IOC Report
IBKB.vbs

loading gif

Files

File Path
Type
Category
Malicious
IBKB.vbs
ASCII text, with very long lines (65413), with CRLF line terminators
initial sample
malicious
C:\Users\Public\Juqmtmya.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Juqmtmya.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\Juqmtmya
data
dropped
malicious
C:\Users\Public\Libraries\Juqmtmya.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\aymtmquJ.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Native_neworigin.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\x.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ACCApi\apihost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\PNO
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Libraries\aymtmquJ.cmd
DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
C:\Users\Public\alpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Trading_AIBot.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4d1ue13h.crm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jfq1141n.tyg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lvj5yjum.fby.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s0bapu3q.ora.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\9aa529efaf59dc6.bin
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Wed Nov 20 08:24:43 2024, mtime=Wed Nov 20 08:24:43 2024, atime=Wed Nov 20 08:24:43 2024, length=70656, window=
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
\Device\Null
ASCII text, with CRLF, CR line terminators
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\IBKB.vbs"
malicious
C:\Users\user\AppData\Local\Temp\x.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\AppData\Local\Temp\x.exe /d C:\\Users\\Public\\Libraries\\Juqmtmya.PIF /o
malicious
C:\Users\Public\Libraries\aymtmquJ.pif
C:\Users\Public\Libraries\aymtmquJ.pif
malicious
C:\Users\user\AppData\Local\Temp\Native_neworigin.exe
"C:\Users\user\AppData\Local\Temp\Native_neworigin.exe"
malicious
C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe
"C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi'
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 04:29 /du 23:59 /sc daily /ri 1 /f
malicious
C:\Users\Public\Libraries\Juqmtmya.PIF
"C:\Users\Public\Libraries\Juqmtmya.PIF"
malicious
C:\Users\Public\Libraries\aymtmquJ.pif
C:\Users\Public\Libraries\aymtmquJ.pif
malicious
C:\Users\user\AppData\Local\Temp\Native_neworigin.exe
"C:\Users\user\AppData\Local\Temp\Native_neworigin.exe"
malicious
C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe
"C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe"
malicious
C:\Users\Public\Libraries\Juqmtmya.PIF
"C:\Users\Public\Libraries\Juqmtmya.PIF"
malicious
C:\Users\Public\Libraries\aymtmquJ.pif
C:\Users\Public\Libraries\aymtmquJ.pif
malicious
C:\Users\user\AppData\Local\Temp\Native_neworigin.exe
"C:\Users\user\AppData\Local\Temp\Native_neworigin.exe"
malicious
C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe
"C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe"
malicious
C:\Users\user\AppData\Roaming\ACCApi\apihost.exe
"C:\Users\user\AppData\Roaming\ACCApi\apihost.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\aymtmquJ.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://lpuegx.biz/bqdrapkxlqcka
82.112.184.197
malicious
http://cvgrf.biz/duhfjaeqhlnmwtn
54.244.188.177
malicious
http://lpuegx.biz/pfrxci
82.112.184.197
malicious
http://lrxdmhrr.biz/wt
54.244.188.177
malicious
http://dwrqljrr.biz/sbnrqyxuvimud
54.244.188.177
malicious
http://lpuegx.biz/sqxjvguhdtdacidd
82.112.184.197
malicious
http://pywolwnvd.biz/lcoyxsnwq
54.244.188.177
malicious
http://pywolwnvd.biz/cakchsrrlpkav
54.244.188.177
malicious
http://cvgrf.biz/v
54.244.188.177
malicious
http://lpuegx.biz/epmanlipym
82.112.184.197
malicious
http://cvgrf.biz/xkcbxhnrv
54.244.188.177
malicious
http://vjaxhpbji.biz/mshka
82.112.184.197
malicious
http://oshhkdluh.biz/rsqlwjdrwk
54.244.188.177
malicious
http://vjaxhpbji.biz/ga
82.112.184.197
malicious
http://pywolwnvd.biz/vfpepibjtu
54.244.188.177
malicious
http://typgfhb.biz/rrrklmujfcwnchb
13.251.16.150
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://fwiwk.biz/jwvwqanfys
172.234.222.143
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
http://myups.biz/c
165.160.15.20
http://przvgke.biz/aunxkp
172.234.222.143
http://82.112.184.197/J
unknown
http://yunalwv.biz/xalserxg
208.100.26.245
http://knjghuig.biz/nsnnyu
18.141.10.107
http://qaynky.biz/uiwlhtxrxipw
13.251.16.150
http://xlfhhhm.biz/mvnulpmrxwqe
47.129.31.212
http://przvgke.biz/cbhxke
172.234.222.138
https://aka.ms/pscore6lB
unknown
http://gytujflc.biz/rofptsppofgiww
208.100.26.245
http://gvijgjwkh.biz/pggbsfikilutqo
3.94.10.34
https://nuget.org/nuget.exe
unknown
http://npukfztj.biz/dkglfbueemimxh
44.221.84.105
http://172.234.222.143/ksc
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ssbzmoy.biz/clmhymdikmk
18.141.10.107
https://account.dyn.com/
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://npukfztj.biz/jo
44.221.84.105
http://82.112.184.197/$
unknown
https://contoso.com/Icon
unknown
https://api.ipify.org/t
unknown
http://knjghuig.biz/mwpi
18.141.10.107
http://wllvnzb.biz/txsxc
18.141.10.107
https://github.com/Pester/Pester
unknown
http://18.141.10.107/nsnnyu
unknown
http://r11.i.lencr.org/0
unknown
http://saytjshyf.biz/qologlfowpsjwwtq
44.221.84.105
http://sxmiywsfv.biz/xwpgxeg
13.251.16.150
http://crl.micro
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://s82.gocheapweb.com
unknown
http://fwiwk.biz/oiqbeltfrlpts
172.234.222.143
http://ssbzmoy.biz/ctaniunjcxta
18.141.10.107
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
http://deoci.biz/jlc
18.208.156.248
http://przvgke.biz/fckn
172.234.222.138
http://82.112.184.197/epmanlipym
unknown
https://gxe0.com/yak2/233_Juqmtmyadyyc
unknown
http://iuzpxe.biz/yngosjtj
13.251.16.150
http://ocsp.sectigo.com0
unknown
https://contoso.com/License
unknown
http://yauexmxk.biz/wdbsnc
18.208.156.248
http://przvgke.biz/krmiyakxt
172.234.222.138
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://ssbzmoy.biz/kfhn
18.141.10.107
http://54.244.188.177/QmKP
unknown
http://vcddkls.biz/cr
18.141.10.107
http://jhvzpcfg.biz/qehuuaxgtrfd
44.221.84.105
http://18.141.10.107/
unknown
http://ftxlah.biz/hppl
47.129.31.212
https://api.ipify.org
unknown
http://przvgke.biz/ksc
172.234.222.143
http://crl.veris
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://contoso.com/
unknown
http://gytujflc.biz/iq
208.100.26.245
http://acwjcqqv.biz/srktyhawgjwb
18.141.10.107
http://nqwjmb.biz/s
35.164.78.200
http://myups.biz/rjreynucnxubyan
165.160.15.20
https://gxe0.com/yak2/233_Juqmtmyadyy
198.252.105.91
http://44.221.84.105/jo
unknown
http://54.244.188.177/
unknown
https://api.ipify.org/
172.67.74.152
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://nuget.org/NuGet.exe
unknown
http://ifsaia.biz/ueacef
13.251.16.150
https://gxe0.com/yak2/233_Juqmtm
unknown
https://sectigo.com/CPS0
unknown
http://przvgke.biz/xyttxtxgf
172.234.222.138
http://r11.o.lencr.org0#
unknown
https://gxe0.com:443/yak2/233_Juqmtmyadyy
unknown
http://knjghuig.biz/h
18.141.10.107
http://ytctnunms.biz/qklr
3.94.10.34
https://gxe0.com/
unknown
http://82.112.184.197:80/epmanlipymy
unknown
http://npukfztj.biz/khahgpo
44.221.84.105
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
oshhkdluh.biz
54.244.188.177
malicious
vjaxhpbji.biz
82.112.184.197
malicious
pywolwnvd.biz
54.244.188.177
malicious
s82.gocheapweb.com
51.195.88.199
malicious
lrxdmhrr.biz
54.244.188.177
malicious
dwrqljrr.biz
54.244.188.177
malicious
cvgrf.biz
54.244.188.177
malicious
lpuegx.biz
82.112.184.197
malicious
uhxqin.biz
unknown
malicious
anpmnmxo.biz
unknown
malicious
zlenh.biz
unknown
malicious
lejtdj.biz
unknown
malicious
jpskm.biz
34.211.97.45
ftxlah.biz
47.129.31.212
ifsaia.biz
13.251.16.150
ytctnunms.biz
3.94.10.34
vrrazpdh.biz
34.211.97.45
tbjrpv.biz
34.246.200.160
jhvzpcfg.biz
44.221.84.105
saytjshyf.biz
44.221.84.105
xlfhhhm.biz
47.129.31.212
fwiwk.biz
172.234.222.143
typgfhb.biz
13.251.16.150
npukfztj.biz
44.221.84.105
esuzf.biz
34.211.97.45
sxmiywsfv.biz
13.251.16.150
przvgke.biz
172.234.222.143
myups.biz
165.160.15.20
gytujflc.biz
208.100.26.245
yauexmxk.biz
18.208.156.248
gvijgjwkh.biz
3.94.10.34
ssbzmoy.biz
18.141.10.107
knjghuig.biz
18.141.10.107
yunalwv.biz
208.100.26.245
gnqgo.biz
18.208.156.248
deoci.biz
18.208.156.248
brsua.biz
3.254.94.185
iuzpxe.biz
13.251.16.150
nqwjmb.biz
35.164.78.200
wllvnzb.biz
18.141.10.107
qaynky.biz
13.251.16.150
gxe0.com
198.252.105.91
bumxkqgxu.biz
44.221.84.105
qpnczch.biz
18.246.231.120
api.ipify.org
172.67.74.152
vcddkls.biz
18.141.10.107
acwjcqqv.biz
18.141.10.107
vyome.biz
18.246.231.120
There are 38 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
51.195.88.199
s82.gocheapweb.com
France
malicious
54.244.188.177
oshhkdluh.biz
United States
malicious
82.112.184.197
vjaxhpbji.biz
Russian Federation
malicious
165.160.15.20
myups.biz
United States
3.94.10.34
ytctnunms.biz
United States
34.246.200.160
tbjrpv.biz
United States
198.252.105.91
gxe0.com
Canada
172.234.222.143
fwiwk.biz
United States
18.208.156.248
yauexmxk.biz
United States
208.100.26.245
gytujflc.biz
United States
35.164.78.200
nqwjmb.biz
United States
172.234.222.138
unknown
United States
44.221.84.105
jhvzpcfg.biz
United States
13.251.16.150
ifsaia.biz
United States
47.129.31.212
ftxlah.biz
Canada
18.141.10.107
ssbzmoy.biz
United States
172.67.74.152
api.ipify.org
United States
There are 7 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Juqmtmya
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Native_neworigin_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3FC5000
trusted library allocation
page read and write
malicious
2A36000
heap
page read and write
malicious
4255000
trusted library allocation
page read and write
malicious
91E000
heap
page read and write
malicious
7FC50000
direct allocation
page read and write
malicious
3041000
trusted library allocation
page read and write
malicious
3140000
trusted library section
page read and write
malicious
2E61000
trusted library allocation
page read and write
malicious
7F6000
heap
page read and write
malicious
2A56000
heap
page read and write
malicious
5850000
trusted library section
page read and write
malicious
5200000
trusted library section
page read and write
malicious
3E7D000
trusted library allocation
page read and write
malicious
2EBA000
trusted library allocation
page read and write
malicious
2EE9000
trusted library allocation
page read and write
malicious
3049000
trusted library allocation
page read and write
malicious
2AD6000
heap
page read and write
malicious
5770000
trusted library section
page read and write
malicious
5160000
trusted library section
page read and write
malicious
897000
heap
page read and write
malicious
7F920000
direct allocation
page read and write
malicious
3251000
trusted library allocation
page read and write
malicious
2F80000
trusted library section
page read and write
malicious
301A000
trusted library allocation
page read and write
malicious
2FC1000
trusted library allocation
page read and write
malicious
2EE1000
trusted library allocation
page read and write
malicious
248B46D6000
heap
page read and write
2A50000
heap
page read and write
2B44000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
6620000
trusted library allocation
page read and write
507E000
stack
page read and write
3300000
heap
page read and write
29F3000
heap
page read and write
591D000
trusted library allocation
page read and write
248B3520000
heap
page read and write
5839000
trusted library allocation
page read and write
7DD20000
direct allocation
page read and write
4E6B000
heap
page read and write
B10000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
5AB5000
trusted library allocation
page read and write
58C1000
trusted library allocation
page read and write
248B31D0000
heap
page read and write
73D0000
trusted library allocation
page read and write
6365000
trusted library allocation
page read and write
D49000
heap
page read and write
6670000
trusted library allocation
page read and write
7ECC0000
direct allocation
page read and write
21AA3000
heap
page read and write
6351000
trusted library allocation
page read and write
2C20000
trusted library allocation
page execute and read and write
5311000
trusted library allocation
page read and write
6A4000
heap
page read and write
5AA0000
direct allocation
page read and write
5B60000
heap
page read and write
2DF0000
trusted library allocation
page read and write
6F00000
heap
page read and write
6CEE000
stack
page read and write
2A0D000
heap
page read and write
6B37000
trusted library allocation
page read and write
5D1E000
stack
page read and write
874000
heap
page read and write
401000
unkown
page execute read
5B20000
direct allocation
page read and write
235C000
direct allocation
page read and write
8F60000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
59F0000
direct allocation
page read and write
5940000
trusted library allocation
page read and write
7DFB0000
direct allocation
page read and write
2E6E000
direct allocation
page read and write
6660000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
297F000
stack
page read and write
7EEC0000
direct allocation
page read and write
7BCF000
heap
page read and write
31E0000
trusted library allocation
page read and write
5A7E000
stack
page read and write
7D001000
direct allocation
page read and write
7D210000
direct allocation
page read and write
5801000
heap
page read and write
58C0000
trusted library allocation
page read and write
2586000
trusted library allocation
page read and write
6BB0000
direct allocation
page read and write
7ED10000
direct allocation
page read and write
44C000
unkown
page execute and read and write
2FE4000
trusted library allocation
page read and write
2140D000
stack
page read and write
6660000
trusted library allocation
page read and write
845000
heap
page read and write
3013000
trusted library allocation
page read and write
5800000
heap
page read and write
7D420000
direct allocation
page read and write
5920000
trusted library allocation
page read and write
2BAB000
trusted library allocation
page execute and read and write
714000
heap
page read and write
7DBC0000
direct allocation
page read and write
6F30000
direct allocation
page read and write
237A000
direct allocation
page read and write
4E54000
heap
page read and write
2BD0000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
248B5359000
heap
page read and write
6450000
trusted library allocation
page read and write
289C000
stack
page read and write
29F3000
heap
page read and write
7ED10000
direct allocation
page read and write
426000
unkown
page execute and write copy
EF7000
stack
page read and write
869000
heap
page read and write
6B30000
trusted library allocation
page read and write
7EFB0000
direct allocation
page read and write
224E2000
direct allocation
page read and write
2B83000
trusted library allocation
page read and write
2132E000
stack
page read and write
303D000
trusted library allocation
page read and write
20B62000
direct allocation
page read and write
5900000
trusted library allocation
page read and write
36C0000
trusted library allocation
page read and write
2130E000
stack
page read and write
688E000
stack
page read and write
20DCF000
stack
page read and write
2A0D000
heap
page read and write
7F070000
direct allocation
page read and write
7CBC0000
direct allocation
page read and write
CF0000
heap
page execute and read and write
5850000
trusted library allocation
page read and write
2EDF000
trusted library allocation
page read and write
7A8000
heap
page read and write
59A0000
direct allocation
page read and write
4CE5000
heap
page read and write
744000
heap
page read and write
4B50000
trusted library allocation
page read and write
4B99000
trusted library allocation
page read and write
7F06F000
direct allocation
page read and write
4FC0000
heap
page read and write
58A0000
trusted library allocation
page read and write
7EDD0000
direct allocation
page read and write
6234000
heap
page read and write
248B1750000
heap
page read and write
558D000
stack
page read and write
73D0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
7EDD0000
direct allocation
page read and write
97B1000
trusted library allocation
page read and write
6679000
trusted library allocation
page read and write
248B18A0000
heap
page read and write
7EF20000
direct allocation
page read and write
422000
unkown
page read and write
89EF000
stack
page read and write
D3B1000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
5943000
trusted library allocation
page read and write
2330000
direct allocation
page read and write
4CE5000
heap
page read and write
7ED80000
direct allocation
page read and write
68B0000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
221E0000
heap
page read and write
5C8D000
stack
page read and write
2609000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
4CFC000
heap
page read and write
9B000
stack
page read and write
714000
heap
page read and write
F1E000
stack
page read and write
7D0000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
41B000
unkown
page readonly
6450000
direct allocation
page read and write
10063000
unkown
page execute and read and write
2A0D000
heap
page read and write
12D0000
heap
page read and write
7E060000
direct allocation
page read and write
7C30000
heap
page read and write
858000
heap
page read and write
6897000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
810000
heap
page read and write
212FE000
stack
page read and write
2216F000
heap
page read and write
901000
heap
page read and write
6BA7000
trusted library allocation
page read and write
744000
heap
page read and write
697E000
stack
page read and write
6450000
remote allocation
page read and write
5C00000
trusted library allocation
page read and write
714000
heap
page read and write
5B50000
trusted library allocation
page read and write
248B3B19000
heap
page read and write
4B90000
trusted library allocation
page read and write
297D000
trusted library allocation
page execute and read and write
2140000
direct allocation
page execute and read and write
73F0000
trusted library allocation
page read and write
6A4000
heap
page read and write
7EDD0000
direct allocation
page read and write
6061000
heap
page read and write
3E61000
trusted library allocation
page read and write
50FF000
stack
page read and write
45E000
unkown
page execute read
2A0D000
heap
page read and write
5860000
trusted library allocation
page read and write
248B41D0000
heap
page read and write
2EB6000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
817000
heap
page read and write
FFDE0000
trusted library allocation
page execute and read and write
6450000
trusted library allocation
page read and write
B30000
heap
page read and write
6B50000
trusted library allocation
page read and write
7C2C000
heap
page read and write
8ABC000
heap
page read and write
554E000
stack
page read and write
6450000
trusted library allocation
page read and write
905000
heap
page read and write
990000
heap
page read and write
2B53000
trusted library allocation
page read and write
714000
heap
page read and write
29F3000
heap
page read and write
5810000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
2A00000
heap
page read and write
4E55000
heap
page read and write
5940000
heap
page read and write
69C0000
direct allocation
page read and write
9CAA6FE000
stack
page read and write
6061000
heap
page read and write
6A5000
heap
page read and write
21779000
heap
page read and write
6A4000
heap
page read and write
68B0000
trusted library allocation
page read and write
4E6B000
heap
page read and write
6670000
trusted library allocation
page read and write
6F80000
heap
page read and write
72B000
stack
page read and write
248B5158000
heap
page read and write
3030000
heap
page execute and read and write
4E1F000
stack
page read and write
313F000
stack
page read and write
235D000
direct allocation
page read and write
58C0000
trusted library allocation
page read and write
2BEE000
stack
page execute and read and write
68B0000
trusted library allocation
page read and write
3620000
heap
page read and write
4DC0000
heap
page read and write
248B39E5000
heap
page read and write
820000
direct allocation
page execute and read and write
5F0000
heap
page read and write
540000
heap
page read and write
2B96000
trusted library allocation
page execute and read and write
29F3000
heap
page read and write
2E3E000
stack
page read and write
2217D000
heap
page read and write
2B30000
trusted library allocation
page read and write
61D3000
heap
page read and write
2B20000
trusted library section
page read and write
2A0D000
heap
page read and write
4E0F000
stack
page read and write
5AF0000
remote allocation
page read and write
131A000
heap
page read and write
2DB0000
direct allocation
page readonly
69C0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
36D8000
heap
page read and write
57EE000
unkown
page read and write
5920000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
21400000
heap
page read and write
2E36000
trusted library allocation
page read and write
6230000
heap
page read and write
34FE000
heap
page read and write
6450000
trusted library allocation
page read and write
7DC30000
direct allocation
page read and write
2864000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
503E000
stack
page read and write
2A11000
heap
page read and write
6A4000
heap
page read and write
299A000
trusted library allocation
page execute and read and write
6630000
trusted library allocation
page read and write
2E2E000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
248B5864000
heap
page read and write
5D4E000
stack
page read and write
8DF000
stack
page read and write
5940000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
6C28000
heap
page read and write
2EC2000
direct allocation
page read and write
5910000
trusted library allocation
page read and write
41B000
unkown
page readonly
2DDE000
direct allocation
page read and write
2DE8000
trusted library allocation
page read and write
5A5A000
trusted library allocation
page read and write
7ED5F000
direct allocation
page read and write
2B73000
trusted library allocation
page execute and read and write
58C0000
trusted library allocation
page read and write
7CFED000
direct allocation
page read and write
25D7000
trusted library allocation
page read and write
7DBF0000
direct allocation
page read and write
7E60000
trusted library allocation
page read and write
4F5E000
stack
page read and write
2C9E000
heap
page read and write
6450000
trusted library allocation
page read and write
401000
unkown
page execute read
8DB1000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
2B50000
trusted library section
page read and write
4CC9000
heap
page read and write
25E0000
heap
page execute and read and write
4BA0000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
3067000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
7E0000
heap
page read and write
6A00000
trusted library allocation
page read and write
6061000
heap
page read and write
59C0000
trusted library allocation
page read and write
8B3000
heap
page read and write
68B0000
trusted library allocation
page read and write
7E990000
direct allocation
page read and write
7D96F000
direct allocation
page read and write
248B39E5000
heap
page read and write
58C0000
trusted library allocation
page read and write
29DF000
stack
page read and write
59B0000
trusted library allocation
page read and write
29E8000
heap
page read and write
58C0000
trusted library allocation
page read and write
50D6000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
2DF0000
heap
page read and write
8EF000
stack
page read and write
890000
heap
page read and write
6650000
heap
page read and write
248B17FB000
heap
page read and write
12C9000
trusted library allocation
page read and write
2DFE000
stack
page read and write
58C0000
trusted library allocation
page read and write
714000
heap
page read and write
7F967000
direct allocation
page read and write
2155E000
stack
page read and write
2CE1000
direct allocation
page execute read
6450000
trusted library allocation
page read and write
21C0000
direct allocation
page read and write
248B5487000
heap
page read and write
744000
heap
page read and write
3674000
trusted library allocation
page read and write
6FCF000
stack
page read and write
5990000
trusted library allocation
page read and write
2AF0000
heap
page read and write
2C0D000
heap
page read and write
68B0000
trusted library allocation
page read and write
6990000
heap
page read and write
2D67000
direct allocation
page execute and read and write
720F000
stack
page read and write
6630000
trusted library allocation
page read and write
4FAE000
stack
page read and write
5B80000
direct allocation
page read and write
10A0000
trusted library allocation
page read and write
714000
heap
page read and write
5AA0000
direct allocation
page read and write
A7E000
stack
page read and write
248B18A5000
heap
page read and write
4E6B000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
2BBB000
trusted library allocation
page execute and read and write
6674000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
4E95000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
2C96000
heap
page read and write
7B80000
heap
page execute and read and write
5D4E000
stack
page read and write
58F0000
remote allocation
page read and write
5920000
heap
page read and write
794B000
stack
page read and write
2AB6000
heap
page read and write
46A000
unkown
page read and write
6920000
trusted library allocation
page execute and read and write
616F000
heap
page read and write
248B5864000
heap
page read and write
248B5822000
heap
page read and write
45F000
unkown
page read and write
5901000
trusted library allocation
page read and write
8AC4000
heap
page read and write
883000
direct allocation
page execute and read and write
858000
heap
page read and write
3527000
heap
page read and write
940000
direct allocation
page read and write
4B6E000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
2214F000
heap
page read and write
25BC000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
6B50000
heap
page read and write
758D000
stack
page read and write
6B20000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
87C000
heap
page read and write
7CAD000
heap
page read and write
D00000
heap
page read and write
248B18AB000
heap
page read and write
61C7000
heap
page read and write
17A000
stack
page read and write
57D1000
heap
page read and write
6890000
trusted library allocation
page read and write
6C0000
direct allocation
page read and write
10D0000
trusted library allocation
page execute and read and write
950000
direct allocation
page read and write
1327000
heap
page read and write
2378000
direct allocation
page read and write
610000
unkown
page execute and read and write
99B000
heap
page read and write
58B0000
trusted library allocation
page read and write
7E90000
trusted library allocation
page read and write
236C000
direct allocation
page read and write
212CE000
stack
page read and write
6410000
trusted library allocation
page read and write
5C00000
remote allocation
page read and write
22173000
heap
page read and write
248B1814000
heap
page read and write
2116F000
stack
page read and write
73D0000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
1287000
trusted library allocation
page read and write
2F7E000
stack
page read and write
57D1000
heap
page read and write
7C04000
heap
page read and write
12E0000
trusted library allocation
page read and write
91A000
heap
page read and write
918000
heap
page read and write
6D2F000
stack
page read and write
73D0000
heap
page read and write
5FAF000
stack
page read and write
58E000
stack
page read and write
6B20000
trusted library allocation
page read and write
744000
heap
page read and write
7D050000
direct allocation
page read and write
8B05000
heap
page read and write
2104F000
stack
page read and write
35F1000
trusted library allocation
page read and write
5C09000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
2B10000
trusted library section
page read and write
426000
unkown
page execute and write copy
7A4E000
stack
page read and write
6061000
heap
page read and write
4BFE000
stack
page read and write
7DF90000
direct allocation
page read and write
31D0000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
20AC6000
direct allocation
page read and write
6450000
trusted library allocation
page read and write
7EDCA000
direct allocation
page read and write
5930000
trusted library allocation
page read and write
7DD20000
direct allocation
page read and write
874000
heap
page read and write
58C0000
trusted library allocation
page read and write
46CE000
stack
page read and write
5F0000
heap
page read and write
401000
unkown
page execute read
892000
heap
page read and write
60CC000
stack
page read and write
2A0D000
heap
page read and write
10000000
unkown
page execute and read and write
99A000
heap
page read and write
31A6000
trusted library allocation
page read and write
2D0E000
direct allocation
page read and write
73E0000
trusted library allocation
page read and write
89E000
heap
page read and write
5A00000
direct allocation
page read and write
248B1807000
heap
page read and write
248B58B4000
heap
page read and write
248B41D1000
heap
page read and write
61BE000
heap
page read and write
7FE0E000
direct allocation
page read and write
53AE000
stack
page read and write
5910000
trusted library allocation
page read and write
5B54000
trusted library allocation
page read and write
4EDE000
stack
page read and write
7DC30000
direct allocation
page read and write
610000
unkown
page execute and read and write
9CAABFB000
stack
page read and write
248B3CBF000
heap
page read and write
581E000
trusted library allocation
page read and write
2B7B000
trusted library allocation
page execute and read and write
216DF000
stack
page read and write
7480000
direct allocation
page read and write
597B000
trusted library allocation
page read and write
7E100000
direct allocation
page read and write
264D000
stack
page read and write
61C1000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
8CD0000
trusted library allocation
page execute and read and write
876000
heap
page read and write
7D380000
direct allocation
page read and write
89AD000
stack
page read and write
6F0000
heap
page read and write
334E000
unkown
page read and write
400000
unkown
page readonly
10000000
unkown
page execute and read and write
2315000
direct allocation
page read and write
68E0000
trusted library allocation
page read and write
2108E000
stack
page read and write
400000
unkown
page readonly
58D0000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
847000
heap
page read and write
7480000
direct allocation
page read and write
6B30000
trusted library allocation
page read and write
248B184B000
heap
page read and write
5B50000
trusted library allocation
page read and write
29F3000
heap
page read and write
8FB000
heap
page read and write
10AB000
trusted library allocation
page execute and read and write
6D36000
heap
page read and write
212EF000
stack
page read and write
68B0000
trusted library allocation
page read and write
7AD000
stack
page read and write
6A4000
heap
page read and write
28D0000
heap
page read and write
4E54000
heap
page read and write
40D000
unkown
page write copy
87A000
heap
page read and write
7EE90000
direct allocation
page read and write
248B3E49000
heap
page read and write
15A1000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
4251000
trusted library allocation
page read and write
2430000
heap
page read and write
2C1A000
heap
page read and write
8E8000
heap
page read and write
855000
heap
page read and write
426000
unkown
page execute and read and write
69CF000
stack
page read and write
9CAA7FF000
stack
page read and write
4E6D000
heap
page read and write
3009000
trusted library allocation
page read and write
249C000
stack
page read and write
4FFE000
stack
page read and write
7E0000
trusted library allocation
page read and write
5F8F000
stack
page read and write
6450000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
6420000
trusted library allocation
page read and write
6C6F000
stack
page read and write
6890000
trusted library allocation
page read and write
29F3000
heap
page read and write
325C000
stack
page read and write
2FAE000
stack
page read and write
58E0000
heap
page read and write
20AD4000
direct allocation
page read and write
714000
heap
page read and write
6B20000
trusted library allocation
page read and write
8DF0000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
AC0000
heap
page read and write
248B5905000
heap
page read and write
69D0000
trusted library allocation
page read and write
65AB000
stack
page read and write
7F020000
direct allocation
page read and write
6A00000
trusted library allocation
page read and write
7C37000
heap
page read and write
59B0000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
660000
heap
page read and write
31B0000
trusted library allocation
page read and write
2252F000
trusted library allocation
page read and write
13D000
stack
page read and write
4EB5000
trusted library allocation
page read and write
650000
heap
page read and write
20B3C000
stack
page read and write
7FC20000
direct allocation
page read and write
217F000
stack
page read and write
5910000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
36D0000
heap
page read and write
5801000
heap
page read and write
517E000
stack
page read and write
6620000
trusted library allocation
page read and write
6A0000
heap
page read and write
8AB8000
heap
page read and write
57D1000
heap
page read and write
4CC0000
heap
page read and write
6B30000
trusted library allocation
page read and write
22148000
heap
page read and write
4C90000
heap
page read and write
8900000
trusted library allocation
page execute and read and write
59C0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
7FC40000
direct allocation
page read and write
58D0000
trusted library allocation
page read and write
20A90000
direct allocation
page read and write
58F0000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
5AF0000
remote allocation
page read and write
7400000
trusted library allocation
page read and write
6B34000
trusted library allocation
page read and write
19D000
stack
page read and write
7F450000
direct allocation
page read and write
5B50000
trusted library allocation
page read and write
7E0000
heap
page read and write
248B57E1000
heap
page read and write
57D1000
heap
page read and write
6BD0000
trusted library allocation
page read and write
2DDF000
stack
page read and write
58C6000
trusted library allocation
page read and write
6EE000
stack
page read and write
248E000
stack
page read and write
298D000
trusted library allocation
page execute and read and write
2B90000
trusted library allocation
page read and write
422000
unkown
page write copy
6450000
trusted library allocation
page read and write
7A0E000
stack
page read and write
663E000
stack
page read and write
63E000
unkown
page read and write
61BC000
heap
page read and write
5176000
heap
page read and write
2B9A000
trusted library allocation
page execute and read and write
4B1E000
stack
page read and write
73B0000
direct allocation
page read and write
20D8F000
stack
page read and write
59A0000
trusted library allocation
page read and write
6BC0000
direct allocation
page read and write
2304000
direct allocation
page read and write
7F900000
direct allocation
page read and write
630E000
stack
page read and write
248B17D9000
heap
page read and write
21AA5000
heap
page read and write
B2B000
stack
page read and write
715000
heap
page read and write
102F000
stack
page read and write
73D0000
trusted library allocation
page read and write
9A000
stack
page read and write
4C3E000
stack
page read and write
4E65000
heap
page read and write
3385000
heap
page read and write
850000
heap
page read and write
46EE000
stack
page read and write
2A0D000
heap
page read and write
7CE000
stack
page read and write
2924000
heap
page read and write
2CC0000
trusted library allocation
page execute and read and write
7EDD0000
direct allocation
page read and write
50EE000
stack
page read and write
10E0000
trusted library allocation
page read and write
550E000
stack
page read and write
6186000
heap
page read and write
2EFD000
trusted library allocation
page read and write
248B5944000
heap
page read and write
6B30000
trusted library allocation
page read and write
416000
unkown
page readonly
7D9C0000
direct allocation
page read and write
2973000
trusted library allocation
page execute and read and write
7A72000
heap
page read and write
674F000
stack
page read and write
248B4470000
heap
page read and write
59D0000
trusted library allocation
page read and write
4F1F000
stack
page read and write
5990000
direct allocation
page read and write
998000
heap
page read and write
3000000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
7480000
direct allocation
page read and write
21590000
remote allocation
page read and write
6C40000
trusted library allocation
page execute and read and write
5107000
heap
page read and write
5A00000
heap
page read and write
7DDDF000
direct allocation
page read and write
7480000
direct allocation
page read and write
6A4000
heap
page read and write
21D0000
direct allocation
page execute and read and write
2DB1000
direct allocation
page execute read
5AE0000
trusted library allocation
page read and write
123E000
stack
page read and write
6A0E000
trusted library allocation
page read and write
7EDD0000
direct allocation
page read and write
58E1000
trusted library allocation
page read and write
4CDA000
heap
page read and write
46C000
unkown
page read and write
58C0000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
69C0000
trusted library allocation
page read and write
9CA9F39000
stack
page read and write
22C7000
heap
page read and write
248B17FE000
heap
page read and write
5900000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
65FE000
stack
page read and write
283C000
stack
page read and write
740000
heap
page read and write
6CF8000
heap
page read and write
28CE000
stack
page read and write
6F80000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
5824000
trusted library allocation
page read and write
75CB000
stack
page read and write
6B50000
direct allocation
page read and write
6209000
heap
page read and write
3985000
trusted library allocation
page read and write
58E000
stack
page read and write
5A20000
trusted library allocation
page read and write
7C6B000
heap
page read and write
7ED4F000
direct allocation
page read and write
6450000
trusted library allocation
page read and write
426000
unkown
page execute and read and write
69F0000
heap
page read and write
69D0000
trusted library allocation
page read and write
69E7000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
714000
heap
page read and write
2328000
direct allocation
page read and write
58C0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
76CD000
stack
page read and write
59C0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
2144F000
trusted library allocation
page read and write
7DBF0000
direct allocation
page read and write
7D5E0000
direct allocation
page read and write
58C9000
trusted library allocation
page read and write
29F3000
heap
page read and write
5A20000
trusted library allocation
page read and write
258E000
stack
page read and write
61B7000
heap
page read and write
3673000
trusted library allocation
page execute and read and write
25F5000
trusted library allocation
page read and write
7DC10000
direct allocation
page read and write
4E66000
trusted library allocation
page read and write
7ED90000
direct allocation
page read and write
2B50000
trusted library allocation
page read and write
7450000
remote allocation
page read and write
A70000
unkown
page execute and read and write
7430000
direct allocation
page read and write
7480000
direct allocation
page read and write
744000
heap
page read and write
29F3000
heap
page read and write
69D0000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
2CD000
stack
page read and write
4E6B000
heap
page read and write
4A50000
trusted library allocation
page read and write
7D0E000
stack
page read and write
2220000
direct allocation
page read and write
5677000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
95F000
stack
page read and write
7480000
direct allocation
page read and write
8F0000
heap
page read and write
6B30000
trusted library allocation
page read and write
248B17A6000
heap
page read and write
2420000
trusted library allocation
page read and write
230C000
direct allocation
page read and write
5830000
trusted library allocation
page read and write
680000
unkown
page readonly
5169000
heap
page read and write
7F95E000
direct allocation
page read and write
62A2000
heap
page read and write
2A0D000
heap
page read and write
400000
unkown
page readonly
7E060000
direct allocation
page read and write
73D0000
trusted library allocation
page read and write
4F1E000
stack
page read and write
2D35000
direct allocation
page read and write
2B70000
trusted library allocation
page read and write
25E7000
trusted library allocation
page read and write
6C0000
direct allocation
page read and write
248B177A000
heap
page read and write
3690000
trusted library allocation
page read and write
6A4000
heap
page read and write
4E70000
trusted library allocation
page read and write
248B17E9000
heap
page read and write
58C0000
trusted library allocation
page read and write
680000
direct allocation
page read and write
5D0D000
stack
page read and write
248B3FE8000
heap
page read and write
61B0000
heap
page read and write
8CE000
heap
page read and write
5910000
trusted library allocation
page read and write
8FC000
heap
page read and write
6BB0000
direct allocation
page read and write
248B3690000
heap
page read and write
2DD0000
heap
page read and write
2F2B000
direct allocation
page execute and read and write
2118F000
stack
page read and write
6A50000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
248B46D3000
heap
page read and write
1063000
trusted library allocation
page execute and read and write
5A00000
direct allocation
page read and write
6B30000
trusted library allocation
page read and write
7EF3F000
direct allocation
page read and write
9B000
stack
page read and write
710000
heap
page read and write
2440000
heap
page read and write
2592000
trusted library allocation
page read and write
257E000
trusted library allocation
page read and write
50BD000
stack
page read and write
7DF50000
direct allocation
page read and write
4C10000
heap
page execute and read and write
416000
unkown
page readonly
6890000
trusted library allocation
page read and write
3CD000
stack
page read and write
68C0000
trusted library allocation
page read and write
220F000
stack
page read and write
6362000
trusted library allocation
page read and write
75E000
unkown
page read and write
57D0000
heap
page read and write
7DF50000
direct allocation
page read and write
4E6B000
heap
page read and write
6A00000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
2B72000
trusted library allocation
page read and write
20CCF000
stack
page read and write
2160000
direct allocation
page read and write
5B39000
trusted library allocation
page read and write
401000
unkown
page execute read
7FDB0000
direct allocation
page read and write
8910000
trusted library allocation
page read and write
69C0000
trusted library allocation
page read and write
248B1780000
heap
page read and write
21440000
trusted library allocation
page read and write
4F0E000
stack
page read and write
7C8B000
heap
page read and write
49DD000
stack
page read and write
86F000
stack
page read and write
248B5864000
heap
page read and write
7F070000
direct allocation
page read and write
7D620000
direct allocation
page read and write
540000
heap
page read and write
288E000
stack
page read and write
248B17E7000
heap
page read and write
2FEE000
trusted library allocation
page read and write
7E730000
direct allocation
page read and write
6B20000
trusted library allocation
page read and write
7480000
direct allocation
page read and write
7DBBC000
direct allocation
page read and write
89E000
stack
page read and write
7FCD0000
direct allocation
page read and write
2A0D000
heap
page read and write
7EEF0000
direct allocation
page read and write
50AC000
stack
page read and write
4D1E000
stack
page read and write
5AD0000
trusted library allocation
page read and write
2950000
trusted library section
page read and write
8ED000
heap
page read and write
5920000
trusted library allocation
page read and write
BA5000
heap
page read and write
50BF000
stack
page read and write
2FF4000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
44C000
unkown
page execute and read and write
2E1E000
trusted library allocation
page read and write
7CBB000
trusted library allocation
page read and write
20BAC000
direct allocation
page read and write
7EDD0000
direct allocation
page read and write
2C60000
heap
page read and write
989000
heap
page read and write
248B177D000
heap
page read and write
2E3C000
stack
page read and write
5920000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
7450000
remote allocation
page read and write
61C9000
trusted library allocation
page read and write
248B180F000
heap
page read and write
2B77000
trusted library allocation
page execute and read and write
2230000
heap
page read and write
248B1720000
heap
page read and write
710000
heap
page read and write
5C10000
direct allocation
page read and write
248B31A0000
heap
page read and write
2BB5000
trusted library allocation
page execute and read and write
6CE0000
heap
page read and write
5970000
trusted library allocation
page read and write
5DA1000
trusted library allocation
page read and write
55F000
unkown
page execute and write copy
64AE000
stack
page read and write
2BE0000
heap
page read and write
4E81000
trusted library allocation
page read and write
7E100000
direct allocation
page read and write
6A4000
heap
page read and write
6C40000
heap
page read and write
87A000
heap
page read and write
12C0000
trusted library allocation
page read and write
57C6000
trusted library allocation
page read and write
9CAA2FE000
stack
page read and write
6B40000
trusted library allocation
page read and write
821000
heap
page read and write
761E000
stack
page read and write
20F4E000
stack
page read and write
73D0000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
990000
heap
page read and write
3F35000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5E5E000
stack
page read and write
8AC000
heap
page read and write
6C3F000
stack
page read and write
2C16000
heap
page read and write
2BA2000
trusted library allocation
page read and write
416000
unkown
page readonly
22D2000
direct allocation
page read and write
6630000
trusted library allocation
page read and write
8C0000
heap
page read and write
2DDE000
stack
page read and write
61A3000
heap
page read and write
972000
heap
page read and write
20BC8000
direct allocation
page read and write
5890000
trusted library allocation
page read and write
7C4C000
heap
page read and write
908000
heap
page read and write
20C3A000
stack
page read and write
5990000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
6061000
heap
page read and write
69C0000
trusted library allocation
page read and write
6631000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
21E0000
heap
page read and write
2940000
trusted library section
page read and write
288D000
heap
page read and write
20B9D000
direct allocation
page read and write
A12000
trusted library allocation
page read and write
248B4D05000
heap
page read and write
248B5944000
heap
page read and write
6B20000
trusted library allocation
page read and write
7F900000
direct allocation
page read and write
75D000
heap
page read and write
4B83000
heap
page read and write
400000
unkown
page readonly
75D0000
trusted library allocation
page read and write
4CFC000
heap
page read and write
6A4000
heap
page read and write
2920000
heap
page read and write
305D000
trusted library allocation
page read and write
2627000
trusted library allocation
page read and write
21A3000
direct allocation
page execute and read and write
5D5000
heap
page read and write
25BF000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
B3E000
stack
page read and write
790000
heap
page read and write
68B0000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
B7D000
trusted library allocation
page execute and read and write
20CCE000
stack
page execute and read and write
DD2000
heap
page read and write
1584000
trusted library allocation
page read and write
2E00000
heap
page execute and read and write
7D500000
direct allocation
page read and write
6D30000
heap
page read and write
29D7000
trusted library allocation
page read and write
57D1000
heap
page read and write
920E000
stack
page read and write
3295000
trusted library allocation
page read and write
211BE000
stack
page read and write
5B1C000
stack
page read and write
6D0000
heap
page read and write
2DF0000
trusted library allocation
page read and write
7ECC0000
direct allocation
page read and write
6061000
heap
page read and write
5B50000
trusted library allocation
page read and write
20ADC000
direct allocation
page read and write
7490000
direct allocation
page read and write
50E0000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
5A00000
direct allocation
page read and write
5AC0000
trusted library allocation
page read and write
6FE000
heap
page read and write
2220000
heap
page read and write
248B1850000
heap
page read and write
6B70000
trusted library allocation
page read and write
3E51000
trusted library allocation
page read and write
248B5353000
heap
page read and write
8AC8000
heap
page read and write
79B1000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
4E30000
heap
page read and write
5D0E000
stack
page read and write
58C0000
trusted library allocation
page read and write
2EA9000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page execute and read and write
4A20000
trusted library allocation
page read and write
2443000
heap
page read and write
4EF0000
heap
page read and write
570000
heap
page read and write
5850000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
2A0D000
heap
page read and write
55F000
unkown
page execute and read and write
6630000
trusted library allocation
page read and write
248B36BB000
heap
page read and write
7EE20000
direct allocation
page read and write
7D70F000
direct allocation
page read and write
2DAE000
stack
page read and write
5AA0000
trusted library allocation
page read and write
2332000
direct allocation
page read and write
44C000
unkown
page execute and read and write
7F148000
trusted library allocation
page execute and read and write
248B57C0000
heap
page read and write
5990000
trusted library allocation
page read and write
7A0000
heap
page read and write
29F3000
heap
page read and write
6920000
trusted library allocation
page read and write
6C20000
heap
page read and write
90A000
heap
page read and write
B04000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
248B180D000
heap
page read and write
68B0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
2BEA000
stack
page read and write
6BD0000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
678E000
stack
page read and write
714000
heap
page read and write
7DAE0000
direct allocation
page read and write
4BB0000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
7D47F000
direct allocation
page read and write
6670000
trusted library allocation
page read and write
2C1E000
stack
page read and write
7E50000
trusted library allocation
page read and write
248B17D0000
heap
page read and write
22520000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
570000
heap
page read and write
744000
heap
page read and write
2FF0000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
625C000
stack
page read and write
687E000
stack
page read and write
788E000
stack
page read and write
7D2A0000
direct allocation
page read and write
8F50000
trusted library allocation
page read and write
6430000
direct allocation
page read and write
81F000
stack
page read and write
7FD90000
direct allocation
page read and write
5B50000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
5DA9000
trusted library allocation
page read and write
2C90000
heap
page read and write
5120000
heap
page read and write
5985000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
6683000
direct allocation
page read and write
5AF0000
trusted library allocation
page read and write
2B40000
trusted library section
page read and write
28EE000
unkown
page read and write
4CF6000
heap
page read and write
7D700000
direct allocation
page read and write
6BD0000
heap
page read and write
2A0D000
heap
page read and write
69E0000
trusted library allocation
page execute and read and write
248B1848000
heap
page read and write
5900000
trusted library allocation
page read and write
D4E000
heap
page read and write
5150000
heap
page execute and read and write
7F6000
trusted library allocation
page execute and read and write
91D000
heap
page read and write
6A4000
heap
page read and write
7EE20000
direct allocation
page read and write
3020000
trusted library allocation
page read and write
2A0F000
heap
page read and write
7FA30000
direct allocation
page read and write
1050000
heap
page read and write
6BB0000
direct allocation
page read and write
5920000
trusted library allocation
page read and write
274C000
stack
page read and write
5B50000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
5A00000
heap
page read and write
7EE000
stack
page read and write
4B71000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
591A000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
714000
heap
page read and write
6F30000
direct allocation
page read and write
2860000
trusted library allocation
page read and write
220EA000
heap
page read and write
7D960000
direct allocation
page read and write
288E000
stack
page read and write
B14000
trusted library allocation
page read and write
5A20000
trusted library allocation
page execute and read and write
5DA9000
trusted library allocation
page read and write
63B000
stack
page read and write
5900000
trusted library allocation
page read and write
220EE000
heap
page read and write
52D0000
direct allocation
page read and write
6B40000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
248B17FE000
heap
page read and write
8B75000
heap
page read and write
29DE000
stack
page read and write
4E4A000
heap
page read and write
5801000
heap
page read and write
73C0000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
7BDB000
heap
page read and write
A1B000
trusted library allocation
page execute and read and write
690000
heap
page read and write
6B20000
trusted library allocation
page read and write
21430000
heap
page read and write
41B000
unkown
page readonly
248B18A8000
heap
page read and write
4FA000
heap
page read and write
22140000
heap
page read and write
4E7E000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
2A0D000
heap
page read and write
68A0000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
20BB3000
direct allocation
page read and write
750000
direct allocation
page read and write
59E0000
trusted library allocation
page read and write
22E0000
direct allocation
page read and write
5960000
trusted library allocation
page read and write
7E040000
direct allocation
page read and write
2C50000
trusted library allocation
page read and write
59A0000
direct allocation
page read and write
7B5000
heap
page read and write
7470000
direct allocation
page read and write
5AC0000
trusted library allocation
page read and write
47EF000
stack
page read and write
7FE0D000
direct allocation
page read and write
910000
heap
page read and write
7DBF0000
direct allocation
page read and write
7DC30000
direct allocation
page read and write
59A0000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
714000
heap
page read and write
630000
heap
page read and write
6131000
heap
page read and write
21590000
remote allocation
page read and write
7480000
direct allocation
page read and write
4CE5000
heap
page read and write
20E0E000
stack
page read and write
B97000
trusted library allocation
page execute and read and write
5A0000
heap
page read and write
780000
heap
page read and write
6B0000
direct allocation
page execute and read and write
6600000
trusted library allocation
page read and write
2381000
direct allocation
page read and write
158B000
trusted library allocation
page read and write
6455000
trusted library allocation
page read and write
2EC7000
direct allocation
page execute and read and write
20B8F000
direct allocation
page read and write
848000
heap
page read and write
7EB0000
trusted library allocation
page read and write
29B9000
trusted library allocation
page read and write
20DCE000
stack
page read and write
248B1788000
heap
page read and write
2EDD000
trusted library allocation
page read and write
4CC0000
heap
page read and write
248B3B8B000
heap
page read and write
73D0000
trusted library allocation
page read and write
59B0000
trusted library allocation
page execute and read and write
4B60000
trusted library allocation
page read and write
248B17EC000
heap
page read and write
5850000
trusted library allocation
page read and write
9CAA5FF000
stack
page read and write
690000
heap
page read and write
2C28000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4C3A000
stack
page read and write
6450000
trusted library allocation
page read and write
7EFDF000
direct allocation
page read and write
7EFB0000
direct allocation
page read and write
6A4000
heap
page read and write
20C2D000
direct allocation
page read and write
7480000
direct allocation
page read and write
2E37000
direct allocation
page execute and read and write
7DDAF000
direct allocation
page read and write
5910000
trusted library allocation
page read and write
61AF000
stack
page read and write
5860000
trusted library allocation
page read and write
7DFB0000
direct allocation
page read and write
58C0000
trusted library allocation
page read and write
248B1848000
heap
page read and write
7ED7F000
direct allocation
page read and write
D2E000
heap
page read and write
798E000
stack
page read and write
6BB0000
direct allocation
page read and write
7C0000
trusted library allocation
page read and write
70CE000
stack
page read and write
264E000
stack
page read and write
720000
heap
page read and write
21DB7000
heap
page read and write
7470000
direct allocation
page read and write
2BD0000
heap
page read and write
400000
unkown
page readonly
584E000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
6070000
heap
page read and write
99F000
stack
page read and write
29F3000
heap
page read and write
278E000
stack
page read and write
57D1000
heap
page read and write
4FD0000
trusted library allocation
page execute and read and write
4BA5000
trusted library allocation
page read and write
4FBC000
stack
page read and write
5B00000
direct allocation
page read and write
744000
heap
page read and write
FFDE0000
trusted library allocation
page execute and read and write
7ED7F000
direct allocation
page read and write
7ED10000
direct allocation
page read and write
518F000
heap
page read and write
85C000
heap
page read and write
6670000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6D34000
heap
page read and write
5A00000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
76D0000
heap
page execute and read and write
309E000
trusted library allocation
page read and write
248B17DE000
heap
page read and write
54CF000
stack
page read and write
7400000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
359F000
unkown
page read and write
6061000
heap
page read and write
6630000
trusted library allocation
page read and write
4EC8000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
7DDEF000
direct allocation
page read and write
5A00000
trusted library allocation
page read and write
896000
heap
page read and write
61BC000
heap
page read and write
2C1C000
heap
page read and write
7FB3F000
direct allocation
page read and write
59A0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
20A8A000
direct allocation
page read and write
58C0000
trusted library allocation
page read and write
AF7000
stack
page read and write
8AB0000
heap
page read and write
5980000
trusted library allocation
page read and write
6A4000
heap
page read and write
6A4E000
stack
page read and write
24A3000
heap
page read and write
2237000
heap
page read and write
22120000
heap
page read and write
A70000
unkown
page execute and read and write
2BA0000
trusted library allocation
page read and write
50F9000
stack
page read and write
20C43000
direct allocation
page read and write
59FB000
trusted library allocation
page read and write
2E5B000
direct allocation
page execute and read and write
6455000
trusted library allocation
page read and write
2A0D000
heap
page read and write
68F0000
trusted library allocation
page read and write
2EA7000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
20C4A000
direct allocation
page read and write
7E100000
direct allocation
page read and write
6670000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
400000
unkown
page readonly
5909000
trusted library allocation
page read and write
3046000
trusted library allocation
page read and write
29F3000
heap
page read and write
248B5944000
heap
page read and write
7ECA0000
direct allocation
page read and write
58E0000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
21410000
trusted library allocation
page read and write
744000
heap
page read and write
3006000
trusted library allocation
page read and write
B74000
trusted library allocation
page read and write
248B17FE000
heap
page read and write
76E0000
heap
page read and write
6A4000
heap
page read and write
5A10000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
1F0000
heap
page read and write
22177000
heap
page read and write
62EE000
stack
page read and write
5B50000
direct allocation
page read and write
2572000
trusted library allocation
page read and write
248B1827000
heap
page read and write
5801000
heap
page read and write
4FEE000
stack
page read and write
55F000
unkown
page execute and write copy
248B5902000
heap
page read and write
BB0000
trusted library allocation
page execute and read and write
8DE0000
trusted library allocation
page read and write
3350000
heap
page read and write
867000
heap
page read and write
5D50000
trusted library allocation
page read and write
401000
unkown
page execute read
7410000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
5116000
heap
page read and write
8B46000
heap
page read and write
6B30000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
576E000
stack
page read and write
46E000
unkown
page write copy
7430000
direct allocation
page read and write
A5F000
stack
page read and write
3054000
trusted library allocation
page read and write
1F0000
heap
page read and write
861000
heap
page read and write
60D0000
heap
page read and write
4B56000
trusted library allocation
page read and write
BFB1000
trusted library allocation
page read and write
2B74000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
8B2000
heap
page read and write
68B0000
trusted library allocation
page read and write
665000
heap
page read and write
7530000
heap
page read and write
6FF000
stack
page read and write
714000
heap
page read and write
B73000
trusted library allocation
page execute and read and write
76D5000
heap
page execute and read and write
6A4000
heap
page read and write
3981000
trusted library allocation
page read and write
4F4E000
stack
page read and write
248B17EB000
heap
page read and write
78CD000
stack
page read and write
207E000
stack
page read and write
248B58A6000
heap
page read and write
2B75000
trusted library allocation
page execute and read and write
93C000
heap
page read and write
5950000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
2668000
trusted library allocation
page read and write
629B000
heap
page read and write
5802000
heap
page read and write
5DA0000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
5D50000
direct allocation
page read and write
914E000
stack
page read and write
5930000
trusted library allocation
page read and write
8FDE000
stack
page read and write
744000
heap
page read and write
5AA0000
direct allocation
page read and write
6450000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
730000
direct allocation
page execute and read and write
25B0000
trusted library allocation
page read and write
127D000
stack
page read and write
2A0D000
heap
page read and write
25C0000
heap
page execute and read and write
248B48C0000
trusted library allocation
page read and write
A70000
unkown
page execute and read and write
5D50000
heap
page read and write
73F0000
trusted library allocation
page read and write
2E31000
trusted library allocation
page read and write
2B92000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
1314000
heap
page read and write
6D4D000
heap
page read and write
25A0000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
868000
heap
page read and write
4E65000
heap
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
2A0D000
heap
page read and write
7ECC0000
direct allocation
page read and write
7FDCF000
direct allocation
page read and write
6D34000
heap
page read and write
5B50000
trusted library allocation
page read and write
29F3000
heap
page read and write
68A0000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
69C0000
trusted library allocation
page read and write
20EDF000
stack
page read and write
5A80000
trusted library allocation
page read and write
8F90000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
7ED4F000
direct allocation
page read and write
5AE0000
trusted library allocation
page read and write
7D0A0000
direct allocation
page read and write
6B30000
trusted library allocation
page read and write
8A5000
heap
page read and write
5970000
trusted library allocation
page read and write
7EDFF000
direct allocation
page read and write
83A000
heap
page read and write
248B58A7000
heap
page read and write
4FE0000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
2410000
heap
page read and write
3243000
direct allocation
page read and write
2A0D000
heap
page read and write
369A000
trusted library allocation
page execute and read and write
7F450000
direct allocation
page read and write
BAE000
stack
page read and write
248B177B000
heap
page read and write
6890000
trusted library allocation
page read and write
58C1000
trusted library allocation
page read and write
61A3000
heap
page read and write
5CCE000
stack
page read and write
571000
unkown
page execute and read and write
6B30000
trusted library allocation
page read and write
3680000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
6A0E000
stack
page read and write
20F0F000
stack
page read and write
58C0000
trusted library allocation
page read and write
760000
heap
page read and write
22048000
heap
page read and write
8960000
heap
page read and write
5950000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7F06F000
direct allocation
page read and write
401000
unkown
page execute read
22776000
heap
page read and write
46C000
unkown
page read and write
67F000
unkown
page read and write
6B90000
trusted library allocation
page read and write
744000
heap
page read and write
818000
heap
page read and write
7FB60000
direct allocation
page read and write
248B1640000
heap
page read and write
BC0000
heap
page read and write
2B7F000
heap
page read and write
7EF70000
direct allocation
page read and write
714000
heap
page read and write
6B50000
direct allocation
page read and write
83D000
heap
page read and write
2223000
heap
page read and write
5830000
trusted library allocation
page read and write
1064000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
22FD000
direct allocation
page read and write
68B0000
trusted library allocation
page read and write
10063000
unkown
page execute and read and write
6A4000
heap
page read and write
220E0000
heap
page read and write
2B7D000
trusted library allocation
page execute and read and write
1F0000
heap
page read and write
7480000
direct allocation
page read and write
248B17FF000
heap
page read and write
55F000
unkown
page execute and write copy
5AB0000
trusted library allocation
page read and write
6A07000
trusted library allocation
page read and write
57AE000
stack
page read and write
2217C000
heap
page read and write
5930000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
7DD16000
direct allocation
page read and write
57D1000
heap
page read and write
20C26000
direct allocation
page read and write
5E4F000
stack
page read and write
7E040000
direct allocation
page read and write
1590000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
7E040000
direct allocation
page read and write
279E000
stack
page read and write
241E000
stack
page read and write
ADF000
stack
page read and write
744000
heap
page read and write
258D000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
6BE0000
heap
page read and write
7EF6F000
direct allocation
page read and write
4A10000
trusted library allocation
page read and write
2321000
direct allocation
page read and write
2410000
trusted library allocation
page execute and read and write
6670000
trusted library allocation
page read and write
7FAAF000
direct allocation
page read and write
46A000
unkown
page read and write
248B4E39000
heap
page read and write
35F5000
trusted library allocation
page read and write
4EA9000
trusted library allocation
page read and write
28E0000
heap
page read and write
73E0000
trusted library allocation
page read and write
746000
heap
page read and write
5140000
trusted library allocation
page read and write
23BC000
stack
page read and write
6890000
trusted library allocation
page read and write
6D26000
heap
page read and write
6B40000
trusted library allocation
page read and write
2996000
trusted library allocation
page execute and read and write
7ED10000
direct allocation
page read and write
4E4C000
heap
page read and write
5B9C000
trusted library allocation
page read and write
7ED10000
direct allocation
page read and write
621D000
heap
page read and write
5940000
trusted library allocation
page read and write
20AAA000
direct allocation
page read and write
2BC0000
trusted library allocation
page read and write
2E51000
trusted library allocation
page read and write
137D000
heap
page read and write
6450000
trusted library allocation
page read and write
3FC1000
trusted library allocation
page read and write
248B17FC000
heap
page read and write
58F0000
trusted library allocation
page read and write
B90000
heap
page read and write
22400000
heap
page read and write
36A0000
trusted library allocation
page read and write
248B5823000
heap
page read and write
61BC000
heap
page read and write
5AC0000
trusted library allocation
page read and write
4B54000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
65B1000
trusted library allocation
page read and write
248B58A9000
heap
page read and write
6B50000
direct allocation
page read and write
5980000
trusted library allocation
page read and write
556E000
stack
page read and write
2F40000
trusted library allocation
page read and write
6061000
heap
page read and write
422000
unkown
page write copy
5DA0000
trusted library allocation
page read and write
2A20000
heap
page read and write
6890000
trusted library allocation
page read and write
2983000
trusted library allocation
page read and write
5EA000
heap
page read and write
4CF6000
heap
page read and write
2BDE000
stack
page read and write
248B58C1000
heap
page read and write
744000
heap
page read and write
7BB0000
heap
page read and write
25D1000
trusted library allocation
page read and write
6177000
heap
page read and write
59E0000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
2F3E000
stack
page read and write
248B17A4000
heap
page read and write
5D0000
heap
page read and write
4CFC000
heap
page read and write
6400000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
29B7000
trusted library allocation
page read and write
2363000
direct allocation
page read and write
5B70000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
2180000
heap
page read and write
5DA0000
trusted library allocation
page read and write
7E9000
stack
page read and write
618B000
heap
page read and write
2A0D000
heap
page read and write
303F000
trusted library allocation
page read and write
7EEB0000
direct allocation
page read and write
220E1000
heap
page read and write
2A0D000
heap
page read and write
610000
unkown
page execute and read and write
256B000
trusted library allocation
page read and write
46A000
unkown
page read and write
2E3D000
trusted library allocation
page read and write
5116000
trusted library allocation
page read and write
5811000
heap
page read and write
4F9F000
stack
page read and write
875000
heap
page read and write
7FA000
trusted library allocation
page execute and read and write
50F0000
trusted library allocation
page read and write
7FDF1000
direct allocation
page read and write
248B18AA000
heap
page read and write
29F3000
heap
page read and write
737000
stack
page read and write
5AE0000
trusted library allocation
page read and write
2A0D000
heap
page read and write
7DE0F000
direct allocation
page read and write
745000
heap
page read and write
6450000
trusted library allocation
page read and write
5BFE000
stack
page read and write
21590000
remote allocation
page read and write
20C3C000
direct allocation
page read and write
2364000
direct allocation
page read and write
6FA000
heap
page read and write
5D50000
trusted library allocation
page read and write
99D000
heap
page read and write
571000
unkown
page execute and read and write
7DD20000
direct allocation
page read and write
69B0000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
7DDAF000
direct allocation
page read and write
6450000
trusted library allocation
page read and write
696E000
stack
page read and write
D20000
heap
page read and write
4E4C000
heap
page read and write
5840000
trusted library allocation
page read and write
7EF80000
direct allocation
page read and write
7DCE6000
direct allocation
page read and write
2490000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
7D1FB000
direct allocation
page read and write
7F00000
trusted library allocation
page read and write
810000
unkown
page execute and read and write
9B000
stack
page read and write
6894000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
9CAA8FE000
stack
page read and write
6C20000
heap
page read and write
7DD000
trusted library allocation
page execute and read and write
618B000
heap
page read and write
7EE50000
direct allocation
page read and write
20BEA000
direct allocation
page read and write
5A00000
trusted library allocation
page read and write
B5B1000
trusted library allocation
page read and write
2B6A000
trusted library allocation
page execute and read and write
7C7B000
heap
page read and write
278E000
stack
page read and write
35D9000
trusted library allocation
page read and write
61BC000
heap
page read and write
248B44D0000
heap
page read and write
6450000
trusted library allocation
page read and write
8E0000
heap
page read and write
34F4000
heap
page read and write
8AF2000
heap
page read and write
5AD0000
trusted library allocation
page read and write
248B17D0000
heap
page read and write
73C0000
trusted library allocation
page read and write
6060000
heap
page read and write
5AB0000
direct allocation
page read and write
5880000
trusted library allocation
page read and write
90E000
heap
page read and write
5109000
heap
page read and write
1030000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
5900000
direct allocation
page read and write
1040000
trusted library allocation
page read and write
20AE4000
direct allocation
page read and write
2380000
direct allocation
page read and write
810000
unkown
page execute and read and write
85F000
heap
page read and write
68C3000
direct allocation
page read and write
20DDE000
stack
page read and write
400000
unkown
page execute and read and write
20C1F000
direct allocation
page read and write
8FB000
heap
page read and write
7ED5F000
direct allocation
page read and write
6B30000
trusted library allocation
page read and write
1290000
heap
page execute and read and write
69C0000
trusted library allocation
page read and write
6EC0000
heap
page read and write
7430000
direct allocation
page read and write
2100F000
stack
page read and write
5970000
trusted library allocation
page read and write
257A000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
F30000
unkown
page execute and read and write
248B5904000
heap
page read and write
6B70000
trusted library allocation
page read and write
8DDC000
stack
page read and write
6B40000
trusted library allocation
page read and write
2580000
direct allocation
page read and write
859000
heap
page read and write
7400000
trusted library allocation
page read and write
20C3F000
stack
page read and write
7DDEF000
direct allocation
page read and write
7DDAF000
direct allocation
page read and write
7FDA0000
direct allocation
page read and write
ABD000
stack
page read and write
80F000
heap
page read and write
5D50000
trusted library allocation
page read and write
20C8E000
stack
page read and write
6A30000
trusted library allocation
page read and write
7E5000
heap
page read and write
5A20000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
58AE000
stack
page read and write
248B17E2000
heap
page read and write
7E060000
direct allocation
page read and write
229C3000
heap
page read and write
9A6000
heap
page read and write
68A0000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
848000
heap
page read and write
2870000
heap
page read and write
700000
heap
page read and write
5AC0000
trusted library allocation
page read and write
5AE0000
direct allocation
page read and write
7FDF3000
direct allocation
page read and write
57C4000
trusted library allocation
page read and write
45F000
unkown
page read and write
58C0000
direct allocation
page read and write
8F63000
trusted library allocation
page read and write
49BE000
stack
page read and write
8D5E000
stack
page read and write
900000
heap
page read and write
2992000
trusted library allocation
page read and write
593C000
stack
page read and write
5940000
trusted library allocation
page read and write
2DB0000
heap
page execute and read and write
5DA0000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page execute and read and write
6B80000
trusted library allocation
page read and write
4E90000
heap
page read and write
10C0000
trusted library allocation
page read and write
130F000
heap
page read and write
7F900000
direct allocation
page read and write
6B20000
trusted library allocation
page read and write
744000
heap
page read and write
7470000
direct allocation
page read and write
2BD0000
heap
page read and write
248B43D3000
heap
page read and write
2A0D000
heap
page read and write
41B000
unkown
page readonly
5AE0000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
422000
unkown
page read and write
4CF6000
heap
page read and write
7ED000
heap
page read and write
473000
unkown
page readonly
248B184A000
heap
page read and write
6F70000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
3689000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
248B1818000
heap
page read and write
5A00000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
600000
heap
page read and write
6890000
trusted library allocation
page read and write
248B1781000
heap
page read and write
5930000
trusted library allocation
page read and write
65E000
stack
page read and write
9D0000
direct allocation
page read and write
6670000
trusted library allocation
page read and write
8D3000
heap
page read and write
6B40000
trusted library allocation
page read and write
7F000000
direct allocation
page read and write
6B10000
trusted library allocation
page execute and read and write
58F0000
remote allocation
page read and write
5B20000
heap
page read and write
BE0000
heap
page read and write
5990000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
12E5000
trusted library allocation
page read and write
91CE000
stack
page read and write
20ECF000
stack
page read and write
6161000
heap
page read and write
870000
heap
page read and write
7CB0000
trusted library allocation
page read and write
570000
heap
page read and write
995000
heap
page read and write
5800000
trusted library allocation
page read and write
248B3D15000
heap
page read and write
58C0000
trusted library allocation
page read and write
A17000
trusted library allocation
page execute and read and write
9B000
stack
page read and write
8AD000
heap
page read and write
881000
heap
page read and write
4F0000
heap
page read and write
744000
heap
page read and write
401000
unkown
page execute read
231A000
direct allocation
page read and write
73D0000
trusted library allocation
page read and write
40D000
unkown
page write copy
5A10000
trusted library allocation
page read and write
25CE000
stack
page read and write
4DDE000
stack
page read and write
2B43000
trusted library allocation
page execute and read and write
2E95000
direct allocation
page read and write
DDE000
heap
page read and write
6B20000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
1D5000
heap
page read and write
2119F000
stack
page read and write
6450000
trusted library allocation
page read and write
933000
heap
page read and write
C87000
trusted library allocation
page execute and read and write
68B7000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
D28000
heap
page read and write
4CDA000
heap
page read and write
6A4000
heap
page read and write
3297000
stack
page read and write
6450000
trusted library allocation
page read and write
3670000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
90B000
heap
page read and write
A1B1000
trusted library allocation
page read and write
60AD000
stack
page read and write
6FB1000
trusted library allocation
page read and write
4325000
trusted library allocation
page read and write
1E0000
heap
page read and write
5B50000
trusted library allocation
page read and write
7C5E000
heap
page read and write
5DA0000
trusted library allocation
page read and write
3460000
heap
page read and write
4BCE000
stack
page read and write
7DD80000
direct allocation
page read and write
840000
heap
page read and write
2BEF000
stack
page read and write
7480000
direct allocation
page read and write
57D1000
heap
page read and write
4AAE000
stack
page read and write
58C0000
trusted library allocation
page read and write
15B5000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
7CE10000
direct allocation
page read and write
58C9000
trusted library allocation
page read and write
20BC1000
direct allocation
page read and write
5DA0000
heap
page read and write
7DD000
heap
page read and write
5AE0000
trusted library allocation
page read and write
744000
heap
page read and write
7D760000
direct allocation
page read and write
73C0000
trusted library allocation
page read and write
4E80000
heap
page readonly
5A70000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
2981000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
4B80000
heap
page read and write
7DD40000
direct allocation
page read and write
6BA0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
744000
heap
page read and write
248B470F000
heap
page read and write
29F4000
heap
page read and write
6B50000
trusted library allocation
page execute and read and write
2B62000
trusted library allocation
page read and write
C20000
heap
page read and write
744000
heap
page read and write
5AC0000
heap
page read and write
524E000
stack
page read and write
7DF40000
direct allocation
page read and write
6450000
trusted library allocation
page read and write
2141F000
trusted library allocation
page read and write
361F000
stack
page read and write
920000
direct allocation
page execute and read and write
227E000
stack
page read and write
19D000
stack
page read and write
248B3EB4000
heap
page read and write
20AEA000
direct allocation
page read and write
198000
stack
page read and write
7BCA000
heap
page read and write
7DD80000
direct allocation
page read and write
2371000
direct allocation
page read and write
426000
unkown
page execute and read and write
7EE29000
direct allocation
page read and write
5A50000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
6620000
trusted library allocation
page read and write
7BE000
heap
page read and write
7ED4F000
direct allocation
page read and write
1586000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
41B000
unkown
page readonly
694000
unkown
page readonly
248B45DB000
heap
page read and write
6188000
heap
page read and write
6CF0000
heap
page read and write
58C0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
639E000
stack
page read and write
917000
heap
page read and write
58C0000
trusted library allocation
page read and write
6460000
trusted library allocation
page execute and read and write
7D880000
direct allocation
page read and write
566E000
stack
page read and write
4095000
trusted library allocation
page read and write
248B58A8000
heap
page read and write
15E0000
heap
page read and write
59F1000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
B47000
trusted library allocation
page execute and read and write
215DE000
stack
page read and write
83B1000
trusted library allocation
page read and write
5A8000
heap
page read and write
8D1E000
stack
page read and write
4E6D000
heap
page read and write
4E4A000
heap
page read and write
2974000
trusted library allocation
page read and write
2B66000
trusted library allocation
page execute and read and write
422000
unkown
page read and write
69B2000
heap
page read and write
8E8000
heap
page read and write
7ECD0000
direct allocation
page read and write
21A90000
heap
page read and write
68BE000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
2101F000
stack
page read and write
135E000
heap
page read and write
59A0000
trusted library allocation
page execute and read and write
3097000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
22529000
heap
page read and write
198000
stack
page read and write
5040000
heap
page read and write
5A00000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
20ACD000
direct allocation
page read and write
248B177D000
heap
page read and write
CD0000
unkown
page execute and read and write
5820000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
5A00000
direct allocation
page read and write
6D1D000
heap
page read and write
6630000
trusted library allocation
page read and write
4CFC000
heap
page read and write
2CD0000
heap
page read and write
2E1B000
trusted library allocation
page read and write
2C1C000
stack
page read and write
32A6000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
918E000
stack
page read and write
991000
heap
page read and write
744000
heap
page read and write
69B0000
trusted library allocation
page read and write
744000
heap
page read and write
3091000
trusted library allocation
page read and write
863000
heap
page read and write
5D50000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
1080000
heap
page read and write
20F0E000
stack
page read and write
3009000
trusted library allocation
page read and write
2C1E000
stack
page read and write
7F2C0000
direct allocation
page read and write
2D6F000
stack
page read and write
6B30000
trusted library allocation
page read and write
2BA5000
trusted library allocation
page execute and read and write
5801000
heap
page read and write
5ABE000
stack
page read and write
2417000
heap
page read and write
3198000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
6635000
trusted library allocation
page read and write
60FC000
heap
page read and write
28DE000
stack
page read and write
7FDDE000
direct allocation
page read and write
5980000
trusted library allocation
page read and write
51E8000
heap
page read and write
2FB0000
heap
page execute and read and write
52A0000
direct allocation
page read and write
40D000
unkown
page write copy
24A0000
heap
page read and write
248B58B4000
heap
page read and write
8A50000
trusted library allocation
page read and write
5A8E000
stack
page read and write
7EF76000
direct allocation
page read and write
6BE000
stack
page read and write
6A4000
heap
page read and write
6CF0000
heap
page read and write
10F5000
heap
page read and write
7F130000
trusted library allocation
page execute and read and write
6BFE000
stack
page read and write
55F000
unkown
page execute and read and write
6670000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
6920000
heap
page read and write
4C80000
heap
page read and write
5B50000
trusted library allocation
page read and write
2B30000
heap
page read and write
6B80000
trusted library allocation
page read and write
2867000
trusted library allocation
page read and write
248B17FA000
heap
page read and write
1D0000
heap
page read and write
3380000
heap
page read and write
713000
direct allocation
page execute and read and write
73D0000
trusted library allocation
page read and write
7E40000
trusted library allocation
page execute and read and write
7ED80000
direct allocation
page read and write
5910000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
2A0D000
heap
page read and write
248B17A6000
heap
page read and write
20AE3000
direct allocation
page read and write
904000
heap
page read and write
8FE000
heap
page read and write
7430000
heap
page read and write
5A1C000
stack
page read and write
6A4000
heap
page read and write
2A0D000
heap
page read and write
3F71000
trusted library allocation
page read and write
2D2A000
heap
page read and write
5970000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
51C1000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
2A11000
heap
page read and write
8A2E000
stack
page read and write
15C0000
trusted library allocation
page read and write
5836000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
234D000
direct allocation
page read and write
2886000
heap
page read and write
513E000
stack
page read and write
3E55000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
248B37EF000
heap
page read and write
7400000
trusted library allocation
page read and write
780000
heap
page read and write
55F000
unkown
page execute and read and write
4E68000
trusted library allocation
page read and write
7E90F000
direct allocation
page read and write
10A7000
trusted library allocation
page execute and read and write
4A1C000
stack
page read and write
7480000
direct allocation
page read and write
20B96000
direct allocation
page read and write
2373000
direct allocation
page read and write
101E000
stack
page read and write
708F000
stack
page read and write
7EA0000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6372000
trusted library allocation
page read and write
5A63000
trusted library allocation
page read and write
6680000
heap
page read and write
400000
unkown
page readonly
1070000
trusted library allocation
page read and write
248B17B4000
heap
page read and write
12F8000
heap
page read and write
7CE90000
direct allocation
page read and write
6B30000
trusted library allocation
page read and write
2E50000
heap
page read and write
22691000
heap
page read and write
7D3000
heap
page read and write
6D2D000
heap
page read and write
7F2C0000
direct allocation
page read and write
673E000
stack
page read and write
58C0000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
7D6DF000
direct allocation
page read and write
5B7E000
stack
page read and write
2DC0000
trusted library allocation
page read and write
4A15000
trusted library allocation
page read and write
2D9F000
stack
page read and write
68B0000
trusted library allocation
page read and write
2B4D000
trusted library allocation
page execute and read and write
873000
heap
page read and write
7DFB0000
direct allocation
page read and write
7D4DB000
direct allocation
page read and write
2C70000
trusted library allocation
page read and write
6B50000
direct allocation
page read and write
ABB1000
trusted library allocation
page read and write
8FE000
heap
page read and write
810000
unkown
page execute and read and write
4E6D000
heap
page read and write
7FC000
heap
page read and write
32A2000
trusted library allocation
page read and write
6420000
heap
page read and write
73E0000
trusted library allocation
page read and write
10F0000
heap
page read and write
4F1F000
stack
page read and write
248B5926000
heap
page read and write
910D000
stack
page read and write
2B90000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
682000
unkown
page readonly
3200000
trusted library allocation
page read and write
83E000
heap
page read and write
2EF4000
trusted library allocation
page read and write
68A0000
heap
page read and write
5990000
trusted library allocation
page read and write
211CE000
stack
page read and write
248B17A4000
heap
page read and write
8B64000
heap
page read and write
7F450000
direct allocation
page read and write
12F0000
heap
page read and write
422000
unkown
page write copy
24A0000
heap
page read and write
744000
heap
page read and write
248B17E2000
heap
page read and write
248B4530000
heap
page read and write
5A00000
trusted library allocation
page read and write
911000
heap
page read and write
571000
unkown
page execute and read and write
6710000
heap
page read and write
5E8E000
stack
page read and write
5D50000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6188000
heap
page read and write
20C9E000
stack
page read and write
51CE000
heap
page read and write
6BB0000
direct allocation
page read and write
5845000
trusted library allocation
page read and write
D65000
heap
page read and write
BA0000
heap
page read and write
22C6000
direct allocation
page read and write
212BE000
stack
page read and write
7F7000
heap
page read and write
5810000
trusted library allocation
page read and write
7D0000
heap
page read and write
45F000
unkown
page write copy
6BB0000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
5A4E000
stack
page read and write
4EDE000
stack
page read and write
8CA000
heap
page read and write
3079000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
3016000
trusted library allocation
page read and write
367D000
trusted library allocation
page execute and read and write
20C34000
direct allocation
page read and write
57D1000
heap
page read and write
63EE000
stack
page read and write
6680000
trusted library allocation
page read and write
57E3000
heap
page read and write
248B17D9000
heap
page read and write
6640000
heap
page read and write
6B30000
trusted library allocation
page read and write
7ED10000
direct allocation
page read and write
591A000
trusted library allocation
page read and write
5D5E000
stack
page read and write
7A0000
heap
page read and write
714000
heap
page read and write
7DF50000
direct allocation
page read and write
744000
heap
page read and write
58F0000
trusted library allocation
page read and write
866000
heap
page read and write
5AF0000
remote allocation
page read and write
20C51000
direct allocation
page read and write
2960000
trusted library allocation
page read and write
C9B1000
trusted library allocation
page read and write
20BA4000
direct allocation
page read and write
88F0000
heap
page read and write
6B30000
trusted library allocation
page read and write
933000
heap
page read and write
51D0000
direct allocation
page read and write
4B5B000
trusted library allocation
page read and write
CD0000
unkown
page execute and read and write
2E10000
trusted library allocation
page read and write
598D000
trusted library allocation
page read and write
605F000
stack
page read and write
248B5902000
heap
page read and write
5970000
trusted library allocation
page read and write
36A2000
trusted library allocation
page read and write
248B1821000
heap
page read and write
58C0000
trusted library allocation
page read and write
248B3521000
heap
page read and write
4EC0000
trusted library allocation
page read and write
6CAE000
stack
page read and write
678E000
stack
page read and write
502E000
stack
page read and write
6400000
heap
page read and write
6B20000
trusted library allocation
page read and write
20BBA000
direct allocation
page read and write
59B0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7CBD000
trusted library allocation
page read and write
2ABA000
heap
page read and write
513C000
heap
page read and write
6B30000
trusted library allocation
page read and write
2581000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
19D000
stack
page read and write
248B4507000
heap
page read and write
5BB1000
trusted library allocation
page read and write
5214000
trusted library allocation
page read and write
710E000
stack
page read and write
6910000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
53CE000
stack
page read and write
2211E000
heap
page read and write
BDE000
stack
page read and write
62AE000
heap
page read and write
6E3F000
stack
page read and write
5985000
trusted library allocation
page read and write
D57000
heap
page read and write
7DD80000
direct allocation
page read and write
7490000
direct allocation
page read and write
2142E000
stack
page read and write
7F3F0000
direct allocation
page read and write
76E000
heap
page read and write
587000
stack
page read and write
73C0000
trusted library allocation
page execute and read and write
665000
heap
page read and write
248B1815000
heap
page read and write
58C0000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
4C00000
heap
page read and write
31F0000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
2560000
trusted library allocation
page read and write
2DE0000
heap
page execute and read and write
CD0000
unkown
page execute and read and write
159E000
trusted library allocation
page read and write
5900000
direct allocation
page read and write
40D1000
trusted library allocation
page read and write
5A00000
direct allocation
page read and write
63F0000
unkown
page execute and read and write
5820000
trusted library allocation
page read and write
649B000
stack
page read and write
2106E000
stack
page read and write
6980000
trusted library allocation
page execute and read and write
800000
heap
page read and write
7DBC0000
direct allocation
page read and write
2388000
direct allocation
page read and write
7ED0000
trusted library allocation
page read and write
401000
unkown
page execute read
4EA0000
trusted library allocation
page read and write
248B181A000
heap
page read and write
744000
heap
page read and write
20AF8000
direct allocation
page read and write
F30000
unkown
page execute and read and write
7490000
direct allocation
page read and write
426000
unkown
page execute and write copy
308C000
trusted library allocation
page read and write
635F000
stack
page read and write
9CAA9FD000
stack
page read and write
6F2E000
stack
page read and write
2240000
heap
page read and write
8B69000
heap
page read and write
B4B000
trusted library allocation
page execute and read and write
41B000
unkown
page readonly
25F1000
trusted library allocation
page read and write
5C00000
remote allocation
page read and write
2D62000
direct allocation
page read and write
5AC0000
trusted library allocation
page read and write
20B20000
direct allocation
page read and write
2E40000
heap
page read and write
6B0E000
stack
page read and write
6451000
trusted library allocation
page read and write
20D9F000
stack
page read and write
73C0000
trusted library allocation
page read and write
29E6000
trusted library allocation
page read and write
5100000
heap
page read and write
5900000
trusted library allocation
page read and write
248B17F7000
heap
page read and write
504F000
stack
page read and write
6450000
trusted library allocation
page read and write
6451000
trusted library allocation
page read and write
8B4000
heap
page read and write
4E54000
heap
page read and write
C8B000
trusted library allocation
page execute and read and write
2B79000
heap
page read and write
248B48B0000
heap
page read and write
7480000
direct allocation
page read and write
73D0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
6410000
trusted library allocation
page read and write
714000
heap
page read and write
29FB000
trusted library allocation
page read and write
7EF46000
direct allocation
page read and write
7D6E000
stack
page read and write
6BC0000
trusted library allocation
page read and write
8ACC000
heap
page read and write
274C000
stack
page read and write
6B20000
trusted library allocation
page read and write
2C20000
heap
page read and write
5DA0000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
7FE1A000
direct allocation
page read and write
9AF000
heap
page read and write
45F000
unkown
page read and write
87E000
heap
page read and write
248B17F2000
heap
page read and write
5FCC000
stack
page read and write
9B000
stack
page read and write
7470000
direct allocation
page read and write
2145E000
stack
page read and write
2C60000
trusted library allocation
page execute and read and write
6A4000
heap
page read and write
2E41000
direct allocation
page execute read
714000
heap
page read and write
2EB2000
trusted library allocation
page read and write
4F28000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
743F000
stack
page read and write
5930000
trusted library allocation
page read and write
248B49DF000
heap
page read and write
7C53000
heap
page read and write
790D000
stack
page read and write
610000
heap
page read and write
5A10000
trusted library allocation
page read and write
22144000
heap
page read and write
645E000
trusted library allocation
page read and write
248B4B13000
heap
page read and write
58C0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
918000
heap
page read and write
7D210000
direct allocation
page read and write
29F3000
heap
page read and write
236A000
direct allocation
page read and write
62A7000
heap
page read and write
58C0000
trusted library allocation
page read and write
966000
heap
page read and write
9A3000
heap
page read and write
4D00000
heap
page read and write
248B58C0000
heap
page read and write
613F000
heap
page read and write
6B30000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
3497000
heap
page read and write
401000
unkown
page execute read
7D3000
trusted library allocation
page execute and read and write
7EDD0000
direct allocation
page read and write
6061000
heap
page read and write
237F000
stack
page read and write
8AB4000
heap
page read and write
328C000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
248B46C0000
heap
page read and write
5EAF000
stack
page read and write
918000
heap
page read and write
3468000
heap
page read and write
666B000
trusted library allocation
page read and write
590000
heap
page read and write
248B180A000
heap
page read and write
6D44000
heap
page read and write
660000
heap
page read and write
2BDF000
stack
page read and write
55EE000
stack
page read and write
7BF5000
heap
page read and write
730000
direct allocation
page read and write
5DA0000
trusted library allocation
page read and write
6C00000
heap
page read and write
5980000
trusted library allocation
page read and write
6A4000
heap
page read and write
7DAF000
stack
page read and write
6B50000
trusted library allocation
page read and write
2A0D000
heap
page read and write
48A000
stack
page read and write
CEE000
stack
page read and write
248B1788000
heap
page read and write
7E2D000
stack
page read and write
599B000
trusted library allocation
page read and write
29F3000
heap
page read and write
936000
heap
page read and write
4E6D000
heap
page read and write
59A0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
253F000
stack
page read and write
5D9E000
stack
page read and write
213FF000
stack
page read and write
211EE000
stack
page read and write
760000
heap
page read and write
5B50000
trusted library allocation
page read and write
F30000
unkown
page execute and read and write
90CD000
stack
page read and write
5DA0000
trusted library allocation
page read and write
6CD0000
heap
page read and write
B60000
trusted library allocation
page read and write
6061000
heap
page read and write
6B20000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
35DE000
stack
page read and write
7E70000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
73B0000
heap
page read and write
2D50000
heap
page read and write
2A12000
heap
page read and write
248B548D000
heap
page read and write
7430000
direct allocation
page read and write
6450000
trusted library allocation
page read and write
7E2000
heap
page read and write
2313000
direct allocation
page read and write
4E1E000
stack
page read and write
248B17B4000
heap
page read and write
4E65000
heap
page read and write
7DEE000
stack
page read and write
29F4000
heap
page read and write
73C0000
trusted library allocation
page read and write
8920000
heap
page read and write
536E000
stack
page read and write
5930000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
7CF36000
direct allocation
page read and write
661E000
stack
page read and write
866000
heap
page read and write
22C0000
heap
page read and write
514C000
stack
page read and write
7DDEF000
direct allocation
page read and write
6226000
trusted library allocation
page read and write
21C0000
heap
page read and write
5970000
trusted library allocation
page read and write
2109E000
stack
page read and write
5A67000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
960000
heap
page read and write
6B20000
trusted library allocation
page read and write
6E7E000
stack
page read and write
20CCA000
stack
page read and write
7E30000
trusted library allocation
page read and write
1284000
trusted library allocation
page read and write
7D420000
direct allocation
page read and write
7C14000
heap
page read and write
1074000
trusted library allocation
page read and write
36A5000
trusted library allocation
page execute and read and write
936000
heap
page read and write
3087000
trusted library allocation
page read and write
61E9000
trusted library allocation
page read and write
248B568F000
heap
page read and write
7D4000
trusted library allocation
page read and write
4E38000
heap
page read and write
7E80000
trusted library allocation
page read and write
3075000
trusted library allocation
page read and write
4F7C000
stack
page read and write
6620000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
7ED10000
direct allocation
page read and write
1020000
heap
page read and write
3E6D000
trusted library allocation
page read and write
5BBE000
stack
page read and write
248B5925000
heap
page read and write
714000
heap
page read and write
81E000
heap
page read and write
B70000
trusted library allocation
page read and write
5930000
trusted library allocation
page execute and read and write
20C58000
direct allocation
page read and write
B9A000
trusted library allocation
page execute and read and write
2BB2000
trusted library allocation
page read and write
2CFF000
stack
page read and write
6980000
heap
page read and write
50C0000
heap
page read and write
58F0000
trusted library allocation
page read and write
8FB000
heap
page read and write
76A000
heap
page read and write
9A9000
heap
page read and write
20AF1000
direct allocation
page read and write
908000
heap
page read and write
7D5000
heap
page read and write
25A4000
trusted library allocation
page read and write
2F2E000
direct allocation
page execute and read and write
2FBB000
direct allocation
page execute and read and write
4CB0000
heap
page read and write
11FF000
stack
page read and write
7F00F000
direct allocation
page read and write
683F000
stack
page read and write
58D0000
trusted library allocation
page read and write
4C0E000
stack
page read and write
6BC0000
trusted library allocation
page read and write
57E4000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
6B4E000
stack
page read and write
4B85000
trusted library allocation
page read and write
58F0000
remote allocation
page read and write
292E000
stack
page read and write
8D9E000
stack
page read and write
69E000
stack
page read and write
29E0000
heap
page read and write
5AE0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
FFDE0000
trusted library allocation
page execute and read and write
2340000
direct allocation
page read and write
7D840000
direct allocation
page read and write
7FC60000
direct allocation
page read and write
7ED5F000
direct allocation
page read and write
C26000
heap
page read and write
B03000
trusted library allocation
page execute and read and write
8A1000
heap
page read and write
69C0000
trusted library allocation
page read and write
6AE000
stack
page read and write
68E000
stack
page read and write
6890000
trusted library allocation
page read and write
714000
heap
page read and write
248B17FE000
heap
page read and write
401000
unkown
page execute read
6B70000
trusted library allocation
page read and write
29A0000
heap
page read and write
F20000
heap
page read and write
6457000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
7C56000
heap
page read and write
198000
stack
page read and write
5970000
trusted library allocation
page read and write
7480000
direct allocation
page read and write
21902000
heap
page read and write
599B000
trusted library allocation
page read and write
59A0000
unkown
page read and write
5870000
trusted library allocation
page read and write
5C0E000
stack
page read and write
2354000
direct allocation
page read and write
4B64000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
20C3E000
stack
page execute and read and write
7400000
trusted library allocation
page read and write
7EB000
stack
page read and write
847000
heap
page read and write
2C5C000
stack
page read and write
2B60000
trusted library allocation
page read and write
612A000
heap
page read and write
58E1000
trusted library allocation
page read and write
20B88000
direct allocation
page read and write
768D000
stack
page read and write
2BB7000
trusted library allocation
page execute and read and write
4FC7000
heap
page read and write
6970000
trusted library allocation
page read and write
620E000
stack
page read and write
5B70000
direct allocation
page read and write
714000
heap
page read and write
744000
heap
page read and write
6151000
heap
page read and write
69D0000
trusted library allocation
page read and write
348B000
heap
page read and write
903000
heap
page read and write
7FAD0000
direct allocation
page read and write
20F1E000
stack
page read and write
5F5F000
stack
page read and write
51B0000
heap
page execute and read and write
7DD16000
direct allocation
page read and write
2B60000
trusted library allocation
page read and write
9CAA3FE000
stack
page read and write
6B40000
trusted library allocation
page read and write
5920000
heap
page read and write
248B17E3000
heap
page read and write
58E0000
trusted library allocation
page read and write
7ED000
trusted library allocation
page execute and read and write
20B14000
direct allocation
page read and write
6369000
trusted library allocation
page read and write
6430000
direct allocation
page read and write
6450000
trusted library allocation
page read and write
7BF3000
heap
page read and write
5A10000
heap
page read and write
5950000
trusted library allocation
page read and write
1594000
trusted library allocation
page read and write
29E8000
trusted library allocation
page read and write
3038000
trusted library allocation
page read and write
79CE000
stack
page read and write
744000
heap
page read and write
7D93F000
direct allocation
page read and write
6BF0000
heap
page read and write
There are 2546 hidden memdumps, click here to show them.