and write
10FA000
heap
page read and write
FFC000
heap
page read and write
32F6000
heap
page read and write
3D71000
heap
page read and write
4383000
trusted library allocation
page read and write
33EF000
stack
page read and write
EC9000
heap
page read and write
1A94F000
stack
page read and write
1E290626000
trusted library section
page read and write
20505202000
heap
page read and write
821000
unkown
page read and write
2BB34185000
heap
page read and write
2B3C007A8000
trusted library allocation
page read and write
1E2865E0000
heap
page readonly
F57000
unkown
page execute and read and write
994000
heap
page read and write
30D0000
heap
page read and write
F4F000
heap
page read and write
404E000
stack
page read and write
34B4000
heap
page read and write
BCE000
heap
page read and write
20505200000
heap
page read and write
3E23000
trusted library allocation
page read and write
BE4000
heap
page read and write
3E3D000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
597A5FE000
unkown
page readonly
32AF000
stack
page read and write
22980039C000
trusted library allocation
page read and write
2B3C008B4000
trusted library allocation
page read and write
2B3C00EA2000
trusted library allocation
page read and write
2DCF000
stack
page read and write
318E000
stack
page read and write
5852000
trusted library allocation
page read and write
1031000
heap
page read and write
6C9AF000
unkown
page readonly
CCC000
heap
page read and write
2B3C001E4000
trusted library allocation
page read and write
994000
heap
page read and write
12A7000
heap
page read and write
4751000
heap
page read and write
2998871A000
heap
page read and write
15550602000
heap
page read and write
584B000
trusted library allocation
page read and write
359E000
heap
page read and write
4B71000
heap
page read and write
10F9000
heap
page read and write
4383000
trusted library allocation
page read and write
64C2000
trusted library allocation
page read and write
764000
heap
page read and write
131B000
heap
page read and write
368C002E4000
direct allocation
page read and write
58E9000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
4D21000
heap
page read and write
57D2000
trusted library allocation
page read and write
4B71000
heap
page read and write
5977DFD000
stack
page read and write
2B3C00540000
trusted library allocation
page read and write
2637000
heap
page read and write
5036000
trusted library allocation
page read and write
229800630000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
18D0000
heap
page read and write
4C41000
direct allocation
page read and write
3430000
heap
page read and write
2EEF000
stack
page read and write
21219000
heap
page read and write
590A7FE000
unkown
page readonly
B40000
heap
page read and write
51FE000
stack
page read and write
4B71000
heap
page read and write
84B000
heap
page read and write
460F000
stack
page read and write
5340000
direct allocation
page execute and read and write
59087FE000
unkown
page readonly
DED000
heap
page read and write
3E09000
trusted library allocation
page read and write
1E29051E000
trusted library section
page read and write
3240000
heap
page read and write
1026000
heap
page read and write
6C9F0000
unkown
page read and write
1154000
heap
page read and write
3EFF000
stack
page read and write
4181000
trusted library allocation
page read and write
2B3C00C34000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
2919000
heap
page read and write
2B3C00210000
trusted library allocation
page read and write
4820000
heap
page read and write
1320000
trusted library allocation
page read and write
37A8002F0000
trusted library allocation
page read and write
1484000
heap
page read and write
596D5FE000
unkown
page readonly
EE9000
heap
page read and write
1E28E587000
unclassified section
page read and write
BFC000
heap
page read and write
57E5000
trusted library allocation
page read and write
30A7000
heap
page read and write
29989250000
trusted library allocation
page read and write
7FF427DA0000
trusted library allocation
page execute and read and write
37A8002B0000
trusted library allocation
page read and write
2120E000
heap
page read and write
2B3C00936000
trusted library allocation
page read and write
2B3C002B4000
trusted library allocation
page read and write
4821000
heap
page read and write
4383000
trusted library allocation
page read and write
20504A48000
heap
page read and write
57B0000
trusted library allocation
page read and write
2861204B000
heap
page read and write
2B3C001E0000
trusted library allocation
page read and write
29988615000
heap
page read and write
2BB341B9000
heap
page read and write
357F000
heap
page read and write
57E2000
trusted library allocation
page read and write
4428000
trusted library allocation
page read and write
44B6000
trusted library allocation
page read and write
353E000
heap
page read and write
103C000
heap
page read and write
BEA000
heap
page read and write
29988E90000
trusted library section
page readonly
446E000
stack
page read and write
4751000
heap
page read and write
12EE000
heap
page read and write
29987E00000
heap
page read and write
9FE000
stack
page read and write
2D5B2000
heap
page read and write
58B1000
trusted library allocation
page read and write
2C3F000
stack
page read and write
21037E77000
heap
page read and write
2BB341A9000
heap
page read and write
4426000
trusted library allocation
page read and write
3DF1000
trusted library allocation
page read and write
FA4000
heap
page read and write
4751000
heap
page read and write
2B3C001B4000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
1E289C53000
heap
page read and write
3DE2000
trusted library allocation
page read and write
374E000
stack
page read and write
29987EBF000
heap
page read and write
3DE7000
trusted library allocation
page read and write
994000
heap
page read and write
BCF000
heap
page read and write
850E000
heap
page read and write
4A50000
direct allocation
page execute and read and write
84B000
heap
page read and write
4761000
heap
page read and write
D16000
unkown
page execute and read and write
3DF8000
trusted library allocation
page read and write
32EE000
stack
page read and write
703C6000
unkown
page readonly
2AFF000
stack
page read and write
F56000
heap
page read and write
658E000
heap
page read and write
FDB81FE000
unkown
page readonly
6581000
heap
page read and write
117E000
heap
page read and write
54BE000
stack
page read and write
4751000
heap
page read and write
4A10000
direct allocation
page execute and read and write
2B3C007A0000
trusted library allocation
page read and write
438A000
trusted library allocation
page read and write
FE9000
heap
page read and write
F83000
heap
page read and write
B10000
heap
page read and write
5E1000
unkown
page execute read
2B3C002F0000
trusted library allocation
page read and write
45DF000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
3CEE000
stack
page read and write
2B3C00DE0000
trusted library allocation
page read and write
1E2866F0000
heap
page read and write
446C000
trusted library allocation
page read and write
2B3C00F94000
trusted library allocation
page read and write
2F7B000
trusted library allocation
page read and write
2B3C00230000
trusted library allocation
page read and write
4810000
direct allocation
page read and write
4380000
trusted library allocation
page read and write
2BB341BD000
heap
page read and write
3E05000
trusted library allocation
page read and write
3D71000
heap
page read and write
FA6000
heap
page read and write
6190000
heap
page read and write
229800374000
trusted library allocation
page read and write
D07000
unkown
page execute and read and write
C00000
heap
page read and write
2919000
heap
page read and write
AE4000
heap
page read and write
4F7E000
stack
page read and write
57DF000
trusted library allocation
page read and write
34BA000
heap
page read and write
1E2906D7000
unclassified section
page read and write
C56000
unkown
page execute and write copy
5153000
trusted library allocation
page read and write
57C9000
trusted library allocation
page read and write
E10000
unkown
page readonly
3430000
heap
page read and write
10D2000
heap
page read and write
3D71000
heap
page read and write
10AE000
stack
page read and write
450A000
trusted library allocation
page read and write
994000
heap
page read and write
1474000
heap
page read and write
4B71000
heap
page read and write
CBB000
unkown
page execute and read and write
299892E0000
trusted library allocation
page read and write
2B3C00A0C000
trusted library allocation
page read and write
57E2000
trusted library allocation
page read and write
D36000
heap
page read and write
4821000
heap
page read and write
28612030000
heap
page read and write
F51000
heap
page read and write
57D2000
trusted library allocation
page read and write
7F4000
heap
page read and write
2B3C00188000
trusted library allocation
page read and write
3E53000
trusted library allocation
page read and write
4751000
heap
page read and write
58A1000
trusted library allocation
page read and write
3416000
heap
page read and write
443F000
trusted library allocation
page read and write
703B0000
unkown
page readonly
4491000
trusted library allocation
page read and write
3E22000
trusted library allocation
page read and write
23C29702000
heap
page read and write
3E15000
trusted library allocation
page read and write
37A800238000
trusted library allocation
page read and write
BC2000
heap
page read and write
FDB87FE000
unkown
page readonly
1063000
heap
page read and write
F5A000
heap
page read and write
3D71000
heap
page read and write
3370000
heap
page read and write
3C4F000
stack
page read and write
2D5B8000
heap
page read and write
183000
unkown
page readonly
2B3C0042C000
trusted library allocation
page read and write
3B80000
trusted library allocation
page read and write
57E2000
trusted library allocation
page read and write
5849000
trusted library allocation
page read and write
1533000
heap
page read and write
4384000
trusted library allocation
page read and write
700000
heap
page read and write
2B3C002A4000
trusted library allocation
page read and write
2BB3417A000
heap
page read and write
4860000
heap
page read and write
29987E91000
heap
page read and write
37A8002C0000
trusted library allocation
page read and write
F6A000
heap
page read and write
3E82000
trusted library allocation
page read and write
44C4000
trusted library allocation
page read and write
4B71000
heap
page read and write
504C000
stack
page read and write
229800401000
trusted library allocation
page read and write
2F7B000
trusted library allocation
page read and write
3E15000
trusted library allocation
page read and write
3E08000
trusted library allocation
page read and write
585D000
trusted library allocation
page read and write
57C8000
trusted library allocation
page read and write
994000
heap
page read and write
F6E000
heap
page read and write
2B3C006F8000
trusted library allocation
page read and write
229800688000
trusted library allocation
page read and write
21212000
heap
page read and write
21202000
heap
page read and write
587E000
trusted library allocation
page read and write
ECE000
heap
page read and write
2B3C0017F000
trusted library allocation
page read and write
2115A213000
heap
page read and write
610000
heap
page read and write
2B3C00E60000
trusted library allocation
page read and write
1B4FC000
stack
page read and write
3E15000
trusted library allocation
page read and write
3D71000
heap
page read and write
743000
heap
page read and write
58A4000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
1370000
heap
page read and write
2B3C00B64000
trusted library allocation
page read and write
1009000
heap
page read and write
360E000
heap
page read and write
4A0F000
stack
page read and write
3E0B000
trusted library allocation
page read and write
2D5AE000
heap
page read and write
145417E000
stack
page read and write
61E00000
direct allocation
page execute and read and write
1484000
heap
page read and write
12958000
trusted library allocation
page read and write
2B3C002A8000
trusted library allocation
page read and write
3373000
heap
page read and write
994000
heap
page read and write
272D9000
heap
page read and write
4B71000
heap
page read and write
ECE000
heap
page read and write
3CBE000
stack
page read and write
114E000
stack
page read and write
2B3C00304000
trusted library allocation
page read and write
2B3C00F44000
trusted library allocation
page read and write
1069000
heap
page read and write
453D000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
859000
heap
page read and write
2298006D0000
trusted library allocation
page read and write
84B000
heap
page read and write
4020000
trusted library allocation
page read and write
F72000
heap
page read and write
720000
heap
page read and write
FDB90FE000
unkown
page readonly
3C4E000
stack
page read and write
35CF000
stack
page read and write
3E1D000
trusted library allocation
page read and write
514F000
stack
page read and write
61A0000
heap
page read and write
7FFB226D2000
unkown
page readonly
44CE000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
4B71000
heap
page read and write
764000
heap
page read and write
5857000
trusted library allocation
page read and write
2F2E000
stack
page read and write
3E2C000
trusted library allocation
page read and write
3F38000
trusted library allocation
page read and write
20505389000
heap
page read and write
442C000
trusted library allocation
page read and write
2B3C00224000
trusted library allocation
page read and write
4A6F000
stack
page read and write
FE8000
heap
page read and write
124D000
stack
page read and write
F85000
heap
page read and write
2B3C00B24000
trusted library allocation
page read and write
1E290927000
unclassified section
page read and write
37DD000
stack
page read and write
2B3C00FA0000
trusted library allocation
page read and write
29988801000
trusted library allocation
page read and write
5973DFD000
stack
page read and write
299894EB000
heap
page read and write
21212000
heap
page read and write
1E28A202000
heap
page read and write
513E000
trusted library allocation
page read and write
F49000
heap
page read and write
590C7FE000
unkown
page readonly
1337000
heap
page read and write
20504C10000
heap
page read and write
340000
unkown
page read and write
37A800264000
trusted library allocation
page read and write
272F3000
heap
page read and write
130000
unkown
page readonly
310000
unkown
page readonly
1164000
heap
page read and write
2861203D000
heap
page read and write
2B3C001F8000
trusted library allocation
page read and write
4B71000
heap
page read and write
2998871A000
heap
page read and write
F73000
heap
page read and write
2B3C00D78000
trusted library allocation
page read and write
23C29C15000
heap
page read and write
C50000
unkown
page readonly
114C000
stack
page read and write
4385000
trusted library allocation
page read and write
3533000
heap
page read and write
3DEF000
stack
page read and write
F6D000
heap
page read and write
4810000
direct allocation
page read and write
F51000
heap
page read and write
34E4000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
3100000
heap
page read and write
21232000
heap
page read and write
3DF7000
trusted library allocation
page read and write
2115A302000
heap
page read and write
59027FE000
unkown
page readonly
CBF000
unkown
page execute and write copy
29988602000
heap
page read and write
16DC000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
B6F000
heap
page read and write
2B3C001AC000
trusted library allocation
page read and write
BEB000
heap
page read and write
44AC000
trusted library allocation
page read and write
131B000
heap
page read and write
585E000
trusted library allocation
page read and write
29987E93000
heap
page read and write
3B80000
trusted library allocation
page read and write
1C600000
heap
page read and write
291E000
heap
page read and write
800000
heap
page read and write
4880000
direct allocation
page read and write
4E8467B000
stack
page read and write
6D160000
unkown
page readonly
4A10000
direct allocation
page execute and read and write
FD6000
heap
page read and write
6A0000
unkown
page read and write
4383000
trusted library allocation
page read and write
533B000
stack
page read and write
83F000
heap
page read and write
587D000
trusted library allocation
page read and write
1154000
heap
page read and write
590DFFE000
stack
page read and write
57D6000
trusted library allocation
page read and write
446C000
trusted library allocation
page read and write
4751000
heap
page read and write
4B71000
heap
page read and write
A011EFF000
stack
page read and write
5190000
direct allocation
page execute and read and write
132B000
heap
page read and write
472F000
stack
page read and write
F62000
heap
page read and write
BEB000
heap
page read and write
4920000
trusted library allocation
page read and write
33BF000
stack
page read and write
1E289C57000
heap
page read and write
3378000
heap
page read and write
A70000
unkown
page readonly
1E290950000
trusted library section
page read and write
2298007C8000
trusted library allocation
page read and write
1E290560000
trusted library section
page read and write
1089000
heap
page read and write
2B3C00214000
trusted library allocation
page read and write
2B3C0048C000
trusted library allocation
page read and write
994000
heap
page read and write
A0123FF000
stack
page read and write
10E6000
heap
page read and write
229800330000
trusted library allocation
page read and write
13AF000
heap
page read and write
3E56000
trusted library allocation
page read and write
2115A200000
heap
page read and write
34FF000
stack
page read and write
57E7000
trusted library allocation
page read and write
438C000
trusted library allocation
page read and write
4751000
heap
page read and write
615000
heap
page read and write
4B71000
heap
page read and write
1E290BB6000
trusted library section
page read and write
57D5000
trusted library allocation
page read and write
2298006CC000
trusted library allocation
page read and write
3ACF000
stack
page read and write
710000
direct allocation
page read and write
21219000
heap
page read and write
1E28FEFD000
trusted library section
page read and write
EB8000
heap
page read and write
935000
unkown
page read and write
764000
heap
page read and write
1E6F000
stack
page read and write
4401000
heap
page read and write
BF3000
heap
page read and write
21225000
heap
page read and write
1E289C20000
heap
page read and write
2B3C00380000
trusted library allocation
page read and write
2121C000
heap
page read and write
290C000
heap
page read and write
AE4000
heap
page read and write
1030000
heap
page read and write
590AFFE000
stack
page read and write
418D000
stack
page read and write
3E4E000
trusted library allocation
page read and write
392E000
stack
page read and write
1E2866A5000
heap
page read and write
2861232C000
heap
page read and write
B50000
heap
page read and write
414F000
stack
page read and write
229800320000
trusted library allocation
page read and write
2205F660000
heap
page read and write
66C0000
heap
page read and write
46AF000
stack
page read and write
4228000
trusted library allocation
page read and write
57C9000
trusted library allocation
page read and write
FC7000
heap
page read and write
58A4000
trusted library allocation
page read and write
444F000
trusted library allocation
page read and write
406F000
stack
page read and write
29989454000
heap
page read and write
28612028000
heap
page read and write
20505802000
heap
page read and write
1484000
heap
page read and write
4389000
trusted library allocation
page read and write
32D2000
heap
page read and write
229800248000
trusted library allocation
page read and write
FDB907E000
stack
page read and write
29987F13000
heap
page read and write
3D71000
heap
page read and write
388E000
stack
page read and write
4442000
trusted library allocation
page read and write
1113000
unkown
page execute read
C63C1FF000
stack
page read and write
5909FFE000
stack
page read and write
2BB0000
direct allocation
page read and write
58A4000
trusted library allocation
page read and write
F4D000
unkown
page execute and read and write
2298002F0000
trusted library allocation
page read and write
3220000
heap
page read and write
432E000
stack
page read and write
1190000
heap
page read and write
F6C000
heap
page read and write
2050533A000
heap
page read and write
2298006C8000
trusted library allocation
page read and write
4D80000
direct allocation
page execute and read and write
28612053000
heap
page read and write
7AE000
stack
page read and write
618F000
stack
page read and write
2B3C00848000
trusted library allocation
page read and write
256DBFF000
stack
page read and write
23C2962B000
heap
page read and write
106A000
heap
page read and write
58A4000
trusted library allocation
page read and write
3DEF000
trusted library allocation
page read and write
59137FE000
unkown
page readonly
37D1000
heap
page read and write
1CCEF000
stack
page read and write
37EE000
stack
page read and write
DDE000
stack
page read and write
1325000
heap
page read and write
20505375000
heap
page read and write
34DF000
heap
page read and write
34BE000
heap
page read and write
3E06000
trusted library allocation
page read and write
229800260000
trusted library allocation
page read and write
C69000
unkown
page execute and write copy
587D000
trusted library allocation
page read and write
3DE9000
trusted library allocation
page read and write
BCF000
heap
page read and write
720000
heap
page read and write
2B3C00294000
trusted library allocation
page read and write
1A98D000
stack
page read and write
4810000
direct allocation
page read and write
586E000
trusted library allocation
page read and write
4751000
heap
page read and write
34F8000
heap
page read and write
52FF000
stack
page read and write
88E000
unkown
page read and write
2B3C00ED4000
trusted library allocation
page read and write
2298006BC000
trusted library allocation
page read and write
730000
heap
page read and write
34E4000
heap
page read and write
596B5FE000
unkown
page readonly
587D000
trusted library allocation
page read and write
1453DFE000
stack
page read and write
A011CFA000
stack
page read and write
BD0000
heap
page read and write
4751000
heap
page read and write
1200000
trusted library allocation
page read and write
2205F600000
heap
page read and write
F83000
heap
page read and write
58BD000
trusted library allocation
page read and write
5966DFB000
stack
page read and write
2B3C0044B000
trusted library allocation
page read and write
300F000
stack
page read and write
1AA8F000
stack
page read and write
57F9000
trusted library allocation
page read and write
597EDFD000
stack
page read and write
3E04000
trusted library allocation
page read and write
1102000
heap
page read and write
408000
unkown
page readonly
10CB000
heap
page read and write
3DF8000
trusted library allocation
page read and write
3DF8000
trusted library allocation
page read and write
41EE000
stack
page read and write
994000
heap
page read and write
11FC000
stack
page read and write
CDF000
unkown
page execute and read and write
29987E6F000
heap
page read and write
F43000
heap
page read and write
F83000
heap
page read and write
F49000
heap
page read and write
4389000
trusted library allocation
page read and write
4B71000
heap
page read and write
21216000
heap
page read and write
468E000
stack
page read and write
161E000
heap
page read and write
F71000
heap
page read and write
442F000
stack
page read and write
23C29713000
heap
page read and write
2121C000
heap
page read and write
37D0000
heap
page read and write
23C2968A000
heap
page read and write
229800664000
trusted library allocation
page read and write
21037F17000
heap
page read and write
CFF000
stack
page read and write
A0122FF000
stack
page read and write
F73000
heap
page read and write
F55000
heap
page read and write
3E44000
trusted library allocation
page read and write
39FF000
stack
page read and write
D5E000
unkown
page execute and write copy
710000
direct allocation
page read and write
44AE000
trusted library allocation
page read and write
2205FD30000
remote allocation
page read and write
5FB5000
trusted library allocation
page read and write
1E28A100000
trusted library section
page read and write
915000
unkown
page read and write
28612054000
heap
page read and write
478F000
stack
page read and write
1E28FE73000
trusted library section
page read and write
1290000
heap
page read and write
1AFBC000
stack
page read and write
6A9000
unkown
page readonly
7FFAAC233000
trusted library allocation
page execute and read and write
2B3C009BC000
trusted library allocation
page read and write
4D21000
heap
page read and write
22980020C000
trusted library allocation
page read and write
31F0000
remote allocation
page read and write
790000
heap
page read and write
670000
unkown
page readonly
2DF0000
direct allocation
page read and write
3683000
heap
page read and write
6C9F5000
unkown
page readonly
4B71000
heap
page read and write
10D4000
heap
page read and write
2B3C00448000
trusted library allocation
page read and write
59017FE000
unkown
page readonly
703B1000
unkown
page execute read
2B3C00174000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
4821000
heap
page read and write
5E0000
heap
page read and write
596C5FE000
unkown
page readonly
2B3C0060C000
trusted library allocation
page read and write
FDF000
heap
page read and write
3ECE000
stack
page read and write
337D000
heap
page read and write
F4F000
heap
page read and write
1E29064D000
trusted library section
page read and write
2CCF000
stack
page read and write
3DCE000
stack
page read and write
7FFB226D0000
unkown
page read and write
105B000
heap
page read and write
441E000
trusted library allocation
page read and write
F6E000
heap
page read and write
670000
unkown
page readonly
1E2906C0000
trusted library section
page read and write
7FFAAC23D000
trusted library allocation
page execute and read and write
4E10000
direct allocation
page execute and read and write
586E000
trusted library allocation
page read and write
459F000
trusted library allocation
page read and write
37BE000
stack
page read and write
1484000
heap
page read and write
1AD7E000
stack
page read and write
587D000
trusted library allocation
page read and write
444D000
trusted library allocation
page read and write
1762000
heap
page read and write
A71000
unkown
page execute and read and write
2B3C002F3000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
4A80000
direct allocation
page execute and read and write
3375000
heap
page read and write
2B3C00E80000
trusted library allocation
page read and write
438F000
trusted library allocation
page read and write
4590000
trusted library allocation
page read and write
CEA000
heap
page read and write
2B3C0009C000
trusted library allocation
page read and write
3D71000
heap
page read and write
3425000
heap
page read and write
2B3C00294000
trusted library allocation
page read and write
3D71000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
1308000
heap
page read and write
5967DFC000
stack
page read and write
4502000
trusted library allocation
page read and write
38CE000
stack
page read and write
1103000
heap
page read and write
585D000
trusted library allocation
page read and write
5963DFA000
stack
page read and write
4387000
trusted library allocation
page read and write
21225000
heap
page read and write
2B3C00D90000
trusted library allocation
page read and write
1109000
unkown
page execute and write copy
33CE000
stack
page read and write
4401000
heap
page read and write
4B71000
heap
page read and write
432E000
stack
page read and write
4751000
heap
page read and write
587D000
trusted library allocation
page read and write
2A60000
heap
page read and write
2B3C00058000
trusted library allocation
page read and write
BED000
heap
page read and write
57BA000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
3DF2000
trusted library allocation
page read and write
3DF9000
trusted library allocation
page read and write
4751000
heap
page read and write
2298006D4000
trusted library allocation
page read and write
89C000
stack
page read and write
38BF000
stack
page read and write
61EB4000
direct allocation
page read and write
1E28A21B000
heap
page read and write
3DFC000
trusted library allocation
page read and write
6CD000
stack
page read and write
592000
unkown
page readonly
17D000
unkown
page write copy
4B71000
heap
page read and write
58A4000
trusted library allocation
page read and write
595F5FE000
unkown
page readonly
2EBF000
stack
page read and write
3076000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
313F000
stack
page read and write
2B3C00E9F000
trusted library allocation
page read and write
324F000
stack
page read and write
994000
heap
page read and write
2F70000
trusted library allocation
page read and write
4B71000
heap
page read and write
F8E000
heap
page read and write
4751000
heap
page read and write
1010000
heap
page read and write
1E28A238000
heap
page read and write
1E28E400000
heap
page read and write
2B3C001B4000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
3DFA000
trusted library allocation
page read and write
720000
heap
page read and write
456D000
trusted library allocation
page read and write
4751000
heap
page read and write
3B80000
trusted library allocation
page read and write
BE0000
trusted library section
page readonly
3B80000
trusted library allocation
page read and write
2B3C00364000
trusted library allocation
page read and write
229800294000
trusted library allocation
page read and write
57EA000
trusted library allocation
page read and write
1E28FF30000
trusted library section
page read and write
5816000
trusted library allocation
page read and write
3E4A000
trusted library allocation
page read and write
CF2000
unkown
page execute and read and write
AE4000
heap
page read and write
B5A000
heap
page read and write
3E05000
trusted library allocation
page read and write
BC1000
heap
page read and write
EF8000
heap
page read and write
C50000
unkown
page readonly
229800684000
trusted library allocation
page read and write
3E1D000
trusted library allocation
page read and write
104A000
heap
page read and write
41AF000
stack
page read and write
597F5FE000
unkown
page readonly
2B3C00C2C000
trusted library allocation
page read and write
1E2866F4000
heap
page read and write
1E28A25E000
heap
page read and write
587D000
trusted library allocation
page read and write
3E04000
trusted library allocation
page read and write
855000
heap
page read and write
994000
heap
page read and write
4401000
heap
page read and write
48E1000
direct allocation
page read and write
2B3C001B4000
trusted library allocation
page read and write
4751000
heap
page read and write
852000
unkown
page read and write
2B3C0094C000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
27313000
heap
page read and write
1610000
heap
page read and write
586D000
trusted library allocation
page read and write
C63C2FF000
stack
page read and write
A69000
unkown
page read and write
596DDFE000
stack
page read and write
F46000
heap
page read and write
77D000
stack
page read and write
FE1000
heap
page read and write
10E9000
heap
page read and write
4751000
heap
page read and write
1484000
heap
page read and write
855000
heap
page read and write
2B3C007C4000
trusted library allocation
page read and write
131E000
heap
page read and write
57C9000
trusted library allocation
page read and write
1E28FE32000
trusted library section
page read and write
7FFAAC28C000
trusted library allocation
page execute and read and write
BFC000
heap
page read and write
2DFF000
stack
page read and write
180000
heap
page read and write
2998950F000
heap
page read and write
4751000
heap
page read and write
438E000
trusted library allocation
page read and write
2BB0000
direct allocation
page read and write
DE0000
heap
page read and write
1E28A27A000
heap
page read and write
4751000
heap
page read and write
2120C000
heap
page read and write
299893B0000
trusted library allocation
page read and write
381000
unkown
page execute read
1AE7D000
stack
page read and write
410F000
stack
page read and write
10ED000
heap
page read and write
2B3C00624000
trusted library allocation
page read and write
4472000
trusted library allocation
page read and write
37A8002C0000
trusted library allocation
page read and write
EF8000
heap
page read and write
110C000
heap
page read and write
545E000
stack
page read and write
2BB0000
direct allocation
page read and write
21222000
heap
page read and write
3F2F000
stack
page read and write
587D000
trusted library allocation
page read and write
57E9000
trusted library allocation
page read and write
994000
heap
page read and write
14541FE000
unkown
page readonly
1E2866C5000
heap
page read and write
580B000
trusted library allocation
page read and write
16DC000
trusted library allocation
page read and write
BEA000
heap
page read and write
4B71000
heap
page read and write
292E000
heap
page read and write
43CE000
stack
page read and write
300F000
stack
page read and write
354E000
heap
page read and write
3419000
heap
page read and write
1548000
heap
page read and write
388F000
stack
page read and write
6A0000
unkown
page read and write
A00000
unkown
page readonly
2F0F000
stack
page read and write
4627000
trusted library allocation
page read and write
2B3C00E0C000
trusted library allocation
page read and write
122E000
stack
page read and write
FDB8A7E000
stack
page read and write
3E2C000
trusted library allocation
page read and write
3509000
heap
page read and write
597FDFE000
stack
page read and write
586D000
trusted library allocation
page read and write
57C9000
trusted library allocation
page read and write
994000
heap
page read and write
84F1000
heap
page read and write
1815000
heap
page read and write
98000
stack
page read and write
F5F000
heap
page read and write
4821000
heap
page read and write
1E289C46000
heap
page read and write
586E000
trusted library allocation
page read and write
4751000
heap
page read and write
50C0000
heap
page read and write
2CD3000
heap
page read and write
4751000
heap
page read and write
D75000
heap
page read and write
4810000
direct allocation
page read and write
1470000
heap
page read and write
1E290571000
trusted library section
page read and write
D73000
unkown
page execute and write copy
44D4000
trusted library allocation
page read and write
123F000
stack
page read and write
272D1000
heap
page read and write
4120000
trusted library allocation
page read and write
3E3B000
trusted library allocation
page read and write
37A800270000
trusted library allocation
page read and write
703B1000
unkown
page execute read
DA7000
heap
page read and write
F63000
heap
page read and write
859000
heap
page read and write
3D71000
heap
page read and write
3602000
heap
page read and write
59067FE000
unkown
page readonly
58A4000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
1061000
heap
page read and write
4D10000
direct allocation
page read and write
1B15D000
stack
page read and write
DD5000
heap
page read and write
FDB9A7E000
stack
page read and write
FDB84F9000
stack
page read and write
1C7F9000
heap
page read and write
58A4000
trusted library allocation
page read and write
696000
unkown
page readonly
2B3C00294000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
2B3C00310000
trusted library allocation
page read and write
229800620000
trusted library allocation
page read and write
11B5000
heap
page read and write
1052000
heap
page read and write
229800248000
trusted library allocation
page read and write
44F4000
trusted library allocation
page read and write
368C002AC000
direct allocation
page read and write
2DBE000
stack
page read and write
2205F5A0000
heap
page read and write
B5A000
heap
page read and write
102C000
heap
page read and write
58A4000
trusted library allocation
page read and write
1E28E403000
heap
page read and write
438D000
trusted library allocation
page read and write
3E0C000
trusted library allocation
page read and write
290B000
heap
page read and write
4440000
trusted library allocation
page read and write
3DF7000
trusted library allocation
page read and write
DAE000
heap
page read and write
2120B000
heap
page read and write
16D1000
trusted library allocation
page read and write
15550660000
heap
page read and write
4751000
heap
page read and write
1200000
trusted library allocation
page read and write
148A000
heap
page read and write
BED000
heap
page read and write
44B1000
trusted library allocation
page read and write
F66000
unkown
page execute and write copy
D57000
unkown
page execute and read and write
F80000
heap
page read and write
587D000
trusted library allocation
page read and write
CC6000
unkown
page execute and read and write
1E290642000
trusted library section
page read and write
12F5000
heap
page read and write
337B000
heap
page read and write
2205F602000
heap
page read and write
348C000
heap
page read and write
2998D670000
remote allocation
page read and write
586B000
trusted library allocation
page read and write
1E28A24C000
heap
page read and write
450E000
stack
page read and write
E1F000
stack
page read and write
7FFB226D5000
unkown
page readonly
2BB34325000
heap
page read and write
2B3C00440000
trusted library allocation
page read and write
1E290583000
trusted library section
page read and write
323F000
stack
page read and write
346F000
heap
page read and write
2B3C008AC000
trusted library allocation
page read and write
3D71000
heap
page read and write
703CD000
unkown
page read and write
368C00303000
direct allocation
page read and write
1314000
heap
page read and write
4E30000
direct allocation
page execute and read and write
2BB341AC000
heap
page read and write
F58000
heap
page read and write
4120000
trusted library allocation
page read and write
3610000
heap
page read and write
4463000
trusted library allocation
page read and write
1E289C57000
heap
page read and write
4B71000
heap
page read and write
2B3C00E9C000
trusted library allocation
page read and write
4B71000
heap
page read and write
2298002DC000
trusted library allocation
page read and write
4E8487B000
stack
page read and write
2BB341B5000
heap
page read and write
438F000
stack
page read and write
2C1E000
stack
page read and write
4D40000
heap
page read and write
2B3C00FD4000
trusted library allocation
page read and write
23C2967D000
heap
page read and write
2B3C0052C000
trusted library allocation
page read and write
2B3C0068D000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
117F000
heap
page read and write
586D000
trusted library allocation
page read and write
586D000
trusted library allocation
page read and write
F4D000
unkown
page execute and read and write
3DE8000
trusted library allocation
page read and write
145327B000
stack
page read and write
4751000
heap
page read and write
4120000
trusted library allocation
page read and write
3498000
heap
page read and write
2B3C001DC000
trusted library allocation
page read and write
2B3C00E48000
trusted library allocation
page read and write
BED000
heap
page read and write
4D21000
heap
page read and write
720000
heap
page read and write
2121F000
heap
page read and write
29987E8E000
heap
page read and write
2298002C8000
trusted library allocation
page read and write
7F0000
heap
page read and write
175B000
heap
page read and write
2D7F000
stack
page read and write
BCB000
heap
page read and write
3E1A000
trusted library allocation
page read and write
3DE9000
trusted library allocation
page read and write
129B000
heap
page read and write
3371000
heap
page read and write
3E24000
trusted library allocation
page read and write
229800744000
trusted library allocation
page read and write
3E52000
trusted library allocation
page read and write
7CA000
unkown
page read and write
596F5FE000
unkown
page readonly
2B3C00B98000
trusted library allocation
page read and write
3DF2000
trusted library allocation
page read and write
3DF0000
trusted library allocation
page read and write
C68000
unkown
page execute and read and write
AE4000
heap
page read and write
3E1F000
trusted library allocation
page read and write
229800424000
trusted library allocation
page read and write
DDC000
heap
page read and write
4A40000
direct allocation
page execute and read and write
5E0000
unkown
page readonly
4B71000
heap
page read and write
CB9000
unkown
page read and write
29988D90000
trusted library allocation
page read and write
61BD000
heap
page read and write
DDB000
stack
page read and write
520000
heap
page read and write
10A3000
heap
page read and write
597BDFB000
stack
page read and write
5903FFD000
stack
page read and write
4810000
direct allocation
page read and write
4821000
heap
page read and write
40B000
unkown
page read and write
2998D600000
trusted library allocation
page read and write
1B180000
heap
page read and write
229800348000
trusted library allocation
page read and write
28612058000
heap
page read and write
1069000
heap
page read and write
21210000
heap
page read and write
10A3000
heap
page read and write
990000
heap
page read and write
155505B0000
heap
page read and write
1103000
heap
page read and write
1060000
heap
page read and write
58A4000
trusted library allocation
page read and write
21225000
heap
page read and write
2B3C00EA8000
trusted library allocation
page read and write
590B7FE000
unkown
page readonly
37A8002C0000
trusted library allocation
page read and write
3406000
heap
page read and write
83F000
heap
page read and write
438B000
trusted library allocation
page read and write
1012000
heap
page read and write
1310000
heap
page read and write
CFC000
unkown
page execute and read and write
57CA000
trusted library allocation
page read and write
40AE000
stack
page read and write
2B3C005AC000
trusted library allocation
page read and write
888000
heap
page read and write
2B3C0080C000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
7FFAAC254000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
3D71000
heap
page read and write
145337D000
stack
page read and write
1484000
heap
page read and write
3A6E000
stack
page read and write
6590000
heap
page read and write
834F000
stack
page read and write
15C2000
heap
page read and write
2B3C00C94000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
20504AAD000
heap
page read and write
4391000
trusted library allocation
page read and write
438F000
trusted library allocation
page read and write
3C9000
unkown
page write copy
7FFAAC234000
trusted library allocation
page read and write
2B3C00801000
trusted library allocation
page read and write
20505374000
heap
page read and write
2903000
heap
page read and write
2BB0000
direct allocation
page read and write
584F000
trusted library allocation
page read and write
37A800201000
trusted library allocation
page read and write
13F0000
heap
page read and write
2B3C00970000
trusted library allocation
page read and write
3E53000
trusted library allocation
page read and write
28613F00000
heap
page read and write
ACB000
unkown
page execute and read and write
1E28A1FA000
heap
page read and write
4391000
trusted library allocation
page read and write
32FE000
heap
page read and write
4B80000
heap
page read and write
84B000
heap
page read and write
D82000
unkown
page execute and read and write
3A80000
trusted library allocation
page read and write
368C002EC000
direct allocation
page read and write
74C000
heap
page read and write
29989502000
heap
page read and write
58A4000
trusted library allocation
page read and write
2B3C00448000
trusted library allocation
page read and write
2BB341A8000
heap
page read and write
FDB7B7E000
stack
page read and write
2B3C001AC000
trusted library allocation
page read and write
859000
heap
page read and write
57B1000
trusted library allocation
page read and write
292D000
heap
page read and write
1484000
heap
page read and write
1E28A1F9000
heap
page read and write
DCD000
stack
page read and write
299893A0000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
859000
heap
page read and write
4E30000
direct allocation
page execute and read and write
2A1E000
stack
page read and write
612000
unkown
page write copy
2B3C00B78000
trusted library allocation
page read and write
229800354000
trusted library allocation
page read and write
2B3C00FA4000
trusted library allocation
page read and write
23C29410000
heap
page read and write
57D2000
trusted library allocation
page read and write
15FE000
stack
page read and write
3E3B000
trusted library allocation
page read and write
277E000
stack
page read and write
3DBF000
stack
page read and write
2B3C0098B000
trusted library allocation
page read and write
F4F000
heap
page read and write
1E30000
heap
page read and write
20505215000
heap
page read and write
4508000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
4751000
heap
page read and write
4B71000
heap
page read and write
710000
direct allocation
page read and write
994000
heap
page read and write
446A000
trusted library allocation
page read and write
FA5000
heap
page read and write
2BB341B7000
heap
page read and write
994000
heap
page read and write
2BB0000
direct allocation
page read and write
2B3C00F5C000
trusted library allocation
page read and write
C59000
unkown
page execute and write copy
29987EDE000
heap
page read and write
229800430000
trusted library allocation
page read and write
287F000
stack
page read and write
33CE000
stack
page read and write
BCE000
heap
page read and write
710000
direct allocation
page read and write
596FDFE000
stack
page read and write
586D000
trusted library allocation
page read and write
B71000
heap
page read and write
F5E000
stack
page read and write
12DB000
heap
page read and write
E1D000
stack
page read and write
2B3C00F64000
trusted library allocation
page read and write
2298006FC000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
4120000
trusted library allocation
page read and write
1E28A300000
trusted library section
page read and write
2B3C005F0000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
58B1000
trusted library allocation
page read and write
C36000
unkown
page execute and write copy
2050536B000
heap
page read and write
507D000
stack
page read and write
587D000
trusted library allocation
page read and write
585E000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
7F9000
stack
page read and write
1107000
unkown
page execute and read and write
1860000
heap
page read and write
3DE1000
trusted library allocation
page read and write
2298006F0000
trusted library allocation
page read and write
21234000
heap
page read and write
5B96000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
E3A000
unkown
page execute and read and write
1484000
heap
page read and write
1320000
trusted library allocation
page read and write
2B3C0040C000
trusted library allocation
page read and write
4751000
heap
page read and write
2B3C00C84000
trusted library allocation
page read and write
2951000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
1E28A213000
heap
page read and write
5190000
direct allocation
page execute and read and write
334C000
heap
page read and write
37A8002E4000
trusted library allocation
page read and write
3E0C000
trusted library allocation
page read and write
5868000
trusted library allocation
page read and write
299892D0000
trusted library allocation
page read and write
4BAF000
stack
page read and write
442D000
trusted library allocation
page read and write
1484000
heap
page read and write
2B3C00AA0000
trusted library allocation
page read and write
730000
heap
page read and write
59785FE000
unkown
page readonly
57DB000
trusted library allocation
page read and write
5B3D000
stack
page read and write
54BE000
stack
page read and write
CCF000
unkown
page execute and write copy
1251000
heap
page read and write
3D71000
heap
page read and write
4751000
heap
page read and write
10B4000
heap
page read and write
4B71000
heap
page read and write
5CB0000
remote allocation
page read and write
37D1000
heap
page read and write
303E000
stack
page read and write
7FFAAC3D0000
trusted library allocation
page read and write
29989240000
trusted library allocation
page read and write
F64000
heap
page read and write
769000
unkown
page write copy
273F000
stack
page read and write
442F000
trusted library allocation
page read and write
859000
heap
page read and write
4810000
direct allocation
page read and write
2DAF000
stack
page read and write
59047FE000
unkown
page readonly
3475000
heap
page read and write
4CB0000
direct allocation
page read and write
38D0000
trusted library allocation
page read and write
4751000
heap
page read and write
547F000
stack
page read and write
2C6F000
stack
page read and write
2115A410000
heap
page read and write
C6D000
unkown
page execute and read and write
4382000
trusted library allocation
page read and write
4386000
trusted library allocation
page read and write
29987E78000
heap
page read and write
46EE000
stack
page read and write
3E17000
trusted library allocation
page read and write
F55000
heap
page read and write
22980035C000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
2BB34150000
heap
page read and write
2050532E000
heap
page read and write
37A800260000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
7C0000
heap
page read and write
2B3C00790000
trusted library allocation
page read and write
29987CF0000
heap
page read and write
FC9000
heap
page read and write
14543FE000
unkown
page readonly
2B3C0011C000
trusted library allocation
page read and write
2B3C00234000
trusted library allocation
page read and write
1484000
heap
page read and write
316F000
stack
page read and write
BE4000
heap
page read and write
342E000
stack
page read and write
4751000
heap
page read and write
51BF000
stack
page read and write
4751000
heap
page read and write
2B3C00330000
trusted library allocation
page read and write
4C2B000
stack
page read and write
3E70000
trusted library allocation
page read and write
95D000
stack
page read and write
1200000
trusted library allocation
page read and write
25DF000
stack
page read and write
FFB000
heap
page read and write
F7E000
stack
page read and write
4D10000
direct allocation
page read and write
2B3C00CF8000
trusted library allocation
page read and write
10F9000
heap
page read and write
B66000
heap
page read and write
1052000
heap
page read and write
210397D0000
remote allocation
page read and write
4751000
heap
page read and write
57EF000
trusted library allocation
page read and write
2B3C00BA0000
trusted library allocation
page read and write
855000
heap
page read and write
57D9000
trusted library allocation
page read and write
A2A000
heap
page read and write
337F000
heap
page read and write
2B3C00AAC000
trusted library allocation
page read and write
37A8002F8000
trusted library allocation
page read and write
4810000
direct allocation
page read and write
324E000
stack
page read and write
710000
direct allocation
page read and write
61ED3000
direct allocation
page read and write
CC4000
unkown
page execute and read and write
BF3000
heap
page read and write
26CE000
heap
page read and write
3C7F000
stack
page read and write
871000
heap
page read and write
3DF0000
trusted library allocation
page read and write
FDB7A7B000
stack
page read and write
F56000
heap
page read and write
368C00220000
direct allocation
page read and write
994000
heap
page read and write
342E000
stack
page read and write
58A4000
trusted library allocation
page read and write
5162000
trusted library allocation
page read and write
3372000
heap
page read and write
58A4000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
BF1000
heap
page read and write
4751000
heap
page read and write
22980080C000
trusted library allocation
page read and write
4751000
heap
page read and write
57E2000
trusted library allocation
page read and write
4751000
heap
page read and write
4ACF000
heap
page read and write
2BB3418E000
heap
page read and write
21210000
heap
page read and write
281000
unkown
page execute read
59007FE000
unkown
page readonly
3071000
heap
page read and write
EC9000
heap
page read and write
2F70000
trusted library allocation
page read and write
7FFAAC3F0000
trusted library allocation
page read and write
DF7000
heap
page read and write
4388000
trusted library allocation
page read and write
2925000
heap
page read and write
3E55000
trusted library allocation
page read and write
3200000
heap
page read and write
2B3C0029A000
trusted library allocation
page read and write
2F0E000
stack
page read and write
3E49000
trusted library allocation
page read and write
CCC000
stack
page read and write
4493000
trusted library allocation
page read and write
1B295000
heap
page read and write
36DC000
stack
page read and write
59DD000
stack
page read and write
31BF000
stack
page read and write
4821000
heap
page read and write
A20000
heap
page read and write
3448000
heap
page read and write
37A800288000
trusted library allocation
page read and write
456F000
trusted library allocation
page read and write
BFD000
heap
page read and write
5961DFD000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
299894EF000
heap
page read and write
5E0000
unkown
page readonly
994000
heap
page read and write
14535FE000
stack
page readonly
5962DFB000
stack
page read and write
58A4000
trusted library allocation
page read and write
65E000
stack
page read and write
FDB8F7E000
stack
page read and write
1020000
heap
page read and write
482E000
stack
page read and write
22980078C000
trusted library allocation
page read and write
2BB3416C000
heap
page read and write
3377000
heap
page read and write
F63000
heap
page read and write
3DF5000
trusted library allocation
page read and write
4382000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
108E000
heap
page read and write
58A4000
trusted library allocation
page read and write
41AF000
stack
page read and write
2B3C00D08000
trusted library allocation
page read and write
351D000
heap
page read and write
A01000
unkown
page execute and write copy
3450000
heap
page read and write
BC2000
heap
page read and write
15550590000
heap
page read and write
21037E2B000
heap
page read and write
2B3C00380000
trusted library allocation
page read and write
F56000
heap
page read and write
23C29430000
heap
page read and write
4B71000
heap
page read and write
584C000
trusted library allocation
page read and write
C34000
unkown
page execute and read and write
7F5000
unkown
page read and write
3DF2000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
2B3C006A4000
trusted library allocation
page read and write
440E000
stack
page read and write
2B3C001E8000
trusted library allocation
page read and write
1080000
heap
page read and write
11C1000
heap
page read and write
58A4000
trusted library allocation
page read and write
3E7B000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
2B3C008E4000
trusted library allocation
page read and write
414E000
stack
page read and write
585F000
stack
page read and write
754000
heap
page read and write
2BA0000
heap
page read and write
B80000
heap
page read and write
3F2F000
stack
page read and write
1006000
heap
page read and write
59675FE000
unkown
page readonly
58A4000
trusted library allocation
page read and write
1745000
heap
page read and write
4A4E000
stack
page read and write
693E000
stack
page read and write
6580000
heap
page read and write
586E000
trusted library allocation
page read and write
2B3C00578000
trusted library allocation
page read and write
5968DFE000
stack
page read and write
53A0000
direct allocation
page execute and read and write
9BA000
unkown
page read and write
32EE000
stack
page read and write
4382000
trusted library allocation
page read and write
1167000
heap
page read and write
BED000
heap
page read and write
2B3C0033C000
trusted library allocation
page read and write
12E0000
heap
page read and write
DFC000
stack
page read and write
FDB8E7E000
stack
page read and write
403F000
stack
page read and write
3E7E000
trusted library allocation
page read and write
21223000
heap
page read and write
10A3000
heap
page read and write
D9F000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
4821000
heap
page read and write
703CF000
unkown
page readonly
147E000
stack
page read and write
2D70000
heap
page read and write
4182000
trusted library allocation
page read and write
3370000
heap
page read and write
1E28A21B000
heap
page read and write
1E289C4E000
heap
page read and write
3E04000
trusted library allocation
page read and write
2B3C00394000
trusted library allocation
page read and write
3D71000
heap
page read and write
3E2E000
trusted library allocation
page read and write
21037F02000
heap
page read and write
EF8000
heap
page read and write
26C9000
heap
page read and write
4460000
trusted library allocation
page read and write
F43000
heap
page read and write
72A000
heap
page read and write
368C0020C000
direct allocation
page read and write
3E00000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
3421000
heap
page read and write
FD3000
heap
page read and write
590000
unkown
page readonly
2B3C00154000
trusted library allocation
page read and write
44BA000
trusted library allocation
page read and write
132B000
heap
page read and write
3703000
heap
page read and write
5E0000
unkown
page readonly
2121C000
heap
page read and write
21037DF0000
trusted library allocation
page read and write
13A0000
heap
page read and write
4B71000
heap
page read and write
587D000
trusted library allocation
page read and write
4751000
heap
page read and write
5340000
direct allocation
page execute and read and write
2B3C009F4000
trusted library allocation
page read and write
3E2D000
trusted library allocation
page read and write
4751000
heap
page read and write
597DDFD000
stack
page read and write
20506010000
heap
page read and write
57C3000
trusted library allocation
page read and write
4810000
direct allocation
page read and write
57B8000
trusted library allocation
page read and write
1E2867E0000
heap
page read and write
FDB8B7E000
stack
page read and write
57E5000
trusted library allocation
page read and write
1C770000
trusted library section
page read and write
2DEE000
stack
page read and write
FDB88FB000
stack
page read and write
24DE000
stack
page read and write
764000
heap
page read and write
994000
heap
page read and write
1069000
heap
page read and write
15550613000
heap
page read and write
B85000
heap
page read and write
58A4000
trusted library allocation
page read and write
108A000
heap
page read and write
349C000
heap
page read and write
855000
heap
page read and write
5340000
direct allocation
page execute and read and write
4750000
heap
page read and write
4387000
trusted library allocation
page read and write
229800201000
trusted library allocation
page read and write
353E000
stack
page read and write
1E28A225000
heap
page read and write
1314000
heap
page read and write
C63C5FF000
stack
page read and write
13A5000
heap
page read and write
446E000
stack
page read and write
58A4000
trusted library allocation
page read and write
C5E000
heap
page read and write
112C000
heap
page read and write
2AD0000
heap
page read and write
4030000
trusted library allocation
page read and write
294F000
stack
page read and write
2B6B000
stack
page read and write
F73000
heap
page read and write
6EF000
stack
page read and write
4B71000
heap
page read and write
7FFAAC3E0000
trusted library allocation
page execute and read and write
4495000
trusted library allocation
page read and write
BCF000
heap
page read and write
2298007E0000
trusted library allocation
page read and write
F56000
heap
page read and write
FDB7EFE000
unkown
page readonly
C56000
unkown
page execute and read and write
3DF0000
trusted library allocation
page read and write
4751000
heap
page read and write
4120000
trusted library allocation
page read and write
F73000
heap
page read and write
1266000
heap
page read and write
4B83000
heap
page read and write
2B3C00734000
trusted library allocation
page read and write
460B000
trusted library allocation
page read and write
59755FE000
unkown
page readonly
448C000
trusted library allocation
page read and write
59117FE000
unkown
page readonly
1E289C5F000
heap
page read and write
F51000
heap
page read and write
3DFB000
trusted library allocation
page read and write
5888000
trusted library allocation
page read and write
1164000
heap
page read and write
58A4000
trusted library allocation
page read and write
22980033C000
trusted library allocation
page read and write
35CB000
heap
page read and write
20505340000
heap
page read and write
5370000
direct allocation
page execute and read and write
57E7000
trusted library allocation
page read and write
117F000
stack
page read and write
3D71000
heap
page read and write
1700000
heap
page read and write
2BB3417F000
heap
page read and write
3D71000
heap
page read and write
1329000
heap
page read and write
4380000
trusted library allocation
page read and write
589D000
trusted library allocation
page read and write
B65000
heap
page read and write
2B3C00E78000
trusted library allocation
page read and write
229800320000
trusted library allocation
page read and write
595EDFE000
stack
page read and write
21224000
heap
page read and write
3170000
heap
page read and write
4A30000
direct allocation
page execute and read and write
3407000
heap
page read and write
21037E6D000
heap
page read and write
3522000
heap
page read and write
29989490000
heap
page read and write
16FF000
stack
page read and write
3DF5000
trusted library allocation
page read and write
4751000
heap
page read and write
585D000
trusted library allocation
page read and write
461000
unkown
page read and write
2B3C0063C000
trusted library allocation
page read and write
859000
heap
page read and write
4B71000
heap
page read and write
3E04000
trusted library allocation
page read and write
44C6000
trusted library allocation
page read and write
364E000
stack
page read and write
C2E000
stack
page read and write
4236000
trusted library allocation
page read and write
2B3C00328000
trusted library allocation
page read and write
3E48000
trusted library allocation
page read and write
2B9E000
stack
page read and write
D0000
unkown
page readonly
5866000
trusted library allocation
page read and write
2B3C00A0C000
trusted library allocation
page read and write
C08000
heap
page read and write
E80000
heap
page read and write
2205F580000
heap
page read and write
587D000
trusted library allocation
page read and write
1CBEE000
stack
page read and write
37A800235000
trusted library allocation
page read and write
2EB0000
heap
page read and write
476E000
stack
page read and write
3B7B000
heap
page read and write
229800368000
trusted library allocation
page read and write
29BF000
stack
page read and write
3DF5000
trusted library allocation
page read and write
10F2000
heap
page read and write
401000
unkown
page execute read
3DF2000
trusted library allocation
page read and write
43FF000
stack
page read and write
2998D620000
trusted library allocation
page read and write
C87000
unkown
page execute and write copy
5340000
direct allocation
page execute and read and write
45F8000
trusted library allocation
page read and write
44A8000
trusted library allocation
page read and write
59655FE000
unkown
page readonly
57F4000
trusted library allocation
page read and write
2F78000
trusted library allocation
page read and write
31AF000
stack
page read and write
2B3C00290000
trusted library allocation
page read and write
44A6000
trusted library allocation
page read and write
3DE1000
trusted library allocation
page read and write
3D71000
heap
page read and write
C62000
heap
page read and write
3DEF000
trusted library allocation
page read and write
2DF0000
direct allocation
page read and write
1080000
heap
page read and write
256D97E000
unkown
page read and write
DA1000
heap
page read and write
2861200B000
heap
page read and write
52FF000
stack
page read and write
994000
heap
page read and write
585D000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
4B71000
heap
page read and write
37A8002BC000
trusted library allocation
page read and write
1E286600000
trusted library allocation
page read and write
21242000
heap
page read and write
337C000
heap
page read and write
22980060C000
trusted library allocation
page read and write
3DEC000
trusted library allocation
page read and write
3C9000
unkown
page write copy
3DF6000
trusted library allocation
page read and write
1079000
heap
page read and write
CB2000
unkown
page execute and read and write
4821000
heap
page read and write
E3A000
unkown
page execute and read and write
48CE000
stack
page read and write
C30000
heap
page read and write
464F000
stack
page read and write
F6E000
heap
page read and write
3DEC000
trusted library allocation
page read and write
392E000
stack
page read and write
57B7000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
3E44000
trusted library allocation
page read and write
2B3C00AC0000
trusted library allocation
page read and write
3F6E000
stack
page read and write
229800750000
trusted library allocation
page read and write
800000
heap
page read and write
4435000
trusted library allocation
page read and write
F43000
heap
page read and write
586E000
trusted library allocation
page read and write
59077FE000
unkown
page readonly
286122E0000
heap
page read and write
2B3C00A40000
trusted library allocation
page read and write
AD7000
unkown
page execute and write copy
37A800278000
trusted library allocation
page read and write
F48000
heap
page read and write
5340000
direct allocation
page execute and read and write
7FFAAC25D000
trusted library allocation
page execute and read and write
84B000
heap
page read and write
585D000
trusted library allocation
page read and write
1078000
heap
page read and write
58A4000
trusted library allocation
page read and write
BE3000
heap
page read and write
4B71000
heap
page read and write
FDB8AFE000
unkown
page readonly
4D90000
direct allocation
page execute and read and write
1049000
heap
page read and write
F48000
heap
page read and write
4181000
trusted library allocation
page read and write
2B3C008DC000
trusted library allocation
page read and write
F6D000
heap
page read and write
4382000
trusted library allocation
page read and write
2B3C002C0000
trusted library allocation
page read and write
2B3C00994000
trusted library allocation
page read and write
356E000
stack
page read and write
7FF000
unkown
page read and write
4120000
trusted library allocation
page read and write
176B000
heap
page read and write
14542FD000
stack
page read and write
2BB341A3000
heap
page read and write
2B3C00218000
trusted library allocation
page read and write
26C2000
heap
page read and write
CF9000
unkown
page execute and write copy
28612030000
heap
page read and write
5330000
direct allocation
page execute and read and write
FDB92FE000
unkown
page readonly
F06000
heap
page read and write
1048000
heap
page read and write
1E289C30000
heap
page read and write
D547EFA000
stack
page read and write
C5E000
unkown
page execute and read and write
859000
heap
page read and write
21037CC0000
heap
page read and write
299894D1000
heap
page read and write
1484000
heap
page read and write
3212000
heap
page read and write
CB2000
unkown
page execute and read and write
850D000
heap
page read and write
E8A000
heap
page read and write
1192000
heap
page read and write
343C000
heap
page read and write
2B3C0090C000
trusted library allocation
page read and write
2B3C00144000
trusted library allocation
page read and write
500F000
stack
page read and write
4BE0000
direct allocation
page read and write
10E6000
heap
page read and write
C99000
unkown
page execute and read and write
438D000
trusted library allocation
page read and write
2B3C00220000
trusted library allocation
page read and write
586E000
trusted library allocation
page read and write
4B71000
heap
page read and write
42BF000
stack
page read and write
2B3C001EC000
trusted library allocation
page read and write
2BC0000
heap
page read and write
229800754000
trusted library allocation
page read and write
159E000
heap
page read and write
A4B000
heap
page read and write
4810000
direct allocation
page read and write
2DF0000
direct allocation
page read and write
3DF5000
trusted library allocation
page read and write
229800418000
trusted library allocation
page read and write
1E28E5B2000
trusted library allocation
page read and write
FDB8C7E000
stack
page read and write
703CF000
unkown
page readonly
2B3C00201000
trusted library allocation
page read and write
12E6000
heap
page read and write
3E2D000
trusted library allocation
page read and write
3DF2000
trusted library allocation
page read and write
2B3C00CE8000
trusted library allocation
page read and write
2B3C0046C000
trusted library allocation
page read and write
514C000
trusted library allocation
page read and write
590000
unkown
page readonly
BCF000
heap
page read and write
2B3C001F4000
trusted library allocation
page read and write
1E28A1E1000
heap
page read and write
63EE000
stack
page read and write
3445000
heap
page read and write
2B3C0089C000
trusted library allocation
page read and write
28612030000
heap
page read and write
155505C0000
heap
page read and write
229800668000
trusted library allocation
page read and write
FA4000
heap
page read and write
29989211000
trusted library allocation
page read and write
1C9EF000
stack
page read and write
D16000
unkown
page execute and write copy
FF8000
heap
page read and write
441C000
trusted library allocation
page read and write
46AF000
stack
page read and write
4435000
trusted library allocation
page read and write
3512000
heap
page read and write
51E0000
direct allocation
page execute and read and write
93B000
unkown
page read and write
20505180000
trusted library allocation
page read and write
23C2963B000
heap
page read and write
D55000
unkown
page execute and write copy
4B70000
heap
page read and write
596BDFE000
stack
page read and write
2298006EC000
trusted library allocation
page read and write
4751000
heap
page read and write
BF0000
heap
page read and write
A0E000
stack
page read and write
E69000
stack
page read and write
4548000
trusted library allocation
page read and write
3D9000
unkown
page readonly
EB8000
heap
page read and write
2B3C00CA0000
trusted library allocation
page read and write
C09000
heap
page read and write
585C000
trusted library allocation
page read and write
2B3C00EE4000
trusted library allocation
page read and write
1E289C4E000
heap
page read and write
994000
heap
page read and write
14540FE000
unkown
page readonly
586D000
trusted library allocation
page read and write
29987E3F000
heap
page read and write
51A0000
direct allocation
page execute and read and write
4389000
trusted library allocation
page read and write
5CC000
stack
page read and write
11A2000
heap
page read and write
994000
heap
page read and write
2DF0000
direct allocation
page read and write
2B3C00EE8000
trusted library allocation
page read and write
AE0000
heap
page read and write
2B3C0043E000
trusted library allocation
page read and write
21242000
heap
page read and write
2B3C00A7C000
trusted library allocation
page read and write
DEE000
stack
page read and write
F6E000
heap
page read and write
3A2E000
stack
page read and write
EF8000
heap
page read and write
3372000
heap
page read and write
368C00284000
direct allocation
page read and write
229800368000
trusted library allocation
page read and write
4B71000
heap
page read and write
44BC000
trusted library allocation
page read and write
2B3C00C70000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
3F3E000
stack
page read and write
4389000
trusted library allocation
page read and write
F40000
heap
page read and write
3E04000
trusted library allocation
page read and write
104B000
heap
page read and write
F83000
heap
page read and write
16F000
unkown
page readonly
20504A48000
heap
page read and write
2B3C0059C000
trusted library allocation
page read and write
58E9000
trusted library allocation
page read and write
345F000
heap
page read and write
1E29095E000
trusted library section
page read and write
29987F02000
heap
page read and write
851000
heap
page read and write
272DE000
heap
page read and write
4FEC000
stack
page read and write
3E10000
trusted library allocation
page read and write
3E27000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
50BD000
stack
page read and write
3E04000
trusted library allocation
page read and write
3D71000
heap
page read and write
FB8000
heap
page read and write
22980033C000
trusted library allocation
page read and write
3E0D000
trusted library allocation
page read and write
F66000
unkown
page execute and write copy
87B000
heap
page read and write
15550652000
heap
page read and write
4386000
trusted library allocation
page read and write
2B3C00E88000
trusted library allocation
page read and write
37A80020C000
trusted library allocation
page read and write
3E04000
trusted library allocation
page read and write
3DF0000
trusted library allocation
page read and write
4B71000
heap
page read and write
28612010000
heap
page read and write
1015000
heap
page read and write
400E000
stack
page read and write
340E000
heap
page read and write
F6C000
heap
page read and write
44BA000
trusted library allocation
page read and write
45F6000
trusted library allocation
page read and write
4810000
direct allocation
page read and write
337C000
heap
page read and write
31AE000
stack
page read and write
2B3C00D78000
trusted library allocation
page read and write
3D71000
heap
page read and write
37A800220000
trusted library allocation
page read and write
3CEE000
stack
page read and write
1B05E000
stack
page read and write
456F000
stack
page read and write
3E05000
trusted library allocation
page read and write
4F4000
unkown
page readonly
57C3000
trusted library allocation
page read and write
14537FD000
stack
page read and write
CDC000
unkown
page execute and write copy
2BB341AC000
heap
page read and write
3D71000
heap
page read and write
D51000
heap
page read and write
3419000
heap
page read and write
20505802000
heap
page read and write
398F000
stack
page read and write
F67000
unkown
page execute and write copy
2861204E000
heap
page read and write
12C0000
heap
page read and write
1E28A1E5000
heap
page read and write
F10000
heap
page read and write
587D000
trusted library allocation
page read and write
F46000
heap
page read and write
2FFF000
stack
page read and write
1E2869C5000
heap
page read and write
3E30000
trusted library allocation
page read and write
2EFE000
stack
page read and write
5855000
trusted library allocation
page read and write
3E15000
trusted library allocation
page read and write
12DB000
heap
page read and write
1107000
unkown
page execute and read and write
10E6000
heap
page read and write
C63BEFE000
stack
page read and write
4384000
trusted library allocation
page read and write
F3E000
heap
page read and write
C1A000
heap
page read and write
1AD2F000
stack
page read and write
FA2000
trusted library allocation
page read and write
229800714000
trusted library allocation
page read and write
4751000
heap
page read and write
38D0000
trusted library allocation
page read and write
22980040C000
trusted library allocation
page read and write
F6D000
heap
page read and write
1069000
heap
page read and write
EC5000
heap
page read and write
C63BB9A000
stack
page read and write
EC1000
heap
page read and write
2B3C00401000
trusted library allocation
page read and write
438F000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
254B10B000
stack
page read and write
4382000
trusted library allocation
page read and write
C08000
heap
page read and write
BF4000
heap
page read and write
23C29BA0000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
34EF000
heap
page read and write
3A37000
heap
page read and write
2B3C00630000
trusted library allocation
page read and write
2B3C0031C000
trusted library allocation
page read and write
49CF000
stack
page read and write
586D000
trusted library allocation
page read and write
F55000
heap
page read and write
1119000
heap
page read and write
4751000
heap
page read and write
101E000
heap
page read and write
F06000
heap
page read and write
4B71000
heap
page read and write
D82000
unkown
page execute and write copy
A00000
unkown
page read and write
29989300000
trusted library allocation
page read and write
1E288EF0000
unkown
page read and write
1555066F000
heap
page read and write
2FCF000
stack
page read and write
173F000
stack
page read and write
A55000
heap
page read and write
229800408000
trusted library allocation
page read and write
3E55000
trusted library allocation
page read and write
3F0E000
stack
page read and write
2B3C00B20000
trusted library allocation
page read and write
F83000
heap
page read and write
2B3C0050D000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
2B3C00F84000
trusted library allocation
page read and write
2120A000
heap
page read and write
37A8002BC000
trusted library allocation
page read and write
1E28DED0000
trusted library allocation
page read and write
3E05000
trusted library allocation
page read and write
2B3C00518000
trusted library allocation
page read and write
2205F640000
heap
page read and write
994000
heap
page read and write
4821000
heap
page read and write
37EE000
stack
page read and write
2CB0000
heap
page read and write
B20000
heap
page read and write
1109000
unkown
page execute and write copy
4CF0000
heap
page read and write
29987E5B000
heap
page read and write
590D7FE000
unkown
page readonly
58DF000
trusted library allocation
page read and write
4751000
heap
page read and write
210397D0000
remote allocation
page read and write
3D71000
heap
page read and write
58CF000
trusted library allocation
page read and write
1022000
heap
page read and write
2998875A000
heap
page read and write
13A8000
heap
page read and write
3CAF000
stack
page read and write
2050536D000
heap
page read and write
2B3C0046C000
trusted library allocation
page read and write
4CEF000
stack
page read and write
438A000
trusted library allocation
page read and write
5034000
trusted library allocation
page read and write
E3A000
unkown
page execute and read and write
82E000
unkown
page read and write
2298007CC000
trusted library allocation
page read and write
F51000
heap
page read and write
337C000
heap
page read and write
710000
direct allocation
page read and write
2861203B000
heap
page read and write
1E28A202000
heap
page read and write
3E2F000
trusted library allocation
page read and write
7FFB226D0000
unkown
page read and write
29988480000
trusted library allocation
page read and write
368C00217000
direct allocation
page read and write
12E9000
heap
page read and write
104B000
heap
page read and write
7FFAAC2F0000
trusted library allocation
page execute and read and write
3FC0000
trusted library allocation
page read and write
2050537E000
heap
page read and write
84F0000
heap
page read and write
4B71000
heap
page read and write
C50000
unkown
page read and write
59057FE000
unkown
page readonly
1E28A22F000
heap
page read and write
21037F13000
heap
page read and write
3B80000
trusted library allocation
page read and write
4387000
trusted library allocation
page read and write
41D3000
trusted library allocation
page read and write
44D2000
trusted library allocation
page read and write
44D7000
trusted library allocation
page read and write
229800614000
trusted library allocation
page read and write
855000
heap
page read and write
BBB000
heap
page read and write
2298002FC000
trusted library allocation
page read and write
27270000
heap
page read and write
994000
heap
page read and write
C4E000
stack
page read and write
FA0000
heap
page read and write
2B3C00450000
trusted library allocation
page read and write
2B3C00001000
trusted library allocation
page read and write
3E3B000
trusted library allocation
page read and write
2B3C00C60000
trusted library allocation
page read and write
A49000
heap
page read and write
4CB0000
direct allocation
page read and write
4B71000
heap
page read and write
7B0000
heap
page read and write
BEA000
heap
page read and write
504E000
stack
page read and write
28612010000
heap
page read and write
3DE1000
trusted library allocation
page read and write
20506000000
heap
page read and write
CBE000
unkown
page execute and read and write
1200000
trusted library allocation
page read and write
13B5000
heap
page read and write
21037F00000
heap
page read and write
2B3C00A0C000
trusted library allocation
page read and write
3E75000
trusted library allocation
page read and write
3DF7000
trusted library allocation
page read and write
F66000
unkown
page execute and read and write
A2E000
heap
page read and write
2B3C00D84000
trusted library allocation
page read and write
2DF0000
direct allocation
page read and write
5310000
remote allocation
page read and write
59745FE000
unkown
page readonly
3E7E000
trusted library allocation
page read and write
3DE1000
trusted library allocation
page read and write
2B3C00E8C000
trusted library allocation
page read and write
11CE000
heap
page read and write
229800698000
trusted library allocation
page read and write
352F000
stack
page read and write
2BB34185000
heap
page read and write
4B71000
heap
page read and write
4437000
trusted library allocation
page read and write
1E28A25A000
heap
page read and write
CC5000
unkown
page execute and write copy
143F000
stack
page read and write
3E04000
trusted library allocation
page read and write
58C9000
trusted library allocation
page read and write
272D6000
heap
page read and write
458E000
trusted library allocation
page read and write
2D310000
heap
page read and write
2B3C008F0000
trusted library allocation
page read and write
3E2D000
trusted library allocation
page read and write
2B3C00F68000
trusted library allocation
page read and write
F56000
heap
page read and write
C50000
unkown
page read and write
58A4000
trusted library allocation
page read and write
CB2000
unkown
page execute and read and write
462F000
trusted library allocation
page read and write
597C5FE000
unkown
page readonly
3E1B000
trusted library allocation
page read and write
1484000
heap
page read and write
29989300000
trusted library allocation
page read and write
366F000
stack
page read and write
2BB34171000
heap
page read and write
7F8000
unkown
page read and write
3D70000
heap
page read and write
C54000
unkown
page execute and write copy
710000
direct allocation
page read and write
1FE000
stack
page read and write
3378000
heap
page read and write
1484000
heap
page read and write
2B3C00EC4000
trusted library allocation
page read and write
1006000
heap
page read and write
377F000
stack
page read and write
BD0000
heap
page execute and read and write
3E04000
trusted library allocation
page read and write
3DFA000
trusted library allocation
page read and write
44E6000
trusted library allocation
page read and write
CE8000
unkown
page execute and read and write
368C00294000
direct allocation
page read and write
EB7000
unkown
page execute and read and write
750000
heap
page read and write
3E49000
trusted library allocation
page read and write
26D1000
heap
page read and write
15E4000
heap
page read and write
3F6E000
stack
page read and write
4751000
heap
page read and write
57AF000
stack
page read and write
1189000
heap
page read and write
4388000
trusted library allocation
page read and write
26C1000
heap
page read and write
29988E80000
trusted library section
page readonly
338E000
stack
page read and write
1E2866BE000
heap
page read and write
596CDFA000
stack
page read and write
2927000
heap
page read and write
1052000
heap
page read and write
229800298000
trusted library allocation
page read and write
2B3C0033C000
trusted library allocation
page read and write
100A000
heap
page read and write
4751000
heap
page read and write
229800230000
trusted library allocation
page read and write
4382000
trusted library allocation
page read and write
103F000
heap
page read and write
5851000
trusted library allocation
page read and write
FF4000
heap
page read and write
CCE000
unkown
page execute and read and write
4BE0000
direct allocation
page read and write
20505390000
heap
page read and write
535D000
stack
page read and write
4382000
trusted library allocation
page read and write
28612028000
heap
page read and write
586D000
trusted library allocation
page read and write
994000
heap
page read and write
2B3C00CCC000
trusted library allocation
page read and write
994000
heap
page read and write
4821000
heap
page read and write
368C00201000
direct allocation
page read and write
C51000
unkown
page execute and write copy
3BAE000
stack
page read and write
43CE000
stack
page read and write
337E000
heap
page read and write
406F000
stack
page read and write
6C9EF000
unkown
page write copy
229800330000
trusted library allocation
page read and write
3373000
heap
page read and write
4500000
trusted library allocation
page read and write
20505802000
heap
page read and write
587D000
trusted library allocation
page read and write
C67000
unkown
page execute and write copy
14538FE000
unkown
page readonly
58A4000
trusted library allocation
page read and write
229800250000
trusted library allocation
page read and write
A0121FE000
stack
page read and write
855000
heap
page read and write
37A8002BC000
trusted library allocation
page read and write
11CB000
heap
page read and write
28CE000
stack
page read and write
31FE000
stack
page read and write
417F000
stack
page read and write
400000
unkown
page readonly
22FE000
stack
page read and write
2B3C0033C000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
44BA000
trusted library allocation
page read and write
2298003EC000
trusted library allocation
page read and write
26CB000
heap
page read and write
F57000
unkown
page execute and read and write
AE4000
heap
page read and write
2861203D000
heap
page read and write
994000
heap
page read and write
368C00234000
direct allocation
page read and write
586E000
trusted library allocation
page read and write
84B000
heap
page read and write
16D8000
trusted library allocation
page read and write
105F000
heap
page read and write
2B3C00DE8000
trusted library allocation
page read and write
4B71000
heap
page read and write
D6C000
unkown
page execute and write copy
585D000
trusted library allocation
page read and write
FDB89FE000
unkown
page readonly
2B3C001A0000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
4385000
trusted library allocation
page read and write
61A6000
heap
page read and write
348F000
stack
page read and write
58A2000
trusted library allocation
page read and write
1ABCF000
stack
page read and write
5971DFB000
stack
page read and write
368C00250000
direct allocation
page read and write
31F0000
heap
page read and write
3E01000
trusted library allocation
page read and write
21F0000
heap
page read and write
2B3C006C8000
trusted library allocation
page read and write
EE9000
heap
page read and write
2BB0000
direct allocation
page read and write
584A000
trusted library allocation
page read and write
D6C000
unkown
page execute and read and write
4426000
trusted library allocation
page read and write
D0D000
unkown
page execute and read and write
FDB8EFE000
unkown
page readonly
4B90000
heap
page read and write
15550637000
heap
page read and write
2BB341BF000
heap
page read and write
2B3C00C34000
trusted library allocation
page read and write
3071000
heap
page read and write
1E2866A5000
heap
page read and write
6A4000
unkown
page write copy
890000
heap
page read and write
59705FE000
unkown
page readonly
4D10000
direct allocation
page read and write
1AACE000
stack
page read and write
83F000
heap
page read and write
57FC000
trusted library allocation
page read and write
4E30000
direct allocation
page execute and read and write
2B3C00A90000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
D9F000
heap
page read and write
21037E13000
heap
page read and write
299894E0000
heap
page read and write
474F000
stack
page read and write
DDC000
heap
page read and write
2920000
heap
page read and write
2B3C00B70000
trusted library allocation
page read and write
229800404000
trusted library allocation
page read and write
BCF000
heap
page read and write
21221000
heap
page read and write
254B7FE000
unkown
page readonly
C51000
unkown
page execute and write copy
D73000
unkown
page execute and write copy
6D1DD000
unkown
page readonly
C50000
unkown
page readonly
443B000
trusted library allocation
page read and write
537E000
stack
page read and write
770000
unkown
page readonly
3F18000
trusted library allocation
page read and write
730000
heap
page read and write
37A8002B0000
trusted library allocation
page read and write
37A800248000
trusted library allocation
page read and write
3E2F000
trusted library allocation
page read and write
47AF000
stack
page read and write
26CC000
heap
page read and write
53E0000
direct allocation
page execute and read and write
2B3C00E3C000
trusted library allocation
page read and write
29988EA0000
trusted library section
page readonly
31F0000
remote allocation
page read and write
3A3E000
stack
page read and write
5ABF000
trusted library allocation
page read and write
599D000
stack
page read and write
4382000
trusted library allocation
page read and write
229800758000
trusted library allocation
page read and write
1A7F0000
heap
page read and write
7FFB226D5000
unkown
page readonly
994000
heap
page read and write
3DFA000
trusted library allocation
page read and write
36AE000
stack
page read and write
584A000
trusted library allocation
page read and write
2BB0000
direct allocation
page read and write
2B3C00F44000
trusted library allocation
page read and write
3DEC000
trusted library allocation
page read and write
4384000
trusted library allocation
page read and write
4B71000
heap
page read and write
D547FFE000
unkown
page readonly
7FFB226B0000
unkown
page readonly
20505377000
heap
page read and write
61A5000
heap
page read and write
4385000
trusted library allocation
page read and write
461A000
trusted library allocation
page read and write
3D71000
heap
page read and write
2B3C0035C000
trusted library allocation
page read and write
2B3C00601000
trusted library allocation
page read and write
4751000
heap
page read and write
2B3C0064C000
trusted library allocation
page read and write
3DFA000
trusted library allocation
page read and write
3E05000
trusted library allocation
page read and write
D710000
heap
page read and write
29988702000
heap
page read and write
4751000
heap
page read and write
2861203C000
heap
page read and write
34EC000
heap
page read and write
585D000
trusted library allocation
page read and write
1E286618000
heap
page read and write
EFC000
stack
page read and write
2F7A000
trusted library allocation
page read and write
4762000
heap
page read and write
59695FE000
unkown
page readonly
587D000
trusted library allocation
page read and write
261F000
stack
page read and write
F66000
unkown
page execute and write copy
2121A000
heap
page read and write
A9C000
heap
page read and write
412F000
trusted library allocation
page read and write
1170000
heap
page read and write
3370000
heap
page read and write
20505390000
heap
page read and write
5888000
trusted library allocation
page read and write
7FFB226D2000
unkown
page readonly
4810000
direct allocation
page read and write
3E04000
trusted library allocation
page read and write
5EF0000
heap
page read and write
5AC5000
trusted library allocation
page read and write
114F000
heap
page read and write
1200000
unclassified section
page read and write
229800610000
trusted library allocation
page read and write
3FB0000
trusted library allocation
page read and write
3E36000
trusted library allocation
page read and write
229800704000
trusted library allocation
page read and write
2B3C00ACC000
trusted library allocation
page read and write
7FFB226B0000
unkown
page readonly
B34000
heap
page read and write
584C000
trusted library allocation
page read and write
FDB80FE000
stack
page read and write
350C000
stack
page read and write
41EE000
stack
page read and write
994000
heap
page read and write
37A8002C8000
trusted library allocation
page read and write
4B71000
heap
page read and write
408000
unkown
page readonly
2B3C00300000
trusted library allocation
page read and write
306E000
stack
page read and write
859000
heap
page read and write
F63000
heap
page read and write
368C00270000
direct allocation
page read and write
2B3C00344000
trusted library allocation
page read and write
4D21000
heap
page read and write
448F000
trusted library allocation
page read and write
1CAEF000
stack
page read and write
229800724000
trusted library allocation
page read and write
590F7FE000
unkown
page readonly
2130D000
heap
page read and write
3B0F000
stack
page read and write
6A0000
unkown
page write copy
C70000
heap
page read and write
4B71000
heap
page read and write
3FB8000
trusted library allocation
page read and write
32FE000
heap
page read and write
3E05000
trusted library allocation
page read and write
57FA000
trusted library allocation
page read and write
21225000
heap
page read and write
CFD000
unkown
page execute and read and write
2CCC000
stack
page read and write
5310000
remote allocation
page read and write
3E18000
trusted library allocation
page read and write
2F71000
heap
page read and write
16DE000
trusted library allocation
page read and write
3E72000
trusted library allocation
page read and write
104B000
heap
page read and write
4381000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
7EE000
stack
page read and write
2BC7000
heap
page read and write
3E11000
trusted library allocation
page read and write
2B3C000BC000
trusted library allocation
page read and write
15BF000
stack
page read and write
5210000
direct allocation
page execute and read and write
58A4000
trusted library allocation
page read and write
7D0000
heap
page read and write
5849000
trusted library allocation
page read and write
3E0F000
trusted library allocation
page read and write
438E000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
37A8002A0000
trusted library allocation
page read and write
994000
heap
page read and write
327F000
stack
page read and write
32F4000
heap
page read and write
2DF0000
direct allocation
page read and write
9B0000
heap
page read and write
4821000
heap
page read and write
A74E54B000
stack
page read and write
2205F65A000
heap
page read and write
4D70000
direct allocation
page execute and read and write
2BB3432C000
heap
page read and write
BF1000
heap
page read and write
21037E5F000
heap
page read and write
368C002A8000
direct allocation
page read and write
4B71000
heap
page read and write
DD9000
heap
page read and write
58A4000
trusted library allocation
page read and write
32EC000
heap
page read and write
859000
heap
page read and write
FE0000
heap
page read and write
3F88000
trusted library allocation
page read and write
55BF000
stack
page read and write
40AE000
stack
page read and write
20504AAA000
heap
page read and write
3D71000
heap
page read and write
131B000
heap
page read and write
448A000
trusted library allocation
page read and write
2B3C00A01000
trusted library allocation
page read and write
256DA7E000
stack
page read and write
20504B02000
heap
page read and write
3376000
heap
page read and write
1060000
heap
page read and write
20504A87000
heap
page read and write
F4D000
unkown
page execute and read and write
367E000
stack
page read and write
1C7F0000
heap
page read and write
EF8000
heap
page read and write
28612048000
heap
page read and write
1695000
unkown
page readonly
59615FE000
unkown
page readonly
2120E000
heap
page read and write
1E286660000
heap
page read and write
FDB8FFE000
unkown
page readonly
1E2869A0000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
4751000
heap
page read and write
58A4000
trusted library allocation
page read and write
3C21000
heap
page read and write
19B000
stack
page read and write
7FFB226D0000
unkown
page read and write
5886000
trusted library allocation
page read and write
30A0000
heap
page read and write
58A4000
trusted library allocation
page read and write
4CB0000
direct allocation
page read and write
2E07000
heap
page read and write
229800310000
trusted library allocation
page read and write
C63C4FF000
stack
page read and write
15F2000
heap
page read and write
4751000
heap
page read and write
11AE000
heap
page read and write
587D000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
20505375000
heap
page read and write
83F000
heap
page read and write
2BB34185000
heap
page read and write
482F000
stack
page read and write
34C3000
heap
page read and write
10ED000
heap
page read and write
15550702000
heap
page read and write
1E289C5F000
heap
page read and write
114A000
heap
page read and write
4390000
trusted library allocation
page read and write
28612043000
heap
page read and write
1E289C53000
heap
page read and write
34AD000
heap
page read and write
2BB0000
direct allocation
page read and write
61ED4000
direct allocation
page readonly
2115A980000
trusted library allocation
page read and write
4571000
trusted library allocation
page read and write
1424000
heap
page read and write
2205F64C000
heap
page read and write
57B8000
trusted library allocation
page read and write
851000
heap
page read and write
BED000
heap
page read and write
45AE000
stack
page read and write
2B3C00D00000
trusted library allocation
page read and write
445E000
trusted library allocation
page read and write
F43000
heap
page read and write
4751000
heap
page read and write
4E10000
direct allocation
page execute and read and write
407E000
stack
page read and write
2CAE000
stack
page read and write
58A4000
trusted library allocation
page read and write
28612320000
heap
page read and write
4B71000
heap
page read and write
764000
heap
page read and write
4B71000
heap
page read and write
103F000
heap
page read and write
2B3C005C0000
trusted library allocation
page read and write
95C000
stack
page read and write
336000
unkown
page readonly
4380000
trusted library allocation
page read and write
596ADFE000
stack
page read and write
110E000
heap
page read and write
438F000
trusted library allocation
page read and write
2DF0000
direct allocation
page read and write
2B3C00330000
trusted library allocation
page read and write
F3E000
stack
page read and write
EF8000
heap
page read and write
FAD000
trusted library allocation
page read and write
58A3000
trusted library allocation
page read and write
23C29613000
heap
page read and write
438B000
trusted library allocation
page read and write
36DB000
heap
page read and write
585D000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
3CF000
unkown
page read and write
1170000
heap
page read and write
1103000
heap
page read and write
5868000
trusted library allocation
page read and write
F1E000
unkown
page execute and read and write
229800694000
trusted library allocation
page read and write
5974DFB000
stack
page read and write
34E5000
heap
page read and write
5851000
trusted library allocation
page read and write
2B3C0033C000
trusted library allocation
page read and write
1095000
heap
page read and write
2BB341B4000
heap
page read and write
4751000
heap
page read and write
29989500000
heap
page read and write
A44000
heap
page read and write
37AF000
stack
page read and write
1026000
heap
page read and write
4182000
trusted library allocation
page read and write
1E2904E0000
trusted library section
page read and write
401000
unkown
page execute read
3E15000
trusted library allocation
page read and write
5819000
trusted library allocation
page read and write
1E289C57000
heap
page read and write
CB9000
unkown
page write copy
740000
heap
page read and write
2B3C007D0000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
A71000
unkown
page execute and write copy
3D71000
heap
page read and write
21216000
heap
page read and write
BF1000
heap
page read and write
1022000
heap
page read and write
2BDF000
unkown
page read and write
4E84B7E000
stack
page read and write
587D000
trusted library allocation
page read and write
1E50000
heap
page read and write
CB9000
unkown
page read and write
34BC000
heap
page read and write
F73000
heap
page read and write
586D000
trusted library allocation
page read and write
F8A000
heap
page read and write
4D10000
direct allocation
page read and write
3D71000
heap
page read and write
3E86000
trusted library allocation
page read and write
EB3000
heap
page read and write
5CB0000
remote allocation
page read and write
190000
heap
page read and write
3DE2000
trusted library allocation
page read and write
21242000
heap
page read and write
994000
heap
page read and write
28612001000
heap
page read and write
229800640000
trusted library allocation
page read and write
B4E000
heap
page read and write
49FA000
trusted library allocation
page read and write
2B3C00D3C000
trusted library allocation
page read and write
44BD000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
4E8497E000
stack
page read and write
2CBC000
heap
page read and write
2B3C002F0000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
3FCF000
stack
page read and write
2B3C00380000
trusted library allocation
page read and write
21222000
heap
page read and write
32B8000
heap
page read and write
59605FE000
unkown
page readonly
3E51000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
3E3C000
trusted library allocation
page read and write
2B3C00BD8000
trusted library allocation
page read and write
7FFB226B1000
unkown
page execute read
3E2F000
trusted library allocation
page read and write
D96000
heap
page read and write
4830000
heap
page read and write
47EF000
stack
page read and write
2B3C0020C000
trusted library allocation
page read and write
29988600000
heap
page read and write
DCD000
stack
page read and write
3D71000
heap
page read and write
11CD000
stack
page read and write
4821000
heap
page read and write
1B510000
heap
page read and write
2B3C00748000
trusted library allocation
page read and write
57EA000
trusted library allocation
page read and write
2B3C00E18000
trusted library allocation
page read and write
5220000
direct allocation
page execute and read and write
21210000
heap
page read and write
229800658000
trusted library allocation
page read and write
855000
heap
page read and write
3D9000
unkown
page readonly
2B3C00550000
trusted library allocation
page read and write
830000
unkown
page read and write
59795FE000
unkown
page readonly
229800644000
trusted library allocation
page read and write
15550648000
heap
page read and write
28612050000
heap
page read and write
2B3C00D48000
trusted library allocation
page read and write
57BA000
trusted library allocation
page read and write
3E15000
trusted library allocation
page read and write
2B3C00728000
trusted library allocation
page read and write
A6B000
unkown
page execute and read and write
2BB3419D000
heap
page read and write
1E29072E000
trusted library section
page read and write
994000
heap
page read and write
1E289C58000
heap
page read and write
119E000
heap
page read and write
3D8F000
stack
page read and write
229800238000
trusted library allocation
page read and write
4751000
heap
page read and write
851000
heap
page read and write
4385000
trusted library allocation
page read and write
11BE000
stack
page read and write
5910FFE000
stack
page read and write
11DB000
stack
page read and write
229800330000
trusted library allocation
page read and write
28612325000
heap
page read and write
328E000
stack
page read and write
2B3C0018B000
trusted library allocation
page read and write
378E000
stack
page read and write
584E000
trusted library allocation
page read and write
2120C000
heap
page read and write
4751000
heap
page read and write
F67000
unkown
page execute and write copy
4751000
heap
page read and write
3DF6000
trusted library allocation
page read and write
27346000
heap
page read and write
44CF000
stack
page read and write
1718000
heap
page read and write
5B8E000
trusted library allocation
page read and write
445C000
trusted library allocation
page read and write
308E000
stack
page read and write
4821000
heap
page read and write
710000
direct allocation
page read and write
764000
heap
page read and write
29988590000
trusted library section
page read and write
21037CA0000
heap
page read and write
7FFB226B1000
unkown
page execute read
456F000
trusted library allocation
page read and write
1E28A180000
heap
page read and write
3E04000
trusted library allocation
page read and write
587D000
trusted library allocation
page read and write
4B71000
heap
page read and write
445B000
trusted library allocation
page read and write
1E28FE3E000
trusted library section
page read and write
38D0000
trusted library allocation
page read and write
2861204B000
heap
page read and write
597E5FE000
unkown
page readonly
7FFAAC2EC000
trusted library allocation
page execute and read and write
4598000
trusted library allocation
page read and write
5979DFC000
stack
page read and write
2BB34320000
heap
page read and write
586E000
trusted library allocation
page read and write
59685FE000
unkown
page readonly
5380000
direct allocation
page execute and read and write
3171000
heap
page read and write
1E290512000
trusted library section
page read and write
280000
unkown
page readonly
1AEBD000
stack
page read and write
23C29510000
heap
page read and write
F63000
heap
page read and write
21DE000
stack
page read and write
4E82000
trusted library allocation
page read and write
1E2869C0000
heap
page read and write
28BE000
stack
page read and write
4D2F000
stack
page read and write
5000000
direct allocation
page read and write
58A4000
trusted library allocation
page read and write
2B3C00EB4000
trusted library allocation
page read and write
37A8002A0000
trusted library allocation
page read and write
99D000
stack
page read and write
2BB35BF0000
heap
page read and write
1B191000
heap
page read and write
2B3C00F1C000
trusted library allocation
page read and write
229800678000
trusted library allocation
page read and write
94E000
stack
page read and write
4D10000
direct allocation
page read and write
CBB000
unkown
page execute and read and write
374F000
stack
page read and write
2B3C00790000
trusted library allocation
page read and write
855000
heap
page read and write
BF0000
heap
page read and write
3A2F000
stack
page read and write
CD6000
heap
page read and write
1601000
heap
page read and write
4380000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
3176000
heap
page read and write
132E000
heap
page read and write
1E2866C2000
heap
page read and write
299892D0000
trusted library allocation
page read and write
600000
heap
page read and write
2B3C00448000
trusted library allocation
page read and write
1051000
heap
page read and write
2B3C006D4000
trusted library allocation
page read and write
3E56000
trusted library allocation
page read and write
32B0000
heap
page read and write
57DF000
trusted library allocation
page read and write
994000
heap
page read and write
16F000
unkown
page readonly
368C002DC000
direct allocation
page read and write
2DF0000
direct allocation
page read and write
87F000
unkown
page read and write
7FFAAC242000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
57D9000
trusted library allocation
page read and write
299893A0000
trusted library allocation
page read and write
3B3F000
stack
page read and write
F4F000
heap
page read and write
3377000
heap
page read and write
2B3C00C80000
trusted library allocation
page read and write
2B3C00448000
trusted library allocation
page read and write
57FB000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
353F000
unkown
page read and write
4821000
heap
page read and write
20504CF0000
heap
page read and write
47F0000
heap
page read and write
3090000
heap
page read and write
28612059000
heap
page read and write
2B3C00AF4000
trusted library allocation
page read and write
4B71000
heap
page read and write
20505352000
heap
page read and write
DB3000
heap
page read and write
29FE000
stack
page read and write
4751000
heap
page read and write
3E15000
trusted library allocation
page read and write
CEF000
unkown
page execute and write copy
F58000
heap
page read and write
5913FFB000
stack
page read and write
229800210000
trusted library allocation
page read and write
DE5000
heap
page read and write
FEB000
heap
page read and write
2B3E000
stack
page read and write
3E3B000
trusted library allocation
page read and write
4810000
direct allocation
page read and write
29987E13000
heap
page read and write
2298006E0000
trusted library allocation
page read and write
5857000
trusted library allocation
page read and write
2205F64A000
heap
page read and write
596E5FE000
unkown
page readonly
1025000
heap
page read and write
3E15000
trusted library allocation
page read and write
F83000
heap
page read and write
2298002ED000
trusted library allocation
page read and write
44AC000
trusted library allocation
page read and write
86D000
heap
page read and write
292E000
heap
page read and write
2CD1000
heap
page read and write
8513000
heap
page read and write
15550616000
heap
page read and write
47CE000
stack
page read and write
44CC000
trusted library allocation
page read and write
There are 4250 hidden memdumps, click here to show them.