IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\LgAmARwZ\Application.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\GreenTech Dynamics\O
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\RDX123456[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[2].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\stealc_default2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\0b44ippu[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\splwow64[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\GOLD1234[1].exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\new_v8[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\Offnewhere[1].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\shop[1].exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001096001\RDX123456.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001425001\shop.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1001507001\1bd0484d71.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\197036\T
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\Baby
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Bar
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\CC7V0PUTO3B4JOR1523VPRJQN904A.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Clearance
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Continental
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Denmark
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Firmware
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Fitting
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Gay
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Hop
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Invalid
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\J4EDANXSATRMSXZUEQ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\January
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Johnson
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\July
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Molecular
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\POSMOJBFP9W4F4JKM6CCW190HW6F0P.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Ruled
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\See
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Spirit
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Sponsorship
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Suitable
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Twisted
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Various
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Wisdom
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Witch
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\XLN9V631J4Y45UE4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZWAE2K096DYFL3DZL5I.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js" >), ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\AKEGDHJD
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BKECAEBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBFIDGIIIJDBGDGDAKKFCGCGID
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FCGIJKJJKEBGHJKFIDGC
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\HCFBAFIDAECAKFHJDBAFIEBKKK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IDHCGDAFBKFIDHJJJDHC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IIJEBFCFIJJJEBGDBAKEHCAFHI
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\JKJKKKJJJKJKFHJJJJEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_GOLD1234.exe_d44442c1f0a3f935813f9615943caaa76ea8d679_3ea6409d_effe71aa-767b-4c8f-9d68-caad73e2b842\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER84D3.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Nov 1 11:33:57 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8580.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER85CF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dac4554719.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\1001172001\Set-up.exe
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\246122658369
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Users\user\AppData\Local\Temp\Beijing
ASCII text, with very long lines (1251), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Beijing.bat
ASCII text, with very long lines (1251), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Bull
data
dropped
C:\Users\user\AppData\Local\Temp\Care
data
dropped
C:\Users\user\AppData\Local\Temp\Mtv
data
dropped
C:\Users\user\AppData\Local\Temp\Purse
data
dropped
C:\Users\user\AppData\Local\Temp\Sweet
data
dropped
C:\Users\user\AppData\Local\Temp\Treat
ASCII text, with very long lines (1592), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LgAmARwZ.url
MS Windows 95 Internet shortcut text (URL=<"C:\ProgramData\LgAmARwZ\Application.exe">), ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 92 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe
"C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe
"C:\Users\user\AppData\Local\Temp\1000477001\Offnewhere.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe
"C:\Users\user\AppData\Local\Temp\1000817001\splwow64.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Beijing Beijing.bat & Beijing.bat
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 197036
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "CRAWFORDFILLEDVERIFYSCALE" Mtv
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Twisted + ..\Molecular + ..\Sponsorship + ..\Various + ..\Witch + ..\Spirit + ..\See + ..\Fitting T
malicious
C:\Users\user\AppData\Local\Temp\197036\Jurisdiction.pif
Jurisdiction.pif T
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & echo URL="C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & exit
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js"
malicious
C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe
"C:\Users\user\AppData\Local\Temp\1000828001\new_v8.exe"
malicious
C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr
"C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr" "C:\Users\user\AppData\Local\GreenTech Dynamics\O"
malicious
C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe
"C:\Users\user\AppData\Local\Temp\1000833001\dac4554719.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.js"
malicious
C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr
"C:\Users\user\AppData\Local\GreenTech Dynamics\EcoCraft.scr" "C:\Users\user\AppData\Local\GreenTech Dynamics\O"
malicious
C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe
"C:\Users\user\AppData\Local\Temp\1000857001\c1a4d3220c.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe
"C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001096001\RDX123456.exe
"C:\Users\user\AppData\Local\Temp\1001096001\RDX123456.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe
"C:\Users\user\AppData\Local\Temp\1000965001\GOLD1234.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001425001\shop.exe
"C:\Users\user\AppData\Local\Temp\1001425001\shop.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe
"C:\Users\user\AppData\Local\Temp\1001475001\0b44ippu.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001425001\shop.exe
"C:\Users\user\AppData\Local\Temp\1001425001\shop.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001425001\shop.exe
"C:\Users\user\AppData\Local\Temp\1001425001\shop.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe
"C:\Users\user\AppData\Local\Temp\1001506001\f6f4816752.exe"
malicious
C:\Users\user\AppData\Local\Temp\1001425001\shop.exe
"C:\Users\user\AppData\Local\Temp\1001425001\shop.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 272
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
seallysl.site
malicious
computeryrati.site
malicious
opposezmny.site
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://goalyfeastz.site/apila=q
unknown
http://www.fontbureau.com/designers
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&amp;l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&amp;l=engli
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
http://185.215.113.206/6c4adf523b719729.php
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://s.ytimg.com;
unknown
http://www.zhongyicts.com.cn
unknown
https://goalyfeastz.site/apiU-
unknown
https://goalyfeastz.site/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpCoinomi
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&amp;
unknown
https://goalyfeastz.site/apiDk
unknown
http://185.215.113.17iR
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded5
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&amp;
unknown
https://www.ecosia.org/newtab/
unknown
http://home.sevjoi17sr.top/TCQEoezkVqyvrJjqBhZs12
unknown
https://goalyfeastz.site/rpwls
unknown
https://lv.queniujq.cn
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://www.youtube.com/
unknown
http://www.carterandcone.coml
unknown
https://cdn.ep
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
http://185.215.113.17/2fb6c2cc8dce150a.php3
unknown
http://185.215.113.17/2fb6c2cc8dce150a.php7
unknown
http://185.215.113.17/2fb6c2cc8dce150a.php)
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://villagedguy.cyou:443/apiwWarningViaUpgradechunkedTransfer-EncodingTrailerno-cachePragmaKeep-
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
http://185.215.113.16/mine/random.exep
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpA
unknown
http://185.215.113.17/yR
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
http://185.215.113.16/off/def.exe
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://villagedguy.cyou/pI
unknown
http://185.215.113.17/2fb6c2cc8dce150a.php=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&amp;l=engli
unknown
http://html4/loose.dtd
unknown
https://steamcommunity.com/-
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpU
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://help.steampowered.com/en/
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://villagedguy.cyou/((
unknown
https://goalyfeastz.site/apilaZq
unknown
http://185.215.113.17/f1ddeb6592c03206/sqlite3.dll
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
http://.css
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpZ
unknown
http://185.215.113.17/f1ddeb6592c03206/vcruntime140.dlla
unknown
http://www.typography.netD
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpq
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&amp;l=englis
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://villagedguy.cyou/apihZP
unknown
https://villagedguy.cyou/s
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://villagedguy.cyou/api
unknown
https://villagedguy.cyou/m
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://villagedguy.cyou/apiE
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpm
unknown
http://185.215.113.17/f1ddeb6592c03206/vcruntime140.dllO
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
https://necklacedmny.store/api1
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious
185.215.113.17
unknown
Portugal
malicious
1.1.1.1
unknown
Australia
185.215.113.36
unknown
Portugal
2.59.161.36
unknown
Russian Federation
104.21.32.196
unknown
United States
20.42.65.92
unknown
United States
172.67.145.203
unknown
United States
188.114.96.3
unknown
European Union
104.102.49.254
unknown
United States
185.215.113.217
unknown
Portugal
185.215.113.206
unknown
Portugal
162.159.134.233
unknown
United States
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
f6f4816752.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
1bd0484d71.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
ProgramId
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
FileId
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
LowerCaseLongPath
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
LongPathHash
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
Name
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
OriginalFileName
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
Publisher
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
Version
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
BinFileVersion
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
BinaryType
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
ProductName
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
ProductVersion
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
LinkDate
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
BinProductVersion
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
AppxPackageFullName
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
AppxPackageRelativeId
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
Size
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
Language
\REGISTRY\A\{7e2c0fa0-576b-d6ab-cb8d-bb756e3ae200}\Root\InventoryApplicationFile\gold1234.exe|866b337cb26e8eac
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
841000
unkown
page execute and read and write
malicious
4940000
direct allocation
page read and write
malicious
52E0000
direct allocation
page read and write
malicious
F11000
unkown
page execute and write copy
malicious
F2E000
heap
page read and write
malicious
F2E000
unkown
page readonly
malicious
2F1000
unkown
page execute and read and write
malicious
176E000
heap
page read and write
malicious
F11000
unkown
page execute and write copy
malicious
5050000
direct allocation
page read and write
malicious
CD1000
unkown
page execute and read and write
malicious
4C00000
direct allocation
page read and write
malicious
F2E000
unkown
page readonly
malicious
5A11000
trusted library allocation
page read and write
3F18000
trusted library allocation
page read and write
BF0000
direct allocation
page read and write
494000
heap
page read and write
1678000
heap
page read and write
39A3000
trusted library allocation
page read and write
1085000
trusted library allocation
page read and write
816000
heap
page read and write
5925000
trusted library allocation
page read and write
F06000
heap
page read and write
28A0000
direct allocation
page read and write
494000
heap
page read and write
12DB000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
3CBD000
trusted library allocation
page read and write
F85000
heap
page read and write
21AA3000
heap
page read and write
39A2000
trusted library allocation
page read and write
1088000
trusted library allocation
page read and write
64F000
heap
page read and write
39BB000
trusted library allocation
page read and write
59F7000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
4D0000
trusted library allocation
page read and write
39A7000
trusted library allocation
page read and write
312B000
heap
page read and write
61ECD000
direct allocation
page readonly
15D0000
heap
page read and write
4070000
trusted library allocation
page read and write
3B48000
trusted library allocation
page read and write
12DD000
trusted library allocation
page read and write
3998000
trusted library allocation
page read and write
6BF50000
unkown
page readonly
3B25000
trusted library allocation
page read and write
9D7000
unkown
page write copy
4060000
trusted library allocation
page read and write
3B6E000
trusted library allocation
page read and write
3B61000
heap
page read and write
D08000
heap
page read and write
1237000
heap
page read and write
3B11000
trusted library allocation
page read and write
5948000
trusted library allocation
page read and write
5EA9000
trusted library allocation
page read and write
39BC000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
4AC0000
direct allocation
page execute and read and write
EC4000
heap
page read and write
1444000
heap
page read and write
51D0000
direct allocation
page execute and read and write
81F000
heap
page read and write
590000
heap
page read and write
5A11000
trusted library allocation
page read and write
14F3000
stack
page read and write
4E41000
heap
page read and write
F9E000
heap
page read and write
577000
heap
page read and write
5A3E000
trusted library allocation
page read and write
2E80000
remote allocation
page read and write
E05000
heap
page read and write
12FD000
heap
page read and write
39A4000
trusted library allocation
page read and write
5D95000
trusted library allocation
page read and write
ECD000
heap
page read and write
3B25000
trusted library allocation
page read and write
4781000
heap
page read and write
4E41000
heap
page read and write
12DA000
heap
page read and write
39AF000
trusted library allocation
page read and write
39F2000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
1087000
trusted library allocation
page read and write
5907000
trusted library allocation
page read and write
872000
unkown
page write copy
2BF5000
trusted library allocation
page read and write
5FCB000
heap
page read and write
3986000
trusted library allocation
page read and write
816000
heap
page read and write
3B61000
heap
page read and write
39E7000
trusted library allocation
page read and write
1254000
heap
page read and write
440000
heap
page read and write
39AF000
trusted library allocation
page read and write
21A8F000
heap
page read and write
594000
heap
page read and write
1B300000
heap
page read and write
4E41000
heap
page read and write
408000
unkown
page readonly
3396000
heap
page read and write
3F22000
trusted library allocation
page read and write
F6A000
unkown
page read and write
5AE000
heap
page read and write
4D70000
direct allocation
page execute and read and write
5FD7000
heap
page read and write
1669000
heap
page read and write
3B85000
trusted library allocation
page read and write
2C3C000
trusted library allocation
page read and write
573000
heap
page read and write
DCD000
heap
page read and write
39A7000
trusted library allocation
page read and write
F98000
unkown
page read and write
40D0000
trusted library allocation
page read and write
2BFA000
trusted library allocation
page read and write
A86000
heap
page read and write
3070000
heap
page read and write
A32000
unkown
page execute and read and write
4880000
trusted library allocation
page read and write
3985000
trusted library allocation
page read and write
58F1000
trusted library allocation
page read and write
15D4000
heap
page read and write
E80000
heap
page read and write
DB1000
unkown
page execute read
C5B000
stack
page read and write
5A11000
trusted library allocation
page read and write
44C1000
heap
page read and write
27A916E0000
heap
page read and write
4E41000
heap
page read and write
3EFE000
stack
page read and write
F6B000
heap
page read and write
2BF8000
trusted library allocation
page read and write
2C38000
trusted library allocation
page read and write
21A96000
heap
page read and write
3980000
trusted library allocation
page read and write
812000
heap
page read and write
F5B000
heap
page read and write
44C1000
heap
page read and write
5E16000
heap
page read and write
4781000
heap
page read and write
650000
heap
page read and write
2BF2000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
687E000
heap
page read and write
3994000
trusted library allocation
page read and write
1CB7E000
stack
page read and write
F06000
heap
page read and write
D32000
heap
page read and write
3981000
trusted library allocation
page read and write
4E41000
heap
page read and write
12E4000
heap
page read and write
DA0000
unkown
page readonly
590000
heap
page read and write
D7D000
heap
page read and write
D88000
heap
page read and write
3989000
trusted library allocation
page read and write
44C1000
heap
page read and write
59F7000
trusted library allocation
page read and write
4781000
heap
page read and write
44C1000
heap
page read and write
9D7000
unkown
page write copy
F70000
heap
page read and write
3F15000
trusted library allocation
page read and write
12D5000
trusted library allocation
page read and write
1355000
trusted library allocation
page read and write
4E41000
heap
page read and write
577000
heap
page read and write
3180000
heap
page read and write
61ED0000
direct allocation
page read and write
35E0000
heap
page read and write
10C0000
heap
page read and write
58FD000
trusted library allocation
page read and write
44C1000
heap
page read and write
DB4000
heap
page read and write
39A2000
trusted library allocation
page read and write
44C1000
heap
page read and write
2F30000
heap
page read and write
455F000
stack
page read and write
5A3E000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
14F9000
stack
page read and write
39C2000
trusted library allocation
page read and write
125C000
heap
page read and write
21A6F000
heap
page read and write
F09000
heap
page read and write
F5A000
unkown
page read and write
AEA000
heap
page read and write
590F000
trusted library allocation
page read and write
3996000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
F6E000
heap
page read and write
611F000
stack
page read and write
3994000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
1088000
trusted library allocation
page read and write
2BFB000
trusted library allocation
page read and write
39BD000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
6AF000
heap
page read and write
C9E000
stack
page read and write
39B8000
trusted library allocation
page read and write
3987000
trusted library allocation
page read and write
1580000
remote allocation
page read and write
30F0000
heap
page read and write
397E000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
21A8F000
heap
page read and write
5460000
direct allocation
page execute and read and write
5A11000
trusted library allocation
page read and write
139A000
heap
page read and write
989000
unkown
page write copy
EE3000
heap
page read and write
3B7D000
trusted library allocation
page read and write
1319000
heap
page read and write
3B34000
trusted library allocation
page read and write
39AF000
trusted library allocation
page read and write
3992000
trusted library allocation
page read and write
15DC000
heap
page read and write
19B000
stack
page read and write
1319000
heap
page read and write
BDE000
stack
page read and write
ADE000
stack
page read and write
3045000
heap
page read and write
5D9E000
trusted library allocation
page read and write
2D8C000
stack
page read and write
39CC000
trusted library allocation
page read and write
2170000
heap
page read and write
4F40000
direct allocation
page execute and read and write
3D12000
trusted library allocation
page read and write
1234000
heap
page read and write
D93000
heap
page read and write
E31000
heap
page read and write
DBC000
heap
page read and write
165F000
heap
page read and write
3B20000
trusted library allocation
page read and write
D33000
heap
page read and write
4BA0000
direct allocation
page read and write
BF0000
direct allocation
page read and write
3B45000
trusted library allocation
page read and write
F7A000
heap
page read and write
DB0000
unkown
page readonly
12D0000
trusted library allocation
page read and write
10C2000
heap
page read and write
3971000
trusted library allocation
page read and write
39AA000
trusted library allocation
page read and write
F6F000
heap
page read and write
6E0000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
3B45000
trusted library allocation
page read and write
10F1000
heap
page read and write
21A7A000
heap
page read and write
F0C000
heap
page read and write
EB7000
heap
page read and write
5E2000
unkown
page readonly
39B8000
trusted library allocation
page read and write
D42000
heap
page read and write
3997000
trusted library allocation
page read and write
280000
heap
page read and write
5A11000
trusted library allocation
page read and write
28A0000
direct allocation
page read and write
5914000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
135C000
trusted library allocation
page read and write
135F000
trusted library allocation
page read and write
BBE000
stack
page read and write
44C1000
heap
page read and write
4ADF000
heap
page read and write
4C0F000
heap
page read and write
81F000
heap
page read and write
1CE1E000
stack
page read and write
15E7000
heap
page read and write
3B45000
trusted library allocation
page read and write
2C3E000
trusted library allocation
page read and write
3B37000
trusted library allocation
page read and write
33BE000
stack
page read and write
6E0000
trusted library allocation
page read and write
3B61000
heap
page read and write
27A916AB000
heap
page read and write
500000
heap
page read and write
4E41000
heap
page read and write
1689000
heap
page read and write
3997000
trusted library allocation
page read and write
39A8000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
981000
unkown
page execute read
59F1000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
3080000
direct allocation
page read and write
D60000
trusted library allocation
page read and write
3B61000
heap
page read and write
431E000
stack
page read and write
21A85000
heap
page read and write
1669000
heap
page read and write
39A8000
trusted library allocation
page read and write
4E41000
heap
page read and write
39BD000
trusted library allocation
page read and write
1230000
heap
page read and write
3080000
direct allocation
page read and write
2F2E000
stack
page read and write
2738000
heap
page read and write
21A7C000
heap
page read and write
1678000
heap
page read and write
3393000
heap
page read and write
6A2000
unkown
page write copy
DED000
unkown
page write copy
1673000
heap
page read and write
3F1B000
trusted library allocation
page read and write
E5B000
heap
page read and write
21A96000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
563000
heap
page read and write
DED000
unkown
page write copy
39A8000
trusted library allocation
page read and write
EB9000
heap
page read and write
1354000
trusted library allocation
page read and write
15B7000
heap
page read and write
19413D3D000
heap
page read and write
1673000
heap
page read and write
E97000
heap
page read and write
4781000
heap
page read and write
21A8F000
heap
page read and write
3745000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
383F000
stack
page read and write
2AC9000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
3992000
trusted library allocation
page read and write
816000
heap
page read and write
3396000
heap
page read and write
164A000
heap
page read and write
56F000
heap
page read and write
573000
heap
page read and write
5460000
direct allocation
page execute and read and write
39A7000
trusted library allocation
page read and write
4D80000
direct allocation
page execute and read and write
3B15000
trusted library allocation
page read and write
2E74000
heap
page read and write
80B000
heap
page read and write
4ADF000
heap
page read and write
3F20000
trusted library allocation
page read and write
14F5000
heap
page read and write
44D1000
heap
page read and write
309E000
stack
page read and write
399C000
trusted library allocation
page read and write
30F8000
heap
page read and write
6870000
heap
page read and write
39A8000
trusted library allocation
page read and write
2842000
heap
page read and write
3745000
heap
page read and write
11E0000
heap
page read and write
1444000
heap
page read and write
3B19000
trusted library allocation
page read and write
2C41000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
10E4000
heap
page read and write
3399000
heap
page read and write
12D5000
trusted library allocation
page read and write
21A87000
heap
page read and write
10FD000
stack
page read and write
58FA000
trusted library allocation
page read and write
3978000
trusted library allocation
page read and write
5915000
trusted library allocation
page read and write
273B000
heap
page read and write
816000
heap
page read and write
5A3E000
trusted library allocation
page read and write
7E0000
unkown
page write copy
1BAF0000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
152E000
stack
page read and write
3F1D000
trusted library allocation
page read and write
981000
unkown
page execute read
3B16000
trusted library allocation
page read and write
4E41000
heap
page read and write
EE2000
heap
page read and write
39C7000
trusted library allocation
page read and write
980000
unkown
page readonly
3B48000
trusted library allocation
page read and write
21A87000
heap
page read and write
720000
unkown
page readonly
3B7D000
trusted library allocation
page read and write
1656000
heap
page read and write
F58000
heap
page read and write
E3D000
heap
page read and write
44C1000
heap
page read and write
671000
heap
page read and write
16A0000
heap
page read and write
21A85000
heap
page read and write
1CA50000
heap
page read and write
3B61000
heap
page read and write
135B000
trusted library allocation
page read and write
50CE000
stack
page read and write
3008000
heap
page read and write
721000
unkown
page execute read
F4E000
stack
page read and write
3B35000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
44C1000
heap
page read and write
4363000
trusted library allocation
page read and write
1670000
heap
page read and write
402A000
trusted library allocation
page read and write
39D4000
trusted library allocation
page read and write
FE9000
unkown
page execute and write copy
39A8000
trusted library allocation
page read and write
32FE000
stack
page read and write
573000
heap
page read and write
12D8000
trusted library allocation
page read and write
80B000
heap
page read and write
DA7000
heap
page read and write
3B48000
trusted library allocation
page read and write
3B33000
trusted library allocation
page read and write
3399000
heap
page read and write
EC2000
heap
page read and write
B6E000
heap
page read and write
7ED000
heap
page read and write
4F70000
direct allocation
page execute and read and write
5909000
trusted library allocation
page read and write
1077000
heap
page read and write
27A916BF000
heap
page read and write
3990000
trusted library allocation
page read and write
27A916CF000
heap
page read and write
3540000
heap
page read and write
135B000
trusted library allocation
page read and write
4030000
trusted library allocation
page read and write
1354000
trusted library allocation
page read and write
1077000
heap
page read and write
3080000
direct allocation
page read and write
44C1000
heap
page read and write
802000
heap
page read and write
3986000
trusted library allocation
page read and write
3380000
heap
page read and write
4D60000
direct allocation
page execute and read and write
1444000
heap
page read and write
CA0000
heap
page read and write
5A3E000
trusted library allocation
page read and write
3985000
trusted library allocation
page read and write
413F000
stack
page read and write
2BF3000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
166E000
heap
page read and write
30A0000
heap
page read and write
3F19000
trusted library allocation
page read and write
3B65000
trusted library allocation
page read and write
594D000
trusted library allocation
page read and write
12DC000
trusted library allocation
page read and write
7FE000
heap
page read and write
12D8000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
4E41000
heap
page read and write
39CC000
trusted library allocation
page read and write
39AF000
trusted library allocation
page read and write
16A5000
heap
page read and write
3B4E000
trusted library allocation
page read and write
39AF000
trusted library allocation
page read and write
3B16000
trusted library allocation
page read and write
671000
heap
page read and write
19413D48000
heap
page read and write
563000
heap
page read and write
7F9000
heap
page read and write
135D000
trusted library allocation
page read and write
F69000
heap
page read and write
5FC4000
heap
page read and write
9D4000
unkown
page readonly
58F5000
trusted library allocation
page read and write
3080000
direct allocation
page read and write
3989000
trusted library allocation
page read and write
39DF000
trusted library allocation
page read and write
3B4B000
trusted library allocation
page read and write
398B000
trusted library allocation
page read and write
3A70000
trusted library allocation
page read and write
21AA3000
heap
page read and write
176A000
heap
page read and write
563000
heap
page read and write
5D9D000
trusted library allocation
page read and write
417E000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
577000
heap
page read and write
3395000
heap
page read and write
128C000
heap
page read and write
1670000
heap
page read and write
4E41000
heap
page read and write
39A2000
trusted library allocation
page read and write
686000
heap
page read and write
1089000
trusted library allocation
page read and write
2FBE000
stack
page read and write
7F9000
heap
page read and write
2BFE000
trusted library allocation
page read and write
671000
heap
page read and write
80B000
heap
page read and write
5240000
direct allocation
page execute and read and write
3B69000
trusted library allocation
page read and write
108C000
trusted library allocation
page read and write
40FF000
stack
page read and write
3B45000
trusted library allocation
page read and write
3B48000
trusted library allocation
page read and write
2C37000
trusted library allocation
page read and write
3971000
trusted library allocation
page read and write
E2C000
stack
page read and write
15E6000
heap
page read and write
3992000
trusted library allocation
page read and write
B5A000
unkown
page execute and write copy
21A96000
heap
page read and write
44C1000
heap
page read and write
39A7000
trusted library allocation
page read and write
1237000
heap
page read and write
2E70000
heap
page read and write
6A3000
unkown
page execute read
21A85000
heap
page read and write
423F000
stack
page read and write
3997000
trusted library allocation
page read and write
505F000
stack
page read and write
4034000
trusted library allocation
page read and write
304D000
heap
page read and write
4781000
heap
page read and write
573000
heap
page read and write
80B000
heap
page read and write
3990000
trusted library allocation
page read and write
2845000
heap
page read and write
15E4000
heap
page read and write
15E4000
heap
page read and write
10AE000
heap
page read and write
162E000
stack
page read and write
EFF000
heap
page read and write
F66000
heap
page read and write
31A6000
heap
page read and write
61E01000
direct allocation
page execute read
398D000
trusted library allocation
page read and write
1082000
trusted library allocation
page read and write
3978000
trusted library allocation
page read and write
4F70000
direct allocation
page execute and read and write
21A63000
heap
page read and write
15E6000
heap
page read and write
3F22000
trusted library allocation
page read and write
44C1000
heap
page read and write
51D0000
direct allocation
page execute and read and write
21A87000
heap
page read and write
2AC9000
trusted library allocation
page read and write
5D9F000
trusted library allocation
page read and write
3B8C000
trusted library allocation
page read and write
BDE000
stack
page read and write
10CC000
heap
page read and write
3A03000
trusted library allocation
page read and write
1301000
heap
page read and write
3B86000
trusted library allocation
page read and write
19413D41000
heap
page read and write
1B9F1000
heap
page read and write
12F1000
heap
page read and write
4781000
heap
page read and write
3B5D000
trusted library allocation
page read and write
12DE000
trusted library allocation
page read and write
39C5000
trusted library allocation
page read and write
3B6C000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
3B2C000
trusted library allocation
page read and write
3B47000
trusted library allocation
page read and write
577000
heap
page read and write
D32000
unkown
page execute and read and write
19413D54000
heap
page read and write
7FE000
heap
page read and write
6B5000
heap
page read and write
44C1000
heap
page read and write
1250000
heap
page read and write
F9D000
heap
page read and write
C80000
trusted library allocation
page read and write
BF0000
direct allocation
page read and write
4781000
heap
page read and write
401000
unkown
page execute read
3ACF000
stack
page read and write
518F000
stack
page read and write
12E4000
heap
page read and write
3997000
trusted library allocation
page read and write
178F000
stack
page read and write
346A000
heap
page read and write
313E000
stack
page read and write
39E0000
trusted library allocation
page read and write
3986000
trusted library allocation
page read and write
4A7F000
stack
page read and write
4BB1000
heap
page read and write
5A3E000
trusted library allocation
page read and write
3B26000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
56F000
heap
page read and write
42DF000
stack
page read and write
E09000
heap
page read and write
21A96000
heap
page read and write
3B8C000
trusted library allocation
page read and write
BE0000
heap
page read and write
2736000
heap
page read and write
3A11000
trusted library allocation
page read and write
128C000
heap
page read and write
44C1000
heap
page read and write
351F000
stack
page read and write
7ED000
heap
page read and write
44C1000
heap
page read and write
102B000
unkown
page read and write
1CC7F000
stack
page read and write
41F000
unkown
page read and write
21AB4000
heap
page read and write
5A3E000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
1084000
trusted library allocation
page read and write
F69000
heap
page read and write
F6B000
heap
page read and write
403C000
trusted library allocation
page read and write
369E000
stack
page read and write
BF0000
direct allocation
page read and write
F88000
heap
page read and write
15D1000
heap
page read and write
403C000
trusted library allocation
page read and write
DA4000
heap
page read and write
3B20000
trusted library allocation
page read and write
108B000
trusted library allocation
page read and write
108A000
trusted library allocation
page read and write
F78000
heap
page read and write
3B45000
trusted library allocation
page read and write
339C000
heap
page read and write
4E41000
heap
page read and write
3C16000
trusted library allocation
page read and write
A0C000
unkown
page execute and write copy
6C1D5000
unkown
page readonly
2905000
heap
page read and write
44C1000
heap
page read and write
21A8F000
heap
page read and write
397F000
stack
page read and write
802000
heap
page read and write
194140BC000
heap
page read and write
1257000
heap
page read and write
5907000
trusted library allocation
page read and write
39F8000
trusted library allocation
page read and write
B12000
unkown
page execute and read and write
1353000
trusted library allocation
page read and write
338E000
stack
page read and write
58FA000
trusted library allocation
page read and write
A00000
heap
page read and write
1690000
heap
page read and write
39EF000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
3140000
heap
page read and write
165E000
heap
page read and write
4781000
heap
page read and write
158F000
stack
page read and write
397E000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
15D5000
heap
page read and write
7FF449D10000
trusted library allocation
page execute and read and write
2BF3000
trusted library allocation
page read and write
39C2000
trusted library allocation
page read and write
FFF000
unkown
page read and write
402B000
trusted library allocation
page read and write
4A90000
direct allocation
page execute and read and write
DC5000
heap
page read and write
2F0000
unkown
page read and write
34BE000
stack
page read and write
1B480000
heap
page read and write
2BFE000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
3B34000
trusted library allocation
page read and write
1CB57000
heap
page read and write
39AC000
trusted library allocation
page read and write
397F000
stack
page read and write
F82000
heap
page read and write
3F20000
trusted library allocation
page read and write
2F50000
heap
page read and write
27A916F6000
heap
page read and write
2C3B000
trusted library allocation
page read and write
DDF000
unkown
page readonly
39CA000
trusted library allocation
page read and write
39A2000
trusted library allocation
page read and write
3996000
trusted library allocation
page read and write
F76000
heap
page read and write
12DE000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
1234000
heap
page read and write
3986000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
13A0000
heap
page read and write
1652000
heap
page read and write
39B2000
trusted library allocation
page read and write
999000
unkown
page readonly
3B45000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
21A96000
heap
page read and write
591F000
trusted library allocation
page read and write
28ED000
stack
page read and write
165F000
heap
page read and write
2C37000
trusted library allocation
page read and write
39CA000
trusted library allocation
page read and write
2C36000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
39A3000
trusted library allocation
page read and write
3BDF000
trusted library allocation
page read and write
2B568FF000
stack
page read and write
3998000
trusted library allocation
page read and write
5FE1000
heap
page read and write
3B35000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
2AC1000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
3871000
heap
page read and write
27DDF000
heap
page read and write
3997000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
1669000
heap
page read and write
4781000
heap
page read and write
21A87000
heap
page read and write
3B1F000
trusted library allocation
page read and write
12F1000
heap
page read and write
44C1000
heap
page read and write
4790000
heap
page read and write
1D04E000
stack
page read and write
44C1000
heap
page read and write
30A6000
heap
page read and write
F6B000
heap
page read and write
3B49000
trusted library allocation
page read and write
3399000
heap
page read and write
812000
heap
page read and write
1087000
trusted library allocation
page read and write
F86000
heap
page read and write
F4B000
heap
page read and write
3393000
heap
page read and write
2C3D000
trusted library allocation
page read and write
980000
unkown
page readonly
3B33000
trusted library allocation
page read and write
F6B000
heap
page read and write
3B17000
trusted library allocation
page read and write
5220000
direct allocation
page execute and read and write
3980000
trusted library allocation
page read and write
2AC3000
trusted library allocation
page read and write
5230000
direct allocation
page execute and read and write
22A0000
heap
page read and write
1088000
trusted library allocation
page read and write
4781000
heap
page read and write
9CE000
unkown
page execute and read and write
1306000
heap
page read and write
39BB000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
3EBE000
stack
page read and write
3B3D000
trusted library allocation
page read and write
2C38000
trusted library allocation
page read and write
D6D000
heap
page read and write
128C000
heap
page read and write
E70000
unkown
page write copy
7FFD9B793000
trusted library allocation
page execute and read and write
2BF1000
trusted library allocation
page read and write
3745000
heap
page read and write
980000
unkown
page readonly
21D4000
heap
page read and write
1D1A0000
trusted library section
page read and write
2A3B000
heap
page read and write
1CE4F000
stack
page read and write
68F000
heap
page read and write
1C650000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
44C1000
heap
page read and write
2AC4000
trusted library allocation
page read and write
2A00000
heap
page read and write
3986000
trusted library allocation
page read and write
840000
unkown
page readonly
21A84000
heap
page read and write
80B000
heap
page read and write
3E81000
trusted library allocation
page read and write
39A5000
trusted library allocation
page read and write
D90000
heap
page read and write
19413D25000
heap
page read and write
D42000
heap
page read and write
F69000
heap
page read and write
123A000
heap
page read and write
D70000
trusted library allocation
page read and write
2ACB000
trusted library allocation
page read and write
4F4000
unkown
page readonly
19413D41000
heap
page read and write
2E20000
heap
page read and write
2844000
heap
page read and write
7ED000
heap
page read and write
5907000
trusted library allocation
page read and write
14E8000
heap
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
39AF000
trusted library allocation
page read and write
F3F000
heap
page read and write
5A00000
trusted library allocation
page read and write
30FF000
stack
page read and write
312B000
heap
page read and write
3B35000
trusted library allocation
page read and write
3B33000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
39A7000
trusted library allocation
page read and write
3B5C000
trusted library allocation
page read and write
1444000
heap
page read and write
2B56FFF000
stack
page read and write
304D000
heap
page read and write
5917000
trusted library allocation
page read and write
8A9000
unkown
page write copy
39AB000
trusted library allocation
page read and write
4E41000
heap
page read and write
5D9E000
trusted library allocation
page read and write
27B10000
heap
page read and write
1656000
heap
page read and write
64EC000
stack
page read and write
4E41000
heap
page read and write
812000
heap
page read and write
14EE000
stack
page read and write
1355000
trusted library allocation
page read and write
9C0000
unkown
page readonly
5A00000
trusted library allocation
page read and write
36BE000
heap
page read and write
B5C000
heap
page read and write
5A3D000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
284E000
heap
page read and write
21A7A000
heap
page read and write
F86000
heap
page read and write
816000
heap
page read and write
4781000
heap
page read and write
39A5000
trusted library allocation
page read and write
44C1000
heap
page read and write
2C3F000
trusted library allocation
page read and write
10DB000
unkown
page read and write
27A914E0000
heap
page read and write
21A7F000
heap
page read and write
1083000
trusted library allocation
page read and write
12F5000
heap
page read and write
39F0000
trusted library allocation
page read and write
3B33000
trusted library allocation
page read and write
21A87000
heap
page read and write
1661000
heap
page read and write
F36000
heap
page read and write
5FB8000
trusted library allocation
page read and write
3B79000
trusted library allocation
page read and write
3080000
direct allocation
page read and write
27A916DC000
heap
page read and write
44C1000
heap
page read and write
39D8000
trusted library allocation
page read and write
1317000
heap
page read and write
2BF4000
trusted library allocation
page read and write
F6B000
heap
page read and write
9C0000
unkown
page readonly
3F14000
trusted library allocation
page read and write
303B000
heap
page read and write
DC5000
heap
page read and write
E9B000
stack
page read and write
4E41000
heap
page read and write
1390000
heap
page read and write
5908000
trusted library allocation
page read and write
621000
heap
page read and write
5EA5000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
7F9000
heap
page read and write
3140000
heap
page read and write
5A00000
trusted library allocation
page read and write
39DB000
trusted library allocation
page read and write
2BBF000
stack
page read and write
3B45000
trusted library allocation
page read and write
27A91865000
heap
page read and write
2ACD000
trusted library allocation
page read and write
575000
heap
page read and write
5E00000
heap
page read and write
4E41000
heap
page read and write
5450000
remote allocation
page read and write
2BF8000
trusted library allocation
page read and write
39F2000
trusted library allocation
page read and write
80B000
heap
page read and write
3746000
heap
page read and write
81C000
heap
page read and write
3994000
trusted library allocation
page read and write
802000
heap
page read and write
4039000
trusted library allocation
page read and write
39C0000
trusted library allocation
page read and write
1234000
heap
page read and write
9C9000
unkown
page write copy
39CA000
trusted library allocation
page read and write
BCD000
stack
page read and write
3FBF000
stack
page read and write
2AC2000
trusted library allocation
page read and write
44BF000
stack
page read and write
EED000
heap
page read and write
3B57000
trusted library allocation
page read and write
1646000
heap
page read and write
3C10000
heap
page read and write
397E000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
4E41000
heap
page read and write
39CA000
trusted library allocation
page read and write
39AF000
trusted library allocation
page read and write
302D000
heap
page read and write
10C9000
heap
page read and write
9CE000
unkown
page write copy
3B5C000
trusted library allocation
page read and write
11E4000
heap
page read and write
CFE000
unkown
page execute and write copy
44C1000
heap
page read and write
4961000
heap
page read and write
3BB6000
trusted library allocation
page read and write
14AF000
stack
page read and write
39B8000
trusted library allocation
page read and write
5927000
trusted library allocation
page read and write
1444000
heap
page read and write
2880000
direct allocation
page read and write
7ED000
heap
page read and write
29BF000
stack
page read and write
5A01000
trusted library allocation
page read and write
1304000
heap
page read and write
27DDD000
heap
page read and write
14C4000
heap
page read and write
39CC000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
4E41000
heap
page read and write
44C1000
heap
page read and write
4BB1000
heap
page read and write
3F29000
trusted library allocation
page read and write
4048000
trusted library allocation
page read and write
21A87000
heap
page read and write
39A7000
trusted library allocation
page read and write
D25000
heap
page read and write
19413CD0000
heap
page read and write
2ACB000
trusted library allocation
page read and write
21AA3000
heap
page read and write
39B8000
trusted library allocation
page read and write
5902000
trusted library allocation
page read and write
2ACF000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
27D40000
trusted library allocation
page read and write
3B11000
trusted library allocation
page read and write
44C1000
heap
page read and write
303F000
heap
page read and write
3997000
trusted library allocation
page read and write
13E5000
heap
page read and write
3391000
heap
page read and write
44C1000
heap
page read and write
2AC9000
trusted library allocation
page read and write
39A9000
trusted library allocation
page read and write
3E1E000
stack
page read and write
3440000
heap
page read and write
22A5000
heap
page read and write
4781000
heap
page read and write
39A8000
trusted library allocation
page read and write
4781000
heap
page read and write
3DBE000
trusted library allocation
page read and write
38BE000
stack
page read and write
3B35000
trusted library allocation
page read and write
19413D41000
heap
page read and write
131B000
heap
page read and write
699000
heap
page read and write
168C000
heap
page read and write
168D000
heap
page read and write
812000
heap
page read and write
44C1000
heap
page read and write
131C000
heap
page read and write
3B31000
trusted library allocation
page read and write
E5B000
heap
page read and write
108C000
trusted library allocation
page read and write
7E0000
unkown
page write copy
3996000
trusted library allocation
page read and write
4039000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
6BF51000
unkown
page execute read
1B40D000
stack
page read and write
39A7000
trusted library allocation
page read and write
1657000
heap
page read and write
3B28000
trusted library allocation
page read and write
9D4000
unkown
page readonly
303D000
stack
page read and write
3B2C000
trusted library allocation
page read and write
2C3C000
trusted library allocation
page read and write
1B84D000
stack
page read and write
2E80000
remote allocation
page read and write
FC145FF000
stack
page read and write
D60000
trusted library allocation
page read and write
39A9000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
D44000
heap
page read and write
346D000
heap
page read and write
F71000
heap
page read and write
3E0A000
trusted library allocation
page read and write
1680000
heap
page read and write
FE3000
heap
page read and write
48E000
stack
page read and write
7FFD9B840000
trusted library allocation
page read and write
3021000
heap
page read and write
463F000
stack
page read and write
1200000
direct allocation
page read and write
4081000
trusted library allocation
page read and write
3427000
heap
page read and write
7F9000
heap
page read and write
F75000
heap
page read and write
2C39000
trusted library allocation
page read and write
6C1CF000
unkown
page write copy
12DB000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
1237000
heap
page read and write
3B8C000
trusted library allocation
page read and write
19413CF0000
heap
page read and write
2AC9000
trusted library allocation
page read and write
12D8000
trusted library allocation
page read and write
4BA0000
direct allocation
page read and write
7F9000
heap
page read and write
3A08000
trusted library allocation
page read and write
12F6000
heap
page read and write
3B35000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
1302000
heap
page read and write
F86000
heap
page read and write
365F000
stack
page read and write
21A6B000
heap
page read and write
12D8000
trusted library allocation
page read and write
3B61000
heap
page read and write
590000
heap
page read and write
3986000
trusted library allocation
page read and write
590D000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
45E000
unkown
page execute and read and write
4781000
heap
page read and write
21A84000
heap
page read and write
1355000
trusted library allocation
page read and write
3973000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
126B000
heap
page read and write
5EA4000
trusted library allocation
page read and write
816000
heap
page read and write
337E000
unkown
page read and write
51A0000
direct allocation
page execute and read and write
B14000
stack
page read and write
44C1000
heap
page read and write
3080000
direct allocation
page read and write
3B4D000
trusted library allocation
page read and write
5D0000
heap
page read and write
A18000
unkown
page execute and write copy
D60000
trusted library allocation
page read and write
39BB000
trusted library allocation
page read and write
44C1000
heap
page read and write
5958000
trusted library allocation
page read and write
44C1000
heap
page read and write
2ACB000
trusted library allocation
page read and write
6080000
remote allocation
page read and write
3B61000
heap
page read and write
2880000
direct allocation
page read and write
44C1000
heap
page read and write
EA2000
heap
page read and write
1B470000
heap
page read and write
1091000
trusted library allocation
page read and write
39A3000
trusted library allocation
page read and write
2AC3000
trusted library allocation
page read and write
EA2000
heap
page read and write
2A37000
heap
page read and write
2A20000
direct allocation
page read and write
F82000
heap
page read and write
F8A000
heap
page read and write
802000
heap
page read and write
39A2000
trusted library allocation
page read and write
9D4000
unkown
page readonly
3994000
trusted library allocation
page read and write
98000
stack
page read and write
3B45000
trusted library allocation
page read and write
5931000
trusted library allocation
page read and write
3D1E000
trusted library allocation
page read and write
63EC000
stack
page read and write
373E000
stack
page read and write
399F000
trusted library allocation
page read and write
108E000
trusted library allocation
page read and write
44C1000
heap
page read and write
3B45000
trusted library allocation
page read and write
FA3000
heap
page read and write
1640000
heap
page read and write
39A9000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
108A000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
56F000
heap
page read and write
34AF000
unkown
page read and write
1255000
heap
page read and write
4B60000
direct allocation
page execute and read and write
5460000
direct allocation
page execute and read and write
481E000
stack
page read and write
12FC000
heap
page read and write
E51000
heap
page read and write
21AA4000
heap
page read and write
5A29000
trusted library allocation
page read and write
3392000
heap
page read and write
5AE000
heap
page read and write
3A06000
trusted library allocation
page read and write
39C2000
trusted library allocation
page read and write
1444000
heap
page read and write
39A7000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
12FC000
heap
page read and write
44C1000
heap
page read and write
A20000
heap
page read and write
C80000
trusted library allocation
page read and write
3D22000
trusted library allocation
page read and write
39A8000
trusted library allocation
page read and write
4E41000
heap
page read and write
BFC000
stack
page read and write
1673000
heap
page read and write
1760000
heap
page read and write
1357000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
F69000
heap
page read and write
14FD000
stack
page read and write
F4C000
heap
page read and write
3B7C000
trusted library allocation
page read and write
39A9000
trusted library allocation
page read and write
490000
heap
page read and write
9D4000
unkown
page readonly
F50000
heap
page read and write
3B61000
heap
page read and write
398F000
trusted library allocation
page read and write
1669000
heap
page read and write
19413D0C000
heap
page read and write
459000
remote allocation
page execute and read and write
19413D18000
heap
page read and write
573000
heap
page read and write
39A7000
trusted library allocation
page read and write
272E000
stack
page read and write
21A7E000
heap
page read and write
44C1000
heap
page read and write
841000
unkown
page execute and write copy
1077000
heap
page read and write
44C1000
heap
page read and write
43BE000
stack
page read and write
601F000
stack
page read and write
2BF5000
trusted library allocation
page read and write
21A87000
heap
page read and write
44C1000
heap
page read and write
21A8F000
heap
page read and write
12D9000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
DA5000
heap
page read and write
F9D000
heap
page read and write
3B61000
trusted library allocation
page read and write
399A000
trusted library allocation
page read and write
2A3F000
stack
page read and write
6E0000
trusted library allocation
page read and write
10CA000
heap
page read and write
3AE1000
trusted library allocation
page read and write
62E000
heap
page read and write
5933000
trusted library allocation
page read and write
39A5000
trusted library allocation
page read and write
12DE000
trusted library allocation
page read and write
1631000
heap
page read and write
27A916EA000
heap
page read and write
4056000
trusted library allocation
page read and write
3982000
trusted library allocation
page read and write
816000
heap
page read and write
417D000
trusted library allocation
page read and write
E11000
heap
page read and write
3997000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
1CF4E000
stack
page read and write
44C1000
heap
page read and write
44C1000
heap
page read and write
21A8F000
heap
page read and write
3A1F000
stack
page read and write
3390000
heap
page read and write
9CE000
unkown
page write copy
39A8000
trusted library allocation
page read and write
7FFD9B7A2000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
3260000
heap
page read and write
AAB000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
1310000
heap
page read and write
3F1C000
trusted library allocation
page read and write
3F15000
trusted library allocation
page read and write
4E41000
heap
page read and write
DF1000
heap
page read and write
3B45000
trusted library allocation
page read and write
87A000
unkown
page execute and write copy
149E000
heap
page read and write
D3B000
unkown
page execute and read and write
39CA000
trusted library allocation
page read and write
2BFA000
trusted library allocation
page read and write
123C000
heap
page read and write
FC13F9A000
stack
page read and write
590000
heap
page read and write
E70000
heap
page read and write
E11000
heap
page read and write
5A09000
trusted library allocation
page read and write
43FE000
stack
page read and write
15CD000
heap
page read and write
3B25000
trusted library allocation
page read and write
1689000
heap
page read and write
21A6B000
heap
page read and write
4174000
trusted library allocation
page read and write
4BA0000
direct allocation
page read and write
3992000
trusted library allocation
page read and write
44C1000
heap
page read and write
3996000
trusted library allocation
page read and write
3743000
heap
page read and write
DF3000
unkown
page readonly
3397000
heap
page read and write
14F4000
heap
page read and write
3F16000
trusted library allocation
page read and write
D63000
heap
page read and write
27A916B9000
heap
page read and write
3B5D000
trusted library allocation
page read and write
3200000
heap
page read and write
359E000
stack
page read and write
4E41000
heap
page read and write
3B45000
trusted library allocation
page read and write
3998000
trusted library allocation
page read and write
21A81000
heap
page read and write
39E7000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
D80000
heap
page read and write
494000
heap
page read and write
123D000
heap
page read and write
816000
heap
page read and write
3B61000
heap
page read and write
3B43000
trusted library allocation
page read and write
194140B0000
heap
page read and write
2BF5000
trusted library allocation
page read and write
123B000
heap
page read and write
577000
heap
page read and write
3396000
heap
page read and write
3972000
trusted library allocation
page read and write
273B000
heap
page read and write
1670000
heap
page read and write
2880000
direct allocation
page read and write
F74000
heap
page read and write
DF6000
unkown
page write copy
3D7E000
stack
page read and write
1087000
trusted library allocation
page read and write
31FF000
stack
page read and write
2E2C000
heap
page read and write
17CF000
stack
page read and write
126A000
heap
page read and write
F71000
heap
page read and write
4E41000
heap
page read and write
12DB000
trusted library allocation
page read and write
44C1000
heap
page read and write
39A2000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
124A000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
4F70000
direct allocation
page execute and read and write
39A2000
trusted library allocation
page read and write
4781000
heap
page read and write
2BF6000
trusted library allocation
page read and write
404A000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
3A20000
trusted library allocation
page read and write
1D0AD000
stack
page read and write
651000
heap
page read and write
15BC000
heap
page read and write
56F000
heap
page read and write
1667000
heap
page read and write
35FF000
stack
page read and write
39A8000
trusted library allocation
page read and write
1646000
heap
page read and write
2C40000
trusted library allocation
page read and write
131B000
heap
page read and write
D90000
trusted library allocation
page read and write
4E41000
heap
page read and write
3B5C000
trusted library allocation
page read and write
27A93500000
heap
page read and write
5A3E000
trusted library allocation
page read and write
27F2000
heap
page read and write
3395000
heap
page read and write
3B4E000
trusted library allocation
page read and write
E25000
heap
page read and write
2C3E000
trusted library allocation
page read and write
123C000
heap
page read and write
12DD000
trusted library allocation
page read and write
DAB000
heap
page read and write
12D9000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
39B3000
trusted library allocation
page read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
F76000
heap
page read and write
B1B000
heap
page read and write
3B25000
trusted library allocation
page read and write
11EC000
heap
page read and write
BF0000
direct allocation
page read and write
44C1000
heap
page read and write
5A3E000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
123C000
heap
page read and write
400000
unkown
page readonly
5A11000
trusted library allocation
page read and write
812000
heap
page read and write
39A4000
trusted library allocation
page read and write
2C3B000
trusted library allocation
page read and write
3AFD000
stack
page read and write
21A88000
heap
page read and write
27A916CE000
heap
page read and write
3B45000
trusted library allocation
page read and write
3B34000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
3F17000
trusted library allocation
page read and write
39BE000
stack
page read and write
88B000
unkown
page execute and write copy
980000
unkown
page readonly
28F7000
heap
page read and write
1689000
heap
page read and write
19413D3D000
heap
page read and write
80B000
heap
page read and write
17B0000
heap
page read and write
21A8F000
heap
page read and write
5A11000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
135D000
trusted library allocation
page read and write
39D1000
trusted library allocation
page read and write
E66000
unkown
page readonly
3B35000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
4E41000
heap
page read and write
E05000
heap
page read and write
2880000
direct allocation
page read and write
39CE000
trusted library allocation
page read and write
58F1000
trusted library allocation
page read and write
402D000
trusted library allocation
page read and write
123B000
heap
page read and write
802000
heap
page read and write
4E41000
heap
page read and write
F7E000
heap
page read and write
3997000
trusted library allocation
page read and write
15E4000
heap
page read and write
1088000
trusted library allocation
page read and write
9C0000
unkown
page readonly
4E41000
heap
page read and write
DDF000
unkown
page readonly
4781000
heap
page read and write
3B25000
trusted library allocation
page read and write
108D000
trusted library allocation
page read and write
1271000
heap
page read and write
458A000
trusted library allocation
page read and write
1B5CF000
stack
page read and write
3080000
direct allocation
page read and write
131E000
heap
page read and write
F7D000
heap
page read and write
61ED4000
direct allocation
page readonly
166E000
heap
page read and write
44C1000
heap
page read and write
720000
unkown
page readonly
5931000
trusted library allocation
page read and write
1689000
heap
page read and write
27A916E0000
heap
page read and write
60FB000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
3B12000
trusted library allocation
page read and write
166E000
stack
page read and write
5927000
trusted library allocation
page read and write
416C000
trusted library allocation
page read and write
12FF000
stack
page read and write
32C0000
heap
page read and write
812000
heap
page read and write
118B000
unkown
page execute and read and write
7ED000
heap
page read and write
327E000
stack
page read and write
594000
heap
page read and write
135C000
trusted library allocation
page read and write
C1E000
stack
page read and write
339A000
heap
page read and write
4781000
heap
page read and write
44C1000
heap
page read and write
5911000
trusted library allocation
page read and write
44C1000
heap
page read and write
2BFC000
trusted library allocation
page read and write
39A4000
trusted library allocation
page read and write
3C6D000
trusted library allocation
page read and write
39C2000
trusted library allocation
page read and write
12DE000
heap
page read and write
1310000
heap
page read and write
3B1F000
trusted library allocation
page read and write
4E41000
heap
page read and write
1082000
trusted library allocation
page read and write
44C1000
heap
page read and write
39CA000
trusted library allocation
page read and write
135B000
trusted library allocation
page read and write
44C1000
heap
page read and write
630000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
3B55000
trusted library allocation
page read and write
21A8F000
heap
page read and write
51C0000
direct allocation
page execute and read and write
B1E000
stack
page read and write
3AA7000
trusted library allocation
page read and write
2731000
heap
page read and write
3080000
direct allocation
page read and write
4D0000
trusted library allocation
page read and write
3A90000
trusted library allocation
page read and write
59F8000
trusted library allocation
page read and write
3080000
direct allocation
page read and write
4DA0000
direct allocation
page execute and read and write
39D2000
trusted library allocation
page read and write
7EA000
heap
page read and write
3B61000
heap
page read and write
3F24000
trusted library allocation
page read and write
520000
heap
page read and write
3B45000
trusted library allocation
page read and write
697000
heap
page read and write
62F000
heap
page read and write
5A01000
trusted library allocation
page read and write
563000
heap
page read and write
2C3C000
trusted library allocation
page read and write
520000
heap
page read and write
44C1000
heap
page read and write
686000
heap
page read and write
4FC1000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
D32000
heap
page read and write
21CE000
stack
page read and write
FC149FF000
stack
page read and write
168C000
heap
page read and write
2C34000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
2880000
direct allocation
page read and write
12F2000
heap
page read and write
44C1000
heap
page read and write
2F0000
unkown
page readonly
15F0000
heap
page read and write
3FFF000
stack
page read and write
27A9186C000
heap
page read and write
F28000
heap
page read and write
12D2000
trusted library allocation
page read and write
E83000
heap
page read and write
3996000
trusted library allocation
page read and write
F7F000
heap
page read and write
7E9000
unkown
page readonly
658000
heap
page read and write
21AA3000
heap
page read and write
FC146FF000
stack
page read and write
1263000
heap
page read and write
1304000
heap
page read and write
5A00000
trusted library allocation
page read and write
7FE000
heap
page read and write
3B9E000
stack
page read and write
12DE000
stack
page read and write
400D000
trusted library allocation
page read and write
3391000
heap
page read and write
2ACB000
trusted library allocation
page read and write
F06000
heap
page read and write
3B25000
trusted library allocation
page read and write
3B43000
trusted library allocation
page read and write
1659000
heap
page read and write
12D6000
trusted library allocation
page read and write
5953000
trusted library allocation
page read and write
21A8F000
heap
page read and write
655000
heap
page read and write
39A4000
trusted library allocation
page read and write
4781000
heap
page read and write
3B77000
trusted library allocation
page read and write
27A916E0000
heap
page read and write
12DA000
trusted library allocation
page read and write
802000
heap
page read and write
15D4000
heap
page read and write
108A000
trusted library allocation
page read and write
573000
heap
page read and write
3B47000
trusted library allocation
page read and write
1091000
trusted library allocation
page read and write
2E7F000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
41DE000
stack
page read and write
3997000
trusted library allocation
page read and write
58F2000
trusted library allocation
page read and write
3F1B000
trusted library allocation
page read and write
7BE000
heap
page read and write
14D5000
heap
page read and write
840000
unkown
page read and write
21AA3000
heap
page read and write
2C00000
trusted library allocation
page read and write
3B11000
trusted library allocation
page read and write
39D7000
trusted library allocation
page read and write
397A000
trusted library allocation
page read and write
12821000
trusted library allocation
page read and write
1CF1F000
stack
page read and write
AEC000
heap
page read and write
327C000
stack
page read and write
44C1000
heap
page read and write
630000
heap
page read and write
58FB000
trusted library allocation
page read and write
44C1000
heap
page read and write
812000
heap
page read and write
402C000
trusted library allocation
page read and write
59F8000
trusted library allocation
page read and write
47DF000
stack
page read and write
3980000
trusted library allocation
page read and write
1D1AD000
stack
page read and write
39D2000
trusted library allocation
page read and write
3B49000
trusted library allocation
page read and write
F95000
unkown
page read and write
C80000
trusted library allocation
page read and write
12DE000
trusted library allocation
page read and write
19413D11000
heap
page read and write
80B000
heap
page read and write
3B35000
trusted library allocation
page read and write
1B460000
heap
page execute and read and write
15C6000
heap
page read and write
1673000
heap
page read and write
4BA0000
direct allocation
page read and write
EA2000
heap
page read and write
405F000
stack
page read and write
2BF5000
trusted library allocation
page read and write
563000
heap
page read and write
1B4C3000
heap
page read and write
81F000
heap
page read and write
5948000
trusted library allocation
page read and write
EB8000
heap
page read and write
27A916E9000
heap
page read and write
2C00000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1669000
heap
page read and write
3B8C000
trusted library allocation
page read and write
39A2000
trusted library allocation
page read and write
E28000
heap
page read and write
2ACB000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
8A9000
unkown
page write copy
3B57000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
12F7000
heap
page read and write
3980000
trusted library allocation
page read and write
1359000
trusted library allocation
page read and write
39AB000
trusted library allocation
page read and write
3B83000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
419F000
stack
page read and write
577000
heap
page read and write
21AA1000
heap
page read and write
131B000
heap
page read and write
15F0000
heap
page read and write
58FA000
trusted library allocation
page read and write
1657000
heap
page read and write
816000
heap
page read and write
3B45000
trusted library allocation
page read and write
149A000
heap
page read and write
509E000
stack
page read and write
10A2000
heap
page read and write
D32000
heap
page read and write
5943000
trusted library allocation
page read and write
816000
heap
page read and write
986000
unkown
page readonly
2C36000
trusted library allocation
page read and write
4781000
heap
page read and write
F66000
heap
page read and write
9CF000
unkown
page read and write
135F000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
64A000
heap
page read and write
124A000
heap
page read and write
3996000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
3B6C000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
417A000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
39BB000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
4F70000
direct allocation
page execute and read and write
13A7000
heap
page read and write
D32000
heap
page read and write
1256000
heap
page read and write
4F4F000
stack
page read and write
3B25000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
403B000
trusted library allocation
page read and write
F0B000
stack
page read and write
4B30000
direct allocation
page execute and read and write
1444000
heap
page read and write
816000
heap
page read and write
3BAE000
trusted library allocation
page read and write
10F4000
heap
page read and write
172E000
stack
page read and write
30E3000
heap
page read and write
3B35000
trusted library allocation
page read and write
3B92000
trusted library allocation
page read and write
1444000
heap
page read and write
1670000
heap
page read and write
D9B000
heap
page read and write
3B25000
trusted library allocation
page read and write
DE0000
heap
page read and write
2DBE000
stack
page read and write
62E000
stack
page read and write
44C1000
heap
page read and write
10B5000
unkown
page read and write
2ACE000
trusted library allocation
page read and write
3F16000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
51D0000
direct allocation
page execute and read and write
3B59000
trusted library allocation
page read and write
4AF0000
direct allocation
page execute and read and write
5A3E000
trusted library allocation
page read and write
12FC000
heap
page read and write
12DB000
trusted library allocation
page read and write
39A8000
trusted library allocation
page read and write
124A000
heap
page read and write
3749000
heap
page read and write
42BE000
stack
page read and write
3B16000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
3B20000
trusted library allocation
page read and write
812000
heap
page read and write
4E41000
heap
page read and write
4B20000
direct allocation
page execute and read and write
6BFF0000
unkown
page readonly
D91000
heap
page read and write
3986000
trusted library allocation
page read and write
39D3000
trusted library allocation
page read and write
14CF000
stack
page read and write
981000
unkown
page execute read
5450000
remote allocation
page read and write
39BA000
trusted library allocation
page read and write
1265000
heap
page read and write
58F8000
trusted library allocation
page read and write
1657000
heap
page read and write
4781000
heap
page read and write
4044000
trusted library allocation
page read and write
59D000
heap
page read and write
3986000
trusted library allocation
page read and write
7F9000
heap
page read and write
29BF000
stack
page read and write
5D92000
trusted library allocation
page read and write
2BF7000
trusted library allocation
page read and write
403B000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
6BFDE000
unkown
page read and write
81F000
heap
page read and write
3B35000
trusted library allocation
page read and write
21A81000
heap
page read and write
4E41000
heap
page read and write
7E4000
unkown
page write copy
44C1000
heap
page read and write
28B0000
heap
page read and write
39D8000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
12DA000
trusted library allocation
page read and write
3DA3000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
4BA0000
direct allocation
page read and write
3B61000
heap
page read and write
3DDF000
stack
page read and write
39FE000
stack
page read and write
12DC000
trusted library allocation
page read and write
4BF4000
heap
page read and write
135A000
trusted library allocation
page read and write
27A91690000
heap
page read and write
3B15000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
3B61000
heap
page read and write
131E000
heap
page read and write
3B45000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
467E000
stack
page read and write
2BF6000
trusted library allocation
page read and write
339C000
heap
page read and write
3B4F000
trusted library allocation
page read and write
39B7000
trusted library allocation
page read and write
4C0F000
heap
page read and write
3992000
trusted library allocation
page read and write
2D70000
heap
page read and write
F82000
heap
page read and write
2AC3000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
5460000
direct allocation
page execute and read and write
5E0000
heap
page read and write
3997000
trusted library allocation
page read and write
802000
heap
page read and write
5923000
trusted library allocation
page read and write
39DB000
trusted library allocation
page read and write
9CE000
unkown
page write copy
61F000
heap
page read and write
39A8000
trusted library allocation
page read and write
862000
unkown
page execute and read and write
304D000
heap
page read and write
22C000
stack
page read and write
80B000
heap
page read and write
21A82000
heap
page read and write
44C1000
heap
page read and write
313A000
heap
page read and write
12D2000
trusted library allocation
page read and write
3F12000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
2BFA000
trusted library allocation
page read and write
D2E000
heap
page read and write
3A71000
heap
page read and write
15D6000
heap
page read and write
BDB000
stack
page read and write
1678000
heap
page read and write
4781000
heap
page read and write
1267000
heap
page read and write
2BF9000
trusted library allocation
page read and write
841000
unkown
page execute and read and write
4D3F000
stack
page read and write
3B35000
trusted library allocation
page read and write
6518000
heap
page read and write
2FFD000
stack
page read and write
3F25000
trusted library allocation
page read and write
21A80000
heap
page read and write
812000
heap
page read and write
1238000
heap
page read and write
3980000
trusted library allocation
page read and write
21A6B000
heap
page read and write
3B11000
trusted library allocation
page read and write
3A8A000
trusted library allocation
page read and write
2F57000
heap
page read and write
3B5B000
trusted library allocation
page read and write
DA1000
unkown
page execute read
44C1000
heap
page read and write
E02000
heap
page read and write
1358000
trusted library allocation
page read and write
D95000
heap
page read and write
39A3000
trusted library allocation
page read and write
3B55000
trusted library allocation
page read and write
594000
heap
page read and write
3F10000
trusted library allocation
page read and write
2BF9000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
397E000
trusted library allocation
page read and write
64F0000
heap
page read and write
5A3E000
trusted library allocation
page read and write
2C3C000
trusted library allocation
page read and write
469F000
stack
page read and write
E05000
heap
page read and write
12D6000
trusted library allocation
page read and write
135D000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
3B46000
trusted library allocation
page read and write
590A000
trusted library allocation
page read and write
44C1000
heap
page read and write
39D2000
trusted library allocation
page read and write
4781000
heap
page read and write
1354000
trusted library allocation
page read and write
5160000
heap
page read and write
F7A000
heap
page read and write
39A9000
trusted library allocation
page read and write
4F9E000
stack
page read and write
2B56BFF000
stack
page read and write
1304000
heap
page read and write
44C1000
heap
page read and write
3140000
heap
page read and write
D60000
trusted library allocation
page read and write
1656000
heap
page read and write
5EAB000
trusted library allocation
page read and write
39C2000
trusted library allocation
page read and write
44C1000
heap
page read and write
5D9A000
trusted library allocation
page read and write
7BA000
heap
page read and write
5A3E000
trusted library allocation
page read and write
21A78000
heap
page read and write
19413D57000
heap
page read and write
4E41000
heap
page read and write
284B000
heap
page read and write
577000
heap
page read and write
165F000
heap
page read and write
1316000
heap
page read and write
109A000
heap
page read and write
363E000
stack
page read and write
B59000
unkown
page execute and write copy
BF0000
direct allocation
page read and write
2ACA000
trusted library allocation
page read and write
3FD9000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
1319000
heap
page read and write
846000
heap
page read and write
3746000
heap
page read and write
1370000
heap
page read and write
1085000
trusted library allocation
page read and write
D44000
heap
page read and write
3B4D000
trusted library allocation
page read and write
4E41000
heap
page read and write
B21000
unkown
page execute and write copy
4781000
heap
page read and write
439000
unkown
page execute and read and write
3980000
trusted library allocation
page read and write
4A9E000
stack
page read and write
573000
heap
page read and write
398B000
trusted library allocation
page read and write
12DD000
trusted library allocation
page read and write
5DE000
heap
page read and write
39A8000
trusted library allocation
page read and write
3B61000
heap
page read and write
39C7000
trusted library allocation
page read and write
5DA000
unkown
page execute and read and write
F8A000
heap
page read and write
3DBC000
trusted library allocation
page read and write
4E41000
heap
page read and write
2C36000
trusted library allocation
page read and write
39EF000
trusted library allocation
page read and write
21A7A000
heap
page read and write
15DA000
heap
page read and write
39A1000
trusted library allocation
page read and write
39DE000
trusted library allocation
page read and write
67E000
stack
page read and write
6C1D0000
unkown
page read and write
2880000
direct allocation
page read and write
4049000
trusted library allocation
page read and write
3B71000
trusted library allocation
page read and write
19413CA0000
heap
page read and write
1653000
heap
page read and write
5DA1000
trusted library allocation
page read and write
39EF000
trusted library allocation
page read and write
1289000
heap
page read and write
D8A000
heap
page read and write
3B61000
heap
page read and write
F88000
heap
page read and write
4E41000
heap
page read and write
3C4D000
trusted library allocation
page read and write
39A8000
trusted library allocation
page read and write
27A916C5000
heap
page read and write
4F70000
direct allocation
page execute and read and write
44C1000
heap
page read and write
FE9000
unkown
page execute and read and write
21A77000
heap
page read and write
6D0000
heap
page read and write
3A10000
trusted library allocation
page read and write
27A916E8000
heap
page read and write
118E000
unkown
page execute and write copy
124A000
heap
page read and write
1267000
heap
page read and write
21A77000
heap
page read and write
339B000
heap
page read and write
56F000
heap
page read and write
125A000
heap
page read and write
3B33000
trusted library allocation
page read and write
9D7000
unkown
page write copy
721000
unkown
page execute read
3FFE000
stack
page read and write
C30000
heap
page read and write
F6F000
heap
page read and write
7ED000
heap
page read and write
2D7E000
stack
page read and write
5F81000
heap
page read and write
165F000
heap
page read and write
12EF000
heap
page read and write
F9D000
heap
page read and write
699000
heap
page read and write
2EBE000
stack
page read and write
2BF0000
trusted library allocation
page read and write
81F000
heap
page read and write
2AC2000
trusted library allocation
page read and write
7E0000
unkown
page read and write
2BF2000
trusted library allocation
page read and write
3984000
trusted library allocation
page read and write
39CC000
trusted library allocation
page read and write
5928000
trusted library allocation
page read and write
5140000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
27D3F000
stack
page read and write
9C0000
unkown
page readonly
12DD000
trusted library allocation
page read and write
59F1000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
561000
heap
page read and write
3B15000
trusted library allocation
page read and write
3986000
trusted library allocation
page read and write
19413D57000
heap
page read and write
39CA000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
4781000
heap
page read and write
446B000
trusted library allocation
page read and write
131E000
heap
page read and write
164B000
heap
page read and write
5C4000
heap
page read and write
3982000
trusted library allocation
page read and write
21A8F000
heap
page read and write
3B5C000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
E79000
unkown
page readonly
AC1000
heap
page read and write
208E000
stack
page read and write
5902000
trusted library allocation
page read and write
58F1000
trusted library allocation
page read and write
3B70000
trusted library allocation
page read and write
2844000
heap
page read and write
3990000
trusted library allocation
page read and write
3B57000
trusted library allocation
page read and write
166B000
heap
page read and write
39A2000
trusted library allocation
page read and write
27DE5000
heap
page read and write
312F000
stack
page read and write
F3D000
heap
page read and write
2AC1000
trusted library allocation
page read and write
FF2000
unkown
page read and write
12D7000
trusted library allocation
page read and write
44C1000
heap
page read and write
802000
heap
page read and write
E40000
unkown
page readonly
590F000
trusted library allocation
page read and write
39B0000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
27A916BF000
heap
page read and write
39A7000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
3B72000
trusted library allocation
page read and write
2C32000
trusted library allocation
page read and write
BF0000
direct allocation
page read and write
3997000
trusted library allocation
page read and write
5908000
trusted library allocation
page read and write
2BFD000
trusted library allocation
page read and write
21A84000
heap
page read and write
21A96000
heap
page read and write
4C2B000
direct allocation
page read and write
12DF000
trusted library allocation
page read and write
2880000
direct allocation
page read and write
3983000
trusted library allocation
page read and write
F3B000
unkown
page write copy
812000
heap
page read and write
4E41000
heap
page read and write
1B303000
heap
page read and write
21A6F000
heap
page read and write
3B25000
trusted library allocation
page read and write
15E6000
heap
page read and write
2BFB000
trusted library allocation
page read and write
D39000
unkown
page write copy
21AA3000
heap
page read and write
34CF000
stack
page read and write
2BFF000
trusted library allocation
page read and write
2BFB000
trusted library allocation
page read and write
39B7000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
590000
heap
page read and write
3137000
heap
page read and write
7A4000
stack
page read and write
1281000
heap
page read and write
3B45000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
124A000
heap
page read and write
5260000
direct allocation
page execute and read and write
44C1000
heap
page read and write
39B8000
trusted library allocation
page read and write
125B000
heap
page read and write
165E000
heap
page read and write
3986000
trusted library allocation
page read and write
3A0000
unkown
page readonly
1355000
trusted library allocation
page read and write
812000
heap
page read and write
165E000
heap
page read and write
F80000
heap
page read and write
32BE000
stack
page read and write
4E41000
heap
page read and write
337F000
stack
page read and write
BF0000
direct allocation
page read and write
408000
unkown
page readonly
2D6E000
unkown
page read and write
D87000
heap
page read and write
7ED000
heap
page read and write
2AC1000
trusted library allocation
page read and write
DF3000
unkown
page readonly
E02000
heap
page read and write
4A5F000
stack
page read and write
4FA000
stack
page read and write
1023000
heap
page read and write
4C3B000
stack
page read and write
D4F000
stack
page read and write
339C000
heap
page read and write
9C0000
unkown
page readonly
3140000
heap
page read and write
2C32000
trusted library allocation
page read and write
1089000
trusted library allocation
page read and write
1352000
trusted library allocation
page read and write
FED000
stack
page read and write
58F7000
trusted library allocation
page read and write
1631000
heap
page read and write
2B5654A000
stack
page read and write
21A7E000
heap
page read and write
409E000
stack
page read and write
39A9000
trusted library allocation
page read and write
12F6000
heap
page read and write
3996000
trusted library allocation
page read and write
19413D1F000
heap
page read and write
3B45000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
1077000
heap
page read and write
3B2A000
trusted library allocation
page read and write
5955000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
594C000
trusted library allocation
page read and write
10DD000
heap
page read and write
124E000
heap
page read and write
2738000
heap
page read and write
31D0000
remote allocation
page read and write
21A96000
heap
page read and write
3F1F000
trusted library allocation
page read and write
75F000
stack
page read and write
21A7C000
heap
page read and write
2BF5000
trusted library allocation
page read and write
CFC000
unkown
page execute and write copy
C80000
trusted library allocation
page read and write
52E000
heap
page read and write
398C000
trusted library allocation
page read and write
87A000
unkown
page execute and read and write
4BB1000
heap
page read and write
21A80000
heap
page read and write
131D000
heap
page read and write
398D000
trusted library allocation
page read and write
3D3F000
stack
page read and write
4D90000
direct allocation
page execute and read and write
1088000
trusted library allocation
page read and write
3393000
heap
page read and write
21AA3000
heap
page read and write
83C000
heap
page read and write
5922000
trusted library allocation
page read and write
2B570FF000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
168C000
heap
page read and write
12D7000
trusted library allocation
page read and write
2C39000
trusted library allocation
page read and write
19413D1E000
heap
page read and write
7D6000
unkown
page readonly
563000
heap
page read and write
46DE000
stack
page read and write
58F2000
trusted library allocation
page read and write
2F7F000
stack
page read and write
3B35000
trusted library allocation
page read and write
15D3000
heap
page read and write
DD1000
heap
page read and write
3F16000
trusted library allocation
page read and write
27A915C0000
heap
page read and write
10AA000
heap
page read and write
80B000
heap
page read and write
3B20000
trusted library allocation
page read and write
45C0000
trusted library allocation
page read and write
DF6000
unkown
page write copy
802000
heap
page read and write
6B1000
heap
page read and write
402E000
trusted library allocation
page read and write
2AC7000
trusted library allocation
page read and write
4E41000
heap
page read and write
40C2000
trusted library allocation
page read and write
2BF3000
trusted library allocation
page read and write
3F1E000
trusted library allocation
page read and write
3F17000
trusted library allocation
page read and write
3AA9000
trusted library allocation
page read and write
402B000
trusted library allocation
page read and write
7D6000
unkown
page readonly
1C672000
trusted library allocation
page read and write
116C000
unkown
page readonly
19415B60000
heap
page read and write
5900000
trusted library allocation
page read and write
218E000
stack
page read and write
166F000
heap
page read and write
3F16000
trusted library allocation
page read and write
CD1000
unkown
page execute and write copy
400000
unkown
page readonly
3ABF000
stack
page read and write
27A916B0000
heap
page read and write
383D000
stack
page read and write
2D3F000
stack
page read and write
3395000
heap
page read and write
19413CF8000
heap
page read and write
3B45000
trusted library allocation
page read and write
3B61000
heap
page read and write
2ACB000
trusted library allocation
page read and write
3C11000
heap
page read and write
4781000
heap
page read and write
398B000
trusted library allocation
page read and write
3B61000
trusted library allocation
page read and write
10A0000
heap
page read and write
401000
unkown
page execute read
21A87000
heap
page read and write
1358000
trusted library allocation
page read and write
1444000
heap
page read and write
1CB3F000
stack
page read and write
2732000
heap
page read and write
2650000
heap
page execute and read and write
3B96000
trusted library allocation
page read and write
4E41000
heap
page read and write
2BFD000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
3B1F000
trusted library allocation
page read and write
39A7000
trusted library allocation
page read and write
1678000
heap
page read and write
3994000
trusted library allocation
page read and write
15D9000
heap
page read and write
1353000
trusted library allocation
page read and write
21A7A000
heap
page read and write
3B35000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
3B61000
heap
page read and write
802000
heap
page read and write
F13000
heap
page read and write
3B48000
trusted library allocation
page read and write
317F000
stack
page read and write
397E000
trusted library allocation
page read and write
3F23000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
F13000
heap
page read and write
400000
unkown
page readonly
671000
heap
page read and write
417F000
trusted library allocation
page read and write
10A3000
heap
page read and write
1356000
trusted library allocation
page read and write
2F1000
unkown
page execute and write copy
593A000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
3F2B000
trusted library allocation
page read and write
12DF000
trusted library allocation
page read and write
3F27000
trusted library allocation
page read and write
81F000
heap
page read and write
5A3E000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
1352000
trusted library allocation
page read and write
12828000
trusted library allocation
page read and write
FA2000
unkown
page read and write
620000
heap
page read and write
5935000
trusted library allocation
page read and write
13A5000
heap
page read and write
4781000
heap
page read and write
427F000
stack
page read and write
108F000
trusted library allocation
page read and write
15D0000
heap
page read and write
2F3F000
stack
page read and write
12DD000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
4DF0000
direct allocation
page read and write
339A000
heap
page read and write
40B000
unkown
page write copy
19413D50000
heap
page read and write
5A01000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
27A916EE000
heap
page read and write
11BD000
stack
page read and write
2E43000
heap
page read and write
12D4000
trusted library allocation
page read and write
44C1000
heap
page read and write
397E000
trusted library allocation
page read and write
7F9000
heap
page read and write
3B11000
trusted library allocation
page read and write
3B15000
trusted library allocation
page read and write
315F000
stack
page read and write
52D0000
direct allocation
page read and write
15A0000
heap
page read and write
3B8E000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
108C000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
5FE000
heap
page read and write
7F9000
heap
page read and write
83C000
heap
page read and write
1355000
trusted library allocation
page read and write
3A81000
heap
page read and write
7ED000
heap
page read and write
27A91860000
heap
page read and write
3992000
trusted library allocation
page read and write
2C3D000
trusted library allocation
page read and write
3993000
trusted library allocation
page read and write
4781000
heap
page read and write
39A9000
trusted library allocation
page read and write
DA0000
unkown
page readonly
12BE000
stack
page read and write
5A11000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
9D4000
unkown
page readonly
4781000
heap
page read and write
2AC2000
trusted library allocation
page read and write
27A916F4000
heap
page read and write
27A931B0000
heap
page read and write
3986000
trusted library allocation
page read and write
14BD000
trusted library allocation
page read and write
3B90000
trusted library allocation
page read and write
39A2000
trusted library allocation
page read and write
F41000
heap
page read and write
A8C000
heap
page read and write
1D20E000
stack
page read and write
FCD000
unkown
page read and write
35E8000
heap
page read and write
F7C000
heap
page read and write
7FE000
heap
page read and write
D13000
heap
page read and write
5341000
direct allocation
page read and write
4BA0000
direct allocation
page read and write
4BA0000
direct allocation
page read and write
2C34000
trusted library allocation
page read and write
2C3C000
trusted library allocation
page read and write
F8A000
heap
page read and write
1237000
heap
page read and write
1200000
direct allocation
page read and write
80B000
heap
page read and write
3B29000
trusted library allocation
page read and write
7FE000
heap
page read and write
802000
heap
page read and write
BDD000
stack
page read and write
720000
unkown
page readonly
B38000
unkown
page execute and write copy
1D06D000
stack
page read and write
3F17000
trusted library allocation
page read and write
3746000
heap
page read and write
795000
heap
page read and write
4781000
heap
page read and write
15D2000
heap
page read and write
44C1000
heap
page read and write
1082000
trusted library allocation
page read and write
413E000
stack
page read and write
400000
unkown
page readonly
39AF000
trusted library allocation
page read and write
3B3A000
trusted library allocation
page read and write
165F000
heap
page read and write
3996000
trusted library allocation
page read and write
4E41000
heap
page read and write
F9C000
heap
page read and write
108A000
trusted library allocation
page read and write
5D93000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
21A8F000
heap
page read and write
118D000
unkown
page execute and read and write
591F000
trusted library allocation
page read and write
3B33000
trusted library allocation
page read and write
4048000
trusted library allocation
page read and write
1B5D0000
heap
page read and write
44C1000
heap
page read and write
2DC0000
heap
page read and write
494000
heap
page read and write
3AFF000
stack
page read and write
12D5000
trusted library allocation
page read and write
5EB1000
trusted library allocation
page read and write
4781000
heap
page read and write
1650000
heap
page read and write
49A1000
direct allocation
page read and write
5460000
direct allocation
page execute and read and write
3B35000
trusted library allocation
page read and write
3B15000
trusted library allocation
page read and write
37A2000
heap
page read and write
39A7000
trusted library allocation
page read and write
3D27000
trusted library allocation
page read and write
39F2000
trusted library allocation
page read and write
3B72000
trusted library allocation
page read and write
3F2B000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
25D0000
trusted library section
page readonly
5A11000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
2C36000
trusted library allocation
page read and write
2880000
direct allocation
page read and write
34BF000
stack
page read and write
1680000
heap
page read and write
3394000
heap
page read and write
1100000
heap
page read and write
F89000
heap
page read and write
3989000
trusted library allocation
page read and write
4E41000
heap
page read and write
F02000
heap
page read and write
21A88000
heap
page read and write
39B6000
trusted library allocation
page read and write
4042000
trusted library allocation
page read and write
D73000
heap
page read and write
B5E000
stack
page read and write
3D11000
trusted library allocation
page read and write
4BA0000
direct allocation
page read and write
1678000
heap
page read and write
124A000
heap
page read and write
125C000
heap
page read and write
1314000
heap
page read and write
4781000
heap
page read and write
1672000
heap
page read and write
12D3000
trusted library allocation
page read and write
39E7000
trusted library allocation
page read and write
284B000
heap
page read and write
12DF000
heap
page read and write
339B000
heap
page read and write
21A7A000
heap
page read and write
39B6000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
403A000
trusted library allocation
page read and write
44C1000
heap
page read and write
414F000
trusted library allocation
page read and write
403A000
trusted library allocation
page read and write
E06000
heap
page read and write
3B45000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
1670000
heap
page read and write
4781000
heap
page read and write
124A000
heap
page read and write
2BFE000
trusted library allocation
page read and write
7D6000
unkown
page readonly
F02000
heap
page read and write
39EF000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
19413D5C000
heap
page read and write
4BB0000
heap
page read and write
3EBA000
trusted library allocation
page read and write
21A84000
heap
page read and write
2B56CFE000
stack
page read and write
5907000
trusted library allocation
page read and write
2C3E000
trusted library allocation
page read and write
D42000
heap
page read and write
7E9000
unkown
page readonly
58F5000
trusted library allocation
page read and write
3996000
trusted library allocation
page read and write
A17000
unkown
page execute and read and write
5918000
trusted library allocation
page read and write
FDA000
unkown
page execute and read and write
5A3E000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
DED000
unkown
page execute and read and write
7F9000
heap
page read and write
2BF8000
trusted library allocation
page read and write
2BF1000
trusted library allocation
page read and write
169E000
heap
page read and write
5A3E000
trusted library allocation
page read and write
3D7F000
stack
page read and write
5DA000
heap
page read and write
64C000
heap
page read and write
812000
heap
page read and write
FA2000
heap
page read and write
9D7000
unkown
page write copy
4F0E000
stack
page read and write
39A8000
trusted library allocation
page read and write
2880000
direct allocation
page read and write
12831000
trusted library allocation
page read and write
2BF7000
trusted library allocation
page read and write
2ACA000
trusted library allocation
page read and write
397A000
trusted library allocation
page read and write
12EF000
heap
page read and write
816000
heap
page read and write
56F000
heap
page read and write
4D0000
trusted library allocation
page read and write
4781000
heap
page read and write
3010000
heap
page read and write
1631000
heap
page read and write
5C0000
heap
page read and write
30B0000
heap
page read and write
9CE000
unkown
page write copy
9B4000
unkown
page readonly
3021000
heap
page read and write
2BFD000
trusted library allocation
page read and write
3B61000
heap
page read and write
3250000
heap
page read and write
590000
heap
page read and write
5FD7000
heap
page read and write
9D7000
unkown
page write copy
1CF6E000
stack
page read and write
6080000
remote allocation
page read and write
19413D1F000
heap
page read and write
5908000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
1444000
heap
page read and write
415C000
trusted library allocation
page read and write
39B6000
trusted library allocation
page read and write
39A2000
trusted library allocation
page read and write
1312000
heap
page read and write
F9D000
heap
page read and write
EA5000
heap
page read and write
3F19000
trusted library allocation
page read and write
3B61000
heap
page read and write
39EA000
trusted library allocation
page read and write
341E000
stack
page read and write
39CA000
trusted library allocation
page read and write
9CE000
unkown
page write copy
404D000
trusted library allocation
page read and write
39B6000
trusted library allocation
page read and write
39A1000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
11F3000
heap
page read and write
F6C000
heap
page read and write
414E000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
CFB000
unkown
page execute and read and write
3B22000
trusted library allocation
page read and write
12C0000
heap
page read and write
3140000
heap
page read and write
5E15000
heap
page read and write
44C1000
heap
page read and write
135E000
trusted library allocation
page read and write
4AC9000
stack
page read and write
115A000
unkown
page read and write
3B15000
trusted library allocation
page read and write
1B1EE000
stack
page read and write
1234000
heap
page read and write
1309000
heap
page read and write
39E4000
trusted library allocation
page read and write
4593000
trusted library allocation
page read and write
284B000
heap
page read and write
D62000
heap
page read and write
2ACE000
trusted library allocation
page read and write
39A2000
trusted library allocation
page read and write
E6D000
heap
page read and write
168A000
heap
page read and write
1084000
trusted library allocation
page read and write
4781000
heap
page read and write
12D6000
trusted library allocation
page read and write
3996000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
339B000
heap
page read and write
1661000
heap
page read and write
4781000
heap
page read and write
1356000
trusted library allocation
page read and write
4046000
trusted library allocation
page read and write
39A9000
trusted library allocation
page read and write
69D000
heap
page read and write
4781000
heap
page read and write
105F000
stack
page read and write
F51000
heap
page read and write
1087000
trusted library allocation
page read and write
1669000
heap
page read and write
3F1D000
trusted library allocation
page read and write
44C1000
heap
page read and write
C25000
unkown
page readonly
5A01000
trusted library allocation
page read and write
2D6C000
stack
page read and write
2C3B000
trusted library allocation
page read and write
3746000
heap
page read and write
4E41000
heap
page read and write
1272000
heap
page read and write
3997000
trusted library allocation
page read and write
10A2000
heap
page read and write
F40000
heap
page read and write
445E000
stack
page read and write
5A09000
trusted library allocation
page read and write
3986000
trusted library allocation
page read and write
165F000
heap
page read and write
15D1000
heap
page read and write
305F000
stack
page read and write
5D97000
trusted library allocation
page read and write
7FE000
heap
page read and write
1240000
heap
page read and write
3990000
trusted library allocation
page read and write
4E41000
heap
page read and write
3240000
heap
page read and write
2710000
heap
page read and write
21A79000
heap
page read and write
530000
heap
page read and write
62E000
stack
page read and write
660B000
trusted library allocation
page read and write
4BB1000
heap
page read and write
4BA0000
direct allocation
page read and write
44C0000
heap
page read and write
44C1000
heap
page read and write
12DD000
trusted library allocation
page read and write
398B000
trusted library allocation
page read and write
3B33000
trusted library allocation
page read and write
3F13000
trusted library allocation
page read and write
21A8F000
heap
page read and write
5EA9000
trusted library allocation
page read and write
21A9B000
heap
page read and write
3B79000
trusted library allocation
page read and write
594000
heap
page read and write
34EE000
stack
page read and write
2737000
heap
page read and write
5921000
trusted library allocation
page read and write
323F000
stack
page read and write
F6F000
heap
page read and write
166D000
heap
page read and write
2CFF000
stack
page read and write
1B88E000
stack
page read and write
3B45000
trusted library allocation
page read and write
4AB0000
direct allocation
page execute and read and write
816000
heap
page read and write
3989000
trusted library allocation
page read and write
1267000
heap
page read and write
124A000
heap
page read and write
123C000
heap
page read and write
3994000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
21A87000
heap
page read and write
44C1000
heap
page read and write
9CF000
stack
page read and write
2880000
direct allocation
page read and write
7B0000
unkown
page readonly
39B0000
trusted library allocation
page read and write
130E000
stack
page read and write
15A7000
heap
page read and write
2620000
trusted library allocation
page read and write
F6F000
heap
page read and write
1200000
direct allocation
page read and write
1354000
trusted library allocation
page read and write
F9A000
stack
page read and write
D42000
heap
page read and write
39FA000
trusted library allocation
page read and write
2B3F000
stack
page read and write
3B61000
heap
page read and write
135B000
trusted library allocation
page read and write
BF0000
direct allocation
page read and write
3080000
direct allocation
page read and write
59D000
heap
page read and write
1352000
trusted library allocation
page read and write
E5D000
heap
page read and write
15D9000
heap
page read and write
A60000
heap
page read and write
F2F000
heap
page read and write
5FCD000
heap
page read and write
44C1000
heap
page read and write
81F000
heap
page read and write
5040000
direct allocation
page read and write
323C000
stack
page read and write
3080000
direct allocation
page read and write
2A30000
heap
page read and write
5D98000
trusted library allocation
page read and write
3B2B000
trusted library allocation
page read and write
3983000
trusted library allocation
page read and write
37DC000
stack
page read and write
39B8000
trusted library allocation
page read and write
79D000
unkown
page write copy
167E000
heap
page read and write
3FCB000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
3B28000
trusted library allocation
page read and write
12E4000
heap
page read and write
21A87000
heap
page read and write
3998000
trusted library allocation
page read and write
135F000
trusted library allocation
page read and write
4BF0000
heap
page read and write
3997000
trusted library allocation
page read and write
2EEE000
stack
page read and write
4047000
trusted library allocation
page read and write
1358000
trusted library allocation
page read and write
1359000
trusted library allocation
page read and write
3DBE000
trusted library allocation
page read and write
802000
heap
page read and write
9CE000
unkown
page write copy
44C1000
heap
page read and write
573000
heap
page read and write
4781000
heap
page read and write
5929000
trusted library allocation
page read and write
39A7000
trusted library allocation
page read and write
570000
heap
page read and write
15DC000
heap
page read and write
4E41000
heap
page read and write
1444000
heap
page read and write
25A0000
heap
page read and write
3B8C000
trusted library allocation
page read and write
7E4000
unkown
page write copy
495E000
stack
page read and write
399F000
trusted library allocation
page read and write
27AF0000
heap
page read and write
2ACD000
trusted library allocation
page read and write
3A2C000
trusted library allocation
page read and write
19413D57000
heap
page read and write
39A2000
trusted library allocation
page read and write
3F15000
trusted library allocation
page read and write
41D0000
trusted library allocation
page read and write
44C1000
heap
page read and write
4478000
trusted library allocation
page read and write
1087000
trusted library allocation
page read and write
1680000
heap
page read and write
4D50000
direct allocation
page execute and read and write
167B000
heap
page read and write
BF0000
direct allocation
page read and write
58F5000
trusted library allocation
page read and write
EE0000
heap
page read and write
21A7A000
heap
page read and write
39AB000
trusted library allocation
page read and write
39AB000
trusted library allocation
page read and write
461000
unkown
page read and write
44C1000
heap
page read and write
2FBF000
stack
page read and write
27A916E8000
heap
page read and write
12DF000
trusted library allocation
page read and write
165F000
heap
page read and write
44C1000
heap
page read and write
4781000
heap
page read and write
EEC000
stack
page read and write
1357000
trusted library allocation
page read and write
D97000
heap
page read and write
3B64000
trusted library allocation
page read and write
1353000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
339C000
heap
page read and write
44C1000
heap
page read and write
58D000
heap
page read and write
4E41000
heap
page read and write
3112000
heap
page read and write
4781000
heap
page read and write
3B45000
trusted library allocation
page read and write
62E000
heap
page read and write
34FE000
stack
page read and write
39CB000
trusted library allocation
page read and write
3B22000
trusted library allocation
page read and write
3B3F000
trusted library allocation
page read and write
573000
heap
page read and write
FC1000
unkown
page read and write
39B8000
trusted library allocation
page read and write
19413D57000
heap
page read and write
14EF000
heap
page read and write
E25000
heap
page read and write
341F000
stack
page read and write
5A27000
trusted library allocation
page read and write
398F000
trusted library allocation
page read and write
E5B000
heap
page read and write
1355000
trusted library allocation
page read and write
3B74000
trusted library allocation
page read and write
E25000
heap
page read and write
1679000
heap
page read and write
2EAF000
stack
page read and write
7F9000
heap
page read and write
5200000
direct allocation
page execute and read and write
D5F000
heap
page read and write
39A3000
trusted library allocation
page read and write
108F000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
58F1000
trusted library allocation
page read and write
CD0000
unkown
page readonly
3B3D000
trusted library allocation
page read and write
CB0000
heap
page read and write
1D330000
heap
page read and write
61EB4000
direct allocation
page read and write
3EBF000
stack
page read and write
4781000
heap
page read and write
DF3000
unkown
page readonly
3A8F000
trusted library allocation
page read and write
1678000
heap
page read and write
2AC0000
trusted library allocation
page read and write
33DE000
stack
page read and write
5A3E000
trusted library allocation
page read and write
39DA000
trusted library allocation
page read and write
379F000
stack
page read and write
39A8000
trusted library allocation
page read and write
BF0000
direct allocation
page read and write
339A000
heap
page read and write
4E41000
heap
page read and write
21A78000
heap
page read and write
44C1000
heap
page read and write
5450000
remote allocation
page read and write
27A916BE000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
333F000
stack
page read and write
E3E000
heap
page read and write
3043000
heap
page read and write
19413D4B000
heap
page read and write
3997000
trusted library allocation
page read and write
16A7000
heap
page read and write
981000
unkown
page execute read
303B000
heap
page read and write
21A6B000
heap
page read and write
3B61000
heap
page read and write
3742000
heap
page read and write
15F0000
heap
page read and write
21A8F000
heap
page read and write
5A3E000
trusted library allocation
page read and write
7F8C000
stack
page read and write
7FE000
heap
page read and write
2BF4000
trusted library allocation
page read and write
F6A000
heap
page read and write
2BFA000
trusted library allocation
page read and write
2C35000
trusted library allocation
page read and write
4961000
heap
page read and write
12EF000
heap
page read and write
5BFA000
trusted library allocation
page read and write
3B15000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
D87000
heap
page read and write
3399000
heap
page read and write
4BB1000
heap
page read and write
3B45000
trusted library allocation
page read and write
44C1000
heap
page read and write
39CD000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
4E41000
heap
page read and write
21A96000
heap
page read and write
FF0000
heap
page read and write
1B3CF000
stack
page read and write
12F7000
heap
page read and write
39B7000
trusted library allocation
page read and write
FC2000
heap
page read and write
D9C000
stack
page read and write
39BF000
stack
page read and write
3B34000
trusted library allocation
page read and write
39CF000
trusted library allocation
page read and write
118C000
unkown
page execute and write copy
10CB000
heap
page read and write
2C35000
trusted library allocation
page read and write
497E000
stack
page read and write
595F000
trusted library allocation
page read and write
4E41000
heap
page read and write
2BF9000
trusted library allocation
page read and write
5A1F000
trusted library allocation
page read and write
2B569FE000
stack
page read and write
5A01000
trusted library allocation
page read and write
7FE000
heap
page read and write
AA7000
heap
page read and write
3A28000
trusted library allocation
page read and write
44C1000
heap
page read and write
4E41000
heap
page read and write
802000
heap
page read and write
6BFF1000
unkown
page execute read
3B5F000
stack
page read and write
39BD000
trusted library allocation
page read and write
D22000
heap
page read and write
D63000
heap
page read and write
3080000
direct allocation
page read and write
3392000
heap
page read and write
2821000
trusted library allocation
page read and write
19413D3C000
heap
page read and write
124A000
heap
page read and write
12D7000
trusted library allocation
page read and write
15DF000
heap
page read and write
2AC7000
trusted library allocation
page read and write
3B73000
trusted library allocation
page read and write
3B18000
trusted library allocation
page read and write
10B1000
heap
page read and write
563000
heap
page read and write
3B44000
trusted library allocation
page read and write
3B61000
heap
page read and write
1678000
heap
page read and write
39A2000
trusted library allocation
page read and write
39BE000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
12F2000
heap
page read and write
594E000
trusted library allocation
page read and write
168D000
heap
page read and write
21A8F000
heap
page read and write
2E41000
heap
page read and write
3B71000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
21AA3000
heap
page read and write
5A3E000
trusted library allocation
page read and write
21A82000
heap
page read and write
F6F000
heap
page read and write
168C000
heap
page read and write
3997000
trusted library allocation
page read and write
2C41000
trusted library allocation
page read and write
9D7000
unkown
page write copy
12D0000
heap
page read and write
DEA000
heap
page read and write
B59000
unkown
page execute and write copy
59F8000
trusted library allocation
page read and write
81F000
heap
page read and write
44C1000
heap
page read and write
D60000
trusted library allocation
page read and write
32A0000
heap
page read and write
44C1000
heap
page read and write
10AC000
heap
page read and write
6C1CE000
unkown
page read and write
5040000
direct allocation
page read and write
DA1000
unkown
page execute read
5A3E000
trusted library allocation
page read and write
80B000
heap
page read and write
44C1000
heap
page read and write
3992000
trusted library allocation
page read and write
2190000
heap
page read and write
16A7000
heap
page read and write
21A82000
heap
page read and write
3F14000
trusted library allocation
page read and write
590F000
trusted library allocation
page read and write
3B23000
trusted library allocation
page read and write
F7E000
heap
page read and write
3996000
trusted library allocation
page read and write
2E7E000
stack
page read and write
6E0000
trusted library allocation
page read and write
44C1000
heap
page read and write
39A7000
trusted library allocation
page read and write
15D2000
heap
page read and write
44C1000
heap
page read and write
44C1000
heap
page read and write
980000
unkown
page readonly
21B6D000
heap
page read and write
3C9F000
stack
page read and write
406E000
trusted library allocation
page read and write
27A916C5000
heap
page read and write
7F9000
heap
page read and write
941000
unkown
page execute read
F7B000
heap
page read and write
44C1000
heap
page read and write
6E0000
trusted library allocation
page read and write
5A29000
trusted library allocation
page read and write
415A000
trusted library allocation
page read and write
2C35000
trusted library allocation
page read and write
39E7000
trusted library allocation
page read and write
F96000
heap
page read and write
5A3E000
trusted library allocation
page read and write
3992000
trusted library allocation
page read and write
5E0000
unkown
page readonly
7ED000
heap
page read and write
4781000
heap
page read and write
941000
unkown
page execute read
39C6000
trusted library allocation
page read and write
3395000
heap
page read and write
3048000
heap
page read and write
51D0000
direct allocation
page execute and read and write
1670000
heap
page read and write
D60000
trusted library allocation
page read and write
2738000
heap
page read and write
4E41000
heap
page read and write
C80000
trusted library allocation
page read and write
F8B000
heap
page read and write
1084000
trusted library allocation
page read and write
39BD000
trusted library allocation
page read and write
4E41000
heap
page read and write
39B8000
trusted library allocation
page read and write
981000
unkown
page execute read
FC142FF000
stack
page read and write
38A0000
heap
page read and write
B2A000
unkown
page execute and write copy
3D12000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
2BFC000
trusted library allocation
page read and write
E74000
unkown
page write copy
BF0000
direct allocation
page read and write
39CC000
trusted library allocation
page read and write
21A6F000
heap
page read and write
3B5A000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
3398000
heap
page read and write
419A000
trusted library allocation
page read and write
840000
heap
page read and write
3B8C000
trusted library allocation
page read and write
5FB6000
trusted library allocation
page read and write
1D335000
heap
page read and write
1652000
heap
page read and write
2880000
direct allocation
page read and write
1444000
heap
page read and write
44C1000
heap
page read and write
E63000
heap
page read and write
7FE000
heap
page read and write
3997000
trusted library allocation
page read and write
27C3E000
stack
page read and write
1356000
trusted library allocation
page read and write
2C3F000
trusted library allocation
page read and write
4BB1000
heap
page read and write
123D000
heap
page read and write
15D5000
heap
page read and write
3390000
heap
page read and write
19413D11000
heap
page read and write
5A11000
trusted library allocation
page read and write
15BC000
heap
page read and write
1359000
trusted library allocation
page read and write
10DD000
heap
page read and write
6880000
heap
page read and write
42D000
unkown
page execute and read and write
5C19000
trusted library allocation
page read and write
BE5000
heap
page read and write
5A3E000
trusted library allocation
page read and write
CFD000
unkown
page execute and read and write
3462000
heap
page read and write
C40000
heap
page read and write
21A87000
heap
page read and write
986000
unkown
page readonly
3B4A000
trusted library allocation
page read and write
4217000
trusted library allocation
page read and write
27DE5000
heap
page read and write
39A4000
trusted library allocation
page read and write
2AC7000
trusted library allocation
page read and write
58FD000
trusted library allocation
page read and write
4781000
heap
page read and write
F9D000
heap
page read and write
FA2000
unkown
page execute and read and write
34FC000
stack
page read and write
19413D54000
heap
page read and write
59FD000
trusted library allocation
page read and write
4045000
trusted library allocation
page read and write
1444000
heap
page read and write
1B70C000
stack
page read and write
3B61000
heap
page read and write
1B60E000
stack
page read and write
7FFD9B792000
trusted library allocation
page read and write
7ED000
heap
page read and write
164B000
heap
page read and write
2BF3000
trusted library allocation
page read and write
4054000
trusted library allocation
page read and write
39CF000
trusted library allocation
page read and write
3C35000
trusted library allocation
page read and write
4781000
heap
page read and write
4E41000
heap
page read and write
108A000
trusted library allocation
page read and write
599000
heap
page read and write
87B000
unkown
page readonly
44C1000
heap
page read and write
19413CB0000
heap
page read and write
2BFE000
stack
page read and write
87B000
unkown
page execute and write copy
1656000
heap
page read and write
3420000
heap
page read and write
39BA000
trusted library allocation
page read and write
58F1000
trusted library allocation
page read and write
39A2000
trusted library allocation
page read and write
314F000
stack
page read and write
44C1000
heap
page read and write
4F70000
direct allocation
page execute and read and write
5A3E000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
DF6000
unkown
page write copy
3744000
heap
page read and write
7D4D000
stack
page read and write
3B15000
trusted library allocation
page read and write
1086000
trusted library allocation
page read and write
3C3E000
stack
page read and write
44C1000
heap
page read and write
3990000
trusted library allocation
page read and write
397E000
trusted library allocation
page read and write
2C36000
trusted library allocation
page read and write
108C000
trusted library allocation
page read and write
16EE000
stack
page read and write
12F5000
heap
page read and write
EC2000
unkown
page execute and read and write
1309000
heap
page read and write
3F25000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
3971000
trusted library allocation
page read and write
570000
heap
page read and write
5907000
trusted library allocation
page read and write
3B3C000
trusted library allocation
page read and write
39DF000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
2FFE000
stack
page read and write
2C38000
trusted library allocation
page read and write
802000
heap
page read and write
7B0000
heap
page read and write
10DD000
heap
page read and write
27AD0000
heap
page read and write
1002000
heap
page read and write
3996000
trusted library allocation
page read and write
5922000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
39AA000
trusted library allocation
page read and write
577000
heap
page read and write
F89000
heap
page read and write
601000
heap
page read and write
3B2C000
trusted library allocation
page read and write
1689000
heap
page read and write
5A11000
trusted library allocation
page read and write
56F000
heap
page read and write
21A96000
heap
page read and write
10F0000
heap
page read and write
3F14000
trusted library allocation
page read and write
E45000
heap
page read and write
841000
unkown
page execute and write copy
1653000
heap
page read and write
69D000
heap
page read and write
3B35000
trusted library allocation
page read and write
4B10000
direct allocation
page execute and read and write
E5F000
heap
page read and write
1357000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
F1D000
heap
page read and write
1661000
heap
page read and write
2733000
heap
page read and write
F7E000
heap
page read and write
3F2C000
trusted library allocation
page read and write
3022000
heap
page read and write
195F000
stack
page read and write
44FF000
stack
page read and write
5A01000
trusted library allocation
page read and write
3B10000
trusted library allocation
page read and write
3D66000
trusted library allocation
page read and write
4047000
trusted library allocation
page read and write
39BA000
trusted library allocation
page read and write
3F14000
trusted library allocation
page read and write
15DD000
heap
page read and write
5946000
trusted library allocation
page read and write
2ACF000
trusted library allocation
page read and write
2BF7000
trusted library allocation
page read and write
D42000
heap
page read and write
1200000
direct allocation
page read and write
39BE000
trusted library allocation
page read and write
FD3000
unkown
page execute and read and write
437F000
stack
page read and write
44C1000
heap
page read and write
3B25000
trusted library allocation
page read and write
5FDD000
heap
page read and write
4E41000
heap
page read and write
301E000
heap
page read and write
317E000
stack
page read and write
39AC000
trusted library allocation
page read and write
5924000
trusted library allocation
page read and write
812000
heap
page read and write
2AC7000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
5A3F000
trusted library allocation
page read and write
3391000
heap
page read and write
1238000
heap
page read and write
7F0000
heap
page read and write
80B000
heap
page read and write
3BFE000
stack
page read and write
5EA6000
trusted library allocation
page read and write
39DA000
trusted library allocation
page read and write
337E000
stack
page read and write
39C4000
trusted library allocation
page read and write
4063000
trusted library allocation
page read and write
D2F000
heap
page read and write
126A000
heap
page read and write
3F5E000
stack
page read and write
1646000
heap
page read and write
2BF5000
trusted library allocation
page read and write
E90000
heap
page read and write
1689000
heap
page read and write
2CA1000
heap
page read and write
10DD000
heap
page read and write
2AC4000
trusted library allocation
page read and write
F81000
heap
page read and write
348E000
stack
page read and write
397C000
trusted library allocation
page read and write
58F8000
trusted library allocation
page read and write
1B5D5000
heap
page read and write
3997000
trusted library allocation
page read and write
9C0000
unkown
page readonly
33BE000
stack
page read and write
3B74000
trusted library allocation
page read and write
1086000
trusted library allocation
page read and write
2B7F000
trusted library allocation
page read and write
168F000
stack
page read and write
4E41000
heap
page read and write
31C000
unkown
page execute and read and write
4E41000
heap
page read and write
39A8000
trusted library allocation
page read and write
4781000
heap
page read and write
403A000
trusted library allocation
page read and write
68E000
heap
page read and write
1661000
heap
page read and write
39E2000
trusted library allocation
page read and write
156E000
stack
page read and write
1234000
heap
page read and write
F5F000
heap
page read and write
1080000
trusted library allocation
page read and write
F87000
heap
page read and write
15D1000
heap
page read and write
311F000
stack
page read and write
169E000
heap
page read and write
C8E000
stack
page read and write
D64000
heap
page read and write
11E0000
heap
page read and write
1661000
heap
page read and write
5A01000
trusted library allocation
page read and write
461000
unkown
page read and write
3992000
trusted library allocation
page read and write
812000
heap
page read and write
4E41000
heap
page read and write
981000
unkown
page execute read
31D0000
remote allocation
page read and write
5E0000
heap
page read and write
12D5000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
111F000
stack
page read and write
4E41000
heap
page read and write
3D17000
trusted library allocation
page read and write
3B34000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
1082000
trusted library allocation
page read and write
21A87000
heap
page read and write
1661000
heap
page read and write
D82000
heap
page read and write
44C1000
heap
page read and write
4E41000
heap
page read and write
5D9C000
trusted library allocation
page read and write
4781000
heap
page read and write
1359000
trusted library allocation
page read and write
51B0000
direct allocation
page execute and read and write
3B34000
trusted library allocation
page read and write
501E000
stack
page read and write
2C32000
trusted library allocation
page read and write
812000
heap
page read and write
27B7A000
heap
page read and write
2C37000
trusted library allocation
page read and write
3B20000
trusted library allocation
page read and write
3B53000
trusted library allocation
page read and write
1089000
trusted library allocation
page read and write
23EE000
stack
page read and write
39E4000
trusted library allocation
page read and write
44C1000
heap
page read and write
6E0000
trusted library allocation
page read and write
2DAE000
stack
page read and write
2AC2000
trusted library allocation
page read and write
2AC3000
trusted library allocation
page read and write
129E000
stack
page read and write
21A96000
heap
page read and write
330000
unkown
page readonly
5A3E000
trusted library allocation
page read and write
398C000
trusted library allocation
page read and write
65A000
heap
page read and write
39A2000
trusted library allocation
page read and write
39A2000
trusted library allocation
page read and write
12EF000
heap
page read and write
80B000
heap
page read and write
1656000
heap
page read and write
12DD000
trusted library allocation
page read and write
21A8F000
heap
page read and write
5A3E000
trusted library allocation
page read and write
2BF5000
trusted library allocation
page read and write
1231000
heap
page read and write
2D3E000
stack
page read and write
2C3B000
trusted library allocation
page read and write
472C000
trusted library allocation
page read and write
164A000
heap
page read and write
4781000
heap
page read and write
339B000
heap
page read and write
5250000
direct allocation
page execute and read and write
21A85000
heap
page read and write
273E000
heap
page read and write
1444000
heap
page read and write
4E41000
heap
page read and write
2C3A000
trusted library allocation
page read and write
3B4E000
trusted library allocation
page read and write
EDE000
stack
page read and write
5A11000
trusted library allocation
page read and write
1B49B000
heap
page read and write
7ED000
heap
page read and write
39B0000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
98000
stack
page read and write
116C000
unkown
page readonly
5FA7000
heap
page read and write
1B9F1000
heap
page read and write
39B2000
trusted library allocation
page read and write
37B0000
heap
page read and write
2BF3000
trusted library allocation
page read and write
7F9000
heap
page read and write
80B000
heap
page read and write
3996000
trusted library allocation
page read and write
130E000
heap
page read and write
41F000
unkown
page read and write
F33000
heap
page read and write
58D000
heap
page read and write
5A11000
trusted library allocation
page read and write
1652000
heap
page read and write
21AA3000
heap
page read and write
27A916F8000
heap
page read and write
387E000
stack
page read and write
577000
heap
page read and write
15CD000
heap
page read and write
367F000
stack
page read and write
1080000
trusted library allocation
page read and write
1241000
heap
page read and write
5A11000
trusted library allocation
page read and write
1689000
heap
page read and write
123B000
heap
page read and write
21A87000
heap
page read and write
126A000
heap
page read and write
C90000
heap
page read and write
573000
heap
page read and write
167B000
heap
page read and write
1080000
trusted library allocation
page read and write
21A7A000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
12DF000
trusted library allocation
page read and write
131E000
heap
page read and write
3B54000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
7FE000
heap
page read and write
1CCBE000
stack
page read and write
3B16000
trusted library allocation
page read and write
3394000
heap
page read and write
4E41000
heap
page read and write
3B57000
trusted library allocation
page read and write
1BAF3000
heap
page read and write
21A8F000
heap
page read and write
44C1000
heap
page read and write
F3B000
unkown
page write copy
5A3E000
trusted library allocation
page read and write
15D9000
heap
page read and write
4781000
heap
page read and write
39C2000
trusted library allocation
page read and write
2C33000
trusted library allocation
page read and write
3B72000
trusted library allocation
page read and write
39F7000
trusted library allocation
page read and write
DFA000
heap
page read and write
29ED000
stack
page read and write
3B61000
heap
page read and write
27E4000
heap
page read and write
7FE000
heap
page read and write
4781000
heap
page read and write
5A3E000
trusted library allocation
page read and write
27DD7000
heap
page read and write
44C1000
heap
page read and write
32DE000
stack
page read and write
E5E000
heap
page read and write
283F000
stack
page read and write
5D9E000
stack
page read and write
3981000
trusted library allocation
page read and write
1655000
heap
page read and write
12FC000
heap
page read and write
39F1000
trusted library allocation
page read and write
387E000
stack
page read and write
2CA1000
heap
page read and write
39EA000
trusted library allocation
page read and write
F9F000
unkown
page read and write
D42000
heap
page read and write
5A3E000
trusted library allocation
page read and write
4F4000
unkown
page readonly
9D7000
unkown
page write copy
56F000
heap
page read and write
2ACA000
trusted library allocation
page read and write
88F000
stack
page read and write
1689000
heap
page read and write
6C18F000
unkown
page readonly
563000
heap
page read and write
39AB000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
980000
unkown
page readonly
44C1000
heap
page read and write
44C1000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
21A96000
heap
page read and write
4E41000
heap
page read and write
5A3E000
trusted library allocation
page read and write
3395000
heap
page read and write
3047000
heap
page read and write
6BFCD000
unkown
page readonly
39E4000
trusted library allocation
page read and write
4E41000
heap
page read and write
3981000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
3740000
heap
page read and write
2BF5000
trusted library allocation
page read and write
3B6C000
trusted library allocation
page read and write
17D1000
heap
page read and write
6BFE2000
unkown
page readonly
3B45000
trusted library allocation
page read and write
301F000
unkown
page read and write
5130000
heap
page read and write
3E0A000
trusted library allocation
page read and write
126C000
heap
page read and write
50DF000
stack
page read and write
3B61000
heap
page read and write
39A8000
trusted library allocation
page read and write
9D7000
unkown
page write copy
15F0000
heap
page read and write
D00000
heap
page read and write
1677000
heap
page read and write
816000
heap
page read and write
816000
heap
page read and write
305E000
stack
page read and write
8CE000
stack
page read and write
3F22000
trusted library allocation
page read and write
44C1000
heap
page read and write
21A88000
heap
page read and write
570000
heap
page read and write
39D4000
trusted library allocation
page read and write
58FA000
trusted library allocation
page read and write
59F1000
trusted library allocation
page read and write
7FE000
heap
page read and write
4F50000
direct allocation
page execute and read and write
1689000
heap
page read and write
39A3000
trusted library allocation
page read and write
21D0000
heap
page read and write
89F000
stack
page read and write
398E000
trusted library allocation
page read and write
4781000
heap
page read and write
5A11000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
ABF000
heap
page read and write
80B000
heap
page read and write
131B000
heap
page read and write
1678000
heap
page read and write
2BFD000
trusted library allocation
page read and write
5EA9000
trusted library allocation
page read and write
19413D25000
heap
page read and write
D57000
heap
page read and write
135A000
trusted library allocation
page read and write
7F9000
heap
page read and write
108F000
trusted library allocation
page read and write
3B61000
heap
page read and write
3F2D000
trusted library allocation
page read and write
590000
heap
page read and write
12D5000
trusted library allocation
page read and write
4781000
heap
page read and write
7FE000
heap
page read and write
44C1000
heap
page read and write
3F15000
trusted library allocation
page read and write
39A3000
trusted library allocation
page read and write
1084000
trusted library allocation
page read and write
812000
heap
page read and write
51D0000
direct allocation
page execute and read and write
3971000
trusted library allocation
page read and write
168C000
heap
page read and write
3A04000
trusted library allocation
page read and write
1089000
trusted library allocation
page read and write
15D7000
heap
page read and write
1689000
heap
page read and write
8AB000
unkown
page execute and read and write
3B61000
heap
page read and write
273D000
heap
page read and write
1082000
trusted library allocation
page read and write
802000
heap
page read and write
21A60000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
44C1000
heap
page read and write
1359000
trusted library allocation
page read and write
64F1000
heap
page read and write
21A8F000
heap
page read and write
F87000
heap
page read and write
5A11000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
A80000
heap
page read and write
3B4B000
trusted library allocation
page read and write
4E41000
heap
page read and write
5BE000
stack
page read and write
F71000
heap
page read and write
397E000
trusted library allocation
page read and write
3B4A000
trusted library allocation
page read and write
3B42000
trusted library allocation
page read and write
E27000
heap
page read and write
1087000
trusted library allocation
page read and write
108B000
trusted library allocation
page read and write
1580000
remote allocation
page read and write
3B35000
trusted library allocation
page read and write
ED7000
heap
page read and write
4BA0000
direct allocation
page read and write
417C000
trusted library allocation
page read and write
283F000
stack
page read and write
3992000
trusted library allocation
page read and write
590000
heap
page read and write
21A8F000
heap
page read and write
399C000
trusted library allocation
page read and write
4E41000
heap
page read and write
391E000
stack
page read and write
2AC6000
trusted library allocation
page read and write
29FE000
stack
page read and write
7FFD9B846000
trusted library allocation
page read and write
2735000
heap
page read and write
4B50000
direct allocation
page execute and read and write
12F5000
heap
page read and write
39A8000
trusted library allocation
page read and write
2140000
heap
page read and write
D60000
trusted library allocation
page read and write
F6B000
heap
page read and write
1359000
trusted library allocation
page read and write
4781000
heap
page read and write
397D000
trusted library allocation
page read and write
3971000
trusted library allocation
page read and write
22EF000
stack
page read and write
3F17000
trusted library allocation
page read and write
4CFB000
stack
page read and write
5A01000
trusted library allocation
page read and write
194140B5000
heap
page read and write
3B8D000
trusted library allocation
page read and write
124A000
heap
page read and write
802000
heap
page read and write
14FF000
stack
page read and write
27A916B0000
heap
page read and write
39A2000
trusted library allocation
page read and write
F02000
heap
page read and write
21AB4000
heap
page read and write
1652000
heap
page read and write
3997000
trusted library allocation
page read and write
12F5000
heap
page read and write
12E0000
trusted library allocation
page read and write
290000
heap
page read and write
3C1C000
trusted library allocation
page read and write
1689000
heap
page read and write
599000
heap
page read and write
64F000
heap
page read and write
5FC5000
trusted library allocation
page read and write
12DB000
trusted library allocation
page read and write
1063000
heap
page read and write
44C1000
heap
page read and write
3398000
heap
page read and write
39B8000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
44C1000
heap
page read and write
3994000
trusted library allocation
page read and write
3F2E000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
37DE000
stack
page read and write
135A000
trusted library allocation
page read and write
5460000
direct allocation
page execute and read and write
F9D000
heap
page read and write
12DF000
trusted library allocation
page read and write
3BF9000
trusted library allocation
page read and write
12F5000
heap
page read and write
39C0000
trusted library allocation
page read and write
2C50000
heap
page read and write
5A11000
trusted library allocation
page read and write
DEE000
unkown
page read and write
69D000
heap
page read and write
44C1000
heap
page read and write
1652000
heap
page read and write
4BA0000
direct allocation
page read and write
3136000
heap
page read and write
4781000
heap
page read and write
2AC8000
trusted library allocation
page read and write
3392000
heap
page read and write
7ED000
heap
page read and write
5A17000
trusted library allocation
page read and write
39BA000
trusted library allocation
page read and write
354C000
heap
page read and write
2EFD000
stack
page read and write
940000
unkown
page readonly
5FC0000
heap
page read and write
5FCD000
heap
page read and write
1022000
heap
page read and write
4036000
trusted library allocation
page read and write
1089000
trusted library allocation
page read and write
4DF0000
direct allocation
page read and write
2C3D000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
FC143FF000
stack
page read and write
12DC000
trusted library allocation
page read and write
4E41000
heap
page read and write
2880000
direct allocation
page read and write
39B2000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
1B640000
heap
page read and write
135B000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
1B74E000
stack
page read and write
3B34000
trusted library allocation
page read and write
10D5000
unkown
page read and write
303B000
heap
page read and write
1B2CF000
stack
page read and write
4BA0000
direct allocation
page read and write
3B23000
trusted library allocation
page read and write
20CE000
stack
page read and write
3986000
trusted library allocation
page read and write
21A8F000
heap
page read and write
3743000
heap
page read and write
124A000
heap
page read and write
281E000
stack
page read and write
5A11000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
58F6000
trusted library allocation
page read and write
3C7E000
stack
page read and write
D60000
trusted library allocation
page read and write
3B2A000
trusted library allocation
page read and write
688000
heap
page read and write
408000
unkown
page readonly
491F000
stack
page read and write
1B9E0000
heap
page read and write
3986000
trusted library allocation
page read and write
124A000
heap
page read and write
EBE000
stack
page read and write
168D000
heap
page read and write
477F000
stack
page read and write
1657000
heap
page read and write
3980000
trusted library allocation
page read and write
4061000
trusted library allocation
page read and write
1ADAC000
stack
page read and write
21A87000
heap
page read and write
1444000
heap
page read and write
DC0000
heap
page read and write
403A000
trusted library allocation
page read and write
21A87000
heap
page read and write
F63000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
59F1000
trusted library allocation
page read and write
6880000
heap
page read and write
1CDBF000
stack
page read and write
3A04000
trusted library allocation
page read and write
374B000
heap
page read and write
5A3E000
trusted library allocation
page read and write
340E000
stack
page read and write
12D7000
trusted library allocation
page read and write
3B74000
trusted library allocation
page read and write
3B61000
heap
page read and write
590F000
trusted library allocation
page read and write
CD0000
unkown
page read and write
4151000
trusted library allocation
page read and write
39CE000
stack
page read and write
590000
heap
page read and write
5F85000
heap
page read and write
21A8F000
heap
page read and write
2AC5000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
21A87000
heap
page read and write
1300000
heap
page read and write
80B000
heap
page read and write
4E41000
heap
page read and write
2BF7000
trusted library allocation
page read and write
3D94000
trusted library allocation
page read and write
323E000
stack
page read and write
2BF3000
trusted library allocation
page read and write
3978000
trusted library allocation
page read and write
1444000
heap
page read and write
12D3000
trusted library allocation
page read and write
3B61000
heap
page read and write
39A8000
trusted library allocation
page read and write
1672000
heap
page read and write
108A000
trusted library allocation
page read and write
4781000
heap
page read and write
135A000
trusted library allocation
page read and write
284D000
heap
page read and write
21AA3000
heap
page read and write
10C4000
heap
page read and write
139E000
heap
page read and write
7FE000
heap
page read and write
19413D57000
heap
page read and write
44C1000
heap
page read and write
15DF000
heap
page read and write
39C2000
trusted library allocation
page read and write
2ACD000
trusted library allocation
page read and write
812000
heap
page read and write
1357000
trusted library allocation
page read and write
44C1000
heap
page read and write
329F000
stack
page read and write
5430000
direct allocation
page execute and read and write
135D000
trusted library allocation
page read and write
21A87000
heap
page read and write
E8B000
heap
page read and write
416E000
trusted library allocation
page read and write
1304000
heap
page read and write
30BF000
stack
page read and write
3980000
trusted library allocation
page read and write
346F000
heap
page read and write
1354000
trusted library allocation
page read and write
1444000
heap
page read and write
12D4000
trusted library allocation
page read and write
21A87000
heap
page read and write
2C3B000
trusted library allocation
page read and write
4D0000
trusted library allocation
page read and write
39BD000
trusted library allocation
page read and write
135F000
trusted library allocation
page read and write
2ACF000
trusted library allocation
page read and write
1689000
heap
page read and write
F7B000
heap
page read and write
1117000
heap
page read and write
19413D51000
heap
page read and write
3A76000
trusted library allocation
page read and write
3998000
trusted library allocation
page read and write
3A5E000
stack
page read and write
5907000
trusted library allocation
page read and write
F7F000
heap
page read and write
3A00000
trusted library allocation
page read and write
58F8000
trusted library allocation
page read and write
38DF000
stack
page read and write
21A87000
heap
page read and write
840000
unkown
page readonly
1631000
heap
page read and write
44C1000
heap
page read and write
5A11000
trusted library allocation
page read and write
355E000
stack
page read and write
5A3E000
trusted library allocation
page read and write
1673000
heap
page read and write
398C000
trusted library allocation
page read and write
2B56DFE000
stack
page read and write
19413D19000
heap
page read and write
39A7000
trusted library allocation
page read and write
7F9000
heap
page read and write
A40000
heap
page read and write
5A29000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
DB6000
heap
page read and write
12DD000
trusted library allocation
page read and write
39F8000
trusted library allocation
page read and write
4781000
heap
page read and write
3996000
trusted library allocation
page read and write
3DCA000
trusted library allocation
page read and write
39CA000
trusted library allocation
page read and write
166E000
heap
page read and write
5902000
trusted library allocation
page read and write
980000
unkown
page readonly
39B8000
trusted library allocation
page read and write
2ABF000
stack
page read and write
23F0000
heap
page read and write
7FE000
heap
page read and write
D60000
trusted library allocation
page read and write
33BE000
stack
page read and write
2C38000
trusted library allocation
page read and write
846000
heap
page read and write
5BFC000
trusted library allocation
page read and write
5440000
direct allocation
page execute and read and write
3F1E000
trusted library allocation
page read and write
7E8B000
stack
page read and write
591F000
trusted library allocation
page read and write
3F1A000
trusted library allocation
page read and write
F80000
heap
page read and write
33DF000
stack
page read and write
4E41000
heap
page read and write
3B61000
heap
page read and write
D3D000
stack
page read and write
36FF000
stack
page read and write
790000
heap
page read and write
52D0000
direct allocation
page read and write
39CE000
trusted library allocation
page read and write
39A7000
trusted library allocation
page read and write
10CA000
heap
page read and write
696000
heap
page read and write
3396000
heap
page read and write
F2A000
heap
page read and write
101F000
unkown
page read and write
1086000
trusted library allocation
page read and write
30FE000
stack
page read and write
39CF000
trusted library allocation
page read and write
407A000
trusted library allocation
page read and write
33A0000
heap
page read and write
403E000
stack
page read and write
7ED000
heap
page read and write
4DF0000
direct allocation
page read and write
8A9000
unkown
page read and write
5FCB000
heap
page read and write
15CD000
heap
page read and write
812000
heap
page read and write
D87000
heap
page read and write
327F000
stack
page read and write
339C000
heap
page read and write
D39000
unkown
page read and write
4FDF000
stack
page read and write
563000
heap
page read and write
981000
unkown
page execute read
2C34000
trusted library allocation
page read and write
1289000
heap
page read and write
F71000
heap
page read and write
31A0000
heap
page read and write
4F4000
unkown
page readonly
39A8000
trusted library allocation
page read and write
3B15000
trusted library allocation
page read and write
166B000
heap
page read and write
3B35000
trusted library allocation
page read and write
39DA000
trusted library allocation
page read and write
4044000
trusted library allocation
page read and write
594000
heap
page read and write
3B45000
trusted library allocation
page read and write
3B61000
heap
page read and write
3B15000
trusted library allocation
page read and write
135E000
trusted library allocation
page read and write
1319000
heap
page read and write
3B45000
trusted library allocation
page read and write
590000
heap
page read and write
164A000
heap
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
F86000
heap
page read and write
15D5000
heap
page read and write
3993000
trusted library allocation
page read and write
3B20000
trusted library allocation
page read and write
3DBD000
stack
page read and write
2CA1000
heap
page read and write
339F000
heap
page read and write
5927000
trusted library allocation
page read and write
4E41000
heap
page read and write
21A81000
heap
page read and write
494000
heap
page read and write
3210000
heap
page read and write
397E000
trusted library allocation
page read and write
590000
heap
page read and write
3B11000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
F80000
heap
page read and write
3B18000
trusted library allocation
page read and write
6AF000
heap
page read and write
590A000
trusted library allocation
page read and write
1444000
heap
page read and write
21A82000
heap
page read and write
C3C000
stack
page read and write
44C1000
heap
page read and write
FEA000
unkown
page execute and write copy
2C35000
trusted library allocation
page read and write
2AC5000
trusted library allocation
page read and write
39A8000
trusted library allocation
page read and write
1D9000
stack
page read and write
39B9000
trusted library allocation
page read and write
5FC3000
trusted library allocation
page read and write
9C0000
unkown
page readonly
287E000
stack
page read and write
5A01000
trusted library allocation
page read and write
2BF6000
trusted library allocation
page read and write
3986000
trusted library allocation
page read and write
44C1000
heap
page read and write
5A3E000
trusted library allocation
page read and write
44C1000
heap
page read and write
9D4000
unkown
page readonly
1CB50000
heap
page read and write
2ACC000
trusted library allocation
page read and write
3978000
trusted library allocation
page read and write
167B000
heap
page read and write
39A8000
trusted library allocation
page read and write
2E0000
heap
page read and write
12DF000
trusted library allocation
page read and write
21A7A000
heap
page read and write
39D7000
trusted library allocation
page read and write
3992000
trusted library allocation
page read and write
577000
heap
page read and write
2880000
direct allocation
page read and write
459E000
stack
page read and write
2AC9000
trusted library allocation
page read and write
F9D000
heap
page read and write
3B61000
heap
page read and write
414C000
trusted library allocation
page read and write
3B5B000
trusted library allocation
page read and write
3986000
trusted library allocation
page read and write
5FE1000
heap
page read and write
44C1000
heap
page read and write
3080000
direct allocation
page read and write
12F1000
heap
page read and write
4E41000
heap
page read and write
39A8000
trusted library allocation
page read and write
3B7D000
trusted library allocation
page read and write
21A87000
heap
page read and write
494000
heap
page read and write
39B4000
trusted library allocation
page read and write
4E41000
heap
page read and write
2AC1000
trusted library allocation
page read and write
3982000
trusted library allocation
page read and write
F28000
heap
page read and write
27A916F7000
heap
page read and write
ECE000
heap
page read and write
999000
unkown
page readonly
3B15000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
3A14000
trusted library allocation
page read and write
39E9000
trusted library allocation
page read and write
4046000
trusted library allocation
page read and write
1353000
trusted library allocation
page read and write
12D8000
trusted library allocation
page read and write
3B61000
heap
page read and write
590000
heap
page read and write
3B4D000
trusted library allocation
page read and write
E16000
heap
page read and write
3F24000
trusted library allocation
page read and write
21A87000
heap
page read and write
BF0000
direct allocation
page read and write
15DB000
heap
page read and write
111C000
heap
page read and write
68F000
heap
page read and write
19413D25000
heap
page read and write
6E0000
trusted library allocation
page read and write
1652000
heap
page read and write
27A916C5000
heap
page read and write
F75000
heap
page read and write
3997000
trusted library allocation
page read and write
F99000
heap
page read and write
3D22000
trusted library allocation
page read and write
59F1000
trusted library allocation
page read and write
2CAE000
heap
page read and write
2C36000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
577000
heap
page read and write
3980000
trusted library allocation
page read and write
15D3000
heap
page read and write
F2B000
heap
page read and write
39A8000
trusted library allocation
page read and write
B9E000
stack
page read and write
1289000
heap
page read and write
692000
heap
page read and write
3B4E000
trusted library allocation
page read and write
39B1000
trusted library allocation
page read and write
44C1000
heap
page read and write
7FE000
heap
page read and write
F9D000
heap
page read and write
4BA0000
direct allocation
page read and write
39A4000
trusted library allocation
page read and write
3139000
heap
page read and write
7FE000
heap
page read and write
9C0000
unkown
page readonly
1086000
trusted library allocation
page read and write
15E6000
heap
page read and write
1D30E000
stack
page read and write
5A3E000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
40B000
unkown
page read and write
812000
heap
page read and write
802000
heap
page read and write
31D0000
remote allocation
page read and write
2D4C000
stack
page read and write
2DF0000
heap
page read and write
3E7F000
stack
page read and write
331000
unkown
page execute read
3B4E000
trusted library allocation
page read and write
12D5000
trusted library allocation
page read and write
310F000
heap
page read and write
304D000
heap
page read and write
D34000
heap
page read and write
A65000
heap
page read and write
12823000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
2C34000
trusted library allocation
page read and write
F63000
heap
page read and write
1084000
trusted library allocation
page read and write
3B61000
heap
page read and write
39B8000
trusted library allocation
page read and write
1353000
trusted library allocation
page read and write
58FF000
trusted library allocation
page read and write
FC148FE000
stack
page read and write
124A000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
3B34000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
E4F000
heap
page read and write
5A11000
trusted library allocation
page read and write
19413D2F000
heap
page read and write
6080000
remote allocation
page read and write
3996000
trusted library allocation
page read and write
58F7000
trusted library allocation
page read and write
1359000
trusted library allocation
page read and write
7ED000
heap
page read and write
2E3F000
stack
page read and write
9CE000
unkown
page write copy
3980000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
5927000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
FBA000
heap
page read and write
58F8000
trusted library allocation
page read and write
7F9000
heap
page read and write
5907000
trusted library allocation
page read and write
5C0000
heap
page read and write
3F1E000
trusted library allocation
page read and write
37A0000
heap
page read and write
F8B000
heap
page read and write
39AC000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
39D1000
trusted library allocation
page read and write
36DC000
stack
page read and write
3993000
trusted library allocation
page read and write
816000
heap
page read and write
7ED000
heap
page read and write
3F24000
trusted library allocation
page read and write
1580000
remote allocation
page read and write
5A00000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
2BF6000
trusted library allocation
page read and write
4781000
heap
page read and write
3B45000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
35FE000
stack
page read and write
3B11000
trusted library allocation
page read and write
3996000
trusted library allocation
page read and write
3B5F000
trusted library allocation
page read and write
3B61000
heap
page read and write
403C000
trusted library allocation
page read and write
7FE000
heap
page read and write
403A000
trusted library allocation
page read and write
3996000
trusted library allocation
page read and write
3B57000
trusted library allocation
page read and write
B4A000
unkown
page execute and read and write
39B2000
trusted library allocation
page read and write
41D2000
trusted library allocation
page read and write
52A000
heap
page read and write
69D000
heap
page read and write
3080000
direct allocation
page read and write
39B2000
trusted library allocation
page read and write
312B000
heap
page read and write
F7A000
heap
page read and write
32A8000
heap
page read and write
39EF000
trusted library allocation
page read and write
6871000
heap
page read and write
F10000
unkown
page readonly
21A7E000
heap
page read and write
3997000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
5EA7000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
221E000
stack
page read and write
3B34000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
7FE000
heap
page read and write
4052000
trusted library allocation
page read and write
15D7000
heap
page read and write
4038000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
4780000
heap
page read and write
EF6000
heap
page read and write
5A11000
trusted library allocation
page read and write
2C3E000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
10AE000
heap
page read and write
7C10000
heap
page read and write
194157D0000
heap
page read and write
39A2000
trusted library allocation
page read and write
44D0000
heap
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
39E7000
trusted library allocation
page read and write
1CD4F000
stack
page read and write
F9D000
heap
page read and write
1680000
heap
page read and write
21A8F000
heap
page read and write
9D4000
unkown
page readonly
1256000
heap
page read and write
F82000
heap
page read and write
3B3F000
trusted library allocation
page read and write
108D000
trusted library allocation
page read and write
2880000
direct allocation
page read and write
441F000
stack
page read and write
2DAC000
stack
page read and write
5A11000
trusted library allocation
page read and write
989000
unkown
page write copy
7FFD9B794000
trusted library allocation
page read and write
7F9000
heap
page read and write
25E0000
heap
page read and write
127E000
stack
page read and write
39B8000
trusted library allocation
page read and write
40B000
unkown
page write copy
ADD000
stack
page read and write
39FA000
trusted library allocation
page read and write
39BC000
trusted library allocation
page read and write
3399000
heap
page read and write
1234000
heap
page read and write
331000
unkown
page execute read
27A916E8000
heap
page read and write
44C1000
heap
page read and write
4B9F000
stack
page read and write
58FD000
trusted library allocation
page read and write
7F9000
heap
page read and write
DA1000
unkown
page execute read
399F000
trusted library allocation
page read and write
397E000
trusted library allocation
page read and write
3B4B000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
3B3E000
stack
page read and write
3980000
trusted library allocation
page read and write
4781000
heap
page read and write
417E000
stack
page read and write
3986000
trusted library allocation
page read and write
508E000
stack
page read and write
2BFF000
trusted library allocation
page read and write
5040000
direct allocation
page read and write
1490000
heap
page read and write
3B51000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
21A8F000
heap
page read and write
D60000
trusted library allocation
page read and write
2736000
heap
page read and write
3C3F000
stack
page read and write
453E000
stack
page read and write
21AA3000
heap
page read and write
3000000
heap
page read and write
1652000
heap
page read and write
1267000
heap
page read and write
44C1000
heap
page read and write
15D7000
heap
page read and write
940000
unkown
page readonly
2C35000
trusted library allocation
page read and write
6B0000
heap
page read and write
2BF8000
trusted library allocation
page read and write
1444000
heap
page read and write
5A3E000
trusted library allocation
page read and write
35BF000
stack
page read and write
2ACD000
trusted library allocation
page read and write
21A87000
heap
page read and write
2BF6000
trusted library allocation
page read and write
4781000
heap
page read and write
3983000
trusted library allocation
page read and write
EA2000
heap
page read and write
3B77000
trusted library allocation
page read and write
39A8000
trusted library allocation
page read and write
39F2000
trusted library allocation
page read and write
1689000
heap
page read and write
4781000
heap
page read and write
3983000
trusted library allocation
page read and write
4E41000
heap
page read and write
3997000
trusted library allocation
page read and write
3B5D000
trusted library allocation
page read and write
7ED000
heap
page read and write
5EA7000
trusted library allocation
page read and write
44C1000
heap
page read and write
5937000
trusted library allocation
page read and write
27A916F9000
heap
page read and write
3978000
trusted library allocation
page read and write
58FF000
trusted library allocation
page read and write
165E000
heap
page read and write
DA0000
unkown
page readonly
398F000
trusted library allocation
page read and write
EEB000
heap
page read and write
5A01000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
D1F000
heap
page read and write
3986000
trusted library allocation
page read and write
2E43000
heap
page read and write
4781000
heap
page read and write
3394000
heap
page read and write
BF0000
direct allocation
page read and write
5A01000
trusted library allocation
page read and write
136E000
stack
page read and write
EB7000
heap
page read and write
B43000
unkown
page execute and read and write
401000
unkown
page execute read
21E0000
heap
page read and write
3B35000
trusted library allocation
page read and write
1B9F0000
heap
page read and write
333F000
stack
page read and write
3B61000
heap
page read and write
397E000
trusted library allocation
page read and write
2BFA000
trusted library allocation
page read and write
1236000
heap
page read and write
4E41000
heap
page read and write
168C000
heap
page read and write
2B56EFF000
stack
page read and write
131C000
heap
page read and write
39C4000
trusted library allocation
page read and write
373F000
stack
page read and write
5A11000
trusted library allocation
page read and write
80B000
heap
page read and write
10A2000
heap
page read and write
5908000
trusted library allocation
page read and write
D71000
heap
page read and write
5E0000
unkown
page readonly
5E10000
heap
page read and write
5A11000
trusted library allocation
page read and write
4038000
trusted library allocation
page read and write
F5E000
heap
page read and write
1631000
heap
page read and write
39A1000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
21A0000
heap
page read and write
124A000
heap
page read and write
39B8000
trusted library allocation
page read and write
5EB3000
trusted library allocation
page read and write
39CB000
trusted library allocation
page read and write
27A916EF000
heap
page read and write
15DD000
heap
page read and write
373D000
stack
page read and write
5A01000
trusted library allocation
page read and write
2C33000
trusted library allocation
page read and write
34BF000
stack
page read and write
4781000
heap
page read and write
1236000
heap
page read and write
27A915E0000
heap
page read and write
980000
unkown
page readonly
123A000
heap
page read and write
4781000
heap
page read and write
3B33000
trusted library allocation
page read and write
27A916DB000
heap
page read and write
3990000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
397A000
trusted library allocation
page read and write
35FC000
stack
page read and write
4F40000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
F15000
heap
page read and write
2C3E000
trusted library allocation
page read and write
44C1000
heap
page read and write
27A916F3000
heap
page read and write
21A88000
heap
page read and write
2CF2000
trusted library allocation
page read and write
F75000
heap
page read and write
125F000
heap
page read and write
4781000
heap
page read and write
15F0000
heap
page read and write
3B23000
trusted library allocation
page read and write
2BFA000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
DDF000
unkown
page readonly
1200000
direct allocation
page read and write
319E000
stack
page read and write
3B49000
trusted library allocation
page read and write
494000
heap
page read and write
1669000
heap
page read and write
19B000
stack
page read and write
1BB000
stack
page read and write
2C40000
trusted library allocation
page read and write
1662000
heap
page read and write
39E4000
trusted library allocation
page read and write
374B000
heap
page read and write
5A0F000
trusted library allocation
page read and write
21A8F000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
2BF3000
trusted library allocation
page read and write
21A81000
heap
page read and write
86C000
unkown
page execute and read and write
3B13000
trusted library allocation
page read and write
2144000
heap
page read and write
F79000
heap
page read and write
D95000
heap
page read and write
12D6000
trusted library allocation
page read and write
D42000
heap
page read and write
3B35000
trusted library allocation
page read and write
3996000
trusted library allocation
page read and write
427E000
stack
page read and write
3741000
heap
page read and write
51F0000
direct allocation
page execute and read and write
397A000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
594000
heap
page read and write
802000
heap
page read and write
494000
heap
page read and write
840000
heap
page read and write
81F000
heap
page read and write
5A21000
trusted library allocation
page read and write
5FE5000
heap
page read and write
5C6000
unkown
page execute and read and write
399A000
trusted library allocation
page read and write
1356000
trusted library allocation
page read and write
4E41000
heap
page read and write
2ACD000
trusted library allocation
page read and write
7ED000
heap
page read and write
21A87000
heap
page read and write
5A3E000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
3AC7000
trusted library allocation
page read and write
313E000
stack
page read and write
2CA0000
heap
page read and write
816000
heap
page read and write
1678000
heap
page read and write
401000
unkown
page execute read
1353000
trusted library allocation
page read and write
7B0000
unkown
page readonly
3B35000
trusted library allocation
page read and write
721000
unkown
page execute read
C80000
trusted library allocation
page read and write
339E000
heap
page read and write
B14000
unkown
page execute and write copy
1081000
trusted library allocation
page read and write
3B5B000
trusted library allocation
page read and write
5D9F000
trusted library allocation
page read and write
3420000
heap
page read and write
39B8000
trusted library allocation
page read and write
4781000
heap
page read and write
9CE000
unkown
page readonly
44C1000
heap
page read and write
3998000
trusted library allocation
page read and write
4781000
heap
page read and write
7E9000
unkown
page readonly
3972000
trusted library allocation
page read and write
44C1000
heap
page read and write
5907000
trusted library allocation
page read and write
5FB9000
heap
page read and write
135B000
trusted library allocation
page read and write
131C000
heap
page read and write
125D000
heap
page read and write
2842000
heap
page read and write
19413D2E000
heap
page read and write
1082000
trusted library allocation
page read and write
3B61000
heap
page read and write
5A3E000
trusted library allocation
page read and write
3CDE000
stack
page read and write
61E00000
direct allocation
page execute and read and write
1271000
heap
page read and write
2737000
heap
page read and write
3996000
trusted library allocation
page read and write
F6B000
heap
page read and write
2AD1000
trusted library allocation
page read and write
625F000
stack
page read and write
21A81000
heap
page read and write
3B20000
trusted library allocation
page read and write
417C000
trusted library allocation
page read and write
1B4CF000
stack
page read and write
15D3000
heap
page read and write
812000
heap
page read and write
387F000
stack
page read and write
12E1000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
1A5F000
stack
page read and write
816000
heap
page read and write
3992000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
7F9000
heap
page read and write
1266000
heap
page read and write
DC6000
heap
page read and write
165B000
heap
page read and write
4781000
heap
page read and write
1657000
heap
page read and write
4054000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
1317000
heap
page read and write
630000
heap
page read and write
2C3F000
stack
page read and write
131B000
heap
page read and write
3B76000
trusted library allocation
page read and write
2A20000
direct allocation
page read and write
4E41000
heap
page read and write
7FE000
heap
page read and write
2ACC000
trusted library allocation
page read and write
124E000
heap
page read and write
4781000
heap
page read and write
39A2000
trusted library allocation
page read and write
3B3F000
trusted library allocation
page read and write
10AC000
heap
page read and write
615E000
stack
page read and write
4A60000
trusted library allocation
page read and write
EB0000
heap
page read and write
135D000
trusted library allocation
page read and write
15DB000
heap
page read and write
764000
unkown
page execute and read and write
404B000
trusted library allocation
page read and write
39BD000
trusted library allocation
page read and write
377E000
stack
page read and write
39E5000
trusted library allocation
page read and write
1227000
heap
page read and write
2AD0000
trusted library allocation
page read and write
10EB000
heap
page read and write
126C000
heap
page read and write
5A3D000
trusted library allocation
page read and write
43BF000
stack
page read and write
9D4000
unkown
page readonly
4E41000
heap
page read and write
27A916B8000
heap
page read and write
816000
heap
page read and write
81F000
heap
page read and write
802000
heap
page read and write
F20000
heap
page read and write
1670000
heap
page read and write
6AF000
heap
page read and write
8A2000
unkown
page execute and read and write
2AC2000
trusted library allocation
page read and write
3986000
trusted library allocation
page read and write
44C1000
heap
page read and write
1B98D000
stack
page read and write
21A77000
heap
page read and write
3B7D000
trusted library allocation
page read and write
3394000
heap
page read and write
3E08000
trusted library allocation
page read and write
303E000
heap
page read and write
1351000
trusted library allocation
page read and write
14F1000
heap
page read and write
4E41000
heap
page read and write
3B61000
heap
page read and write
5DDE000
stack
page read and write
51D0000
direct allocation
page execute and read and write
5A11000
trusted library allocation
page read and write
39BB000
trusted library allocation
page read and write
40B000
unkown
page read and write
4039000
trusted library allocation
page read and write
44C1000
heap
page read and write
44C1000
heap
page read and write
302C000
heap
page read and write
1234000
heap
page read and write
39B2000
trusted library allocation
page read and write
816000
heap
page read and write
4BA0000
direct allocation
page read and write
3B34000
trusted library allocation
page read and write
39E1000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
44C1000
heap
page read and write
7ED000
heap
page read and write
5A3E000
trusted library allocation
page read and write
5210000
direct allocation
page execute and read and write
39BB000
trusted library allocation
page read and write
3B22000
trusted library allocation
page read and write
12FC000
heap
page read and write
DB2000
heap
page read and write
508F000
stack
page read and write
373F000
stack
page read and write
374A000
heap
page read and write
98F000
unkown
page read and write
FC2000
heap
page read and write
4781000
heap
page read and write
69B000
heap
page read and write
28B7000
heap
page read and write
3390000
heap
page read and write
419C000
trusted library allocation
page read and write
3B33000
trusted library allocation
page read and write
760000
heap
page read and write
4029000
trusted library allocation
page read and write
4E41000
heap
page read and write
3989000
trusted library allocation
page read and write
4961000
heap
page read and write
3998000
trusted library allocation
page read and write
28A0000
direct allocation
page read and write
3F12000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
2730000
heap
page read and write
3395000
heap
page read and write
4E41000
heap
page read and write
3F16000
trusted library allocation
page read and write
D42000
heap
page read and write
44C1000
heap
page read and write
50B1000
direct allocation
page read and write
1237000
heap
page read and write
1082000
trusted library allocation
page read and write
21A8F000
heap
page read and write
39DB000
trusted library allocation
page read and write
7B0000
unkown
page readonly
4D7E000
stack
page read and write
3A34000
trusted library allocation
page read and write
7E4E000
stack
page read and write
981000
unkown
page execute read
15DC000
heap
page read and write
D60000
trusted library allocation
page read and write
573000
heap
page read and write
1235000
heap
page read and write
5D94000
trusted library allocation
page read and write
3F26000
trusted library allocation
page read and write
F3D000
heap
page read and write
12EF000
heap
page read and write
FC147FE000
stack
page read and write
168C000
heap
page read and write
1655000
heap
page read and write
2733000
heap
page read and write
1082000
trusted library allocation
page read and write
369F000
stack
page read and write
4781000
heap
page read and write
F10000
unkown
page readonly
4037000
trusted library allocation
page read and write
56F000
heap
page read and write
3AE0000
heap
page read and write
2739000
heap
page read and write
44C1000
heap
page read and write
39A8000
trusted library allocation
page read and write
39B8000
trusted library allocation
page read and write
3B28000
trusted library allocation
page read and write
408000
unkown
page readonly
831000
unkown
page execute and write copy
168C000
heap
page read and write
2AC8000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
D23000
heap
page read and write
12F6000
heap
page read and write
3B20000
trusted library allocation
page read and write
DB4000
heap
page read and write
12D2000
trusted library allocation
page read and write
1689000
heap
page read and write
123C000
heap
page read and write
4F4000
unkown
page readonly
7F9000
heap
page read and write
3B34000
trusted library allocation
page read and write
2BF2000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
39D8000
trusted library allocation
page read and write
3B7D000
trusted library allocation
page read and write
4781000
heap
page read and write
12F5000
heap
page read and write
3994000
trusted library allocation
page read and write
2C3E000
trusted library allocation
page read and write
F0E000
stack
page read and write
4F60000
direct allocation
page execute and read and write
3B54000
trusted library allocation
page read and write
56F000
heap
page read and write
5EAB000
trusted library allocation
page read and write
3B34000
trusted library allocation
page read and write
F68000
heap
page read and write
3F18000
trusted library allocation
page read and write
3978000
trusted library allocation
page read and write
4961000
heap
page read and write
4781000
heap
page read and write
510F000
stack
page read and write
19413D41000
heap
page read and write
39A2000
trusted library allocation
page read and write
3997000
trusted library allocation
page read and write
4B40000
direct allocation
page execute and read and write
830000
unkown
page readonly
135A000
trusted library allocation
page read and write
58F4000
trusted library allocation
page read and write
F8B000
heap
page read and write
39CE000
trusted library allocation
page read and write
58F6000
trusted library allocation
page read and write
802000
heap
page read and write
39A7000
trusted library allocation
page read and write
44C1000
heap
page read and write
1080000
trusted library allocation
page read and write
5110000
heap
page read and write
2ACE000
trusted library allocation
page read and write
B59000
unkown
page execute and read and write
27A916EA000
heap
page read and write
33CF000
stack
page read and write
3B3C000
trusted library allocation
page read and write
2BF4000
trusted library allocation
page read and write
165F000
heap
page read and write
347F000
stack
page read and write
3F1F000
stack
page read and write
5A3E000
trusted library allocation
page read and write
399F000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
3F1A000
trusted library allocation
page read and write
58FA000
trusted library allocation
page read and write
5D95000
trusted library allocation
page read and write
4062000
trusted library allocation
page read and write
44C1000
heap
page read and write
2E80000
remote allocation
page read and write
44C1000
heap
page read and write
39B5000
trusted library allocation
page read and write
21A87000
heap
page read and write
1358000
trusted library allocation
page read and write
23AE000
stack
page read and write
123C000
heap
page read and write
124E000
heap
page read and write
4781000
heap
page read and write
There are 4328 hidden memdumps, click here to show them.