IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\RDP Wrapper\rdpwrap.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\BKFHCGIDBA.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\BKJJEBKKEH.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\GIEBGIIJDG.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\userAFHDHCAAKE.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\userBGIJEGCGDG.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\userGCAEHDBAAE.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\66f5d9ab0d4c7_rdp[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\66f5db9e54794_vfkagks[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\66f5dbaca34ac_lfdnsafnds[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\66f5d9ab0d4c7_rdp[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\66f5db9e54794_vfkagks[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\66f5dbaca34ac_lfdnsafnds[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
PE32 executable (console) Intel 80386, for MS Windows
modified
malicious
C:\Program Files\RDP Wrapper\rdpwrap.ini
Generic INItialization configuration [SLPolicy]
dropped
C:\ProgramData\AEBAFBGIDHCB\AAFIJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\AEBAFBGIDHCB\AEBAFB
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\AEBAFBGIDHCB\DGHJEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\AEBAFBGIDHCB\FCFBFB
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\AEBAFBGIDHCB\GIEHJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\AEBAFBGIDHCB\HIIEBA
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\AEBAFBGIDHCB\JDBKJJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\AEBAFBGIDHCB\JECAFH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\AEBAFBGIDHCB\JECAFH-shm
data
dropped
C:\ProgramData\AEBAFBGIDHCB\JKKECB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\AEBAFBGIDHCB\KEBKJD
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\AEBAFBGIDHCB\KEBKJD-shm
data
dropped
C:\ProgramData\AEBAFBGIDHCB\KKKJEB
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\BKFHCGIDBAAF\CBFCBK
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BKFHCGIDBAAF\GIIIIJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\BKFHCGIDBAAF\JKEGHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CFCBAAEBKEGHIEBFIJJK
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\CGHCGIIDGDAKFIEBKFCFIDAFBF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBFHDBGIEBFIIDGCBFBKEBFHJD
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\HDGIEBGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JECAEHJJJKJKFIDGCBGIJJJEHI
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\JKEHIIJJECFHJKECFHDG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KECGDBFCBKFIDHIDHDHI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KFIJEGCB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\KJEHJKJEBGHJJKEBGIECAAFIJK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BKFHCGIDBA.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BKJJEBKKEH.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GIEBGIIJDG.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\userAFHDHCAAKE.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\userBGIJEGCGDG.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\userGCAEHDBAAE.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
old packed data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\System32\rfxvmt.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped
There are 57 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userAFHDHCAAKE.exe"
malicious
C:\Users\userAFHDHCAAKE.exe
"C:\Users\userAFHDHCAAKE.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userGCAEHDBAAE.exe"
malicious
C:\Users\userGCAEHDBAAE.exe
"C:\Users\userGCAEHDBAAE.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userBGIJEGCGDG.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\userBGIJEGCGDG.exe
"C:\Users\userBGIJEGCGDG.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user
malicious
C:\Windows\SysWOW64\net.exe
net user
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c "C:\Users\user\AppData\Local\Temp\RDPWInst.exe" -i
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
C:\Users\user\AppData\Local\Temp\RDPWInst.exe -i
malicious
C:\Windows\System32\netsh.exe
netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user RDPUser_615fbfde V24hFLzx4jqu /add
malicious
C:\Windows\SysWOW64\net.exe
net user RDPUser_615fbfde V24hFLzx4jqu /add
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup
malicious
C:\Windows\SysWOW64\net.exe
net localgroup
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup "Administrators" RDPUser_615fbfde /add
malicious
C:\Windows\SysWOW64\net.exe
net localgroup "Administrators" RDPUser_615fbfde /add
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup "Remote Desktop Users" RDPUser_615fbfde /add
malicious
C:\Windows\SysWOW64\net.exe
net localgroup "Remote Desktop Users" RDPUser_615fbfde /add
malicious
C:\ProgramData\BKFHCGIDBA.exe
"C:\ProgramData\BKFHCGIDBA.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\BKJJEBKKEH.exe
"C:\ProgramData\BKJJEBKKEH.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\GIEBGIIJDG.exe
"C:\ProgramData\GIEBGIIJDG.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user
malicious
C:\Windows\SysWOW64\net.exe
net user
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AEBAFBGIDHCB" & exit
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\drivers\rdpvideominiport.sys
C:\Windows\System32\drivers\rdpdr.sys
C:\Windows\System32\drivers\tsusbhub.sys
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user RDPUser_615fbfde V24hFLzx4jqu /add
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup "Administrators" RDPUser_615fbfde /add
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup "Remote Desktop Users" RDPUser_615fbfde /add
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
There are 52 hidden processes, click here to show them.

URLs

Name
IP
Malicious
stogeneratmns.shop
malicious
https://reinforcenh.shop/api
172.67.208.139
malicious
https://5.75.211.162/vcruntime140.dll
5.75.211.162
malicious
wallkedsleeoi.shop
malicious
http://46.8.231.109/1309cdeb8f4c8736/softokn3.dll
46.8.231.109
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
fragnantbui.shop
malicious
http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe
147.45.44.104
malicious
offensivedzvju.shop
malicious
https://reinforcenh.shop/apii
unknown
malicious
https://stogeneratmns.shop/apiT
unknown
malicious
https://steamcommunity.com/profiles/76561199780418869
104.102.49.254
malicious
https://wallkedsleeoi.shop/api1
unknown
malicious
http://46.8.231.109/
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/nss3.dll
46.8.231.109
malicious
https://5.75.211.162/softokn3.dll
5.75.211.162
malicious
https://stogeneratmns.shop/api
188.114.96.3
malicious
https://ghostreedmnu.shop/api
188.114.96.3
malicious
http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dll
46.8.231.109
malicious
https://5.75.211.162/
5.75.211.162
malicious
http://46.8.231.109/c4754d4f680ead72.php
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll
46.8.231.109
malicious
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://5.75.211.162BFIEG
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=e
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
http://46.8.231.109/c4754d4f680ead72.phpHTe
unknown
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
https://steamcommunity.com/profiles/76561199780418869=
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://ballotnwu.site/apik
unknown
https://s.ytimg.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://5.75.211.162HIJJK
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
unknown
http://www.entrust.net/rpa03
unknown
http://cowod.AFHIJKECFBKJ
unknown
http://46.8.231.109/1309cdeb8f4c8736/nss3.dlL
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dcn
unknown
http://cowod.hopto.org/Rj
unknown
https://5.75.211.162/DBAAF
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://46.8.231.109UVWXYZ1234567890undary=----CGHCGIIDGDAKFIEBKFCFaultrelease
unknown
https://5.75.211.162/x
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://5.75.211.162rt/form-data;
unknown
https://help.steampowered.com/en/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://46.8.231.109/1309cdeb8f4c8736/nss3.dll8
unknown
https://offensivedzvju.shop/
unknown
https://steamcommunity.com/profiles/76561199780418869/inventory/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a
unknown
http://147.45.44.104/prog/66f5db9e54794_vfkagks.exem-data;
unknown
http://46.8.231.109/c4754d4f680ead72.php32
unknown
http://147.45.44.104
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://steamcommunity.com/workshop/
unknown
http://147.45.44.104/prog/66f5d9ab0d4c7_rdp.exe0
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exeata;
unknown
https://ballotnwu.site:443/api$
unknown
https://5.75.211.162ta
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://raw.githubusercontent.com/stascorp/rdpwrap/master/res/rdpwrap.iniU
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199780418869
unknown
https://ballotnwu.site:443/apiprofiles/76561199724331900
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
https://store.steampowered.com/
unknown
https://reinforcenh.shop/e
unknown
http://46.8.231.109/1309cdeb8f4c8736/vcruntime140.dllj
unknown
http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll4
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://hansgborn.eu
unknown
https://5.75.211.1620.5938.132
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://46.8.231.109/1309cdeb8f4c8736/mozglue.dll0
unknown
https://store.steampowered.com/mobile
unknown
http://cowod.hopto.orgBKJ
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
http://api.ipify.orgd
unknown
http://46.8.231.109/c4754d4f680ead72.phpnu
unknown
http://api.ipify.orgX
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://cowod.hopto.org
unknown
http://hansgborn.eud
unknown
https://5.75.211.162/pet_
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fragnantbui.shop
188.114.97.3
malicious
gutterydhowi.shop
104.21.4.136
malicious
cowod.hopto.org
45.132.206.251
malicious
offensivedzvju.shop
188.114.97.3
malicious
drawzhotdog.shop
104.21.58.182
malicious
ghostreedmnu.shop
188.114.96.3
malicious
ballotnwu.site
172.67.128.144
malicious
wallkedsleeoi.shop
172.67.194.216
malicious
hansgborn.eu
188.114.97.3
malicious
steamcommunity.com
104.102.49.254
malicious
stogeneratmns.shop
188.114.96.3
malicious
reinforcenh.shop
172.67.208.139
malicious
vozmeatillu.shop
188.114.96.3
malicious
bg.microsoft.map.fastly.net
199.232.210.172
api.ipify.org
104.26.13.205
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
46.8.231.109
unknown
Russian Federation
malicious
8.46.123.33
unknown
United States
malicious
147.45.44.104
unknown
Russian Federation
malicious
104.21.58.182
drawzhotdog.shop
United States
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
172.67.208.139
reinforcenh.shop
United States
malicious
104.21.4.136
gutterydhowi.shop
United States
malicious
188.114.97.3
fragnantbui.shop
European Union
malicious
172.67.128.144
ballotnwu.site
United States
malicious
188.114.96.3
ghostreedmnu.shop
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.194.216
wallkedsleeoi.shop
United States
malicious
5.75.211.162
unknown
Germany
malicious
239.255.255.250
unknown
Reserved
104.26.13.205
api.ipify.org
United States
There are 5 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\Licensing Core
EnableConcurrentSessions
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters
ServiceDll
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server
fDenyTSConnections
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\userBGIJEGCGDG_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
AllowMultipleTSSessions
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMajorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMinorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{191a5137-7c9d-43c0-a943-de4411f424f7}\##?#TS_USB_HUB_Enumerator#UMB#2&30d3618&0&TS_USB_HUB#{191a5137-7c9d-43c0-a943-de4411f424f7}
DeviceInstance
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B01000
trusted library allocation
page read and write
malicious
5A1000
remote allocation
page execute and read and write
malicious
3A65000
trusted library allocation
page read and write
malicious
11C0000
heap
page read and write
malicious
450000
unkown
page readonly
malicious
132A000
heap
page read and write
malicious
1230000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3945000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
23D1000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
450000
unkown
page readonly
malicious
832000
unkown
page readonly
malicious
3D85000
trusted library allocation
page read and write
malicious
B5C000
stack
page read and write
A9E000
unkown
page readonly
3302000
trusted library allocation
page read and write
2FC4000
trusted library allocation
page read and write
56EE000
stack
page read and write
3148000
trusted library allocation
page read and write
33AE000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
12D0000
trusted library allocation
page execute and read and write
3100000
heap
page read and write
129A000
trusted library allocation
page execute and read and write
4B0000
heap
page read and write
64B0000
heap
page read and write
3082000
trusted library allocation
page read and write
8B0000
heap
page read and write
3276000
trusted library allocation
page read and write
30FE000
stack
page read and write
3230000
heap
page read and write
313F000
unkown
page read and write
880000
heap
page read and write
3224000
trusted library allocation
page read and write
2A18000
heap
page read and write
650000
heap
page read and write
3028000
trusted library allocation
page read and write
3382000
trusted library allocation
page read and write
3472000
trusted library allocation
page read and write
4C2000
remote allocation
page execute and read and write
E50000
trusted library allocation
page read and write
3198000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
2E70000
heap
page read and write
3436000
trusted library allocation
page read and write
31E8000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
4F6000
remote allocation
page execute and read and write
69D0000
trusted library allocation
page read and write
30F4000
trusted library allocation
page read and write
326C000
trusted library allocation
page read and write
8B5000
heap
page read and write
3088000
trusted library allocation
page read and write
2C2F000
trusted library allocation
page read and write
2C90000
heap
page read and write
3454000
trusted library allocation
page read and write
7F0000
heap
page read and write
321A000
trusted library allocation
page read and write
2021A000
direct allocation
page readonly
316E000
trusted library allocation
page read and write
844000
unkown
page readonly
305C000
stack
page read and write
31D4000
trusted library allocation
page read and write
314E000
trusted library allocation
page read and write
321E000
trusted library allocation
page read and write
304A000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
2FEC000
trusted library allocation
page read and write
32B8000
trusted library allocation
page read and write
1510000
heap
page execute and read and write
2FC6000
trusted library allocation
page read and write
31A2000
trusted library allocation
page read and write
326DA000
heap
page read and write
1317000
heap
page read and write
310A000
trusted library allocation
page read and write
3290000
heap
page read and write
2FE4000
trusted library allocation
page read and write
3274000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
32FE000
trusted library allocation
page read and write
97E000
stack
page read and write
30F2000
trusted library allocation
page read and write
2F2A000
trusted library allocation
page read and write
86D000
stack
page read and write
9F50000
unclassified section
page read and write
6C520000
unkown
page read and write
3098000
trusted library allocation
page read and write
D92000
heap
page read and write
4E2000
remote allocation
page execute and read and write
2FB8000
trusted library allocation
page read and write
2910000
heap
page read and write
3308000
trusted library allocation
page read and write
2BE0000
heap
page read and write
2F52000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
5090000
trusted library section
page read and write
32E0000
heap
page read and write
336E000
trusted library allocation
page read and write
4E8000
remote allocation
page execute and read and write
3218000
trusted library allocation
page read and write
4E1000
remote allocation
page execute and read and write
3012000
trusted library allocation
page read and write
335E000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
5200000
trusted library allocation
page execute and read and write
331C000
trusted library allocation
page read and write
2BF1000
trusted library allocation
page read and write
3222000
trusted library allocation
page read and write
349F000
stack
page read and write
33C2000
trusted library allocation
page read and write
805000
heap
page read and write
128E000
stack
page read and write
305C000
trusted library allocation
page read and write
3356000
trusted library allocation
page read and write
157E000
stack
page read and write
14EFE000
stack
page read and write
1096000
heap
page read and write
1151000
heap
page read and write
2F20000
trusted library allocation
page read and write
311A000
trusted library allocation
page read and write
3206000
trusted library allocation
page read and write
303A000
trusted library allocation
page read and write
311C000
trusted library allocation
page read and write
33EE000
trusted library allocation
page read and write
309E000
trusted library allocation
page read and write
11E4000
trusted library allocation
page read and write
586E000
stack
page read and write
DC0000
heap
page read and write
2FF0000
trusted library allocation
page read and write
303E000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
3158000
trusted library allocation
page read and write
119D000
heap
page read and write
2FDE000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
2DD0000
heap
page read and write
2CE0000
heap
page read and write
348C000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
3142000
trusted library allocation
page read and write
30C2000
trusted library allocation
page read and write
26A0000
trusted library allocation
page read and write
32C4000
trusted library allocation
page read and write
1485000
heap
page read and write
3026000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
3128000
trusted library allocation
page read and write
4DBE000
stack
page read and write
318C000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
32E8000
trusted library allocation
page read and write
506000
remote allocation
page execute and read and write
3F0000
heap
page read and write
2FC0000
trusted library allocation
page read and write
D4C000
stack
page read and write
31F2000
trusted library allocation
page read and write
3206000
trusted library allocation
page read and write
4B08000
trusted library allocation
page read and write
200B5000
direct allocation
page execute read
4DA000
remote allocation
page execute and read and write
32AC000
trusted library allocation
page read and write
B6E000
heap
page read and write
2F9C000
trusted library allocation
page read and write
32BE000
heap
page read and write
325E000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
4EF000
remote allocation
page execute and read and write
130E000
stack
page read and write
3066000
trusted library allocation
page read and write
2F42000
trusted library allocation
page read and write
19E70000
heap
page read and write
4FD000
stack
page read and write
32E0000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
1048D000
stack
page read and write
3318000
trusted library allocation
page read and write
19C2F000
stack
page read and write
129CD000
stack
page read and write
2F1E000
trusted library allocation
page read and write
2E30000
heap
page read and write
2FDA000
trusted library allocation
page read and write
12A0B000
stack
page read and write
23EF000
trusted library allocation
page read and write
930000
heap
page read and write
19CB9000
heap
page read and write
3216000
trusted library allocation
page read and write
331A000
trusted library allocation
page read and write
3314000
trusted library allocation
page read and write
32D0000
trusted library allocation
page read and write
2FAC000
trusted library allocation
page read and write
3222000
trusted library allocation
page read and write
306A000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
23CE000
stack
page read and write
14E0000
trusted library allocation
page execute and read and write
105C000
stack
page read and write
334A000
trusted library allocation
page read and write
248B000
direct allocation
page read and write
3156000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
6107000
heap
page read and write
32A6000
trusted library allocation
page read and write
3456000
trusted library allocation
page read and write
79E000
stack
page read and write
30C8000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
3158000
trusted library allocation
page read and write
820000
heap
page read and write
2E4D000
stack
page read and write
2F8E000
trusted library allocation
page read and write
347A000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
2D98000
heap
page read and write
50C0000
heap
page execute and read and write
332C000
trusted library allocation
page read and write
770000
heap
page read and write
B70000
heap
page read and write
2FF4000
trusted library allocation
page read and write
200BD000
direct allocation
page execute read
3328000
trusted library allocation
page read and write
32B2000
trusted library allocation
page read and write
A42000
unkown
page readonly
3135000
heap
page read and write
2B60000
heap
page read and write
3350000
trusted library allocation
page read and write
3196000
trusted library allocation
page read and write
2FC6000
trusted library allocation
page read and write
3300000
heap
page read and write
307E000
trusted library allocation
page read and write
2B40000
heap
page read and write
3298000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
348F000
unkown
page read and write
3382000
trusted library allocation
page read and write
3216000
trusted library allocation
page read and write
343C000
trusted library allocation
page read and write
33A8000
trusted library allocation
page read and write
6C31D000
unkown
page readonly
3064000
trusted library allocation
page read and write
3028000
trusted library allocation
page read and write
63AE000
stack
page read and write
1709000
heap
page read and write
3288000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
2F6E000
stack
page read and write
31EE000
trusted library allocation
page read and write
730000
unkown
page readonly
33A8000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
3008000
trusted library allocation
page read and write
51E000
remote allocation
page execute and read and write
7FC20000
direct allocation
page read and write
31FA000
trusted library allocation
page read and write
33D8000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
33D4000
trusted library allocation
page read and write
32DE000
trusted library allocation
page read and write
19B80000
heap
page read and write
3050000
trusted library allocation
page read and write
33AC000
trusted library allocation
page read and write
2D90000
heap
page read and write
2F4E000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
30FC000
trusted library allocation
page read and write
317C000
trusted library allocation
page read and write
30F6000
trusted library allocation
page read and write
3372000
trusted library allocation
page read and write
33BA000
trusted library allocation
page read and write
33A2000
trusted library allocation
page read and write
116F000
heap
page read and write
2A7E000
stack
page read and write
2BE7000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
5C5000
remote allocation
page execute and read and write
3392000
trusted library allocation
page read and write
2378000
direct allocation
page read and write
335E000
trusted library allocation
page read and write
32CC000
trusted library allocation
page read and write
2FE6000
trusted library allocation
page read and write
2021F000
direct allocation
page readonly
318C000
trusted library allocation
page read and write
2A63000
trusted library allocation
page read and write
3088000
trusted library allocation
page read and write
67D000
stack
page read and write
316C000
trusted library allocation
page read and write
233E000
direct allocation
page read and write
B90000
heap
page read and write
2E10000
heap
page read and write
68CC000
stack
page read and write
31CA000
trusted library allocation
page read and write
328E000
trusted library allocation
page read and write
9D5000
stack
page read and write
2FEC000
trusted library allocation
page read and write
2F72000
trusted library allocation
page read and write
5B2F000
stack
page read and write
1273000
trusted library allocation
page execute and read and write
2FE0000
trusted library allocation
page read and write
D1E000
stack
page read and write
33BC000
trusted library allocation
page read and write
4930000
heap
page execute and read and write
3168000
trusted library allocation
page read and write
33F6000
trusted library allocation
page read and write
3941000
trusted library allocation
page read and write
323C000
trusted library allocation
page read and write
304E000
trusted library allocation
page read and write
3378000
trusted library allocation
page read and write
3042000
trusted library allocation
page read and write
3074000
trusted library allocation
page read and write
305C000
trusted library allocation
page read and write
445000
unkown
page write copy
15C0000
heap
page read and write
22C0000
heap
page execute and read and write
29EF000
stack
page read and write
30E0000
trusted library allocation
page read and write
101E000
stack
page read and write
38D000
stack
page read and write
337E000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
303C000
trusted library allocation
page read and write
D60000
heap
page read and write
3152000
trusted library allocation
page read and write
55ED000
stack
page read and write
329C000
trusted library allocation
page read and write
64AD000
stack
page read and write
33E6000
trusted library allocation
page read and write
30C6000
trusted library allocation
page read and write
3035000
heap
page read and write
2B8E000
stack
page read and write
1032000
heap
page read and write
3174000
trusted library allocation
page read and write
3018000
trusted library allocation
page read and write
2021D000
direct allocation
page readonly
2FA6000
trusted library allocation
page read and write
310C000
trusted library allocation
page read and write
20136000
direct allocation
page read and write
278B1000
heap
page read and write
2AFD000
stack
page read and write
2D81000
trusted library allocation
page execute and read and write
302C000
trusted library allocation
page read and write
2F8C000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
3246000
trusted library allocation
page read and write
1D0000
heap
page read and write
156E000
stack
page read and write
2FC0000
trusted library allocation
page read and write
2BDF000
trusted library allocation
page read and write
9C0000
trusted library allocation
page read and write
325C000
trusted library allocation
page read and write
3394000
trusted library allocation
page read and write
201E8000
direct allocation
page readonly
96E000
stack
page read and write
1330000
heap
page read and write
FD0000
heap
page read and write
7FD70000
direct allocation
page read and write
5A2000
unkown
page readonly
E56000
trusted library allocation
page read and write
2F46000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
2FA4000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
2CED000
stack
page read and write
3126000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
1396000
heap
page read and write
5A0000
unkown
page readonly
2058B000
stack
page read and write
30B8000
trusted library allocation
page read and write
316A000
trusted library allocation
page read and write
60F4000
heap
page read and write
18D000
stack
page read and write
313C000
trusted library allocation
page read and write
1406000
heap
page read and write
30C2000
trusted library allocation
page read and write
133A000
heap
page read and write
1FE000
stack
page read and write
30DA000
trusted library allocation
page read and write
301E000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
278D1000
heap
page read and write
5C80000
trusted library allocation
page read and write
33DE000
trusted library allocation
page read and write
66D000
stack
page read and write
2DED000
stack
page read and write
5B5000
heap
page read and write
31B6000
trusted library allocation
page read and write
11A0000
heap
page read and write
315A000
trusted library allocation
page read and write
312E000
trusted library allocation
page read and write
6C341000
unkown
page execute read
322E000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
3432000
trusted library allocation
page read and write
1085000
heap
page read and write
3038000
trusted library allocation
page read and write
3398000
trusted library allocation
page read and write
30D8000
trusted library allocation
page read and write
13D6000
heap
page read and write
3438000
trusted library allocation
page read and write
31D4000
trusted library allocation
page read and write
33C0000
trusted library allocation
page read and write
3C0000
heap
page read and write
3412000
trusted library allocation
page read and write
3138000
trusted library allocation
page read and write
A10000
heap
page read and write
73DE000
stack
page read and write
3184000
trusted library allocation
page read and write
E54000
trusted library allocation
page read and write
632F000
stack
page read and write
2DE0000
heap
page read and write
3474000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
302A000
trusted library allocation
page read and write
4EF000
remote allocation
page execute and read and write
63A000
remote allocation
page execute and read and write
2FBA000
trusted library allocation
page read and write
3378000
trusted library allocation
page read and write
3072000
trusted library allocation
page read and write
333E000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
34E5000
heap
page read and write
316A000
trusted library allocation
page read and write
3144000
trusted library allocation
page read and write
32DA000
trusted library allocation
page read and write
30FC000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
30A8000
trusted library allocation
page read and write
3284000
trusted library allocation
page read and write
307A000
trusted library allocation
page read and write
A3C000
stack
page read and write
33F2000
trusted library allocation
page read and write
11D5000
heap
page read and write
3262000
trusted library allocation
page read and write
2BD0000
heap
page read and write
28D0000
heap
page read and write
2E78000
heap
page read and write
153D000
stack
page read and write
1145000
heap
page read and write
3252000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
346A000
trusted library allocation
page read and write
5AEE000
stack
page read and write
317A000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
ADF000
stack
page read and write
31A8000
trusted library allocation
page read and write
10FE000
stack
page read and write
326E000
trusted library allocation
page read and write
3A61000
trusted library allocation
page read and write
329E000
trusted library allocation
page read and write
31DA000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
130E000
stack
page read and write
3220000
trusted library allocation
page read and write
314A000
trusted library allocation
page read and write
4ADE000
stack
page read and write
323E000
trusted library allocation
page read and write
10CE000
stack
page read and write
33B4000
trusted library allocation
page read and write
333E000
stack
page read and write
3150000
trusted library allocation
page read and write
2EF6000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
1090000
heap
page read and write
3498000
trusted library allocation
page read and write
2C43000
trusted library allocation
page read and write
2FE6000
trusted library allocation
page read and write
582000
remote allocation
page execute and read and write
760000
heap
page read and write
3346000
trusted library allocation
page read and write
30E2000
trusted library allocation
page read and write
346C000
trusted library allocation
page read and write
3130000
heap
page read and write
2FB0000
trusted library allocation
page read and write
19C42000
heap
page read and write
3286000
trusted library allocation
page read and write
30CC000
heap
page read and write
3446000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
103CD000
stack
page read and write
A8E000
stack
page read and write
65D000
stack
page read and write
291C000
heap
page read and write
1580000
heap
page execute and read and write
FFE000
heap
page read and write
3128000
trusted library allocation
page read and write
19D22000
heap
page read and write
32BA000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
31DE000
trusted library allocation
page read and write
3092000
trusted library allocation
page read and write
35AE000
stack
page read and write
2830000
heap
page read and write
136E000
heap
page read and write
29EF000
stack
page read and write
3150000
trusted library allocation
page read and write
2790000
heap
page execute and read and write
2F60000
heap
page read and write
55E000
remote allocation
page execute and read and write
2FCE000
trusted library allocation
page read and write
655000
heap
page read and write
3278000
trusted library allocation
page read and write
330E000
trusted library allocation
page read and write
319E000
trusted library allocation
page read and write
2D4E000
stack
page read and write
1590000
heap
page read and write
BF0000
heap
page read and write
31C4000
trusted library allocation
page read and write
14CE000
stack
page read and write
3080000
trusted library allocation
page read and write
326C000
trusted library allocation
page read and write
2FEE000
trusted library allocation
page read and write
3284000
trusted library allocation
page read and write
32C2000
trusted library allocation
page read and write
10F8000
stack
page read and write
3444000
trusted library allocation
page read and write
324E000
trusted library allocation
page read and write
31D2000
trusted library allocation
page read and write
1286000
trusted library allocation
page read and write
3364000
trusted library allocation
page read and write
30EA000
trusted library allocation
page read and write
9EF000
stack
page read and write
517D000
stack
page read and write
2F5D000
stack
page read and write
3338000
trusted library allocation
page read and write
3062000
trusted library allocation
page read and write
2F4A000
trusted library allocation
page read and write
8DD000
stack
page read and write
600000
heap
page read and write
33FA000
trusted library allocation
page read and write
2B50000
heap
page read and write
30DA000
trusted library allocation
page read and write
2B3E000
stack
page read and write
30E8000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
300E000
trusted library allocation
page read and write
32CA000
trusted library allocation
page read and write
B10000
heap
page read and write
B60000
heap
page read and write
31FC000
trusted library allocation
page read and write
3322000
trusted library allocation
page read and write
31EC000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
C40000
heap
page read and write
400000
unkown
page readonly
3030000
heap
page read and write
348E000
trusted library allocation
page read and write
300C000
trusted library allocation
page read and write
2F44000
trusted library allocation
page read and write
542000
heap
page read and write
92F000
stack
page read and write
27850000
heap
page read and write
3352000
trusted library allocation
page read and write
D15000
heap
page read and write
3270000
trusted library allocation
page read and write
12BA000
trusted library allocation
page execute and read and write
3054000
trusted library allocation
page read and write
460000
remote allocation
page execute and read and write
731E000
stack
page read and write
3266000
trusted library allocation
page read and write
3116000
trusted library allocation
page read and write
5F5D000
stack
page read and write
2FFE000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
1250000
heap
page read and write
327E000
trusted library allocation
page read and write
A40000
unkown
page readonly
2FB2000
trusted library allocation
page read and write
30E4000
trusted library allocation
page read and write
3144000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
30AA000
trusted library allocation
page read and write
3054000
trusted library allocation
page read and write
12F0000
heap
page read and write
32BC000
heap
page read and write
EF2000
stack
page read and write
3010000
trusted library allocation
page read and write
114D000
heap
page read and write
BF0000
heap
page read and write
11F6000
trusted library allocation
page read and write
1AF6F000
stack
page read and write
61EB7000
direct allocation
page readonly
3398000
trusted library allocation
page read and write
131C000
heap
page read and write
2FA3000
trusted library allocation
page read and write
D85000
heap
page read and write
31D0000
trusted library allocation
page read and write
2F9A000
trusted library allocation
page read and write
674F000
stack
page read and write
3190000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
344C000
trusted library allocation
page read and write
17CE000
stack
page read and write
4A6AC000
stack
page read and write
30D4000
trusted library allocation
page read and write
1FFD0000
direct allocation
page execute and read and write
4F5000
stack
page read and write
1293000
trusted library allocation
page execute and read and write
2F96000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
69CA000
stack
page read and write
1280000
trusted library allocation
page read and write
DBB000
heap
page read and write
CB0000
trusted library allocation
page read and write
30F2000
trusted library allocation
page read and write
2F40000
heap
page read and write
29F0000
heap
page read and write
30D6000
trusted library allocation
page read and write
304A000
trusted library allocation
page read and write
44C000
unkown
page write copy
365E000
stack
page read and write
3E0000
heap
page read and write
3000000
heap
page read and write
2A5E000
stack
page read and write
546E000
stack
page read and write
2020C000
heap
page read and write
333C000
trusted library allocation
page read and write
65E000
stack
page read and write
3192000
trusted library allocation
page read and write
3050000
heap
page read and write
32DF000
stack
page read and write
325C000
trusted library allocation
page read and write
A20000
trusted library allocation
page execute and read and write
3178000
trusted library allocation
page read and write
303E000
stack
page read and write
2F02000
trusted library allocation
page read and write
312C000
trusted library allocation
page read and write
3004000
trusted library allocation
page read and write
2E1A000
heap
page read and write
3372000
trusted library allocation
page read and write
50F000
remote allocation
page execute and read and write
32FA000
trusted library allocation
page read and write
31DA000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
1032000
trusted library allocation
page read and write
32E8000
trusted library allocation
page read and write
B3E000
stack
page read and write
31AA000
trusted library allocation
page read and write
3184000
trusted library allocation
page read and write
3404000
trusted library allocation
page read and write
316C000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
B68000
heap
page read and write
688E000
stack
page read and write
30F0000
trusted library allocation
page read and write
2AC0000
heap
page read and write
1400000
heap
page read and write
3118000
trusted library allocation
page read and write
31D2000
trusted library allocation
page read and write
389E000
stack
page read and write
B88000
heap
page read and write
2F5C000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
830000
unkown
page readonly
3030000
heap
page read and write
FD0000
heap
page read and write
1037000
trusted library allocation
page execute and read and write
3096000
trusted library allocation
page read and write
1030000
heap
page read and write
309A000
trusted library allocation
page read and write
2FD6000
trusted library allocation
page read and write
31A6000
trusted library allocation
page read and write
302A000
trusted library allocation
page read and write
3192000
trusted library allocation
page read and write
1520000
heap
page read and write
1170000
heap
page read and write
314A000
trusted library allocation
page read and write
52C000
heap
page read and write
32E2000
trusted library allocation
page read and write
19BAE000
heap
page read and write
32E4000
trusted library allocation
page read and write
3240000
heap
page read and write
346E000
trusted library allocation
page read and write
11A5000
heap
page read and write
3E5B7000
heap
page read and write
985E000
stack
page read and write
2A10000
heap
page read and write
333E000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
2FAE000
trusted library allocation
page read and write
63E000
stack
page read and write
2B00000
heap
page read and write
12C7000
trusted library allocation
page execute and read and write
C00000
heap
page read and write
3000000
trusted library allocation
page read and write
3026000
trusted library allocation
page read and write
19BB2000
heap
page read and write
1665000
heap
page read and write
485000
remote allocation
page execute and read and write
3306000
trusted library allocation
page read and write
8DC000
stack
page read and write
331E000
trusted library allocation
page read and write
3394000
trusted library allocation
page read and write
30DE000
trusted library allocation
page read and write
B3C000
stack
page read and write
2362000
direct allocation
page read and write
2F0F000
stack
page read and write
340A000
trusted library allocation
page read and write
1285000
heap
page read and write
6124000
heap
page read and write
1B20E000
stack
page read and write
D5E000
heap
page read and write
33E0000
trusted library allocation
page read and write
344E000
trusted library allocation
page read and write
3166000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
33F4000
trusted library allocation
page read and write
32F6000
trusted library allocation
page read and write
CEE000
heap
page read and write
2FFA000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
317C000
trusted library allocation
page read and write
1449000
heap
page read and write
3140000
trusted library allocation
page read and write
2FCA000
trusted library allocation
page read and write
5A1000
remote allocation
page execute and read and write
3268000
trusted library allocation
page read and write
318E000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
2FA6000
trusted library allocation
page read and write
1FF3A000
direct allocation
page execute read
1060000
trusted library allocation
page read and write
2E8E000
stack
page read and write
3348000
trusted library allocation
page read and write
30DC000
trusted library allocation
page read and write
31A6000
trusted library allocation
page read and write
840000
heap
page read and write
1A076000
heap
page read and write
32B6000
trusted library allocation
page read and write
12F8000
heap
page read and write
3408000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
447000
unkown
page read and write
2FFC000
trusted library allocation
page read and write
3226000
trusted library allocation
page read and write
BA0000
heap
page read and write
105E000
stack
page read and write
32F0000
trusted library allocation
page read and write
33CA000
trusted library allocation
page read and write
4C8000
remote allocation
page execute and read and write
3024000
trusted library allocation
page read and write
19E9A000
stack
page read and write
11C0000
heap
page read and write
30A0000
trusted library allocation
page read and write
32DC000
trusted library allocation
page read and write
507D000
stack
page read and write
343E000
trusted library allocation
page read and write
32F2000
trusted library allocation
page read and write
29FE000
stack
page read and write
3082000
trusted library allocation
page read and write
2C7C000
heap
page read and write
542F000
stack
page read and write
F2D000
stack
page read and write
2F3C000
trusted library allocation
page read and write
32F4000
trusted library allocation
page read and write
1140000
heap
page read and write
327F000
stack
page read and write
32CE000
trusted library allocation
page read and write
32B4000
trusted library allocation
page read and write
3440000
trusted library allocation
page read and write
315C000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
33D2000
trusted library allocation
page read and write
1026000
trusted library allocation
page execute and read and write
4C3E000
stack
page read and write
307C000
trusted library allocation
page read and write
2D90000
heap
page read and write
339C000
trusted library allocation
page read and write
4A5AC000
stack
page read and write
3248000
trusted library allocation
page read and write
309C000
stack
page read and write
329A000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
330C000
trusted library allocation
page read and write
31B4000
trusted library allocation
page read and write
338C000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
347E000
trusted library allocation
page read and write
798000
stack
page read and write
327E000
trusted library allocation
page read and write
10F0000
heap
page read and write
2FDC000
trusted library allocation
page read and write
1A1B6000
heap
page read and write
3326000
trusted library allocation
page read and write
1070000
heap
page read and write
30BA000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
616D000
heap
page read and write
334A000
trusted library allocation
page read and write
1766D000
stack
page read and write
2CB8000
heap
page read and write
33B2000
trusted library allocation
page read and write
24C1000
direct allocation
page read and write
11D0000
heap
page read and write
307E000
trusted library allocation
page read and write
2B0E000
stack
page read and write
33D1000
trusted library allocation
page read and write
3308000
trusted library allocation
page read and write
1380000
heap
page read and write
3302000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
2C5E000
trusted library allocation
page read and write
D58000
heap
page read and write
33C8000
trusted library allocation
page read and write
991E000
stack
page read and write
3228000
trusted library allocation
page read and write
77E000
unkown
page read and write
8BE000
stack
page read and write
54AD000
stack
page read and write
3008000
trusted library allocation
page read and write
30EE000
trusted library allocation
page read and write
1004000
trusted library allocation
page read and write
131E000
stack
page read and write
1333000
heap
page read and write
26B0000
trusted library allocation
page read and write
44D000
unkown
page write copy
333C000
trusted library allocation
page read and write
3406000
trusted library allocation
page read and write
33B6000
trusted library allocation
page read and write
1070000
trusted library allocation
page execute and read and write
3316000
trusted library allocation
page read and write
278E1000
heap
page read and write
3208000
trusted library allocation
page read and write
86E000
stack
page read and write
3198000
trusted library allocation
page read and write
3264000
trusted library allocation
page read and write
152F000
stack
page read and write
3110000
trusted library allocation
page read and write
246C000
direct allocation
page read and write
3354000
trusted library allocation
page read and write
48F000
remote allocation
page execute and read and write
3110000
trusted library allocation
page read and write
1E0000
heap
page read and write
30E0000
trusted library allocation
page read and write
3386000
trusted library allocation
page read and write
2B47000
trusted library allocation
page read and write
2FE2000
trusted library allocation
page read and write
3146000
trusted library allocation
page read and write
3352000
trusted library allocation
page read and write
1762E000
stack
page read and write
51CE000
stack
page read and write
2EFA000
trusted library allocation
page read and write
33EA000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
3016000
trusted library allocation
page read and write
4BD000
remote allocation
page execute and read and write
33CA000
trusted library allocation
page read and write
3094000
trusted library allocation
page read and write
6C2A0000
unkown
page readonly
30FE000
trusted library allocation
page read and write
33A4000
trusted library allocation
page read and write
9E90000
unclassified section
page read and write
3056000
trusted library allocation
page read and write
730000
heap
page read and write
24D0000
direct allocation
page read and write
3194000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
2F4C000
trusted library allocation
page read and write
467000
remote allocation
page execute and read and write
31DF000
stack
page read and write
2FD4000
trusted library allocation
page read and write
14D000
stack
page read and write
2C769000
heap
page read and write
2F10000
trusted library allocation
page read and write
778000
heap
page read and write
323A000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
FF0000
heap
page read and write
3030000
trusted library allocation
page read and write
D44000
trusted library allocation
page read and write
300C000
trusted library allocation
page read and write
375F000
stack
page read and write
30FA000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
320A000
trusted library allocation
page read and write
770000
heap
page read and write
2DC0000
heap
page read and write
1B0AE000
stack
page read and write
30AC000
trusted library allocation
page read and write
8FD000
stack
page read and write
2F7E000
trusted library allocation
page read and write
401000
unkown
page execute read
1080000
heap
page read and write
3034000
trusted library allocation
page read and write
312A000
trusted library allocation
page read and write
2933000
heap
page read and write
3086000
trusted library allocation
page read and write
2369000
direct allocation
page read and write
11A5000
heap
page read and write
5D0000
heap
page read and write
32A4000
trusted library allocation
page read and write
30CE000
trusted library allocation
page read and write
2CD0000
heap
page read and write
31CA000
trusted library allocation
page read and write
3068000
trusted library allocation
page read and write
31F2000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
32A0000
heap
page read and write
308C000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
6C520000
unkown
page read and write
30BE000
trusted library allocation
page read and write
2C57000
trusted library allocation
page read and write
36F0000
heap
page read and write
61ED4000
direct allocation
page readonly
3256000
trusted library allocation
page read and write
1B0000
heap
page read and write
303A000
trusted library allocation
page read and write
313E000
trusted library allocation
page read and write
678000
heap
page read and write
456E000
stack
page read and write
312A000
trusted library allocation
page read and write
11E3000
trusted library allocation
page execute and read and write
3328000
trusted library allocation
page read and write
3032000
trusted library allocation
page read and write
3034000
trusted library allocation
page read and write
3118000
trusted library allocation
page read and write
308E000
trusted library allocation
page read and write
339A000
trusted library allocation
page read and write
311E000
trusted library allocation
page read and write
3232000
trusted library allocation
page read and write
8AE000
stack
page read and write
9EA000
trusted library allocation
page execute and read and write
1672000
heap
page read and write
3392000
trusted library allocation
page read and write
4A7F000
stack
page read and write
2D70000
heap
page execute and read and write
3396000
trusted library allocation
page read and write
5D5E000
unkown
page read and write
3260000
trusted library allocation
page read and write
516000
remote allocation
page execute and read and write
7D0000
heap
page read and write
30E4000
trusted library allocation
page read and write
2CFD000
stack
page read and write
32E0000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
31BE000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
3256000
trusted library allocation
page read and write
9E60000
heap
page read and write
3130000
heap
page read and write
3224000
trusted library allocation
page read and write
19CDB000
stack
page read and write
30F8000
trusted library allocation
page read and write
328A000
trusted library allocation
page read and write
2BED000
trusted library allocation
page read and write
528000
remote allocation
page execute and read and write
4FE000
remote allocation
page execute and read and write
1FFD8000
direct allocation
page execute read
EDE000
stack
page read and write
2FB4000
trusted library allocation
page read and write
31DC000
trusted library allocation
page read and write
19BED000
heap
page read and write
2FD4000
trusted library allocation
page read and write
31B2000
trusted library allocation
page read and write
20212000
direct allocation
page read and write
5A5000
remote allocation
page execute and read and write
3376000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
6C4DF000
unkown
page readonly
31C8000
trusted library allocation
page read and write
47E000
stack
page read and write
8AE000
stack
page read and write
2F6E000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
2C80000
heap
page read and write
30A0000
heap
page read and write
32C8000
trusted library allocation
page read and write
314C000
trusted library allocation
page read and write
21823000
heap
page read and write
3134000
trusted library allocation
page read and write
32BC000
trusted library allocation
page read and write
1310000
heap
page read and write
30A4000
trusted library allocation
page read and write
2FDE000
trusted library allocation
page read and write
16F2000
heap
page read and write
3250000
heap
page read and write
2C85000
heap
page read and write
1C0000
heap
page read and write
2180B000
heap
page read and write
31A8000
trusted library allocation
page read and write
33E2000
trusted library allocation
page read and write
305A000
trusted library allocation
page read and write
30D4000
trusted library allocation
page read and write
307A000
trusted library allocation
page read and write
51F000
remote allocation
page execute and read and write
3410000
trusted library allocation
page read and write
12BD000
stack
page read and write
2BDF000
stack
page read and write
2F66000
trusted library allocation
page read and write
32EC000
trusted library allocation
page read and write
3292000
trusted library allocation
page read and write
32E8000
heap
page read and write
3120000
heap
page read and write
33AC000
trusted library allocation
page read and write
2F74000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
FEE000
stack
page read and write
12C0000
trusted library allocation
page read and write
7FDE0000
direct allocation
page read and write
30DC000
trusted library allocation
page read and write
3452000
trusted library allocation
page read and write
60E8000
heap
page read and write
1060000
heap
page read and write
782000
unkown
page readonly
2FCE000
trusted library allocation
page read and write
2F0C000
trusted library allocation
page read and write
1290D000
stack
page read and write
1080000
heap
page read and write
9B0000
trusted library allocation
page read and write
32C2000
trusted library allocation
page read and write
2F34000
trusted library allocation
page read and write
2F54000
trusted library allocation
page read and write
33B6000
trusted library allocation
page read and write
343F000
stack
page read and write
31B2000
trusted library allocation
page read and write
31FE000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
2F22000
trusted library allocation
page read and write
2FDC000
trusted library allocation
page read and write
4CE000
remote allocation
page execute and read and write
60DD000
stack
page read and write
760000
heap
page read and write
2EF8000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
3172000
trusted library allocation
page read and write
322C000
trusted library allocation
page read and write
2DA8000
heap
page read and write
216A0000
heap
page read and write
3434000
trusted library allocation
page read and write
34610000
heap
page read and write
46B000
remote allocation
page execute and read and write
D43000
trusted library allocation
page execute and read and write
3044000
trusted library allocation
page read and write
302C000
trusted library allocation
page read and write
7EA000
heap
page read and write
3396000
trusted library allocation
page read and write
16CF000
stack
page read and write
34A4000
trusted library allocation
page read and write
2E33000
heap
page read and write
71E000
unkown
page read and write
322E000
trusted library allocation
page read and write
326E000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
111E000
stack
page read and write
2FD2000
trusted library allocation
page read and write
52A000
heap
page read and write
32F2000
trusted library allocation
page read and write
313E000
trusted library allocation
page read and write
4B1000
remote allocation
page execute and read and write
2AF0000
heap
page read and write
F88000
stack
page read and write
2FF8000
trusted library allocation
page read and write
229E000
stack
page read and write
3342000
trusted library allocation
page read and write
1383000
heap
page read and write
B9D000
stack
page read and write
2015D000
heap
page read and write
3050000
trusted library allocation
page read and write
38646000
heap
page read and write
30CA000
trusted library allocation
page read and write
336C000
trusted library allocation
page read and write
2F98000
trusted library allocation
page read and write
337A000
trusted library allocation
page read and write
3336000
trusted library allocation
page read and write
328E000
trusted library allocation
page read and write
135E000
heap
page read and write
33CE000
trusted library allocation
page read and write
31BC000
trusted library allocation
page read and write
33EC000
trusted library allocation
page read and write
3044000
trusted library allocation
page read and write
31D6000
trusted library allocation
page read and write
401000
unkown
page execute read
2BE5000
trusted library allocation
page read and write
3036000
trusted library allocation
page read and write
1324000
heap
page read and write
3180000
trusted library allocation
page read and write
308C000
trusted library allocation
page read and write
217FA000
heap
page read and write
3050000
heap
page read and write
19B6F000
stack
page read and write
11EF000
heap
page read and write
1A27D000
heap
page read and write
30CA000
trusted library allocation
page read and write
30BF000
stack
page read and write
2FFA000
trusted library allocation
page read and write
30CE000
trusted library allocation
page read and write
3B01000
trusted library allocation
page read and write
30E2000
trusted library allocation
page read and write
3220000
heap
page read and write
308A000
trusted library allocation
page read and write
1B4BD000
stack
page read and write
321E000
stack
page read and write
19B000
stack
page read and write
490000
heap
page read and write
7FD00000
direct allocation
page read and write
3478000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
1205000
heap
page read and write
30E6000
trusted library allocation
page read and write
2B4E000
unkown
page read and write
CE8000
heap
page read and write
323A000
trusted library allocation
page read and write
3486000
trusted library allocation
page read and write
138A000
heap
page read and write
8B0000
heap
page read and write
32B4000
trusted library allocation
page read and write
2D4F000
stack
page read and write
23B8000
direct allocation
page read and write
33E4000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
3326000
trusted library allocation
page read and write
319E000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
338A000
trusted library allocation
page read and write
B8D000
heap
page read and write
2FE4000
trusted library allocation
page read and write
3214000
trusted library allocation
page read and write
32A6000
trusted library allocation
page read and write
1363000
heap
page read and write
3162000
trusted library allocation
page read and write
14FC000
heap
page read and write
2BD5000
heap
page read and write
31E6000
trusted library allocation
page read and write
217FF000
heap
page read and write
1387000
heap
page read and write
3146000
trusted library allocation
page read and write
5D1E000
stack
page read and write
33AE000
trusted library allocation
page read and write
166D000
heap
page read and write
3200000
trusted library allocation
page read and write
30C8000
trusted library allocation
page read and write
19C5C000
heap
page read and write
33AA000
trusted library allocation
page read and write
611D000
heap
page read and write
1280000
trusted library allocation
page read and write
3EF5000
trusted library allocation
page read and write
31C8000
trusted library allocation
page read and write
322C000
trusted library allocation
page read and write
3458000
trusted library allocation
page read and write
14F0000
heap
page read and write
2BE9000
trusted library allocation
page read and write
339C000
trusted library allocation
page read and write
93E000
stack
page read and write
670000
heap
page read and write
3068000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
3006000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
33C0000
trusted library allocation
page read and write
3258000
trusted library allocation
page read and write
3084000
trusted library allocation
page read and write
12A7000
trusted library allocation
page execute and read and write
3086000
trusted library allocation
page read and write
3356000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
31FE000
unkown
page read and write
2F70000
trusted library allocation
page read and write
33FC000
trusted library allocation
page read and write
33CE000
trusted library allocation
page read and write
30BA000
trusted library allocation
page read and write
2D60000
heap
page read and write
2770000
trusted library allocation
page read and write
3124000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
10DE000
stack
page read and write
2FD6000
trusted library allocation
page read and write
2F76000
trusted library allocation
page read and write
34E0000
heap
page read and write
10A0000
heap
page read and write
330E000
trusted library allocation
page read and write
3366000
trusted library allocation
page read and write
82F000
stack
page read and write
3418000
trusted library allocation
page read and write
1B620000
heap
page read and write
325A000
trusted library allocation
page read and write
2F7A000
trusted library allocation
page read and write
1B06D000
stack
page read and write
1B30F000
stack
page read and write
3370000
trusted library allocation
page read and write
1380000
heap
page read and write
33DE000
trusted library allocation
page read and write
35A0000
heap
page read and write
445000
unkown
page read and write
3374000
trusted library allocation
page read and write
338E000
trusted library allocation
page read and write
10F3000
stack
page read and write
33A6000
trusted library allocation
page read and write
337A000
trusted library allocation
page read and write
CB0000
heap
page read and write
315A000
trusted library allocation
page read and write
3226000
trusted library allocation
page read and write
2C70000
heap
page read and write
3468000
trusted library allocation
page read and write
115E000
stack
page read and write
7E0000
heap
page read and write
11B4000
heap
page read and write
3496000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
141F000
heap
page read and write
335A000
trusted library allocation
page read and write
1022000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
30D2000
trusted library allocation
page read and write
60E000
stack
page read and write
3272000
trusted library allocation
page read and write
304E000
trusted library allocation
page read and write
2BEB000
trusted library allocation
page read and write
3344000
trusted library allocation
page read and write
30D6000
trusted library allocation
page read and write
3014000
trusted library allocation
page read and write
3480000
trusted library allocation
page read and write
3304000
trusted library allocation
page read and write
20883000
heap
page read and write
3332000
trusted library allocation
page read and write
678E000
stack
page read and write
3126000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
2F18000
trusted library allocation
page read and write
3318000
trusted library allocation
page read and write
114E000
stack
page read and write
3204000
trusted library allocation
page read and write
19DDC000
stack
page read and write
310E000
trusted library allocation
page read and write
14F4000
heap
page read and write
16EE000
heap
page read and write
1B5BD000
stack
page read and write
30EC000
trusted library allocation
page read and write
32EC000
trusted library allocation
page read and write
6C32E000
unkown
page read and write
C50000
heap
page read and write
5F1E000
stack
page read and write
339E000
trusted library allocation
page read and write
64A000
remote allocation
page execute and read and write
11ED000
heap
page read and write
3084000
trusted library allocation
page read and write
32EA000
trusted library allocation
page read and write
AF0000
heap
page read and write
2BEF000
trusted library allocation
page read and write
3164000
trusted library allocation
page read and write
2F6A000
trusted library allocation
page read and write
50E000
heap
page read and write
31A2000
trusted library allocation
page read and write
33DC000
trusted library allocation
page read and write
6C51E000
unkown
page read and write
9D4000
trusted library allocation
page read and write
320C000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
1706000
heap
page read and write
312C000
trusted library allocation
page read and write
3035000
heap
page read and write
D50000
heap
page read and write
328C000
trusted library allocation
page read and write
330C000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
3246000
trusted library allocation
page read and write
31DC000
trusted library allocation
page read and write
2EE0000
heap
page read and write
2C30000
heap
page read and write
3156000
trusted library allocation
page read and write
30AE000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
326A000
trusted library allocation
page read and write
10F8000
stack
page read and write
2011B000
direct allocation
page readonly
30F8000
trusted library allocation
page read and write
BB4000
heap
page read and write
2F48000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
6C332000
unkown
page readonly
30E6000
trusted library allocation
page read and write
3366000
trusted library allocation
page read and write
32F8000
trusted library allocation
page read and write
3466000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
60E0000
heap
page read and write
2FEF000
stack
page read and write
2FEA000
trusted library allocation
page read and write
3152000
trusted library allocation
page read and write
2F06000
trusted library allocation
page read and write
732000
unkown
page readonly
F39000
stack
page read and write
3002000
trusted library allocation
page read and write
20103000
direct allocation
page readonly
2181B000
heap
page read and write
3416000
trusted library allocation
page read and write
2DE8000
heap
page read and write
30C0000
trusted library allocation
page read and write
2FF8000
trusted library allocation
page read and write
30CC000
trusted library allocation
page read and write
488000
remote allocation
page execute and read and write
3310000
trusted library allocation
page read and write
1430000
heap
page read and write
467000
remote allocation
page execute and read and write
301C000
trusted library allocation
page read and write
3388000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
64C0000
heap
page read and write
2F94000
trusted library allocation
page read and write
31F4000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
3038000
trusted library allocation
page read and write
2FCC000
trusted library allocation
page read and write
3294000
trusted library allocation
page read and write
BD0000
heap
page read and write
331A000
trusted library allocation
page read and write
9F0000
heap
page read and write
1160000
heap
page read and write
3002000
trusted library allocation
page read and write
2240000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
32B2000
trusted library allocation
page read and write
32E2000
trusted library allocation
page read and write
A3E000
trusted library allocation
page read and write
19F5E000
stack
page read and write
201DD000
direct allocation
page execute read
3200000
trusted library allocation
page read and write
1207000
heap
page read and write
315E000
trusted library allocation
page read and write
3182000
trusted library allocation
page read and write
32CA000
trusted library allocation
page read and write
33FE000
trusted library allocation
page read and write
850000
heap
page read and write
30B2000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
2FA1000
trusted library allocation
page execute and read and write
31F8000
trusted library allocation
page read and write
325E000
trusted library allocation
page read and write
31C6000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
3358000
trusted library allocation
page read and write
315E000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
306E000
trusted library allocation
page read and write
94E000
stack
page read and write
303C000
trusted library allocation
page read and write
FF8000
heap
page read and write
EF8000
stack
page read and write
65C000
remote allocation
page execute and read and write
33C8000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
3244000
trusted library allocation
page read and write
1413000
heap
page read and write
3214000
trusted library allocation
page read and write
2CBD000
stack
page read and write
61ED0000
direct allocation
page read and write
D7C000
heap
page read and write
1320000
heap
page read and write
337E000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
970000
heap
page read and write
31D6000
trusted library allocation
page read and write
30A6000
trusted library allocation
page read and write
1178000
heap
page read and write
31C6000
trusted library allocation
page read and write
2D00000
heap
page read and write
31CC000
trusted library allocation
page read and write
2935000
heap
page read and write
31EC000
trusted library allocation
page read and write
33C2000
trusted library allocation
page read and write
31B8000
trusted library allocation
page read and write
2FBA000
trusted library allocation
page read and write
21743000
heap
page read and write
50E000
remote allocation
page execute and read and write
32EA000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
1330000
heap
page read and write
FAF000
stack
page read and write
45A000
remote allocation
page execute and read and write
2FDA000
trusted library allocation
page read and write
670000
remote allocation
page execute and read and write
308A000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
235B000
direct allocation
page read and write
19C6E000
heap
page read and write
3492000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
30FE000
trusted library allocation
page read and write
33DC000
trusted library allocation
page read and write
2D91E000
stack
page read and write
2FB4000
trusted library allocation
page read and write
9D90000
heap
page read and write
308E000
trusted library allocation
page read and write
6DD000
stack
page read and write
2FBE000
trusted library allocation
page read and write
3342000
trusted library allocation
page read and write
311C000
trusted library allocation
page read and write
2930000
heap
page read and write
2A61000
trusted library allocation
page execute and read and write
2F36000
trusted library allocation
page read and write
342C000
trusted library allocation
page read and write
9F0000
heap
page read and write
3060000
trusted library allocation
page read and write
6FD000
stack
page read and write
3386000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
2DA1F000
stack
page read and write
164A000
heap
page read and write
3052000
trusted library allocation
page read and write
320E000
trusted library allocation
page read and write
9E0000
heap
page read and write
12AB000
trusted library allocation
page execute and read and write
2FAA000
trusted library allocation
page read and write
31C2000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
3138000
trusted library allocation
page read and write
2D50000
heap
page read and write
337C000
trusted library allocation
page read and write
E7B000
trusted library allocation
page execute and read and write
330A000
trusted library allocation
page read and write
22A7000
direct allocation
page read and write
31FE000
trusted library allocation
page read and write
32BC000
trusted library allocation
page read and write
3196000
trusted library allocation
page read and write
2FF4000
trusted library allocation
page read and write
143F000
stack
page read and write
1580000
heap
page read and write
33DA000
trusted library allocation
page read and write
325A000
trusted library allocation
page read and write
92F000
stack
page read and write
2060E000
stack
page read and write
32FE000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
29EF000
stack
page read and write
620000
heap
page read and write
217E2000
heap
page read and write
30EC000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
45D000
remote allocation
page execute and read and write
101C000
heap
page read and write
3162000
trusted library allocation
page read and write
3292000
trusted library allocation
page read and write
32CC000
trusted library allocation
page read and write
31D8000
trusted library allocation
page read and write
1076000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
32D0000
trusted library allocation
page read and write
33B2000
trusted library allocation
page read and write
328A000
trusted library allocation
page read and write
97D000
stack
page read and write
32B0000
trusted library allocation
page read and write
1AB2E000
stack
page read and write
B0F000
stack
page read and write
30C6000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
2C1E000
unkown
page read and write
32E4000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
2D9E000
stack
page read and write
14DE000
stack
page read and write
2FE0000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
DFC000
stack
page read and write
2E5E000
stack
page read and write
3172000
trusted library allocation
page read and write
2F14000
trusted library allocation
page read and write
317E000
trusted library allocation
page read and write
334E000
trusted library allocation
page read and write
14FFF000
stack
page read and write
32A2000
trusted library allocation
page read and write
3092000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
11B0000
heap
page read and write
2F4B000
heap
page read and write
32E6000
trusted library allocation
page read and write
26AA000
trusted library allocation
page execute and read and write
1320000
heap
page read and write
32BA000
trusted library allocation
page read and write
2E2E000
stack
page read and write
1150000
heap
page read and write
331C000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
3134000
trusted library allocation
page read and write
102A000
trusted library allocation
page execute and read and write
2FE8000
trusted library allocation
page read and write
1024000
heap
page read and write
3104000
trusted library allocation
page read and write
3344000
trusted library allocation
page read and write
3336000
trusted library allocation
page read and write
32C6000
trusted library allocation
page read and write
19F78000
heap
page read and write
323E000
trusted library allocation
page read and write
FD5000
heap
page read and write
33F0000
trusted library allocation
page read and write
2FCE000
stack
page read and write
2EF1000
trusted library allocation
page execute and read and write
3220000
trusted library allocation
page read and write
31FC000
trusted library allocation
page read and write
6C51F000
unkown
page write copy
309E000
unkown
page read and write
309A000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
2FC2000
trusted library allocation
page read and write
311E000
trusted library allocation
page read and write
1480000
heap
page read and write
3240000
trusted library allocation
page read and write
63E000
stack
page read and write
D77000
heap
page read and write
14FBE000
stack
page read and write
3096000
trusted library allocation
page read and write
31AE000
trusted library allocation
page read and write
3312000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
345D000
stack
page read and write
111E000
stack
page read and write
1020000
trusted library allocation
page read and write
20238000
heap
page read and write
14F0000
heap
page read and write
2FD000
stack
page read and write
323F000
stack
page read and write
32B8000
trusted library allocation
page read and write
2EFC000
trusted library allocation
page read and write
1460000
heap
page read and write
3362000
trusted library allocation
page read and write
2012B000
direct allocation
page readonly
2F7C000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
55D000
remote allocation
page execute and read and write
31EA000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
DDF000
stack
page read and write
20085000
direct allocation
page execute read
317A000
trusted library allocation
page read and write
33EE000
trusted library allocation
page read and write
3346000
trusted library allocation
page read and write
312E000
trusted library allocation
page read and write
2F5A000
trusted library allocation
page read and write
329E000
trusted library allocation
page read and write
2CF0000
heap
page read and write
51B000
remote allocation
page execute and read and write
2180E000
heap
page read and write
33C4000
trusted library allocation
page read and write
31BC000
trusted library allocation
page read and write
1003000
trusted library allocation
page execute and read and write
12B7000
heap
page read and write
3116000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
30C0000
heap
page read and write
100D000
trusted library allocation
page execute and read and write
32F6000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
73D000
stack
page read and write
30A4000
trusted library allocation
page read and write
740000
heap
page read and write
3212000
trusted library allocation
page read and write
32CF000
stack
page read and write
3154000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
338E000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
300F000
stack
page read and write
563000
remote allocation
page execute and read and write
3168000
trusted library allocation
page read and write
19B8C000
heap
page read and write
2FEA000
trusted library allocation
page read and write
1284000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
2F6C000
trusted library allocation
page read and write
32DE000
trusted library allocation
page read and write
31DE000
trusted library allocation
page read and write
32BE000
trusted library allocation
page read and write
3078000
trusted library allocation
page read and write
3376000
trusted library allocation
page read and write
4A8ED000
stack
page read and write
3078000
trusted library allocation
page read and write
305A000
trusted library allocation
page read and write
16E6000
heap
page read and write
30B0000
heap
page read and write
19C80000
heap
page read and write
2C7E000
stack
page read and write
32F8000
trusted library allocation
page read and write
12A6000
trusted library allocation
page read and write
4EBE000
stack
page read and write
1B36D000
stack
page read and write
2BC7000
trusted library allocation
page read and write
2F3A000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
3158000
heap
page read and write
19E84000
heap
page read and write
150F000
stack
page read and write
120B000
heap
page read and write
2F16000
trusted library allocation
page read and write
3248000
trusted library allocation
page read and write
341C000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
12A7000
trusted library allocation
page execute and read and write
3058000
trusted library allocation
page read and write
5EC000
heap
page read and write
30DE000
trusted library allocation
page read and write
2943000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
860000
heap
page read and write
32FC000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
332A000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
640000
heap
page read and write
341E000
stack
page read and write
2250000
heap
page read and write
2ACC000
stack
page read and write
30DD000
stack
page read and write
33CC000
trusted library allocation
page read and write
305E000
trusted library allocation
page read and write
33B8000
trusted library allocation
page read and write
11F9000
heap
page read and write
345E000
trusted library allocation
page read and write
29AE000
stack
page read and write
20132000
direct allocation
page read and write
30B6000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
301A000
trusted library allocation
page read and write
32DC000
stack
page read and write
1A1D4000
heap
page read and write
3EF1000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
3488000
trusted library allocation
page read and write
319A000
trusted library allocation
page read and write
5C0000
heap
page read and write
3426000
trusted library allocation
page read and write
124D000
stack
page read and write
341A000
trusted library allocation
page read and write
3462000
trusted library allocation
page read and write
349C000
trusted library allocation
page read and write
865000
heap
page read and write
2941000
trusted library allocation
page execute and read and write
32A0000
trusted library allocation
page read and write
3202000
trusted library allocation
page read and write
6C32E000
unkown
page read and write
338C000
trusted library allocation
page read and write
563000
remote allocation
page execute and read and write
30F4000
trusted library allocation
page read and write
3294000
trusted library allocation
page read and write
527000
heap
page read and write
3236000
trusted library allocation
page read and write
34A2000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
12CB000
trusted library allocation
page execute and read and write
110A000
heap
page read and write
3176000
trusted library allocation
page read and write
318E000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
2FF2000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
304C000
trusted library allocation
page read and write
2FCC000
trusted library allocation
page read and write
327A000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
2A4E000
unkown
page read and write
2FF2000
trusted library allocation
page read and write
320E000
trusted library allocation
page read and write
3004000
trusted library allocation
page read and write
1560000
heap
page read and write
3238000
trusted library allocation
page read and write
2C99000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
EC0000
heap
page read and write
30BE000
trusted library allocation
page read and write
27891000
heap
page read and write
FF0000
heap
page execute and read and write
1512D000
stack
page read and write
3194000
trusted library allocation
page read and write
CC3000
trusted library allocation
page execute and read and write
300A000
trusted library allocation
page read and write
293E000
stack
page read and write
19CB5000
heap
page read and write
B80000
heap
page read and write
16C000
stack
page read and write
3476000
trusted library allocation
page read and write
3186000
trusted library allocation
page read and write
3124000
trusted library allocation
page read and write
3166000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
3262000
trusted library allocation
page read and write
3104000
trusted library allocation
page read and write
2C6C000
trusted library allocation
page read and write
345C000
trusted library allocation
page read and write
31B4000
trusted library allocation
page read and write
1A050000
heap
page read and write
31B0000
trusted library allocation
page read and write
9FB000
trusted library allocation
page execute and read and write
217EF000
heap
page read and write
7CE000
stack
page read and write
3232000
trusted library allocation
page read and write
7B0000
heap
page read and write
6C51E000
unkown
page read and write
301A000
trusted library allocation
page read and write
30C0000
heap
page read and write
2FC4000
trusted library allocation
page read and write
6C525000
unkown
page readonly
23B1000
direct allocation
page read and write
332A000
trusted library allocation
page read and write
56D000
stack
page read and write
1040000
heap
page read and write
3048000
trusted library allocation
page read and write
2EFE000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
234C000
direct allocation
page read and write
463000
remote allocation
page execute and read and write
7F0000
heap
page read and write
2CCE000
stack
page read and write
1371000
heap
page read and write
70D000
stack
page read and write
322A000
trusted library allocation
page read and write
F80000
heap
page read and write
3074000
trusted library allocation
page read and write
2BDD000
trusted library allocation
page read and write
B6E000
stack
page read and write
30CC000
trusted library allocation
page read and write
FCF000
stack
page read and write
20116000
direct allocation
page readonly
E8C000
stack
page read and write
9E7000
trusted library allocation
page execute and read and write
3130000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
3208000
trusted library allocation
page read and write
332C000
trusted library allocation
page read and write
7E0000
heap
page read and write
33F2000
trusted library allocation
page read and write
200FD000
direct allocation
page execute read
E6A000
trusted library allocation
page execute and read and write
2F2E000
trusted library allocation
page read and write
1212000
heap
page read and write
3310000
trusted library allocation
page read and write
3358000
trusted library allocation
page read and write
8FE000
stack
page read and write
32A8000
trusted library allocation
page read and write
19ED8000
heap
page read and write
2F28000
trusted library allocation
page read and write
60E2000
heap
page read and write
3252000
trusted library allocation
page read and write
5E0000
heap
page read and write
33C6000
trusted library allocation
page read and write
7EE000
heap
page read and write
8A0000
heap
page read and write
1B1AF000
stack
page read and write
1044F000
stack
page read and write
323C000
trusted library allocation
page read and write
295E000
stack
page read and write
33E2000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
31E8000
trusted library allocation
page read and write
331E000
trusted library allocation
page read and write
2345000
direct allocation
page read and write
290D000
stack
page read and write
1759C000
stack
page read and write
1290000
trusted library allocation
page read and write
14F4C000
stack
page read and write
3322000
trusted library allocation
page read and write
5CDE000
stack
page read and write
32BE000
trusted library allocation
page read and write
83E000
stack
page read and write
324A000
trusted library allocation
page read and write
1211000
heap
page read and write
13E7000
heap
page read and write
2F0E000
trusted library allocation
page read and write
358F000
stack
page read and write
13DE000
heap
page read and write
C9E000
stack
page read and write
3402000
trusted library allocation
page read and write
3188000
trusted library allocation
page read and write
3324000
trusted library allocation
page read and write
30AC000
trusted library allocation
page read and write
3046000
trusted library allocation
page read and write
33E4000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
32DC000
trusted library allocation
page read and write
D23000
heap
page read and write
CD0000
heap
page read and write
D30000
trusted library allocation
page read and write
309E000
trusted library allocation
page read and write
320A000
trusted library allocation
page read and write
BA4000
heap
page read and write
789000
heap
page read and write
BEF000
stack
page read and write
1A27B000
heap
page read and write
348A000
trusted library allocation
page read and write
33A2000
trusted library allocation
page read and write
355D000
stack
page read and write
31EE000
trusted library allocation
page read and write
200CA000
direct allocation
page execute read
337C000
trusted library allocation
page read and write
2D83000
trusted library allocation
page read and write
2FCA000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
129A000
trusted library allocation
page execute and read and write
2E6E000
stack
page read and write
2F8A000
trusted library allocation
page read and write
3062000
trusted library allocation
page read and write
2F0A000
trusted library allocation
page read and write
32D2000
trusted library allocation
page read and write
1100000
heap
page read and write
1A06F000
heap
page read and write
31CE000
trusted library allocation
page read and write
EA0000
trusted library allocation
page execute and read and write
3348000
trusted library allocation
page read and write
4C9D000
stack
page read and write
D9F000
heap
page read and write
3108000
trusted library allocation
page read and write
E77000
trusted library allocation
page execute and read and write
2C47000
trusted library allocation
page read and write
32D6000
trusted library allocation
page read and write
3042000
trusted library allocation
page read and write
2AFF000
stack
page read and write
2FC8000
trusted library allocation
page read and write
6C340000
unkown
page readonly
14E8E000
stack
page read and write
33D8000
trusted library allocation
page read and write
30D8000
trusted library allocation
page read and write
31AA000
trusted library allocation
page read and write
4B3D000
stack
page read and write
315C000
trusted library allocation
page read and write
3296000
trusted library allocation
page read and write
335C000
trusted library allocation
page read and write
2337000
direct allocation
page read and write
32D6000
trusted library allocation
page read and write
31C2000
trusted library allocation
page read and write
30D2000
trusted library allocation
page read and write
AD5000
heap
page read and write
31CE000
trusted library allocation
page read and write
9F7000
trusted library allocation
page execute and read and write
33BC000
trusted library allocation
page read and write
2F2C000
trusted library allocation
page read and write
73D000
stack
page read and write
314E000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
31F8000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
940000
heap
page read and write
1294000
trusted library allocation
page read and write
57C000
heap
page read and write
339E000
trusted library allocation
page read and write
1FFD1000
direct allocation
page execute read
1FEF8000
direct allocation
page execute read
19D40000
heap
page read and write
3228000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
342A000
trusted library allocation
page read and write
20056000
direct allocation
page execute read
2F92000
trusted library allocation
page read and write
2FAA000
trusted library allocation
page read and write
3316000
trusted library allocation
page read and write
2C8F000
stack
page read and write
19B82000
heap
page read and write
90D000
stack
page read and write
27870000
heap
page read and write
3236000
trusted library allocation
page read and write
3238000
trusted library allocation
page read and write
317E000
trusted library allocation
page read and write
60E6000
heap
page read and write
3178000
trusted library allocation
page read and write
30A8000
trusted library allocation
page read and write
330A000
trusted library allocation
page read and write
33BE000
trusted library allocation
page read and write
1074000
trusted library allocation
page read and write
30A2000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
2C95000
heap
page read and write
3258000
trusted library allocation
page read and write
31E6000
trusted library allocation
page read and write
3204000
trusted library allocation
page read and write
301E000
trusted library allocation
page read and write
71E000
unkown
page read and write
5CE000
stack
page read and write
316E000
trusted library allocation
page read and write
3052000
trusted library allocation
page read and write
596E000
stack
page read and write
340C000
trusted library allocation
page read and write
300E000
trusted library allocation
page read and write
2C60000
heap
page read and write
32C0000
trusted library allocation
page read and write
9F0000
heap
page read and write
1274000
trusted library allocation
page read and write
237F000
direct allocation
page read and write
500000
heap
page read and write
31FA000
trusted library allocation
page read and write
2FA2000
trusted library allocation
page read and write
2F5E000
trusted library allocation
page read and write
2BCA000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
BC0000
heap
page read and write
1B46C000
stack
page read and write
328C000
trusted library allocation
page read and write
33AA000
trusted library allocation
page read and write
335C000
trusted library allocation
page read and write
85D000
stack
page read and write
3FA5000
trusted library allocation
page read and write
32AA000
trusted library allocation
page read and write
3298000
trusted library allocation
page read and write
B38000
stack
page read and write
582E000
stack
page read and write
6D0000
heap
page read and write
75E000
stack
page read and write
16E8000
heap
page read and write
33A4000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
271E000
stack
page read and write
497E000
stack
page read and write
F3C000
stack
page read and write
2BC5000
trusted library allocation
page read and write
1226000
heap
page read and write
340E000
trusted library allocation
page read and write
2461000
direct allocation
page read and write
3312000
trusted library allocation
page read and write
168D000
heap
page read and write
59AE000
stack
page read and write
3032000
trusted library allocation
page read and write
30E0000
heap
page read and write
32FF000
unkown
page read and write
2F20000
heap
page read and write
3424000
trusted library allocation
page read and write
200C4000
direct allocation
page execute read
3072000
trusted library allocation
page read and write
1355000
heap
page read and write
3016000
trusted library allocation
page read and write
582000
remote allocation
page execute and read and write
3306000
trusted library allocation
page read and write
33B8000
trusted library allocation
page read and write
32AA000
trusted library allocation
page read and write
32E6000
trusted library allocation
page read and write
2C97000
trusted library allocation
page read and write
217E0000
heap
page read and write
1B734000
heap
page read and write
33BE000
trusted library allocation
page read and write
33A6000
trusted library allocation
page read and write
3448000
trusted library allocation
page read and write
9DA0000
heap
page read and write
3056000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
3332000
trusted library allocation
page read and write
30EE000
trusted library allocation
page read and write
5C6E000
stack
page read and write
309C000
trusted library allocation
page read and write
332E000
trusted library allocation
page read and write
55A000
remote allocation
page execute and read and write
320C000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
3334000
trusted library allocation
page read and write
30A2000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
32A4000
trusted library allocation
page read and write
584000
remote allocation
page execute and read and write
660000
heap
page read and write
534000
heap
page read and write
88D000
stack
page read and write
3314000
trusted library allocation
page read and write
1080000
heap
page execute and read and write
3300000
trusted library allocation
page read and write
2C1B000
heap
page read and write
3040000
trusted library allocation
page read and write
324A000
trusted library allocation
page read and write
2DF0000
heap
page read and write
3066000
trusted library allocation
page read and write
1038F000
stack
page read and write
3094000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
302E000
trusted library allocation
page read and write
30E3000
heap
page read and write
78E000
stack
page read and write
3282000
trusted library allocation
page read and write
309C000
trusted library allocation
page read and write
117E000
heap
page read and write
3148000
trusted library allocation
page read and write
1146000
heap
page read and write
329C000
trusted library allocation
page read and write
28EF000
unkown
page read and write
6CD000
stack
page read and write
12AB000
trusted library allocation
page execute and read and write
2DA0000
heap
page read and write
2F2F000
stack
page read and write
32FA000
trusted library allocation
page read and write
133C000
stack
page read and write
3304000
trusted library allocation
page read and write
3022000
trusted library allocation
page read and write
31E2000
trusted library allocation
page read and write
1100000
heap
page read and write
341E000
trusted library allocation
page read and write
30BD000
stack
page read and write
CC4000
trusted library allocation
page read and write
2F1A000
trusted library allocation
page read and write
2760000
trusted library allocation
page execute and read and write
44B000
unkown
page read and write
5B6E000
stack
page read and write
306A000
trusted library allocation
page read and write
318A000
trusted library allocation
page read and write
300A000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
2970000
heap
page read and write
3068000
trusted library allocation
page read and write
19CBD000
heap
page read and write
33B0000
trusted library allocation
page read and write
200FF000
direct allocation
page readonly
D21000
heap
page read and write
3286000
trusted library allocation
page read and write
9E50000
heap
page read and write
103B000
trusted library allocation
page execute and read and write
2FAE000
trusted library allocation
page read and write
14E0000
heap
page read and write
334C000
trusted library allocation
page read and write
990000
heap
page read and write
32F4000
trusted library allocation
page read and write
31B6000
trusted library allocation
page read and write
463000
remote allocation
page execute and read and write
319A000
trusted library allocation
page read and write
33EA000
trusted library allocation
page read and write
324E000
trusted library allocation
page read and write
5AAE000
stack
page read and write
3018000
trusted library allocation
page read and write
572E000
stack
page read and write
3170000
trusted library allocation
page read and write
218EA000
heap
page read and write
C05000
heap
page read and write
13FA000
heap
page read and write
3450000
trusted library allocation
page read and write
5CD000
stack
page read and write
2FD2000
trusted library allocation
page read and write
FD0000
heap
page read and write
2FE8000
trusted library allocation
page read and write
32FC000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
1423000
heap
page read and write
11F0000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
324C000
trusted library allocation
page read and write
33D4000
trusted library allocation
page read and write
32CE000
trusted library allocation
page read and write
3202000
trusted library allocation
page read and write
323E000
stack
page read and write
3244000
trusted library allocation
page read and write
32A8000
trusted library allocation
page read and write
55AE000
stack
page read and write
2C3B000
trusted library allocation
page read and write
267F5000
heap
page read and write
75E000
stack
page read and write
2FC2000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
19CAD000
heap
page read and write
2F56000
trusted library allocation
page read and write
6103000
heap
page read and write
3046000
trusted library allocation
page read and write
508E000
stack
page read and write
34A0000
heap
page read and write
B75000
heap
page read and write
3278000
trusted library allocation
page read and write
15DE000
stack
page read and write
1368000
heap
page read and write
33B4000
trusted library allocation
page read and write
2EF3000
trusted library allocation
page read and write
C9E000
stack
page read and write
5E1E000
stack
page read and write
26BB000
trusted library allocation
page execute and read and write
19F87000
heap
page read and write
78D000
stack
page read and write
318A000
trusted library allocation
page read and write
32D2000
trusted library allocation
page read and write
109D000
heap
page read and write
11F4000
trusted library allocation
page read and write
1017000
heap
page read and write
1170000
heap
page read and write
7E0000
heap
page read and write
33F4000
trusted library allocation
page read and write
2284000
direct allocation
page read and write
3250000
trusted library allocation
page read and write
B95000
heap
page read and write
3012000
trusted library allocation
page read and write
2C80000
heap
page read and write
32A2000
trusted library allocation
page read and write
301C000
trusted library allocation
page read and write
2CD8000
heap
page read and write
310A000
trusted library allocation
page read and write
33DA000
trusted library allocation
page read and write
2DFA000
heap
page read and write
3164000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
222E000
stack
page read and write
14EE000
stack
page read and write
400000
unkown
page readonly
32A7000
heap
page read and write
101E000
stack
page read and write
2F04000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
298F000
stack
page read and write
4D4000
remote allocation
page execute and read and write
12A7000
heap
page read and write
492000
remote allocation
page execute and read and write
3364000
trusted library allocation
page read and write
2FFE000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
3368000
trusted library allocation
page read and write
2F26000
trusted library allocation
page read and write
3296000
trusted library allocation
page read and write
37E000
stack
page read and write
31BA000
trusted library allocation
page read and write
3098000
trusted library allocation
page read and write
2F08000
trusted library allocation
page read and write
324C000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
BB0000
heap
page read and write
760000
heap
page read and write
2C91000
trusted library allocation
page read and write
302E000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
200C6000
direct allocation
page execute read
307C000
trusted library allocation
page read and write
3182000
trusted library allocation
page read and write
148E000
stack
page read and write
3064000
trusted library allocation
page read and write
30E8000
trusted library allocation
page read and write
DAC000
heap
page read and write
30F6000
trusted library allocation
page read and write
310E000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
9C3000
trusted library allocation
page execute and read and write
12FE000
heap
page read and write
379E000
stack
page read and write
31B8000
trusted library allocation
page read and write
6C2A1000
unkown
page execute read
A40000
heap
page read and write
1676000
heap
page read and write
303D000
stack
page read and write
2D9F000
unkown
page read and write
3186000
trusted library allocation
page read and write
31E2000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
31CC000
trusted library allocation
page read and write
345A000
trusted library allocation
page read and write
32D8000
trusted library allocation
page read and write
2F3E000
trusted library allocation
page read and write
2E1F000
stack
page read and write
33D6000
trusted library allocation
page read and write
3464000
trusted library allocation
page read and write
21809000
heap
page read and write
3280000
trusted library allocation
page read and write
332E000
trusted library allocation
page read and write
4C40000
heap
page read and write
3482000
trusted library allocation
page read and write
1B630000
heap
page read and write
3484000
trusted library allocation
page read and write
3334000
trusted library allocation
page read and write
2F25000
heap
page read and write
69C000
stack
page read and write
3176000
trusted library allocation
page read and write
333A000
trusted library allocation
page read and write
4BBF000
stack
page read and write
3055000
heap
page read and write
3264000
trusted library allocation
page read and write
2F68000
trusted library allocation
page read and write
33D6000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
30AE000
trusted library allocation
page read and write
2CD0000
heap
page read and write
321E000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
121B000
heap
page read and write
326A000
trusted library allocation
page read and write
349A000
trusted library allocation
page read and write
313C000
trusted library allocation
page read and write
31F4000
trusted library allocation
page read and write
3374000
trusted library allocation
page read and write
1505D000
stack
page read and write
2B57000
trusted library allocation
page read and write
98D000
stack
page read and write
1294D000
stack
page read and write
310C000
trusted library allocation
page read and write
342E000
trusted library allocation
page read and write
1047000
heap
page read and write
3354000
trusted library allocation
page read and write
319C000
trusted library allocation
page read and write
30CD000
stack
page read and write
5F9E000
stack
page read and write
33BA000
trusted library allocation
page read and write
9DF000
stack
page read and write
32AC000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
19C4C000
heap
page read and write
30EA000
trusted library allocation
page read and write
19C40000
heap
page read and write
4B7E000
stack
page read and write
2FB6000
trusted library allocation
page read and write
3388000
trusted library allocation
page read and write
142F000
stack
page read and write
150BF000
stack
page read and write
32C4000
trusted library allocation
page read and write
334E000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
12A4000
trusted library allocation
page read and write
3428000
trusted library allocation
page read and write
20136000
direct allocation
page execute read
9D0000
trusted library allocation
page read and write
3014000
trusted library allocation
page read and write
2F24000
trusted library allocation
page read and write
329C000
heap
page read and write
20126000
direct allocation
page readonly
32B6000
trusted library allocation
page read and write
33F8000
trusted library allocation
page read and write
940000
heap
page read and write
31B0000
trusted library allocation
page read and write
135D000
heap
page read and write
2FC8000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
2B50000
heap
page read and write
605000
heap
page read and write
327A000
trusted library allocation
page read and write
278C2000
heap
page read and write
31BE000
trusted library allocation
page read and write
101D000
trusted library allocation
page execute and read and write
11AE000
stack
page read and write
9C000
stack
page read and write
21803000
heap
page read and write
2F8F000
stack
page read and write
BDE000
stack
page read and write
17F0000
heap
page read and write
500000
heap
page read and write
336E000
trusted library allocation
page read and write
30AA000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
311A000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
2040D000
stack
page read and write
19E4E000
stack
page read and write
3036000
trusted library allocation
page read and write
32D8000
trusted library allocation
page read and write
2F1C000
trusted library allocation
page read and write
2330000
direct allocation
page read and write
306C000
trusted library allocation
page read and write
1417000
heap
page read and write
201DF000
direct allocation
page readonly
2FE2000
trusted library allocation
page read and write
B20000
heap
page read and write
115C000
stack
page read and write
26B7000
trusted library allocation
page execute and read and write
7BD000
stack
page read and write
305E000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
16F4000
heap
page read and write
2E5D000
stack
page read and write
3040000
trusted library allocation
page read and write
52D000
remote allocation
page execute and read and write
3274000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
508000
heap
page read and write
650000
heap
page read and write
31D8000
trusted library allocation
page read and write
98F000
stack
page read and write
5210000
trusted library allocation
page read and write
2F62000
trusted library allocation
page read and write
3324000
trusted library allocation
page read and write
60FF000
heap
page read and write
132E000
stack
page read and write
33D2000
trusted library allocation
page read and write
3494000
trusted library allocation
page read and write
32C6000
trusted library allocation
page read and write
3150000
heap
page read and write
3174000
trusted library allocation
page read and write
306E000
trusted library allocation
page read and write
780000
heap
page read and write
333A000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
33E6000
trusted library allocation
page read and write
2FFC000
trusted library allocation
page read and write
3368000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
338A000
trusted library allocation
page read and write
3188000
trusted library allocation
page read and write
CD000
stack
page read and write
4FEE000
stack
page read and write
29BE000
unkown
page read and write
33EC000
trusted library allocation
page read and write
123C000
stack
page read and write
3266000
trusted library allocation
page read and write
30A6000
trusted library allocation
page read and write
2FB0000
heap
page read and write
3FD000
stack
page read and write
2CB0000
heap
page read and write
19B9D000
heap
page read and write
61E000
stack
page read and write
314C000
trusted library allocation
page read and write
3FA1000
trusted library allocation
page read and write
1200000
heap
page read and write
81F000
stack
page read and write
760000
heap
page read and write
2C10000
heap
page read and write
31DE000
stack
page read and write
33D0000
trusted library allocation
page read and write
2A8F000
stack
page read and write
26D0000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
36AF000
stack
page read and write
2D4D000
stack
page read and write
2C5E000
stack
page read and write
303E000
trusted library allocation
page read and write
DB0000
heap
page read and write
339A000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
2F63000
heap
page read and write
2FD0000
heap
page read and write
2CC0000
heap
page read and write
446000
unkown
page write copy
46B000
remote allocation
page execute and read and write
5FDE000
stack
page read and write
2FAC000
trusted library allocation
page read and write
610D000
heap
page read and write
334C000
trusted library allocation
page read and write
3058000
trusted library allocation
page read and write
1640000
heap
page read and write
2E0F000
unkown
page read and write
2181F000
heap
page read and write
1140000
heap
page read and write
2280000
direct allocation
page read and write
19D9C000
stack
page read and write
2C6F000
unkown
page read and write
2FB2000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
10E7000
heap
page read and write
13F7000
heap
page read and write
155D000
stack
page read and write
2E6F000
stack
page read and write
138D000
heap
page read and write
E3C000
stack
page read and write
628000
heap
page read and write
2F12000
trusted library allocation
page read and write
3024000
trusted library allocation
page read and write
304C000
trusted library allocation
page read and write
480000
heap
page read and write
10E0000
heap
page read and write
2328000
direct allocation
page read and write
336C000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
9C4000
trusted library allocation
page read and write
275D000
stack
page read and write
3360000
trusted library allocation
page read and write
3268000
trusted library allocation
page read and write
2FEE000
trusted library allocation
page read and write
1FF63000
direct allocation
page execute read
32DA000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
3272000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
176EE000
stack
page read and write
3108000
trusted library allocation
page read and write
33CC000
trusted library allocation
page read and write
EFC000
stack
page read and write
3022000
trusted library allocation
page read and write
2F9E000
trusted library allocation
page read and write
31C4000
trusted library allocation
page read and write
3288000
trusted library allocation
page read and write
AD0000
heap
page read and write
664E000
stack
page read and write
90D000
stack
page read and write
32AE000
trusted library allocation
page read and write
2F78000
trusted library allocation
page read and write
1310000
heap
page read and write
2C90000
heap
page read and write
3414000
trusted library allocation
page read and write
2FEF000
stack
page read and write
63A000
remote allocation
page execute and read and write
2FA8000
trusted library allocation
page read and write
3006000
trusted library allocation
page read and write
5CB000
remote allocation
page execute and read and write
3442000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
31AE000
trusted library allocation
page read and write
536D000
stack
page read and write
2F38000
trusted library allocation
page read and write
680000
heap
page read and write
31BA000
trusted library allocation
page read and write
329A000
trusted library allocation
page read and write
313A000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
349E000
trusted library allocation
page read and write
30FA000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
3338000
trusted library allocation
page read and write
CE0000
heap
page read and write
32AE000
trusted library allocation
page read and write
3048000
trusted library allocation
page read and write
313A000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
3142000
trusted library allocation
page read and write
347C000
trusted library allocation
page read and write
2FDE000
stack
page read and write
33C4000
trusted library allocation
page read and write
There are 2401 hidden memdumps, click here to show them.