IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\Nework[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\crypted[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\neon[1].exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\rstxdhuj[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\Microsoft-Edge[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\gold[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\needmoney[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\12dsvc[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\newbundle2[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\penis[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\LummaC222222[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\cccc2[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\stealc_default2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000002001\gold.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000004001\12dsvc.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000005001\Nework.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000191001\needmoney.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000254001\penis.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000290001\crypted.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000314001\LummaC222222.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000322001\newbundle2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000342001\rstxdhuj.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000349001\cccc2.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000354001\c6f71c9f40.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000355001\3ab68b6f1f.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000356001\neon.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000357001\Microsoft-Edge.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\NetSup_Buil2d.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\svchost015.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\VCIo8iTrPf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Ylrdnrwcx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\esFzLrEqPw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AFCBKFHJJJKKFHIDAAKF
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\AKKEGDGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\CBKJJJDHDGDAAKECAKJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CFIEHCFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\CGDBGCBGIDHCBGDHIEBF
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\DGDBFBFCBFBKECAAKJKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\ECGDHIDAAFHIIDGDBFIECFCFHI
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FBAAAKFCAFIIDHIDGHIECGDGID
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FCGIJKJJKEBGHJKFIDGCAAFCAF
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\GHIDHCBGDHJKEBGDGIJECFIDGC
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\IDAAFBGDBKJJJKFIIIJJJECAAE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IECGIEBAEBFIIECBGCBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IJJJKEGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJDGIIDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJJEGHDAECBFHJKEGIJKKJKKKF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KECFCGHIDHCAKEBFCFHC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 05:47:20 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\12dsvc.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VCIo8iTrPf.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cccc2.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\crypted.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\gold.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\newbundle2.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\penis.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\TmpA451.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpA462.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpB578.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpB588.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpFBD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpFC35.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpFC46.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpFCE.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\26e6dc3279954494be14b7b8567c87b5_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\876839fa433a5db637fbfc481f0e8c50_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\e5b7c7ff24796fe5cddb308f57cb644a_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\Hkbsse.job
data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped
There are 89 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000002001\gold.exe
"C:\Users\user\AppData\Local\Temp\1000002001\gold.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000004001\12dsvc.exe
"C:\Users\user\AppData\Local\Temp\1000004001\12dsvc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Roaming\esFzLrEqPw.exe
"C:\Users\user\AppData\Roaming\esFzLrEqPw.exe"
malicious
C:\Users\user\AppData\Roaming\VCIo8iTrPf.exe
"C:\Users\user\AppData\Roaming\VCIo8iTrPf.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000005001\Nework.exe
"C:\Users\user\AppData\Local\Temp\1000005001\Nework.exe"
malicious
C:\Users\user\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
C:\Users\user\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
malicious
C:\Users\user\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
"C:\Users\user\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe
"C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000191001\needmoney.exe
"C:\Users\user\AppData\Local\Temp\1000191001\needmoney.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000254001\penis.exe
"C:\Users\user\AppData\Local\Temp\1000254001\penis.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000290001\crypted.exe
"C:\Users\user\AppData\Local\Temp\1000290001\crypted.exe"
malicious
C:\Users\user\AppData\Local\Temp\svchost015.exe
C:\Users\user\AppData\Local\Temp\svchost015.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000314001\LummaC222222.exe
"C:\Users\user\AppData\Local\Temp\1000314001\LummaC222222.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000322001\newbundle2.exe
"C:\Users\user\AppData\Local\Temp\1000322001\newbundle2.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000342001\rstxdhuj.exe
"C:\Users\user\AppData\Local\Temp\1000342001\rstxdhuj.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000349001\cccc2.exe
"C:\Users\user\AppData\Local\Temp\1000349001\cccc2.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000354001\c6f71c9f40.exe
"C:\Users\user\AppData\Local\Temp\1000354001\c6f71c9f40.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 908
There are 23 hidden processes, click here to show them.

URLs

Name
IP
Malicious
lootebarrkeyn.shop
malicious
http://91.202.233.158/3836fd5700214436/msvcp140.dll
91.202.233.158
malicious
http://91.202.233.158/3836fd5700214436/sqlite3.dll
91.202.233.158
malicious
stogeneratmns.shop
malicious
http://91.202.233.158/
91.202.233.158
malicious
http://91.202.233.158/e96ea2db21fa9a1b.php
91.202.233.158
malicious
http://91.202.233.158/3836fd5700214436/vcruntime140.dll
91.202.233.158
malicious
89.105.223.196:29862
malicious
fragnantbui.shop
malicious
offensivedzvju.shop
malicious
188.190.10.161
malicious
http://91.202.233.158/3836fd5700214436/nss3.dll
91.202.233.158
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.17/f1ddeb6592c03206/sqlite3.dll
185.215.113.17
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0Q
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://185.215.113.117/inc/gold.exe8
unknown
https://eijfrhegrtbrfcd.online/D9
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://www.x-ways.net/winhex/subscribe-d.htmlU
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://185.215.113.117/inc/gold.exeP
unknown
http://185.215.113.16/XN
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://185.215.113.16/inc/stealc_default2.exe(P
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://www.x-ways.net/order.html-d.htmlS
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://185.215.113.16/Jo89Ku7d/index.phpft
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://91.202.233.158/g
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpTK
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://185.215.113.16/Jo89Ku7d/index.phpUsers
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://eijfrhegrtbrfcd.online/download/Microsoft-Edge.exe
104.21.64.194
https://api.ip.sb/ip
unknown
https://www.x-ways.net/winhex/forum/www.x-ways.net/winhex/templates/www.x-ways.net/dongle_protection
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
https://cdn.ep
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phperbird
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://185.215.113.17/2fb6c2cc8dce150a.php6
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://eijfrhegrtbrfcd.online/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://185.215.113.103/mine/random.exe
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpB
unknown
http://194.116.215.195/12dsvc.exe
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://185.215.113.103/mine/random.exe&
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://91.202.233.158//
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://ocsp.sectigo.com0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpN
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
https://api.ip.s
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpf
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://185.215.113.16/ineer
unknown
http://185.215.113.17/2fb6c2cc8dce150a.phpZ
unknown
http://185.215.113.17/f1ddeb6592c03206/nss3.dllrowser
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drawzhotdog.shop
172.67.162.108
malicious
google.com
142.250.186.46
eijfrhegrtbrfcd.online
104.21.64.194
youtube-ui.l.google.com
142.250.181.238
www3.l.google.com
216.58.206.78
play.google.com
142.250.185.206
www.google.com
142.250.185.100
glthub.ru
37.140.192.213
youtube.com
142.250.186.174
accounts.youtube.com
unknown
www.youtube.com
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
91.202.233.158
unknown
Russian Federation
malicious
185.215.113.37
unknown
Portugal
malicious
185.215.113.67
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
malicious
185.215.113.17
unknown
Portugal
malicious
172.67.162.108
drawzhotdog.shop
United States
malicious
65.21.18.51
unknown
United States
malicious
89.105.223.196
unknown
Netherlands
malicious
185.215.113.117
unknown
Portugal
malicious
142.250.186.46
google.com
United States
194.116.215.195
unknown
unknown
185.215.113.26
unknown
Portugal
104.21.64.194
eijfrhegrtbrfcd.online
United States
95.179.250.45
unknown
Netherlands
37.140.192.213
glthub.ru
Russian Federation
185.215.113.103
unknown
Portugal
There are 6 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
c6f71c9f40.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
3ab68b6f1f.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Ylrdnrwcx
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\newbundle2_RASMANCS
FileDirectory
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
38A1000
trusted library allocation
page read and write
malicious
5A1000
unkown
page execute read
malicious
201000
unkown
page execute and read and write
malicious
FF2000
unkown
page readonly
malicious
3129000
direct allocation
page execute and read and write
malicious
4A00000
direct allocation
page read and write
malicious
5390000
direct allocation
page read and write
malicious
4A20000
direct allocation
page read and write
malicious
5A1000
unkown
page execute read
malicious
2971000
trusted library allocation
page read and write
malicious
AC2000
unkown
page readonly
malicious
5370000
direct allocation
page read and write
malicious
5A1000
unkown
page execute read
malicious
101E000
heap
page read and write
malicious
2E20000
direct allocation
page execute and read and write
malicious
5A1000
unkown
page execute read
malicious
402000
remote allocation
page execute and read and write
malicious
51000
unkown
page readonly
malicious
201000
unkown
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
38C5000
trusted library allocation
page read and write
malicious
5FA0000
trusted library section
page read and write
malicious
931000
unkown
page execute read
malicious
B51000
unkown
page execute and read and write
malicious
201000
unkown
page execute and read and write
malicious
3740000
direct allocation
page read and write
malicious
931000
unkown
page execute and write copy
malicious
BFE000
heap
page read and write
malicious
421000
remote allocation
page execute and read and write
malicious
2821000
trusted library allocation
page read and write
malicious
423000
remote allocation
page execute and read and write
malicious
931000
unkown
page execute and write copy
malicious
4C10000
direct allocation
page read and write
malicious
4165000
trusted library allocation
page read and write
malicious
931000
unkown
page execute read
malicious
3710000
direct allocation
page execute and read and write
malicious
317F000
stack
page read and write
20FD2000
heap
page read and write
153E000
stack
page read and write
6A4F000
stack
page read and write
30BC000
trusted library allocation
page read and write
301E000
stack
page read and write
4ED1000
heap
page read and write
4E1000
unkown
page execute and read and write
1475000
heap
page read and write
4C4000
remote allocation
page execute and read and write
38F0000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
17CF000
stack
page read and write
2C96000
trusted library allocation
page read and write
C64000
heap
page read and write
171E000
heap
page read and write
5F30000
trusted library allocation
page execute and read and write
3F0E000
stack
page read and write
7D63000
heap
page read and write
556E000
stack
page read and write
575E000
stack
page read and write
2EF8000
trusted library allocation
page read and write
2750000
heap
page read and write
4581000
heap
page read and write
2A5B000
trusted library allocation
page read and write
36DC000
trusted library allocation
page read and write
3856000
trusted library allocation
page read and write
526F000
stack
page read and write
553C000
stack
page read and write
1AB1E000
stack
page read and write
4F01000
heap
page read and write
8C44000
heap
page read and write
5F8A000
heap
page read and write
101D000
unkown
page execute and write copy
38CE000
stack
page read and write
38FF000
stack
page read and write
12D2000
trusted library allocation
page read and write
4F45000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
4581000
heap
page read and write
2860000
heap
page read and write
17D0000
heap
page read and write
1081000
heap
page read and write
4BCE000
stack
page read and write
4581000
heap
page read and write
4E2E000
stack
page read and write
4581000
heap
page read and write
2E80000
heap
page execute and read and write
6AE000
heap
page read and write
4ED1000
heap
page read and write
619E000
stack
page read and write
4C30000
direct allocation
page execute and read and write
41A8000
trusted library allocation
page read and write
B6E000
unkown
page readonly
5410000
trusted library allocation
page read and write
267F000
stack
page read and write
4ED1000
heap
page read and write
7E76000
heap
page read and write
5A8E000
stack
page read and write
20FB1000
heap
page read and write
5390000
direct allocation
page read and write
5330000
trusted library allocation
page read and write
79A5000
trusted library allocation
page read and write
C0E000
stack
page read and write
5B30000
trusted library allocation
page execute and read and write
4C88000
trusted library allocation
page read and write
660000
trusted library allocation
page read and write
129A000
trusted library allocation
page execute and read and write
5EF7000
heap
page read and write
2C77000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
2AA4000
trusted library allocation
page read and write
45A0000
heap
page read and write
68EFD000
unkown
page readonly
280D000
stack
page read and write
1AC6E000
stack
page read and write
49DE000
stack
page read and write
37FE000
trusted library allocation
page read and write
5530000
direct allocation
page execute and read and write
7F280000
trusted library allocation
page execute and read and write
573E000
stack
page read and write
2DFE000
stack
page read and write
3073000
trusted library allocation
page read and write
62C000
remote allocation
page execute and read and write
951E000
stack
page read and write
4B3E000
stack
page read and write
4581000
heap
page read and write
CFD000
stack
page read and write
103B000
heap
page read and write
BE7000
heap
page read and write
74BE000
stack
page read and write
26B000
unkown
page execute and read and write
63DE000
stack
page read and write
680E000
stack
page read and write
36A2000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
DD0000
heap
page read and write
4ED1000
heap
page read and write
5AC0000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
7990000
trusted library allocation
page read and write
6DC2000
heap
page read and write
4F01000
heap
page read and write
6D6D000
heap
page read and write
78FE000
stack
page read and write
2688000
heap
page read and write
1A9DE000
stack
page read and write
37BF000
stack
page read and write
4B70000
direct allocation
page execute and read and write
2BD1000
trusted library allocation
page read and write
2BA8000
trusted library allocation
page read and write
D57000
stack
page read and write
561E000
stack
page read and write
4ED1000
heap
page read and write
15E4000
heap
page read and write
2FC0000
trusted library allocation
page read and write
425F000
trusted library allocation
page read and write
7F4A000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
4CEE000
stack
page read and write
11A000
stack
page read and write
5D53000
heap
page read and write
4F01000
heap
page read and write
292B000
trusted library allocation
page read and write
3A2A000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
35FC000
trusted library allocation
page read and write
4ED1000
heap
page read and write
2C03000
trusted library allocation
page read and write
6EAC000
stack
page read and write
E1E000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
283B000
trusted library allocation
page execute and read and write
15C0000
heap
page read and write
3A7E000
stack
page read and write
695B1000
unkown
page execute read
C90000
trusted library allocation
page read and write
7090000
trusted library allocation
page execute and read and write
274CA000
heap
page read and write
4EC0000
direct allocation
page read and write
C1E000
stack
page read and write
2D21000
trusted library allocation
page read and write
E31000
unkown
page execute and read and write
4D90000
direct allocation
page execute and read and write
2EFF000
stack
page read and write
4F01000
heap
page read and write
4E1C000
stack
page read and write
4EC0000
direct allocation
page read and write
4F51000
trusted library allocation
page read and write
CD7000
trusted library allocation
page execute and read and write
8020000
trusted library allocation
page read and write
7DFA000
heap
page read and write
930000
unkown
page readonly
31D9000
trusted library allocation
page read and write
8FF0000
heap
page read and write
4FE0000
heap
page execute and read and write
27020000
heap
page read and write
5EDE000
stack
page read and write
12B0000
trusted library allocation
page read and write
2C35000
trusted library allocation
page read and write
11EE000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
3183000
trusted library allocation
page read and write
2B5B000
trusted library allocation
page read and write
8E8000
stack
page read and write
3611000
trusted library allocation
page read and write
780B000
heap
page read and write
5D6C000
heap
page read and write
27F0000
trusted library allocation
page read and write
20FB4000
heap
page read and write
6FF0000
trusted library allocation
page read and write
3645000
trusted library allocation
page read and write
2BCF000
trusted library allocation
page read and write
38AB000
trusted library allocation
page read and write
E20000
direct allocation
page read and write
4F88000
trusted library allocation
page read and write
2C1E000
trusted library allocation
page read and write
2503000
trusted library allocation
page read and write
663B000
stack
page read and write
A64000
heap
page read and write
AC0000
unkown
page readonly
33BF000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
1960000
heap
page read and write
6C80000
heap
page read and write
A71000
heap
page read and write
4581000
heap
page read and write
B20000
heap
page read and write
10D9000
stack
page read and write
4ED1000
heap
page read and write
3237000
heap
page read and write
2C50000
trusted library allocation
page read and write
EF4000
heap
page read and write
55F1000
heap
page read and write
1190000
heap
page read and write
5272000
trusted library allocation
page read and write
4ED1000
heap
page read and write
56AD000
stack
page read and write
8D30000
trusted library allocation
page execute and read and write
16CF000
stack
page read and write
20FA6000
heap
page read and write
4922000
trusted library allocation
page read and write
6655000
trusted library allocation
page read and write
35BF000
stack
page read and write
4736000
heap
page read and write
4305000
trusted library allocation
page read and write
35B8000
trusted library allocation
page read and write
40BE000
stack
page read and write
20FA1000
heap
page read and write
133A000
heap
page read and write
314E000
stack
page read and write
2F70000
heap
page read and write
2822000
trusted library allocation
page read and write
FE8000
heap
page read and write
E0F000
unkown
page readonly
368F000
trusted library allocation
page read and write
FB4000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
4C0000
unkown
page readonly
532F000
trusted library allocation
page read and write
575D000
stack
page read and write
2A70000
trusted library allocation
page execute and read and write
4F3B000
trusted library allocation
page read and write
6480000
trusted library allocation
page execute and read and write
6FEB000
trusted library allocation
page read and write
3432000
trusted library allocation
page read and write
27BF000
trusted library allocation
page read and write
14AF000
stack
page read and write
1590000
heap
page read and write
20FCF000
heap
page read and write
42FF000
stack
page read and write
27E0000
trusted library allocation
page read and write
597A000
heap
page read and write
2E54000
trusted library allocation
page read and write
5D10000
heap
page read and write
93CE000
stack
page read and write
2B95000
trusted library allocation
page read and write
44A5000
trusted library allocation
page read and write
80EF000
stack
page read and write
AB7000
unkown
page read and write
21427000
heap
page read and write
EF4000
heap
page read and write
35DD000
trusted library allocation
page read and write
4426000
trusted library allocation
page read and write
58EE000
heap
page read and write
4581000
heap
page read and write
2144D000
heap
page read and write
4ABF000
stack
page read and write
300F000
trusted library allocation
page read and write
4EF0000
direct allocation
page read and write
F27000
heap
page read and write
D6B000
heap
page read and write
B70000
heap
page read and write
1325000
heap
page read and write
8D40000
trusted library allocation
page read and write
373E000
stack
page read and write
2F41000
trusted library allocation
page read and write
12EF000
stack
page read and write
6938000
trusted library allocation
page read and write
4EC0000
direct allocation
page read and write
1770000
heap
page read and write
9D9000
heap
page read and write
1505000
heap
page read and write
5D88000
heap
page read and write
E00000
heap
page read and write
4D01000
heap
page read and write
4ED1000
heap
page read and write
1180000
heap
page read and write
2C09000
trusted library allocation
page read and write
2140B000
heap
page read and write
CDB000
trusted library allocation
page execute and read and write
777E000
stack
page read and write
3703000
trusted library allocation
page read and write
77D6000
heap
page read and write
309D000
trusted library allocation
page read and write
97C000
stack
page read and write
274D0000
heap
page read and write
6A60000
trusted library allocation
page execute and read and write
2480000
direct allocation
page read and write
2776000
trusted library allocation
page read and write
6D60000
heap
page read and write
2C98000
trusted library allocation
page read and write
4F1000
remote allocation
page execute and read and write
2AD6000
trusted library allocation
page read and write
2A55000
trusted library allocation
page read and write
448F000
trusted library allocation
page read and write
1570000
heap
page read and write
728E000
stack
page read and write
6F90000
trusted library allocation
page read and write
35C6000
trusted library allocation
page read and write
21423000
heap
page read and write
C64000
heap
page read and write
61ED4000
direct allocation
page readonly
5F20000
trusted library allocation
page execute and read and write
129F000
stack
page read and write
326F000
trusted library allocation
page read and write
182C000
heap
page read and write
D6F000
stack
page read and write
DB0000
unkown
page readonly
48D000
unkown
page read and write
4735000
heap
page read and write
6B20000
trusted library allocation
page execute and read and write
1737000
heap
page read and write
2B19000
trusted library allocation
page read and write
4ED1000
heap
page read and write
2D3E000
trusted library allocation
page read and write
4ED1000
heap
page read and write
50E000
unkown
page execute and read and write
653E000
stack
page read and write
2C73000
trusted library allocation
page read and write
34B8000
trusted library allocation
page read and write
407000
remote allocation
page execute and read and write
1154000
heap
page read and write
2144D000
heap
page read and write
1850000
heap
page read and write
3BBE000
stack
page read and write
4581000
heap
page read and write
2AEE000
stack
page read and write
4581000
heap
page read and write
171E000
heap
page read and write
3809000
trusted library allocation
page read and write
602000
unkown
page read and write
41FE000
stack
page read and write
4FD0000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
37B5000
trusted library allocation
page read and write
175B000
heap
page read and write
4ED1000
heap
page read and write
2711000
trusted library allocation
page read and write
2D12000
trusted library allocation
page read and write
20FC1000
heap
page read and write
5822000
trusted library allocation
page read and write
4DC000
remote allocation
page execute and read and write
2B5F000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
65DE000
stack
page read and write
31BE000
stack
page read and write
2C3B000
trusted library allocation
page read and write
385B000
trusted library allocation
page read and write
20FE3000
heap
page read and write
100000
heap
page read and write
4ED1000
heap
page read and write
6D20000
trusted library allocation
page read and write
21CE000
stack
page read and write
36D5000
trusted library allocation
page read and write
4F01000
heap
page read and write
2F09000
trusted library allocation
page read and write
364D000
trusted library allocation
page read and write
73BE000
stack
page read and write
133C000
stack
page read and write
1312000
trusted library allocation
page read and write
14D8000
heap
page read and write
2CC6000
trusted library allocation
page read and write
468E000
stack
page read and write
5963000
heap
page read and write
3A91000
trusted library allocation
page read and write
54D0000
direct allocation
page execute and read and write
3C81000
trusted library allocation
page read and write
5F40000
trusted library allocation
page execute and read and write
2A0E000
trusted library allocation
page read and write
2DBF000
stack
page read and write
6890000
trusted library allocation
page read and write
2C92000
trusted library allocation
page read and write
85CC000
stack
page read and write
E3D000
trusted library allocation
page execute and read and write
302A000
trusted library allocation
page read and write
3754000
trusted library allocation
page read and write
1B391000
heap
page read and write
1036000
unkown
page readonly
4AD0000
heap
page read and write
1480000
heap
page read and write
2F90000
trusted library allocation
page read and write
200000
unkown
page readonly
172E000
heap
page read and write
303F000
trusted library allocation
page read and write
E51000
heap
page read and write
3253000
trusted library allocation
page read and write
4ED1000
heap
page read and write
2D22000
trusted library allocation
page execute and read and write
B37000
trusted library allocation
page execute and read and write
5E44000
heap
page read and write
2142C000
heap
page read and write
4A10000
direct allocation
page read and write
3676000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
4DFE000
stack
page read and write
6D10000
trusted library allocation
page execute and read and write
3657000
trusted library allocation
page read and write
7E68000
heap
page read and write
3538000
trusted library allocation
page read and write
2757000
trusted library allocation
page read and write
447E000
stack
page read and write
21443000
heap
page read and write
31BE000
stack
page read and write
5AE0000
trusted library allocation
page execute and read and write
27CA000
trusted library allocation
page read and write
11AF000
stack
page read and write
EF4000
heap
page read and write
9CF000
unkown
page read and write
623A000
trusted library allocation
page execute and read and write
6E05000
heap
page read and write
642000
unkown
page readonly
516000
unkown
page execute and read and write
1AF21000
heap
page read and write
4581000
heap
page read and write
25B3000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
2E69000
trusted library allocation
page read and write
5F1F000
heap
page read and write
42B3000
trusted library allocation
page read and write
2F2C000
trusted library allocation
page read and write
37FE000
stack
page read and write
9BA000
heap
page read and write
32EB000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2CBE000
stack
page read and write
3005000
trusted library allocation
page read and write
2820000
trusted library allocation
page execute and read and write
534E000
stack
page read and write
4A10000
direct allocation
page read and write
4ED1000
heap
page read and write
251B000
trusted library allocation
page read and write
B2E000
heap
page read and write
2CFB000
trusted library allocation
page read and write
4F01000
heap
page read and write
2142D000
heap
page read and write
5435000
heap
page read and write
5580000
direct allocation
page execute and read and write
17D0000
heap
page read and write
69510000
unkown
page readonly
5CDC000
trusted library allocation
page read and write
4581000
heap
page read and write
DFF000
unkown
page write copy
BDD000
heap
page read and write
5B10000
heap
page read and write
36EB000
trusted library allocation
page read and write
1430000
heap
page read and write
301E000
trusted library allocation
page read and write
EF4000
heap
page read and write
21427000
heap
page read and write
BE7000
heap
page read and write
94CF000
stack
page read and write
7E85000
heap
page read and write
84CE000
stack
page read and write
4ED1000
heap
page read and write
A30000
unkown
page readonly
E50000
heap
page read and write
712A000
trusted library allocation
page read and write
E92000
heap
page read and write
9EB000
stack
page read and write
E8D000
heap
page read and write
2C24000
trusted library allocation
page read and write
F0D000
stack
page read and write
4ED1000
heap
page read and write
7E30000
heap
page read and write
1A99F000
stack
page read and write
2D6F7000
heap
page read and write
2D48000
trusted library allocation
page read and write
2BEA000
trusted library allocation
page read and write
2536000
trusted library allocation
page read and write
3873000
trusted library allocation
page read and write
2DA8000
trusted library allocation
page read and write
450F000
stack
page read and write
38CE000
stack
page read and write
43EA000
trusted library allocation
page read and write
516E000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
4311000
trusted library allocation
page read and write
12D7000
trusted library allocation
page execute and read and write
7D24000
heap
page read and write
2810000
trusted library allocation
page read and write
2876000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4EC0000
direct allocation
page read and write
4E1E000
stack
page read and write
200000
unkown
page read and write
A32000
unkown
page readonly
7DD9000
heap
page read and write
27F7000
trusted library allocation
page execute and read and write
598A000
heap
page read and write
2DAE000
trusted library allocation
page read and write
64DE000
stack
page read and write
663000
trusted library allocation
page execute and read and write
1A21F000
stack
page read and write
C5E000
stack
page read and write
2973000
trusted library allocation
page read and write
15E4000
heap
page read and write
21420000
heap
page read and write
6AD0000
heap
page read and write
5C48000
heap
page read and write
20FA7000
heap
page read and write
F70000
heap
page read and write
C64000
heap
page read and write
2EE4000
trusted library allocation
page read and write
294C000
trusted library allocation
page read and write
4ED1000
heap
page read and write
21427000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
4D7F000
stack
page read and write
A30000
heap
page read and write
1168000
heap
page read and write
53A0000
heap
page read and write
61E00000
direct allocation
page execute and read and write
4F01000
heap
page read and write
42E0000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
308C000
trusted library allocation
page read and write
1390000
trusted library allocation
page execute and read and write
2520000
trusted library allocation
page read and write
4D7E000
stack
page read and write
1854000
heap
page read and write
624000
unkown
page readonly
AFE000
stack
page read and write
CC0000
trusted library allocation
page read and write
36BB000
trusted library allocation
page read and write
525000
unkown
page execute and read and write
1000000
direct allocation
page read and write
B56000
heap
page read and write
38FC000
trusted library allocation
page read and write
16D7000
heap
page read and write
FF0000
unkown
page readonly
63FC000
stack
page read and write
4C00000
direct allocation
page execute and read and write
4D90000
direct allocation
page execute and read and write
7570000
trusted library allocation
page read and write
20FCF000
heap
page read and write
11B0000
heap
page read and write
549E000
stack
page read and write
F7E000
stack
page read and write
598E000
stack
page read and write
2E65000
trusted library allocation
page read and write
FE0000
heap
page read and write
4383000
trusted library allocation
page read and write
172E000
stack
page read and write
2C92000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
6E4E000
stack
page read and write
15E0000
trusted library allocation
page read and write
30FE000
trusted library allocation
page read and write
7D90000
heap
page read and write
15E4000
heap
page read and write
2D14000
trusted library allocation
page read and write
C64000
heap
page read and write
6F56000
trusted library allocation
page read and write
2BD8000
trusted library allocation
page read and write
2DAC000
trusted library allocation
page read and write
525000
unkown
page execute and read and write
4ED1000
heap
page read and write
4791000
heap
page read and write
5C9E000
stack
page read and write
710F000
trusted library allocation
page read and write
4ED1000
heap
page read and write
2B8F000
trusted library allocation
page read and write
8ED000
stack
page read and write
8E4E000
stack
page read and write
4B92000
trusted library allocation
page read and write
21048000
heap
page read and write
262000
unkown
page execute and read and write
21425000
heap
page read and write
1330000
trusted library allocation
page read and write
7776000
heap
page read and write
20F9B000
heap
page read and write
103F000
stack
page read and write
63A0000
trusted library allocation
page execute and read and write
20FD3000
heap
page read and write
4F5D000
trusted library allocation
page read and write
40FF000
stack
page read and write
38D8000
trusted library allocation
page read and write
EF8000
heap
page read and write
36ED000
trusted library allocation
page read and write
2B44000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
126F000
heap
page read and write
4F01000
heap
page read and write
61ED0000
direct allocation
page read and write
DEE000
stack
page read and write
C64000
heap
page read and write
B60000
trusted library allocation
page execute and read and write
30D9000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
DCB000
heap
page read and write
5110000
heap
page read and write
20F99000
heap
page read and write
9F1000
heap
page read and write
30C4000
trusted library allocation
page read and write
3075000
trusted library allocation
page read and write
20FB9000
heap
page read and write
6120000
heap
page read and write
C64000
heap
page read and write
201000
unkown
page execute and write copy
7110000
trusted library allocation
page read and write
2565000
trusted library allocation
page read and write
6570000
trusted library allocation
page execute and read and write
1465000
heap
page read and write
2220000
trusted library allocation
page read and write
4581000
heap
page read and write
15E4000
heap
page read and write
E20000
direct allocation
page read and write
329E000
trusted library allocation
page read and write
4F01000
heap
page read and write
2380000
direct allocation
page execute and read and write
29FF000
trusted library allocation
page read and write
237D000
trusted library allocation
page read and write
53AE000
stack
page read and write
2A36000
trusted library allocation
page read and write
33F3000
trusted library allocation
page read and write
2A23000
trusted library allocation
page read and write
B51000
unkown
page execute and write copy
27AA000
trusted library allocation
page read and write
2E83000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
2DC9000
trusted library allocation
page read and write
1380000
heap
page read and write
5010000
heap
page read and write
B75000
heap
page read and write
2EC1000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
463E000
stack
page read and write
5DDE000
stack
page read and write
3371000
trusted library allocation
page read and write
180F000
heap
page read and write
6F50000
trusted library allocation
page read and write
2CDE000
stack
page read and write
4ED1000
heap
page read and write
2B00000
heap
page execute and read and write
14D0000
heap
page read and write
372C000
trusted library allocation
page read and write
6FA1000
trusted library allocation
page read and write
4BA0000
heap
page read and write
2B06000
trusted library allocation
page read and write
311E000
stack
page read and write
44F3000
trusted library allocation
page read and write
B50000
heap
page read and write
2D50000
trusted library allocation
page read and write
1A89E000
stack
page read and write
1537000
heap
page read and write
2B76000
trusted library allocation
page read and write
5190000
heap
page execute and read and write
3095000
trusted library allocation
page read and write
D30000
unkown
page readonly
4AFF000
stack
page read and write
269000
unkown
page read and write
29FF000
stack
page read and write
5360000
direct allocation
page read and write
4FA0000
trusted library allocation
page read and write
B2A000
heap
page read and write
57D0000
trusted library allocation
page read and write
33C7000
trusted library allocation
page read and write
930000
unkown
page readonly
E60000
heap
page read and write
9B0000
heap
page read and write
6978F000
unkown
page write copy
1262000
heap
page read and write
4581000
heap
page read and write
2B21000
trusted library allocation
page read and write
265C000
trusted library allocation
page read and write
2938000
trusted library allocation
page read and write
1022000
unkown
page readonly
3A6C000
trusted library allocation
page read and write
2D1A000
trusted library allocation
page read and write
4332000
trusted library allocation
page read and write
72AE000
heap
page read and write
B1C000
stack
page read and write
321B000
trusted library allocation
page read and write
487F000
stack
page read and write
2144D000
heap
page read and write
2E8D000
trusted library allocation
page read and write
6CE000
unkown
page execute and read and write
27AF000
trusted library allocation
page read and write
5369000
trusted library allocation
page read and write
3E3E000
stack
page read and write
F7D000
stack
page read and write
53DE000
stack
page read and write
526000
unkown
page execute and write copy
7980000
trusted library allocation
page read and write
3DCE000
stack
page read and write
7FBD000
stack
page read and write
20FA9000
heap
page read and write
3A9F000
trusted library allocation
page read and write
3C4F000
stack
page read and write
5A0000
unkown
page readonly
512000
unkown
page readonly
2E8B000
trusted library allocation
page read and write
1303000
trusted library allocation
page read and write
ED8000
heap
page read and write
2C37000
trusted library allocation
page read and write
15E4000
heap
page read and write
4F54000
trusted library allocation
page read and write
3759000
trusted library allocation
page read and write
177D000
trusted library allocation
page read and write
2A25000
trusted library allocation
page read and write
21425000
heap
page read and write
68FB000
trusted library allocation
page read and write
426B000
trusted library allocation
page read and write
2B72000
trusted library allocation
page read and write
3851000
trusted library allocation
page read and write
BD0000
heap
page read and write
779E000
heap
page read and write
64FC000
stack
page read and write
438E000
trusted library allocation
page read and write
999000
stack
page read and write
70E2000
trusted library allocation
page read and write
7F2B0000
trusted library allocation
page execute and read and write
3B0C000
stack
page read and write
2C0F000
stack
page read and write
1020000
direct allocation
page read and write
1ADBE000
stack
page read and write
6098000
trusted library allocation
page read and write
5100000
heap
page read and write
777A000
heap
page read and write
69795000
unkown
page readonly
2BB3000
trusted library allocation
page read and write
698C000
stack
page read and write
3028000
trusted library allocation
page read and write
4581000
heap
page read and write
2FEB000
trusted library allocation
page read and write
776D000
stack
page read and write
73BC000
stack
page read and write
4581000
heap
page read and write
33B1000
trusted library allocation
page read and write
454E000
stack
page read and write
3A7E000
stack
page read and write
5780000
trusted library allocation
page read and write
17EE000
heap
page read and write
45A3000
trusted library allocation
page read and write
99D000
stack
page read and write
B15000
heap
page read and write
44C0000
trusted library allocation
page read and write
6DFE000
heap
page read and write
477E000
stack
page read and write
C90000
direct allocation
page read and write
38D2000
trusted library allocation
page read and write
3E01000
trusted library allocation
page read and write
AB0000
heap
page read and write
7C20000
heap
page read and write
1AB7F000
stack
page read and write
6EE000
stack
page read and write
1B391000
heap
page read and write
2104A000
heap
page read and write
BCE000
heap
page read and write
F15000
heap
page read and write
4790000
heap
page read and write
4EC0000
direct allocation
page read and write
C5E000
stack
page read and write
4581000
heap
page read and write
20FBA000
heap
page read and write
20FCC000
heap
page read and write
7F4F000
trusted library allocation
page read and write
4581000
heap
page read and write
2830000
trusted library allocation
page read and write
68F7000
trusted library allocation
page read and write
4BC0000
direct allocation
page execute and read and write
3599000
trusted library allocation
page read and write
180F000
heap
page read and write
2715000
trusted library allocation
page read and write
2E67000
trusted library allocation
page read and write
21427000
heap
page read and write
28C0000
heap
page read and write
5360000
direct allocation
page read and write
3764000
trusted library allocation
page read and write
E75000
unkown
page execute and write copy
C64000
heap
page read and write
443F000
stack
page read and write
2C64000
trusted library allocation
page read and write
4ED1000
heap
page read and write
B28000
unkown
page readonly
1570000
trusted library allocation
page read and write
288E000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
1164000
heap
page read and write
4ED1000
heap
page read and write
4532000
trusted library allocation
page read and write
37F7000
trusted library allocation
page read and write
4ED1000
heap
page read and write
32BF000
stack
page read and write
4581000
heap
page read and write
103E000
stack
page read and write
1554000
trusted library allocation
page read and write
5A1F000
stack
page read and write
2A02000
trusted library allocation
page read and write
7F38000
trusted library allocation
page read and write
4581000
heap
page read and write
36C8000
trusted library allocation
page read and write
21425000
heap
page read and write
3258000
trusted library allocation
page read and write
451F000
trusted library allocation
page read and write
8C60000
trusted library allocation
page read and write
4FB3000
heap
page read and write
21425000
heap
page read and write
526000
unkown
page execute and write copy
F6E000
stack
page read and write
4161000
trusted library allocation
page read and write
A30000
heap
page read and write
2F56000
trusted library allocation
page read and write
3751000
trusted library allocation
page read and write
236E000
trusted library allocation
page read and write
2DA4000
trusted library allocation
page read and write
1225000
heap
page read and write
69790000
unkown
page read and write
374B000
trusted library allocation
page read and write
5AD000
remote allocation
page execute and read and write
AAE000
stack
page read and write
AFD000
stack
page read and write
4344000
trusted library allocation
page read and write
15A4000
heap
page read and write
27D0000
trusted library allocation
page read and write
36C8000
trusted library allocation
page read and write
7BC000
stack
page read and write
2382000
trusted library allocation
page read and write
1AF10000
heap
page read and write
4D17000
heap
page read and write
1730000
heap
page read and write
3639000
trusted library allocation
page read and write
344E000
stack
page read and write
6974F000
unkown
page readonly
6940000
trusted library allocation
page read and write
79BF000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
2B47000
trusted library allocation
page read and write
8C5E000
heap
page read and write
20FCF000
heap
page read and write
1C6E000
stack
page read and write
4ED1000
heap
page read and write
4581000
heap
page read and write
6935000
trusted library allocation
page read and write
992000
unkown
page read and write
4ED1000
heap
page read and write
525000
unkown
page execute and write copy
6991000
heap
page read and write
2B7C000
trusted library allocation
page read and write
330E000
stack
page read and write
2D1C000
trusted library allocation
page read and write
2FBB000
trusted library allocation
page execute and read and write
6C80000
trusted library allocation
page execute and read and write
15E4000
heap
page read and write
4EF0000
direct allocation
page read and write
6675000
trusted library allocation
page read and write
A3E000
heap
page read and write
2890000
heap
page execute and read and write
38FF000
stack
page read and write
DAF000
stack
page read and write
6CA0000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
3247000
trusted library allocation
page read and write
673C000
stack
page read and write
680000
heap
page read and write
BE1000
heap
page read and write
4C7E000
stack
page read and write
6A50000
trusted library allocation
page read and write
113B000
trusted library allocation
page execute and read and write
F0B000
heap
page read and write
3781000
trusted library allocation
page read and write
5834000
trusted library allocation
page read and write
6F70000
trusted library allocation
page execute and read and write
4ED1000
heap
page read and write
6FBE000
trusted library allocation
page read and write
3683000
trusted library allocation
page read and write
16D7000
heap
page read and write
D1F000
stack
page read and write
4581000
heap
page read and write
713E000
stack
page read and write
6BB000
stack
page read and write
20FB5000
heap
page read and write
500000
remote allocation
page execute and read and write
5450000
trusted library section
page readonly
7020000
trusted library allocation
page read and write
1340000
heap
page read and write
4ED1000
heap
page read and write
3B7F000
stack
page read and write
1AE3E000
stack
page read and write
8C8E000
heap
page read and write
58C0000
heap
page read and write
6A20000
trusted library allocation
page read and write
529E000
stack
page read and write
CDC000
heap
page read and write
4B90000
trusted library allocation
page read and write
7E95000
heap
page read and write
36AE000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
48A0000
trusted library allocation
page read and write
55E0000
heap
page read and write
4F01000
heap
page read and write
C64000
heap
page read and write
2E63000
trusted library allocation
page read and write
360D000
trusted library allocation
page read and write
20FC0000
heap
page read and write
2A2B000
trusted library allocation
page read and write
2D97000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
15F5000
heap
page read and write
4C1000
unkown
page execute read
71AE000
stack
page read and write
3B4E000
stack
page read and write
583E000
stack
page read and write
46CF000
stack
page read and write
6A9000
heap
page read and write
2D69000
trusted library allocation
page read and write
2B08000
trusted library allocation
page read and write
6DC0000
heap
page read and write
400000
remote allocation
page execute and read and write
696000
trusted library allocation
page execute and read and write
4EF0000
direct allocation
page read and write
4F01000
heap
page read and write
3007000
trusted library allocation
page read and write
405000
unkown
page execute and read and write
2EC8000
trusted library allocation
page read and write
5510000
direct allocation
page execute and read and write
2BCB000
trusted library allocation
page read and write
5030000
trusted library allocation
page execute and read and write
4B80000
direct allocation
page execute and read and write
3592000
trusted library allocation
page read and write
4ED1000
heap
page read and write
2D1F000
stack
page read and write
AB0000
heap
page read and write
E30000
heap
page read and write
3622000
trusted library allocation
page read and write
D97000
heap
page read and write
2D57000
trusted library allocation
page read and write
54E0000
direct allocation
page execute and read and write
8C50000
heap
page read and write
4581000
heap
page read and write
24FC000
trusted library allocation
page read and write
4F01000
heap
page read and write
15E4000
heap
page read and write
2B9E000
trusted library allocation
page read and write
3345000
trusted library allocation
page read and write
361C000
trusted library allocation
page read and write
21442000
heap
page read and write
2EF4000
trusted library allocation
page read and write
54AF000
stack
page read and write
EE0000
heap
page read and write
129E000
stack
page read and write
6900000
trusted library allocation
page read and write
723E000
stack
page read and write
2CC4000
trusted library allocation
page read and write
28A2000
trusted library allocation
page execute and read and write
5F10000
trusted library allocation
page read and write
17CF000
stack
page read and write
6CD000
unkown
page execute and write copy
C5A000
stack
page read and write
2D4A000
trusted library allocation
page read and write
4FB0000
heap
page read and write
42ED000
trusted library allocation
page read and write
2F3E000
stack
page read and write
770000
heap
page read and write
2140B000
heap
page read and write
285E000
trusted library allocation
page read and write
176D000
stack
page read and write
20F9B000
heap
page read and write
15E4000
heap
page read and write
DC0000
heap
page read and write
3CFE000
stack
page read and write
4ED1000
heap
page read and write
422E000
trusted library allocation
page read and write
26EE000
stack
page read and write
61C0000
trusted library allocation
page execute and read and write
2680000
heap
page read and write
48D000
unkown
page write copy
28D4000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
3472000
trusted library allocation
page read and write
4EFE000
stack
page read and write
2FF3000
trusted library allocation
page read and write
4960000
heap
page read and write
318C000
stack
page read and write
5C36000
heap
page read and write
2ECE000
stack
page read and write
2400000
heap
page read and write
4D2B000
stack
page read and write
DFF000
unkown
page write copy
400000
remote allocation
page execute and read and write
42D5000
trusted library allocation
page read and write
29E6000
trusted library allocation
page read and write
4EBF000
stack
page read and write
3235000
trusted library allocation
page read and write
30BE000
trusted library allocation
page read and write
4581000
heap
page read and write
400F000
stack
page read and write
2C7F000
stack
page read and write
400000
unkown
page readonly
5F00000
trusted library allocation
page read and write
11DC000
stack
page read and write
2D99000
trusted library allocation
page read and write
90F0000
trusted library allocation
page execute and read and write
3F7E000
stack
page read and write
7F3A000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
4388000
trusted library allocation
page read and write
30E3000
trusted library allocation
page read and write
101A000
heap
page read and write
3337000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
5848000
trusted library allocation
page read and write
CC2000
trusted library allocation
page read and write
172E000
heap
page read and write
6CD000
unkown
page execute and write copy
F20000
heap
page read and write
21427000
heap
page read and write
7D85000
heap
page read and write
48CE000
trusted library allocation
page read and write
4963000
heap
page read and write
5360000
direct allocation
page read and write
2B40000
trusted library allocation
page read and write
4E1000
unkown
page execute and read and write
4ED1000
heap
page read and write
44E000
remote allocation
page execute and read and write
727E000
stack
page read and write
5F0000
unkown
page readonly
3451000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
4F01000
heap
page read and write
BB9000
stack
page read and write
12FC000
stack
page read and write
2B70000
trusted library allocation
page read and write
86CE000
stack
page read and write
609000
unkown
page readonly
354F000
stack
page read and write
27470000
heap
page read and write
EB0000
heap
page read and write
20FCF000
heap
page read and write
54F0000
direct allocation
page execute and read and write
134D000
heap
page read and write
C42000
heap
page read and write
FF0000
heap
page read and write
C64000
heap
page read and write
4F01000
heap
page read and write
5340000
trusted library allocation
page read and write
3636000
trusted library allocation
page read and write
15E4000
heap
page read and write
366A000
trusted library allocation
page read and write
30F3000
trusted library allocation
page read and write
1759000
heap
page read and write
4828000
trusted library allocation
page read and write
63C000
unkown
page write copy
B3B000
trusted library allocation
page execute and read and write
2851000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
3210000
heap
page read and write
9E0000
heap
page read and write
12F0000
trusted library allocation
page execute and read and write
2832000
trusted library allocation
page read and write
532000
unkown
page readonly
538E000
stack
page read and write
8C34000
heap
page read and write
364E000
stack
page read and write
51E5000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
2D61000
trusted library allocation
page read and write
D64000
trusted library allocation
page read and write
7EC000
stack
page read and write
4C80000
trusted library allocation
page read and write
29D8000
trusted library allocation
page read and write
E0F000
unkown
page readonly
4581000
heap
page read and write
4F01000
heap
page read and write
3041000
trusted library allocation
page read and write
4900000
heap
page read and write
68F0000
trusted library allocation
page read and write
692000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
4420000
trusted library allocation
page read and write
77A9000
heap
page read and write
43EF000
trusted library allocation
page read and write
1356000
heap
page read and write
36F3000
trusted library allocation
page read and write
24E2000
trusted library allocation
page read and write
525000
unkown
page execute and write copy
654E000
stack
page read and write
2CC8000
trusted library allocation
page read and write
36B3000
trusted library allocation
page read and write
171A000
heap
page read and write
6990000
heap
page read and write
66BC000
trusted library allocation
page read and write
CE0000
heap
page read and write
1020000
direct allocation
page read and write
6DDC000
heap
page read and write
171A000
heap
page read and write
10BB000
stack
page read and write
6A80000
trusted library allocation
page read and write
1840000
heap
page read and write
4ED1000
heap
page read and write
609000
unkown
page readonly
27C0000
trusted library allocation
page read and write
2A38000
trusted library allocation
page read and write
437F000
stack
page read and write
2D01000
trusted library allocation
page read and write
21400000
heap
page read and write
7ED0000
heap
page read and write
7DFF000
heap
page read and write
4581000
heap
page read and write
2EBB000
trusted library allocation
page read and write
687000
heap
page read and write
25B0000
trusted library allocation
page read and write
28A3000
trusted library allocation
page read and write
877C000
stack
page read and write
EF4000
heap
page read and write
4519000
trusted library allocation
page read and write
21435000
heap
page read and write
1010000
heap
page read and write
44BF000
stack
page read and write
C64000
heap
page read and write
5F90000
trusted library allocation
page read and write
2D18000
trusted library allocation
page read and write
20FC6000
heap
page read and write
B30000
heap
page read and write
6A1E000
trusted library allocation
page read and write
4581000
heap
page read and write
2C24000
trusted library allocation
page read and write
74FC000
stack
page read and write
551E000
stack
page read and write
338F000
stack
page read and write
2D40000
trusted library allocation
page read and write
7105000
trusted library allocation
page read and write
11C0000
heap
page read and write
2790000
trusted library allocation
page read and write
664000
trusted library allocation
page read and write
2BAE000
trusted library allocation
page read and write
5EC4000
heap
page read and write
128F000
stack
page read and write
970000
heap
page read and write
3082000
trusted library allocation
page read and write
4581000
heap
page read and write
2B6E000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
3FFE000
stack
page read and write
15E4000
heap
page read and write
604000
unkown
page write copy
6C4F000
stack
page read and write
C64000
heap
page read and write
6DA0000
heap
page read and write
690FF000
unkown
page write copy
3730000
trusted library allocation
page read and write
21427000
heap
page read and write
C64000
heap
page read and write
1440000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
5350000
trusted library allocation
page read and write
4581000
heap
page read and write
15E4000
heap
page read and write
4F56000
trusted library allocation
page read and write
30E8000
trusted library allocation
page read and write
6139000
trusted library allocation
page read and write
172E000
heap
page read and write
9F4000
heap
page read and write
F90000
trusted library allocation
page read and write
4F01000
heap
page read and write
2D8E000
stack
page read and write
53B3000
heap
page read and write
383F000
trusted library allocation
page read and write
724E000
stack
page read and write
B70000
heap
page read and write
4ABF000
stack
page read and write
345B000
trusted library allocation
page read and write
4ED1000
heap
page read and write
1822000
heap
page read and write
20FC6000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
2D64F000
stack
page read and write
15A0000
heap
page read and write
2EBF000
trusted library allocation
page read and write
5060000
heap
page read and write
2ABE000
trusted library allocation
page read and write
2F22000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
2ED6000
trusted library allocation
page read and write
2D2F000
trusted library allocation
page read and write
DB1000
unkown
page execute read
6CD000
unkown
page execute and write copy
177A000
heap
page read and write
2142D000
heap
page read and write
274BE000
heap
page read and write
176A000
heap
page read and write
17EB000
heap
page read and write
AFD000
stack
page read and write
487E000
stack
page read and write
54C0000
direct allocation
page execute and read and write
2CC2000
trusted library allocation
page read and write
31FC000
trusted library allocation
page read and write
9280000
heap
page read and write
2CBA000
trusted library allocation
page read and write
4EC0000
direct allocation
page read and write
5C24000
heap
page read and write
36E8000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
2EF6000
trusted library allocation
page read and write
23B0000
heap
page read and write
8CAD000
heap
page read and write
7F9C0000
trusted library allocation
page execute and read and write
2B7E000
trusted library allocation
page read and write
21434000
heap
page read and write
25CC000
trusted library allocation
page read and write
1470000
heap
page read and write
30A1000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
2A3E000
stack
page read and write
4ED1000
heap
page read and write
51E0000
trusted library allocation
page read and write
20FAF000
heap
page read and write
2EFF000
stack
page read and write
30C4000
trusted library allocation
page read and write
282E000
stack
page read and write
A0E000
heap
page read and write
177E000
heap
page read and write
ADD000
unkown
page read and write
7220000
trusted library allocation
page read and write
20FAB000
heap
page read and write
2CBE000
stack
page read and write
4F01000
heap
page read and write
2B30000
trusted library allocation
page read and write
20FB8000
heap
page read and write
4B70000
direct allocation
page execute and read and write
180F000
heap
page read and write
52B3000
heap
page execute and read and write
2A87000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
42D1000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
12D0000
heap
page execute and read and write
6930000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
79E8000
trusted library allocation
page read and write
6CF000
unkown
page execute and write copy
6D8C000
heap
page read and write
5E5000
heap
page read and write
26AD000
stack
page read and write
C64000
heap
page read and write
49FE000
stack
page read and write
29CE000
stack
page read and write
128B000
heap
page read and write
980000
unkown
page readonly
4DB0000
direct allocation
page execute and read and write
4E6E000
stack
page read and write
1ACFE000
stack
page read and write
1AF21000
heap
page read and write
4F01000
heap
page read and write
44DA000
trusted library allocation
page read and write
999000
unkown
page readonly
1A85F000
stack
page read and write
4469000
trusted library allocation
page read and write
4581000
heap
page read and write
68F0E000
unkown
page read and write
760E000
stack
page read and write
20FCF000
heap
page read and write
5D00000
trusted library allocation
page read and write
32A1000
trusted library allocation
page read and write
4ED1000
heap
page read and write
993000
stack
page read and write
2DDF000
stack
page read and write
21427000
heap
page read and write
21419000
heap
page read and write
1B07D000
stack
page read and write
52B0000
heap
page execute and read and write
424E000
trusted library allocation
page read and write
688C000
stack
page read and write
BC0000
heap
page read and write
6898000
trusted library allocation
page read and write
25A6000
trusted library allocation
page read and write
53E0000
trusted library allocation
page execute and read and write
20FA7000
heap
page read and write
2F13000
trusted library allocation
page read and write
2B91000
trusted library allocation
page read and write
4ED1000
heap
page read and write
15E4000
heap
page read and write
4791000
heap
page read and write
5DCA000
heap
page read and write
1130000
trusted library allocation
page read and write
5F0000
unkown
page readonly
2D21000
trusted library allocation
page read and write
357E000
stack
page read and write
14FF000
stack
page read and write
2FA0000
trusted library allocation
page read and write
F20000
heap
page read and write
3161000
trusted library allocation
page read and write
21423000
heap
page read and write
9B000
stack
page read and write
CE0000
heap
page read and write
6720000
trusted library allocation
page execute and read and write
FCA000
heap
page read and write
95C000
unkown
page read and write
4F34000
trusted library allocation
page read and write
2420000
heap
page read and write
2E44000
trusted library allocation
page read and write
2C7F000
stack
page read and write
3020000
trusted library allocation
page read and write
AB0000
heap
page read and write
596E000
heap
page read and write
2D6F5000
heap
page read and write
3176000
trusted library allocation
page read and write
30DD000
trusted library allocation
page read and write
69511000
unkown
page execute read
4581000
heap
page read and write
36A0000
trusted library allocation
page read and write
6FB2000
trusted library allocation
page read and write
BBC000
heap
page read and write
2F4E000
trusted library allocation
page read and write
3ECF000
stack
page read and write
4F01000
heap
page read and write
28AE000
stack
page read and write
57D8000
trusted library allocation
page read and write
2B78000
trusted library allocation
page read and write
EF4000
heap
page read and write
388F000
stack
page read and write
6DAE000
heap
page read and write
2761000
trusted library allocation
page read and write
7F20000
trusted library allocation
page read and write
8C69000
heap
page read and write
A2D000
unkown
page read and write
1030000
heap
page read and write
9F4000
unkown
page read and write
39CF000
stack
page read and write
26B000
unkown
page execute and read and write
6F4E000
stack
page read and write
2E78000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
15E4000
heap
page read and write
2704000
trusted library allocation
page read and write
262000
unkown
page execute and read and write
604000
unkown
page write copy
2889000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
5230000
heap
page read and write
21427000
heap
page read and write
112F000
stack
page read and write
2D140000
heap
page read and write
21420000
heap
page read and write
2F6F000
trusted library allocation
page read and write
3C3E000
stack
page read and write
77D0000
heap
page read and write
10AE000
stack
page read and write
55CE000
stack
page read and write
930000
unkown
page readonly
68F21000
unkown
page execute read
234E000
stack
page read and write
6130000
trusted library allocation
page read and write
21419000
heap
page read and write
6350000
trusted library allocation
page read and write
C0C000
heap
page read and write
6050000
trusted library section
page read and write
94E000
unkown
page readonly
2B1F000
trusted library allocation
page read and write
3D25000
trusted library allocation
page read and write
30B7000
trusted library allocation
page read and write
F0C000
heap
page read and write
3120000
heap
page read and write
2C3D000
trusted library allocation
page read and write
2826000
trusted library allocation
page execute and read and write
433E000
stack
page read and write
4F45000
trusted library allocation
page read and write
1B1BC000
stack
page read and write
54F0000
direct allocation
page execute and read and write
5210000
trusted library allocation
page read and write
A02000
heap
page read and write
1AF7E000
stack
page read and write
453D000
trusted library allocation
page read and write
E77000
heap
page read and write
4FD000
remote allocation
page execute and read and write
335F000
trusted library allocation
page read and write
4377000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
4C3F000
stack
page read and write
2E58000
trusted library allocation
page read and write
45FF000
stack
page read and write
3832000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
6A1B000
trusted library allocation
page read and write
885000
heap
page read and write
5193000
heap
page execute and read and write
4F01000
heap
page read and write
7E34000
heap
page read and write
6550000
trusted library allocation
page read and write
11F6000
heap
page read and write
2BA0000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4D80000
direct allocation
page execute and read and write
4F01000
heap
page read and write
E5E000
heap
page read and write
BBB000
unkown
page execute and read and write
78BE000
stack
page read and write
2810000
heap
page execute and read and write
352B000
trusted library allocation
page read and write
D50000
heap
page read and write
6DF7000
heap
page read and write
C64000
heap
page read and write
548F000
stack
page read and write
37000
unkown
page readonly
17F6000
heap
page read and write
3690000
trusted library allocation
page read and write
274C7000
heap
page read and write
4416000
trusted library allocation
page read and write
2709F000
heap
page read and write
147F000
stack
page read and write
EF7000
stack
page read and write
2ED2000
trusted library allocation
page read and write
2C5E000
trusted library allocation
page read and write
493000
remote allocation
page execute and read and write
61A0000
trusted library allocation
page read and write
291E000
stack
page read and write
53AD000
stack
page read and write
2B90000
heap
page execute and read and write
70F8000
trusted library allocation
page read and write
2832000
trusted library allocation
page read and write
1550000
heap
page read and write
309F000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
35B5000
trusted library allocation
page read and write
6460000
trusted library allocation
page execute and read and write
4F10000
trusted library allocation
page read and write
4F95000
trusted library allocation
page read and write
2A78000
trusted library allocation
page read and write
8CA2000
heap
page read and write
6CB0000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
2D74000
trusted library allocation
page read and write
1298000
heap
page read and write
DB1000
unkown
page execute read
5760000
heap
page read and write
21443000
heap
page read and write
418E000
stack
page read and write
1966000
heap
page read and write
4586000
heap
page read and write
157A000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
400000
remote allocation
page execute and read and write
30A7000
trusted library allocation
page read and write
638E000
stack
page read and write
4581000
heap
page read and write
12A3000
trusted library allocation
page execute and read and write
15E4000
heap
page read and write
C64000
heap
page read and write
4278000
trusted library allocation
page read and write
EA0000
heap
page read and write
FC0000
heap
page read and write
79B000
heap
page read and write
1759000
heap
page read and write
2A12000
trusted library allocation
page read and write
443F000
stack
page read and write
B4D000
heap
page read and write
68E81000
unkown
page execute read
6A0000
heap
page read and write
4C10000
direct allocation
page execute and read and write
20FC6000
heap
page read and write
402000
remote allocation
page execute and read and write
2FCF000
stack
page read and write
2D68000
trusted library allocation
page read and write
1540000
heap
page read and write
48BE000
stack
page read and write
4F00000
trusted library allocation
page execute and read and write
2A8D000
trusted library allocation
page read and write
4ED1000
heap
page read and write
35FE000
stack
page read and write
3578000
trusted library allocation
page read and write
130E000
stack
page read and write
5187000
trusted library allocation
page read and write
6D71000
heap
page read and write
6F67000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
BB9000
unkown
page read and write
4ED1000
heap
page read and write
E66000
unkown
page execute and read and write
4B8C000
stack
page read and write
FD0000
heap
page read and write
7990000
trusted library allocation
page execute and read and write
2BF5000
trusted library allocation
page read and write
35BE000
trusted library allocation
page read and write
2ED8000
trusted library allocation
page read and write
4791000
heap
page read and write
30BF000
stack
page read and write
1358000
heap
page read and write
1004000
heap
page read and write
61E01000
direct allocation
page execute read
2FBE000
stack
page read and write
69CF000
stack
page read and write
3802000
trusted library allocation
page read and write
4488000
trusted library allocation
page read and write
4581000
heap
page read and write
442B000
trusted library allocation
page read and write
4581000
heap
page read and write
3542000
trusted library allocation
page read and write
20FB1000
heap
page read and write
77BE000
stack
page read and write
FEC000
stack
page read and write
1510000
heap
page read and write
53D2000
trusted library allocation
page read and write
31C1000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
1B490000
trusted library allocation
page read and write
2CE2000
trusted library allocation
page read and write
5E6E000
stack
page read and write
3058000
trusted library allocation
page read and write
1160000
heap
page read and write
41D2000
trusted library allocation
page read and write
283B000
trusted library allocation
page read and write
7DEE000
heap
page read and write
3BFF000
stack
page read and write
C6B000
heap
page read and write
68EA000
trusted library allocation
page read and write
C64000
heap
page read and write
15E4000
heap
page read and write
423F000
stack
page read and write
2F84000
trusted library allocation
page read and write
2141F000
heap
page read and write
4258000
trusted library allocation
page read and write
4BB0000
direct allocation
page execute and read and write
25E1000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
291D000
trusted library allocation
page read and write
20FB5000
heap
page read and write
341E000
trusted library allocation
page read and write
1420000
heap
page read and write
530000
unkown
page readonly
2B36000
trusted library allocation
page read and write
4245000
trusted library allocation
page read and write
4B8E000
stack
page read and write
1ADFE000
stack
page read and write
CB0000
trusted library allocation
page read and write
285E000
stack
page read and write
5960000
heap
page read and write
2D76000
trusted library allocation
page read and write
E9A000
heap
page read and write
CD5000
trusted library allocation
page execute and read and write
3BBD000
stack
page read and write
42A3000
trusted library allocation
page read and write
15E4000
heap
page read and write
4C20000
direct allocation
page execute and read and write
594E000
stack
page read and write
16EF000
stack
page read and write
A20000
heap
page read and write
67BE000
stack
page read and write
310F000
stack
page read and write
2B02000
trusted library allocation
page read and write
320F000
trusted library allocation
page read and write
2142D000
heap
page read and write
6901000
trusted library allocation
page read and write
2783000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
1191000
heap
page read and write
2F50000
trusted library allocation
page read and write
388F000
stack
page read and write
4565000
trusted library allocation
page read and write
20FA2000
heap
page read and write
BDE000
heap
page read and write
269000
unkown
page write copy
762C000
stack
page read and write
337D000
trusted library allocation
page read and write
2845000
trusted library allocation
page read and write
280D000
trusted library allocation
page execute and read and write
EF4000
heap
page read and write
12A7000
trusted library allocation
page execute and read and write
20FB4000
heap
page read and write
BB3000
heap
page read and write
6370000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
5310000
trusted library allocation
page read and write
11E0000
heap
page read and write
2DC1000
trusted library allocation
page read and write
5420000
trusted library allocation
page execute and read and write
4592000
trusted library allocation
page read and write
1500000
heap
page read and write
3A0C000
stack
page read and write
4581000
heap
page read and write
587000
remote allocation
page execute and read and write
693B000
trusted library allocation
page read and write
2B42000
trusted library allocation
page read and write
17C2000
heap
page read and write
EF4000
heap
page read and write
2F47000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
5110000
heap
page read and write
4F4E000
trusted library allocation
page read and write
5540000
heap
page read and write
407000
remote allocation
page execute and read and write
15E4000
heap
page read and write
4581000
heap
page read and write
4B80000
direct allocation
page execute and read and write
15E4000
heap
page read and write
43B8000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
7DB9000
heap
page read and write
5BAF000
stack
page read and write
4ED1000
heap
page read and write
11F9000
heap
page read and write
3056000
trusted library allocation
page read and write
37BF000
stack
page read and write
2BA4000
trusted library allocation
page read and write
2443000
heap
page read and write
B5E000
stack
page read and write
4FFE000
stack
page read and write
4D4F000
stack
page read and write
21427000
heap
page read and write
1000000
direct allocation
page read and write
30C2000
trusted library allocation
page read and write
103C000
stack
page read and write
3CBF000
stack
page read and write
11D7000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
17CF000
heap
page read and write
C2E000
heap
page read and write
20F92000
heap
page read and write
5D1E000
stack
page read and write
4C4E000
stack
page read and write
20FA7000
heap
page read and write
11BA000
stack
page read and write
2957000
trusted library allocation
page read and write
3607000
trusted library allocation
page read and write
1765000
heap
page read and write
21419000
heap
page read and write
C90000
direct allocation
page read and write
510E000
heap
page read and write
20FBD000
heap
page read and write
20FE3000
heap
page read and write
1139000
stack
page read and write
428F000
stack
page read and write
4ED1000
heap
page read and write
6090000
trusted library allocation
page read and write
1550000
heap
page read and write
2142D000
heap
page read and write
169E000
heap
page read and write
35EA000
trusted library allocation
page read and write
26E3000
trusted library allocation
page read and write
25D9000
trusted library allocation
page read and write
2FA6000
trusted library allocation
page execute and read and write
1854000
heap
page read and write
6160000
trusted library allocation
page read and write
2DB2000
trusted library allocation
page read and write
E50000
heap
page read and write
5B5F000
stack
page read and write
432B000
trusted library allocation
page read and write
16F7000
heap
page read and write
4F3E000
trusted library allocation
page read and write
1450000
heap
page read and write
2DFE000
stack
page read and write
640000
unkown
page readonly
36DA000
trusted library allocation
page read and write
2CDF000
stack
page read and write
2D1E000
trusted library allocation
page read and write
447E000
stack
page read and write
2EA8000
trusted library allocation
page read and write
DEF000
stack
page read and write
4F01000
heap
page read and write
4FBE000
stack
page read and write
459E000
trusted library allocation
page read and write
5390000
direct allocation
page read and write
33C3A000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
20FB5000
heap
page read and write
6F60000
trusted library allocation
page read and write
4EF0000
direct allocation
page read and write
31CC000
trusted library allocation
page read and write
7F29000
trusted library allocation
page read and write
383F000
stack
page read and write
4BEE000
stack
page read and write
9BE000
stack
page read and write
5BC6000
heap
page read and write
20FC2000
heap
page read and write
3F7E000
stack
page read and write
36CF000
trusted library allocation
page read and write
29B2000
trusted library allocation
page execute and read and write
EF0000
heap
page read and write
B20000
heap
page read and write
6F80000
heap
page read and write
60A0000
trusted library allocation
page read and write
4581000
heap
page read and write
2C5C000
trusted library allocation
page read and write
52DB000
trusted library allocation
page read and write
308F000
trusted library allocation
page read and write
2C62000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
2D44000
trusted library allocation
page read and write
38EE000
trusted library allocation
page read and write
39CF000
stack
page read and write
34DB000
trusted library allocation
page read and write
2CB3000
trusted library allocation
page read and write
1322000
trusted library allocation
page read and write
B65000
heap
page read and write
6D10000
heap
page read and write
7610000
trusted library allocation
page execute and read and write
C64000
heap
page read and write
4ED1000
heap
page read and write
2DBF000
stack
page read and write
2497000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
159E000
stack
page read and write
4581000
heap
page read and write
4ED1000
heap
page read and write
8C56000
heap
page read and write
27B4000
trusted library allocation
page read and write
53C0000
heap
page read and write
2140B000
heap
page read and write
6906000
trusted library allocation
page read and write
6D9C000
heap
page read and write
372A000
trusted library allocation
page read and write
44E1000
trusted library allocation
page read and write
62000
unkown
page readonly
784C000
heap
page read and write
1208000
heap
page read and write
12BD000
trusted library allocation
page execute and read and write
15C6000
heap
page read and write
6CC000
unkown
page execute and read and write
274B6000
heap
page read and write
EF4000
heap
page read and write
4A81000
direct allocation
page read and write
400000
unkown
page readonly
2CF7000
trusted library allocation
page read and write
1AC1E000
stack
page read and write
48DD000
stack
page read and write
A70000
heap
page read and write
68F9000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
BB2000
unkown
page execute and read and write
5B32000
heap
page read and write
6220000
trusted library allocation
page execute and read and write
6D60000
heap
page execute and read and write
401000
unkown
page execute read
2B50000
heap
page read and write
104F000
stack
page read and write
588E000
trusted library allocation
page read and write
2B8B000
trusted library allocation
page read and write
5D69000
heap
page read and write
4581000
heap
page read and write
355A000
trusted library allocation
page read and write
F3E000
stack
page read and write
2D95000
trusted library allocation
page read and write
4F01000
heap
page read and write
E5A000
heap
page read and write
2D89000
trusted library allocation
page read and write
67D000
trusted library allocation
page execute and read and write
2E6B000
trusted library allocation
page read and write
6590000
trusted library allocation
page execute and read and write
70E0000
trusted library allocation
page read and write
250E000
trusted library allocation
page read and write
5643000
heap
page read and write
6912000
trusted library allocation
page read and write
2AE5000
trusted library allocation
page read and write
21435000
heap
page read and write
4ED1000
heap
page read and write
E47000
heap
page read and write
D54000
trusted library allocation
page read and write
5A70000
remote allocation
page read and write
692A000
trusted library allocation
page read and write
4581000
heap
page read and write
2F1E000
stack
page read and write
2AC8000
trusted library allocation
page read and write
4EE0000
heap
page read and write
BEE000
stack
page read and write
4581000
heap
page read and write
5DFF000
heap
page read and write
79E0000
trusted library allocation
page read and write
999000
unkown
page readonly
17C0000
heap
page read and write
32FE000
stack
page read and write
C64000
heap
page read and write
77E2000
heap
page read and write
4450000
trusted library allocation
page read and write
8C30000
heap
page read and write
2B0E000
stack
page read and write
6D32000
heap
page read and write
4359000
trusted library allocation
page read and write
38A5000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
30D6000
trusted library allocation
page read and write
7260000
trusted library allocation
page execute and read and write
37AD000
trusted library allocation
page read and write
46A000
remote allocation
page execute and read and write
4C000
unkown
page readonly
123C000
stack
page read and write
2B89000
trusted library allocation
page read and write
21505000
heap
page read and write
52A9000
stack
page read and write
6A55000
trusted library allocation
page read and write
68C6000
trusted library allocation
page read and write
4ED1000
heap
page read and write
1836000
heap
page read and write
8C86000
heap
page read and write
2142D000
heap
page read and write
C64000
heap
page read and write
F15000
heap
page read and write
534B000
stack
page read and write
11DF000
heap
page read and write
43F4000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
28F7000
heap
page read and write
4F01000
heap
page read and write
595D000
stack
page read and write
D53000
trusted library allocation
page execute and read and write
1AF3F000
stack
page read and write
2B3E000
trusted library allocation
page read and write
2AED000
trusted library allocation
page read and write
6FC1000
trusted library allocation
page read and write
51C6000
trusted library allocation
page read and write
2A43000
trusted library allocation
page read and write
15E4000
heap
page read and write
EF8000
stack
page read and write
5648000
heap
page read and write
6F65000
trusted library allocation
page read and write
70FA000
trusted library allocation
page read and write
752E000
stack
page read and write
4ED1000
heap
page read and write
6FE5000
trusted library allocation
page read and write
41BF000
stack
page read and write
DB0000
heap
page read and write
2FBE000
trusted library allocation
page read and write
BAF000
stack
page read and write
5E90000
trusted library allocation
page read and write
1540000
heap
page read and write
629E000
stack
page read and write
1744000
heap
page read and write
30DD000
trusted library allocation
page read and write
15E4000
heap
page read and write
25B1000
trusted library allocation
page read and write
8E3000
stack
page read and write
3424F000
heap
page read and write
5590000
direct allocation
page execute and read and write
5AAE000
stack
page read and write
5180000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
278E000
stack
page read and write
36E1000
trusted library allocation
page read and write
6650000
trusted library allocation
page read and write
30EA000
trusted library allocation
page read and write
4ED1000
heap
page read and write
B70000
heap
page read and write
C64000
heap
page read and write
3438000
trusted library allocation
page read and write
694E000
stack
page read and write
3257000
trusted library allocation
page read and write
200000
unkown
page readonly
32CF000
stack
page read and write
344A000
trusted library allocation
page read and write
60A9000
trusted library allocation
page read and write
2BAC000
trusted library allocation
page read and write
605000
unkown
page read and write
131A000
trusted library allocation
page execute and read and write
79D0000
trusted library allocation
page read and write
12CE000
heap
page read and write
3719000
trusted library allocation
page read and write
FA3000
trusted library allocation
page execute and read and write
2D7E000
trusted library allocation
page read and write
695B0000
unkown
page readonly
597A000
heap
page read and write
428C000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
3088000
trusted library allocation
page read and write
2A74000
trusted library allocation
page read and write
15A5000
heap
page read and write
352E000
trusted library allocation
page read and write
3746000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
20FB1000
heap
page read and write
4ED1000
heap
page read and write
169A000
heap
page read and write
6E14000
heap
page read and write
1825000
heap
page read and write
CA5000
heap
page read and write
171A000
heap
page read and write
3D8F000
stack
page read and write
6E08000
heap
page read and write
2AA2000
trusted library allocation
page read and write
35AF000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
F0F000
stack
page read and write
27EF000
stack
page read and write
15E0000
heap
page read and write
41C000
remote allocation
page execute and read and write
4F01000
heap
page read and write
2803000
trusted library allocation
page execute and read and write
F80000
heap
page read and write
4895000
trusted library allocation
page read and write
2D6FB000
heap
page read and write
2A57000
trusted library allocation
page read and write
E20000
direct allocation
page read and write
21419000
heap
page read and write
4ED1000
heap
page read and write
359F000
trusted library allocation
page read and write
43E3000
trusted library allocation
page read and write
9000000
heap
page read and write
B3E000
stack
page read and write
6830000
trusted library allocation
page read and write
38F7000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
6F9B000
trusted library allocation
page read and write
15C0000
heap
page read and write
E76000
unkown
page execute and write copy
15E4000
heap
page read and write
15F0000
heap
page read and write
4ED1000
heap
page read and write
30C0000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
160E000
stack
page read and write
54EC000
stack
page read and write
2E50000
heap
page read and write
2C07000
trusted library allocation
page read and write
1839000
heap
page read and write
52B0000
trusted library allocation
page read and write
609000
unkown
page readonly
12D5000
trusted library allocation
page execute and read and write
6B10000
trusted library allocation
page execute and read and write
102B000
heap
page read and write
73B000
heap
page read and write
7590000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
518C000
trusted library allocation
page read and write
BCA000
heap
page read and write
6DAC000
stack
page read and write
11BE000
heap
page read and write
C64000
heap
page read and write
5B60000
heap
page read and write
20FBA000
heap
page read and write
2A29000
trusted library allocation
page read and write
4B80000
direct allocation
page execute and read and write
184F000
heap
page read and write
25EE000
trusted library allocation
page read and write
130D000
trusted library allocation
page execute and read and write
1000000
heap
page read and write
32BC000
trusted library allocation
page read and write
15E4000
heap
page read and write
308B000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
8640000
heap
page read and write
4EC0000
direct allocation
page read and write
5CE8000
trusted library allocation
page read and write
5D50000
heap
page read and write
52AE000
stack
page read and write
4F42000
trusted library allocation
page read and write
4DD0000
direct allocation
page execute and read and write
7E000
unkown
page readonly
497F000
stack
page read and write
C15000
heap
page read and write
164E000
stack
page read and write
4FBF000
stack
page read and write
BA0000
heap
page read and write
13A7000
heap
page read and write
374E000
trusted library allocation
page read and write
15E4000
heap
page read and write
196E000
stack
page read and write
7D7B000
heap
page read and write
5319000
trusted library allocation
page read and write
4581000
heap
page read and write
2A76000
trusted library allocation
page read and write
C64000
heap
page read and write
4D70000
direct allocation
page execute and read and write
4508000
trusted library allocation
page read and write
4ED1000
heap
page read and write
5EE0000
trusted library allocation
page execute and read and write
2C60000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
35BD000
trusted library allocation
page read and write
479000
remote allocation
page execute and read and write
2AAC000
trusted library allocation
page read and write
2AF2000
trusted library allocation
page read and write
343F000
trusted library allocation
page read and write
7080000
trusted library allocation
page execute and read and write
2C7F000
trusted library allocation
page read and write
2A6E000
trusted library allocation
page read and write
74FE000
stack
page read and write
37DB000
trusted library allocation
page read and write
41BF000
trusted library allocation
page read and write
695A2000
unkown
page readonly
2A40000
trusted library allocation
page read and write
7D20000
heap
page read and write
C64000
heap
page read and write
2A7F000
stack
page read and write
2A6A000
trusted library allocation
page read and write
609A000
trusted library allocation
page read and write
990000
heap
page read and write
6120000
trusted library allocation
page read and write
D9E000
stack
page read and write
5B68000
heap
page read and write
51F0000
trusted library allocation
page read and write
3045000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
4B60000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
20FAB000
heap
page read and write
C90000
direct allocation
page read and write
3698000
trusted library allocation
page read and write
2D9B000
trusted library allocation
page read and write
7560000
trusted library allocation
page execute and read and write
2C0D000
trusted library allocation
page read and write
457F000
trusted library allocation
page read and write
21425000
heap
page read and write
27D4000
trusted library allocation
page read and write
B95000
heap
page read and write
B30000
heap
page read and write
E1E000
stack
page read and write
CA3000
trusted library allocation
page execute and read and write
6B0F000
stack
page read and write
2960000
direct allocation
page read and write
4BC0000
direct allocation
page execute and read and write
602000
unkown
page write copy
7E22000
heap
page read and write
2769000
trusted library allocation
page read and write
7D0000
heap
page read and write
4581000
heap
page read and write
60D3000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
4ED1000
heap
page read and write
101C000
unkown
page execute and read and write
53F0000
trusted library allocation
page execute and read and write
10E4000
heap
page read and write
3160000
heap
page read and write
54F0000
direct allocation
page execute and read and write
29AF000
trusted library allocation
page read and write
319D000
trusted library allocation
page read and write
5560000
heap
page execute and read and write
4D90000
direct allocation
page execute and read and write
353A000
trusted library allocation
page read and write
6A5B000
trusted library allocation
page read and write
8C30000
heap
page read and write
2CE6000
trusted library allocation
page read and write
4B90000
direct allocation
page execute and read and write
49C0000
heap
page read and write
2FB0000
trusted library allocation
page read and write
CD5000
heap
page read and write
68D2000
trusted library allocation
page read and write
C10000
heap
page read and write
67C5000
heap
page read and write
1543000
trusted library allocation
page execute and read and write
4EF0000
direct allocation
page read and write
20FA9000
heap
page read and write
2960000
direct allocation
page read and write
387F000
trusted library allocation
page read and write
8E10000
trusted library allocation
page read and write
36CF000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
19B000
stack
page read and write
10A0000
heap
page read and write
180000
heap
page read and write
37F4000
trusted library allocation
page read and write
445C000
trusted library allocation
page read and write
7516000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
1327000
trusted library allocation
page execute and read and write
FF6000
heap
page read and write
4580000
heap
page read and write
38DF000
trusted library allocation
page read and write
12A4000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
2D139000
heap
page read and write
5969000
heap
page read and write
E20000
direct allocation
page read and write
2616000
trusted library allocation
page read and write
5770000
heap
page read and write
28EF000
stack
page read and write
6CF000
unkown
page execute and write copy
8B2B000
stack
page read and write
5270000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
2C4E000
stack
page read and write
B30000
trusted library allocation
page read and write
5F0000
unkown
page readonly
342B000
trusted library allocation
page read and write
171E000
heap
page read and write
39B5000
trusted library allocation
page read and write
F1F000
stack
page read and write
4581000
heap
page read and write
4EF0000
trusted library allocation
page read and write
E7C000
stack
page read and write
8C2C000
stack
page read and write
4285000
trusted library allocation
page read and write
66D0000
trusted library allocation
page execute and read and write
28A0000
heap
page read and write
3588000
trusted library allocation
page read and write
2D63000
trusted library allocation
page read and write
3628000
trusted library allocation
page read and write
33D2000
trusted library allocation
page read and write
2141D000
heap
page read and write
5770000
heap
page read and write
4ED1000
heap
page read and write
670000
trusted library allocation
page read and write
306B000
trusted library allocation
page read and write
4EF8000
trusted library allocation
page read and write
36F6000
trusted library allocation
page read and write
BE8000
heap
page read and write
E5E000
unkown
page execute and read and write
4F80000
trusted library allocation
page read and write
2D16000
trusted library allocation
page read and write
E0B000
stack
page read and write
35E1000
trusted library allocation
page read and write
D32000
unkown
page readonly
437A000
trusted library allocation
page read and write
C64000
heap
page read and write
2B59000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
6F5A000
trusted library allocation
page read and write
99A000
unkown
page read and write
F6C000
stack
page read and write
4EF0000
direct allocation
page read and write
5223000
heap
page read and write
7F3F000
trusted library allocation
page read and write
26B000
unkown
page execute and read and write
2370000
heap
page read and write
2BA5000
trusted library allocation
page read and write
440E000
stack
page read and write
21425000
heap
page read and write
5F47000
heap
page read and write
2E81000
trusted library allocation
page read and write
2E5F000
trusted library allocation
page read and write
324E000
trusted library allocation
page read and write
354D000
trusted library allocation
page read and write
11CA000
heap
page read and write
2D31000
trusted library allocation
page read and write
5F90000
heap
page read and write
21443000
heap
page read and write
31B6000
trusted library allocation
page read and write
15E4000
heap
page read and write
CC6000
trusted library allocation
page execute and read and write
2A72000
trusted library allocation
page read and write
10AB000
heap
page read and write
3774000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
3C8F000
trusted library allocation
page read and write
4581000
heap
page read and write
20FAB000
heap
page read and write
2F11000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
1466000
heap
page read and write
2D93000
trusted library allocation
page read and write
21427000
heap
page read and write
68F20000
unkown
page readonly
2884000
trusted library allocation
page read and write
4A10000
direct allocation
page read and write
2BE0000
heap
page read and write
20FCF000
heap
page read and write
176C000
stack
page read and write
4ED1000
heap
page read and write
1000000
direct allocation
page read and write
1233000
heap
page read and write
3CA2000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
20FB7000
heap
page read and write
5E90000
heap
page read and write
2D31000
trusted library allocation
page read and write
4581000
heap
page read and write
2ACE000
trusted library allocation
page read and write
4EFD000
stack
page read and write
11CE000
heap
page read and write
F5A000
heap
page read and write
4581000
heap
page read and write
4F01000
heap
page read and write
42CB000
trusted library allocation
page read and write
2457000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
4ED1000
heap
page read and write
14A0000
heap
page read and write
6DE6000
heap
page read and write
C10000
heap
page read and write
E20000
direct allocation
page read and write
2105A000
heap
page read and write
324F000
stack
page read and write
11BA000
heap
page read and write
4ED1000
heap
page read and write
2210000
trusted library allocation
page read and write
274F3000
heap
page read and write
2D9E000
trusted library allocation
page read and write
37FE000
stack
page read and write
C64000
heap
page read and write
4F01000
heap
page read and write
6CE000
unkown
page execute and read and write
291F000
trusted library allocation
page read and write
2ACF000
stack
page read and write
EF4000
heap
page read and write
C64000
heap
page read and write
4542000
trusted library allocation
page read and write
3024000
trusted library allocation
page read and write
6CDE000
stack
page read and write
BEA000
heap
page read and write
2B1E000
trusted library allocation
page read and write
B80000
heap
page read and write
510000
unkown
page readonly
2D6FF000
heap
page read and write
1020000
direct allocation
page read and write
303F000
stack
page read and write
4581000
heap
page read and write
CE5000
heap
page read and write
4581000
heap
page read and write
44F8000
trusted library allocation
page read and write
44FD000
trusted library allocation
page read and write
11FE000
heap
page read and write
5EAA000
heap
page read and write
2B38000
trusted library allocation
page read and write
4526000
trusted library allocation
page read and write
4409000
trusted library allocation
page read and write
A0C000
heap
page read and write
2800000
trusted library allocation
page read and write
B80000
heap
page read and write
60A7000
trusted library allocation
page read and write
C64000
heap
page read and write
C5F000
heap
page read and write
15E4000
heap
page read and write
A9F000
stack
page read and write
393E000
stack
page read and write
9E0000
heap
page read and write
30DB000
trusted library allocation
page read and write
2ACC000
trusted library allocation
page read and write
50FF000
stack
page read and write
C60000
heap
page read and write
2DC3000
trusted library allocation
page read and write
70E0000
trusted library allocation
page execute and read and write
21407000
heap
page read and write
2C7D000
trusted library allocation
page read and write
387E000
stack
page read and write
2D36000
trusted library allocation
page read and write
EF4000
heap
page read and write
20FAC000
heap
page read and write
B37000
stack
page read and write
151E000
stack
page read and write
2B20000
trusted library allocation
page read and write
605000
unkown
page read and write
2AD0000
trusted library allocation
page read and write
26DC000
trusted library allocation
page read and write
93C000
stack
page read and write
30A9000
trusted library allocation
page read and write
70E9000
trusted library allocation
page read and write
4F01000
heap
page read and write
2B74000
trusted library allocation
page read and write
11B0000
heap
page read and write
15E4000
heap
page read and write
63CE000
stack
page read and write
2EFB000
trusted library allocation
page read and write
2872000
trusted library allocation
page read and write
433D000
trusted library allocation
page read and write
2B1B000
trusted library allocation
page read and write
20FAB000
heap
page read and write
5500000
direct allocation
page execute and read and write
4EF0000
direct allocation
page read and write
24EF000
trusted library allocation
page read and write
4F7000
stack
page read and write
CBD000
trusted library allocation
page execute and read and write
190000
heap
page read and write
15E4000
heap
page read and write
5830000
trusted library allocation
page read and write
54D0000
heap
page read and write
6DA2000
heap
page read and write
94E000
unkown
page readonly
1482000
heap
page read and write
851E000
stack
page read and write
7E0000
heap
page read and write
21419000
heap
page read and write
C90000
direct allocation
page read and write
3322000
trusted library allocation
page read and write
343E000
stack
page read and write
DFC000
unkown
page readonly
44CD000
trusted library allocation
page read and write
5022000
trusted library allocation
page read and write
2B34000
trusted library allocation
page read and write
C64000
heap
page read and write
20F99000
heap
page read and write
2B28000
trusted library allocation
page read and write
62E000
stack
page read and write
61ECC000
direct allocation
page read and write
2141E000
heap
page read and write
2D5F000
trusted library allocation
page read and write
525000
unkown
page execute and write copy
33C30000
heap
page read and write
E34000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
433E000
stack
page read and write
D87000
trusted library allocation
page execute and read and write
4EC0000
direct allocation
page read and write
61ED3000
direct allocation
page read and write
C60000
heap
page read and write
72A1000
heap
page read and write
1690000
heap
page read and write
2D8F000
trusted library allocation
page read and write
2EA4000
trusted library allocation
page read and write
259C000
trusted library allocation
page read and write
4581000
heap
page read and write
53D1000
direct allocation
page read and write
2D13A000
heap
page read and write
F75000
heap
page read and write
29FB000
trusted library allocation
page read and write
E23000
heap
page read and write
3164000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
7D47000
heap
page read and write
12EE000
heap
page read and write
281D000
trusted library allocation
page execute and read and write
6390000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
2141A000
heap
page read and write
4ED1000
heap
page read and write
12FD000
trusted library allocation
page execute and read and write
C0D000
stack
page read and write
4F01000
heap
page read and write
B1E000
stack
page read and write
33F1000
trusted library allocation
page read and write
274D3000
heap
page read and write
CA0000
heap
page read and write
379D000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
3F3F000
stack
page read and write
269000
unkown
page read and write
5550000
heap
page read and write
41FE000
stack
page read and write
107E000
stack
page read and write
2F26000
trusted library allocation
page read and write
39B1000
trusted library allocation
page read and write
9E4000
heap
page read and write
20FB5000
heap
page read and write
26F1000
trusted library allocation
page read and write
EBB000
heap
page read and write
913B000
stack
page read and write
51B0000
trusted library allocation
page read and write
4F01000
heap
page read and write
6CE000
unkown
page execute and read and write
1351000
heap
page read and write
367F000
stack
page read and write
43A3000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
2830000
heap
page execute and read and write
20FCF000
heap
page read and write
71FC000
trusted library allocation
page read and write
BA0000
heap
page read and write
473E000
stack
page read and write
6A70000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
2F9A000
trusted library allocation
page read and write
1330000
heap
page read and write
7070000
trusted library allocation
page read and write
353F000
stack
page read and write
15E4000
heap
page read and write
21443000
heap
page read and write
CAD000
trusted library allocation
page execute and read and write
B32000
trusted library allocation
page read and write
83C000
stack
page read and write
405000
unkown
page execute and read and write
2F16000
trusted library allocation
page read and write
52DE000
trusted library allocation
page read and write
F03000
heap
page read and write
5EF0000
trusted library allocation
page read and write
1460000
heap
page read and write
50D000
unkown
page readonly
3901000
trusted library allocation
page read and write
5B20000
trusted library allocation
page execute and read and write
4EAE000
stack
page read and write
C90000
direct allocation
page read and write
820000
heap
page read and write
68E000
stack
page read and write
6390000
trusted library allocation
page execute and read and write
4ACC000
stack
page read and write
A00000
heap
page read and write
2D5D000
trusted library allocation
page read and write
17C3000
heap
page read and write
51B2000
trusted library allocation
page read and write
79B8000
trusted library allocation
page read and write
3352000
trusted library allocation
page read and write
289E000
stack
page read and write
68E80000
unkown
page readonly
2E9C000
trusted library allocation
page read and write
10DA000
heap
page read and write
5520000
direct allocation
page execute and read and write
3600000
trusted library allocation
page read and write
2CDC000
trusted library allocation
page read and write
83CE000
stack
page read and write
7F22000
trusted library allocation
page read and write
2BAA000
trusted library allocation
page read and write
2E85000
trusted library allocation
page read and write
4F01000
heap
page read and write
2F9D000
trusted library allocation
page execute and read and write
45D000
remote allocation
page execute and read and write
2C10000
heap
page read and write
3ABF000
stack
page read and write
376E000
trusted library allocation
page read and write
269000
unkown
page write copy
E10000
heap
page read and write
50E000
unkown
page execute and read and write
3410000
trusted library allocation
page read and write
25F5000
trusted library allocation
page read and write
3642000
trusted library allocation
page read and write
2F24000
trusted library allocation
page read and write
BF0000
heap
page read and write
6978E000
unkown
page read and write
48C0000
trusted library allocation
page read and write
E1B000
heap
page read and write
12F4000
trusted library allocation
page read and write
21423000
heap
page read and write
21427000
heap
page read and write
38B2000
trusted library allocation
page read and write
1250000
heap
page read and write
4429000
trusted library allocation
page read and write
793B000
stack
page read and write
4C00000
direct allocation
page execute and read and write
99E000
stack
page read and write
FCE000
heap
page read and write
2899000
trusted library allocation
page read and write
1747000
heap
page read and write
6A4E000
stack
page read and write
8C80000
heap
page read and write
57FB000
trusted library allocation
page read and write
50D000
unkown
page readonly
15E4000
heap
page read and write
25FA000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
5302000
trusted library allocation
page read and write
C64000
heap
page read and write
12A0000
heap
page read and write
54E0000
trusted library section
page read and write
EF4000
heap
page read and write
4ED1000
heap
page read and write
79C5000
trusted library allocation
page read and write
21427000
heap
page read and write
2970000
heap
page read and write
4581000
heap
page read and write
4B50000
direct allocation
page execute and read and write
29F0000
trusted library allocation
page read and write
12A4000
heap
page read and write
120F000
stack
page read and write
6C40000
trusted library allocation
page read and write
35B5000
trusted library allocation
page read and write
3AFE000
stack
page read and write
2D03000
trusted library allocation
page read and write
E74000
heap
page read and write
2A91000
trusted library allocation
page read and write
5220000
heap
page read and write
60D0000
trusted library allocation
page read and write
176B000
heap
page read and write
172E000
heap
page read and write
35D6000
trusted library allocation
page read and write
4ED1000
heap
page read and write
1744000
heap
page read and write
7060000
trusted library allocation
page read and write
4581000
heap
page read and write
778E000
heap
page read and write
A50000
heap
page read and write
42E3000
trusted library allocation
page read and write
4ED1000
heap
page read and write
13A0000
heap
page read and write
41BF000
stack
page read and write
260A000
trusted library allocation
page read and write
27D6000
trusted library allocation
page read and write
4F62000
trusted library allocation
page read and write
EA0000
heap
page read and write
57CE000
stack
page read and write
4568000
trusted library allocation
page read and write
269000
unkown
page read and write
E20000
direct allocation
page read and write
36DF000
trusted library allocation
page read and write
79D4000
trusted library allocation
page read and write
2DC5000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
4B90000
direct allocation
page execute and read and write
4EF0000
direct allocation
page read and write
6A50000
trusted library allocation
page read and write
4ED1000
heap
page read and write
7F7E0000
trusted library allocation
page execute and read and write
4363000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page execute and read and write
5684000
heap
page read and write
1544000
trusted library allocation
page read and write
682C000
stack
page read and write
1AADE000
stack
page read and write
48F000
unkown
page read and write
3140000
heap
page execute and read and write
2A8F000
trusted library allocation
page read and write
69100000
unkown
page read and write
7230000
trusted library allocation
page read and write
38C7000
trusted library allocation
page read and write
2977000
heap
page read and write
61EB4000
direct allocation
page read and write
5BF4000
heap
page read and write
2837000
trusted library allocation
page execute and read and write
4581000
heap
page read and write
4EC0000
direct allocation
page read and write
20FBD000
heap
page read and write
12E7000
heap
page read and write
20FB1000
heap
page read and write
30D3000
trusted library allocation
page read and write
470E000
stack
page read and write
667000
unkown
page write copy
4EF0000
direct allocation
page read and write
54F0000
direct allocation
page execute and read and write
262000
unkown
page execute and read and write
357E000
stack
page read and write
3AB2000
trusted library allocation
page read and write
4BE0000
direct allocation
page execute and read and write
4241000
trusted library allocation
page read and write
2C39000
trusted library allocation
page read and write
70CE000
stack
page read and write
15B0000
heap
page read and write
5CCE000
stack
page read and write
35D0000
trusted library allocation
page read and write
4ED1000
heap
page read and write
5D9E000
stack
page read and write
2E9E000
trusted library allocation
page read and write
4EBE000
stack
page read and write
6A0E000
stack
page read and write
2ED4000
trusted library allocation
page read and write
6947000
trusted library allocation
page read and write
21425000
heap
page read and write
4D55000
trusted library allocation
page read and write
4D2E000
trusted library allocation
page read and write
2BC0000
remote allocation
page read and write
C64000
heap
page read and write
68BB000
trusted library allocation
page read and write
4EF0000
direct allocation
page read and write
397F000
stack
page read and write
2D60000
heap
page read and write
1000000
direct allocation
page read and write
3742000
trusted library allocation
page read and write
101F000
stack
page read and write
650E000
stack
page read and write
4598000
trusted library allocation
page read and write
578C000
trusted library allocation
page read and write
2140A000
heap
page read and write
4ED1000
heap
page read and write
2BC3000
trusted library allocation
page read and write
2D4F000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
2743000
trusted library allocation
page read and write
E20000
direct allocation
page read and write
4F01000
heap
page read and write
CDE000
heap
page read and write
43CB000
trusted library allocation
page read and write
33B50000
heap
page read and write
4BD0000
trusted library allocation
page read and write
8D24000
trusted library allocation
page read and write
4D13000
heap
page read and write
64E0000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
4ED1000
heap
page read and write
138E000
stack
page read and write
3C8E000
stack
page read and write
328E000
stack
page read and write
6CC000
unkown
page execute and read and write
75F2000
trusted library allocation
page read and write
307E000
stack
page read and write
57F0000
trusted library allocation
page read and write
308A000
trusted library allocation
page read and write
4ED1000
heap
page read and write
68F12000
unkown
page readonly
36EB000
trusted library allocation
page read and write
407F000
stack
page read and write
FC0000
heap
page read and write
A09000
heap
page read and write
E20000
direct allocation
page read and write
4ED1000
heap
page read and write
4F01000
heap
page read and write
2E8F000
stack
page read and write
E20000
direct allocation
page read and write
10D7000
heap
page read and write
EDE000
stack
page read and write
3A3F000
stack
page read and write
29FD000
trusted library allocation
page read and write
6E7000
heap
page read and write
4434000
trusted library allocation
page read and write
6E4E000
heap
page read and write
E2E000
stack
page read and write
50E000
unkown
page execute and read and write
4250000
trusted library allocation
page read and write
2AA6000
trusted library allocation
page read and write
A05000
heap
page read and write
58E0000
heap
page read and write
880000
heap
page read and write
4581000
heap
page read and write
50EE000
stack
page read and write
125B000
stack
page read and write
441D000
trusted library allocation
page read and write
F27000
heap
page read and write
79CF000
trusted library allocation
page read and write
2A5F000
trusted library allocation
page read and write
2D141000
heap
page read and write
33CE000
stack
page read and write
20F9B000
heap
page read and write
4581000
heap
page read and write
7783000
heap
page read and write
12D0000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
5E15000
heap
page read and write
306F000
trusted library allocation
page read and write
21423000
heap
page read and write
68C1000
trusted library allocation
page read and write
4581000
heap
page read and write
2D132000
heap
page read and write
2C01000
trusted library allocation
page read and write
5855000
trusted library allocation
page read and write
2ACA000
trusted library allocation
page read and write
5DD7000
heap
page read and write
15E4000
heap
page read and write
4F36000
trusted library allocation
page read and write
C64000
heap
page read and write
2B5D000
trusted library allocation
page read and write
3A0E000
stack
page read and write
4B80000
direct allocation
page execute and read and write
1822000
heap
page read and write
2A3C000
trusted library allocation
page read and write
49BE000
stack
page read and write
21411000
heap
page read and write
5340000
trusted library allocation
page read and write
15E4000
heap
page read and write
31B1000
trusted library allocation
page read and write
4581000
heap
page read and write
1000000
direct allocation
page read and write
2D91000
trusted library allocation
page read and write
316E000
trusted library allocation
page read and write
86E000
stack
page read and write
4581000
heap
page read and write
7BB000
stack
page read and write
663C000
stack
page read and write
21421000
heap
page read and write
407F000
stack
page read and write
20F9F000
heap
page read and write
404E000
stack
page read and write
2A66000
trusted library allocation
page read and write
2FB7000
trusted library allocation
page execute and read and write
9EF000
heap
page read and write
37E2000
trusted library allocation
page read and write
70F0000
trusted library allocation
page execute and read and write
64CE000
stack
page read and write
427E000
stack
page read and write
378E000
stack
page read and write
5A0000
unkown
page readonly
797E000
stack
page read and write
4439000
trusted library allocation
page read and write
4ED1000
heap
page read and write
7130000
trusted library allocation
page read and write
108E000
stack
page read and write
49F000
remote allocation
page execute and read and write
2F3E000
stack
page read and write
12C2000
trusted library allocation
page read and write
CD2000
trusted library allocation
page read and write
172E000
heap
page read and write
2D4C000
trusted library allocation
page read and write
992000
unkown
page write copy
1822000
heap
page read and write
6F69000
trusted library allocation
page read and write
36E5000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
2C94000
trusted library allocation
page read and write
6D60000
heap
page read and write
33FF000
stack
page read and write
52F1000
trusted library allocation
page read and write
1766000
heap
page read and write
2EEE000
trusted library allocation
page read and write
378E000
stack
page read and write
C90000
direct allocation
page read and write
2E1D000
stack
page read and write
2F83000
trusted library allocation
page execute and read and write
602000
unkown
page write copy
66B0000
trusted library allocation
page read and write
4A5E000
stack
page read and write
3067000
trusted library allocation
page read and write
3E3E000
stack
page read and write
4ED0000
heap
page read and write
3821000
trusted library allocation
page read and write
3F3F000
stack
page read and write
51C4000
trusted library allocation
page read and write
89BF000
stack
page read and write
4581000
heap
page read and write
75A0000
trusted library allocation
page read and write
8CA8000
heap
page read and write
4ED1000
heap
page read and write
1340000
trusted library allocation
page read and write
4ED1000
heap
page read and write
CCA000
trusted library allocation
page execute and read and write
4ED1000
heap
page read and write
20FA9000
heap
page read and write
25FE000
stack
page read and write
2390000
trusted library allocation
page read and write
4B80000
direct allocation
page execute and read and write
3033000
trusted library allocation
page read and write
5E8E000
stack
page read and write
33FF000
trusted library allocation
page read and write
11A3000
trusted library allocation
page execute and read and write
110A000
heap
page read and write
171E000
heap
page read and write
DB0000
unkown
page readonly
3D7E000
stack
page read and write
245B000
trusted library allocation
page read and write
95B000
unkown
page write copy
4EF0000
direct allocation
page read and write
338D000
trusted library allocation
page read and write
4349000
trusted library allocation
page read and write
E57000
heap
page read and write
4ED1000
heap
page read and write
303D000
trusted library allocation
page read and write
20FAC000
heap
page read and write
2BA2000
trusted library allocation
page read and write
AF0000
heap
page read and write
58DE000
stack
page read and write
71F0000
trusted library allocation
page read and write
2E56000
trusted library allocation
page read and write
16FF000
heap
page read and write
4ED1000
heap
page read and write
3382000
trusted library allocation
page read and write
5D31000
heap
page read and write
4E7F000
stack
page read and write
4910000
heap
page execute and read and write
38F4000
trusted library allocation
page read and write
13BF000
stack
page read and write
2EF0000
trusted library allocation
page read and write
21435000
heap
page read and write
20FB5000
heap
page read and write
67C6000
heap
page read and write
26DF000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page execute and read and write
29AE000
stack
page read and write
3043000
trusted library allocation
page read and write
B0E000
stack
page read and write
2CD4000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
2F3F000
trusted library allocation
page read and write
27EA000
trusted library allocation
page execute and read and write
4ED1000
heap
page read and write
2ECA000
trusted library allocation
page read and write
343E000
stack
page read and write
3164000
heap
page read and write
1764000
heap
page read and write
CA0000
trusted library allocation
page read and write
3848000
trusted library allocation
page read and write
3002000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
374F000
stack
page read and write
1320000
trusted library allocation
page read and write
38B7000
trusted library allocation
page read and write
360F000
stack
page read and write
52D0000
trusted library allocation
page read and write
628E000
stack
page read and write
80AE000
stack
page read and write
4F01000
heap
page read and write
4581000
heap
page read and write
378A000
trusted library allocation
page read and write
5E0000
heap
page read and write
42DE000
trusted library allocation
page read and write
3B0F000
stack
page read and write
1060000
heap
page read and write
72B0000
heap
page read and write
3D21000
trusted library allocation
page read and write
43BE000
stack
page read and write
2C0B000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
2835000
trusted library allocation
page execute and read and write
2A81000
trusted library allocation
page read and write
4499000
trusted library allocation
page read and write
23B1000
trusted library allocation
page read and write
3EBE000
stack
page read and write
690BF000
unkown
page readonly
491000
unkown
page write copy
4F01000
heap
page read and write
3106000
trusted library allocation
page read and write
BEE000
heap
page read and write
362F000
trusted library allocation
page read and write
4ED1000
heap
page read and write
49BF000
stack
page read and write
4F01000
heap
page read and write
E20000
direct allocation
page read and write
16AF000
stack
page read and write
3408000
trusted library allocation
page read and write
5B7C000
heap
page read and write
15E4000
heap
page read and write
21427000
heap
page read and write
3540000
trusted library allocation
page read and write
7773000
heap
page read and write
35D4000
trusted library allocation
page read and write
184F000
heap
page read and write
60A0000
trusted library section
page read and write
E40000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
156E000
stack
page read and write
D60000
heap
page read and write
A25000
heap
page read and write
3022000
trusted library allocation
page read and write
4EC0000
direct allocation
page read and write
E20000
heap
page read and write
3466000
trusted library allocation
page read and write
20FAC000
heap
page read and write
7270000
trusted library allocation
page execute and read and write
4535000
trusted library allocation
page read and write
72B0000
heap
page read and write
4ED1000
heap
page read and write
2EA0000
trusted library allocation
page read and write
320F000
stack
page read and write
4F01000
heap
page read and write
71EE000
stack
page read and write
525000
unkown
page execute and read and write
320D000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
4E00000
direct allocation
page execute and read and write
C64000
heap
page read and write
6230000
trusted library allocation
page execute and read and write
2AEB000
trusted library allocation
page read and write
5A70000
remote allocation
page read and write
20FB0000
heap
page read and write
C10000
heap
page read and write
7114000
trusted library allocation
page read and write
4ED1000
heap
page read and write
A30000
unkown
page read and write
1B0BE000
stack
page read and write
4581000
heap
page read and write
5220000
heap
page read and write
2B87000
trusted library allocation
page read and write
FFF000
stack
page read and write
6040000
trusted library allocation
page execute and read and write
EFE000
stack
page read and write
5A7000
remote allocation
page execute and read and write
5FC000
stack
page read and write
A8C000
unkown
page readonly
5A5E000
stack
page read and write
1B31D000
stack
page read and write
6D95000
heap
page read and write
4ED1000
heap
page read and write
1320000
heap
page read and write
36AE000
trusted library allocation
page read and write
3230000
heap
page read and write
4ED1000
heap
page read and write
21411000
heap
page read and write
1316000
trusted library allocation
page execute and read and write
2BD5000
trusted library allocation
page read and write
1ACBF000
stack
page read and write
1027000
unkown
page readonly
57DE000
stack
page read and write
4B3F000
stack
page read and write
30CF000
trusted library allocation
page read and write
7030000
trusted library allocation
page read and write
274B8000
heap
page read and write
21048000
heap
page read and write
51B8000
trusted library allocation
page read and write
264C000
trusted library allocation
page read and write
7DCE000
heap
page read and write
2B4C000
stack
page read and write
2945000
trusted library allocation
page read and write
3648000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
2A96000
trusted library allocation
page read and write
6958D000
unkown
page readonly
52DE000
stack
page read and write
297F000
trusted library allocation
page read and write
690FE000
unkown
page read and write
4F01000
heap
page read and write
49BE000
stack
page read and write
1137000
trusted library allocation
page execute and read and write
2AB0000
direct allocation
page execute and read and write
2D23000
trusted library allocation
page read and write
6B4E000
stack
page read and write
994000
unkown
page write copy
CA4000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
1300000
heap
page read and write
333F000
stack
page read and write
4581000
heap
page read and write
421000
remote allocation
page execute and read and write
26F6000
trusted library allocation
page read and write
624E000
stack
page read and write
2142D000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
2860000
trusted library allocation
page read and write
44FE000
stack
page read and write
C64000
heap
page read and write
2960000
direct allocation
page read and write
21427000
heap
page read and write
20FB5000
heap
page read and write
32FE000
stack
page read and write
350E000
stack
page read and write
2C90000
trusted library allocation
page read and write
4B80000
direct allocation
page execute and read and write
4C20000
direct allocation
page execute and read and write
11A4000
trusted library allocation
page read and write
2D0A0000
trusted library allocation
page read and write
25AF000
stack
page read and write
4EF0000
direct allocation
page read and write
20FC4000
heap
page read and write
6850000
trusted library allocation
page read and write
2470000
heap
page read and write
414F000
stack
page read and write
3603000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
960000
heap
page read and write
C64000
heap
page read and write
1000000
direct allocation
page read and write
13C0000
heap
page read and write
4730000
heap
page read and write
938E000
stack
page read and write
4B80000
direct allocation
page execute and read and write
C64000
heap
page read and write
5A0000
unkown
page readonly
7D3A000
heap
page read and write
AC0000
unkown
page readonly
4581000
heap
page read and write
2F80000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
2354000
trusted library allocation
page read and write
689B000
trusted library allocation
page read and write
36BE000
trusted library allocation
page read and write
E9E000
stack
page read and write
2D2A000
trusted library allocation
page read and write
11E7000
heap
page read and write
2D650000
trusted library allocation
page read and write
20FB5000
heap
page read and write
2D7A000
trusted library allocation
page read and write
2A80000
heap
page execute and read and write
3534000
trusted library allocation
page read and write
6C70000
heap
page execute and read and write
E80000
heap
page read and write
4386000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
5C1E000
stack
page read and write
6D85000
heap
page read and write
15E4000
heap
page read and write
2141E000
heap
page read and write
24D5000
trusted library allocation
page read and write
1090000
heap
page read and write
4F01000
heap
page read and write
C64000
heap
page read and write
52FD000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
20FCF000
heap
page read and write
EF4000
heap
page read and write
B6E000
unkown
page readonly
1310000
trusted library allocation
page read and write
4EF0000
direct allocation
page read and write
5570000
direct allocation
page execute and read and write
2AAE000
trusted library allocation
page read and write
2E76000
trusted library allocation
page read and write
2CBC000
trusted library allocation
page read and write
35B2000
trusted library allocation
page read and write
4FC0000
heap
page read and write
431E000
trusted library allocation
page read and write
314F000
stack
page read and write
4EEE000
stack
page read and write
184F000
heap
page read and write
133E000
heap
page read and write
6E07000
heap
page read and write
2F0B000
trusted library allocation
page read and write
2D54E000
stack
page read and write
B10000
heap
page read and write
2AD2000
trusted library allocation
page read and write
2141A000
heap
page read and write
1A75F000
stack
page read and write
E20000
direct allocation
page read and write
4590000
heap
page read and write
2BE6000
trusted library allocation
page read and write
17C0000
heap
page read and write
A0C000
heap
page read and write
45AE000
trusted library allocation
page read and write
A39000
heap
page read and write
356C000
trusted library allocation
page read and write
33FF000
stack
page read and write
4EC0000
direct allocation
page read and write
2C7E000
stack
page read and write
3B7F000
stack
page read and write
423B000
trusted library allocation
page read and write
5B10000
heap
page execute and read and write
76C000
stack
page read and write
69105000
unkown
page readonly
20FBE000
heap
page read and write
12F0000
trusted library allocation
page read and write
4A61000
direct allocation
page read and write
1356000
heap
page read and write
5790000
heap
page read and write
3629000
trusted library allocation
page read and write
282A000
trusted library allocation
page execute and read and write
927E000
stack
page read and write
2BF2000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
2F2A000
trusted library allocation
page read and write
38C0000
trusted library allocation
page read and write
995000
unkown
page read and write
BE0000
heap
page read and write
9C3000
unkown
page read and write
980000
unkown
page readonly
4F01000
heap
page read and write
3D21000
trusted library allocation
page read and write
5F9E000
trusted library allocation
page read and write
1A65F000
stack
page read and write
6AA0000
trusted library allocation
page read and write
37E6000
trusted library allocation
page read and write
4581000
heap
page read and write
21427000
heap
page read and write
384C000
trusted library allocation
page read and write
42FF000
stack
page read and write
2CDE000
trusted library allocation
page read and write
2963000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
4581000
heap
page read and write
525E000
stack
page read and write
1211000
heap
page read and write
630000
heap
page read and write
29B1000
trusted library allocation
page read and write
756E000
stack
page read and write
68E1000
trusted library allocation
page read and write
454C000
stack
page read and write
2376000
trusted library allocation
page read and write
66D000
trusted library allocation
page execute and read and write
3420000
trusted library allocation
page read and write
2B57000
trusted library allocation
page read and write
144E000
heap
page read and write
1F0000
heap
page read and write
34BE000
stack
page read and write
4581000
heap
page read and write
38E9000
trusted library allocation
page read and write
5184000
trusted library allocation
page read and write
7D53000
heap
page read and write
3347000
trusted library allocation
page read and write
C36000
heap
page read and write
27490000
heap
page read and write
2843000
trusted library allocation
page read and write
3399000
trusted library allocation
page read and write
610C000
trusted library allocation
page read and write
2BEE000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
8C5A000
heap
page read and write
61B0000
trusted library allocation
page read and write
DA8000
heap
page read and write
171A000
heap
page read and write
3101000
trusted library allocation
page read and write
270B3000
heap
page read and write
182D000
heap
page read and write
6BC000
stack
page read and write
11F0000
heap
page read and write
520000
unkown
page readonly
E40000
heap
page read and write
4ED1000
heap
page read and write
6DB0000
heap
page read and write
35F5000
trusted library allocation
page read and write
2F45000
trusted library allocation
page read and write
1030000
heap
page read and write
35EE000
trusted library allocation
page read and write
5260000
heap
page read and write
2D59000
trusted library allocation
page read and write
8C50000
trusted library allocation
page read and write
305D000
trusted library allocation
page read and write
70FF000
trusted library allocation
page read and write
602000
unkown
page read and write
2CDA000
trusted library allocation
page read and write
135A000
stack
page read and write
5D6D000
heap
page read and write
2AA0000
trusted library allocation
page read and write
2D1E000
stack
page read and write
3263000
trusted library allocation
page read and write
2FF9000
trusted library allocation
page read and write
20FE4000
heap
page read and write
9B4E000
stack
page read and write
2CE8000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
5280000
trusted library allocation
page execute and read and write
7140000
trusted library allocation
page read and write
AF8000
stack
page read and write
337E000
stack
page read and write
252A000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
3205000
trusted library allocation
page read and write
2798000
trusted library allocation
page read and write
6110000
trusted library allocation
page execute and read and write
300F000
stack
page read and write
367F000
stack
page read and write
79A2000
trusted library allocation
page read and write
42E8000
trusted library allocation
page read and write
2D78000
trusted library allocation
page read and write
2144D000
heap
page read and write
4ED1000
heap
page read and write
27040000
heap
page read and write
388C000
trusted library allocation
page read and write
516000
unkown
page execute and read and write
2E4B000
stack
page read and write
434E000
trusted library allocation
page read and write
3095000
trusted library allocation
page read and write
B50000
unkown
page read and write
2804000
trusted library allocation
page read and write
94D0000
heap
page read and write
12EE000
stack
page read and write
1000000
direct allocation
page read and write
4C71000
direct allocation
page read and write
688000
unkown
page readonly
4581000
heap
page read and write
2E61000
trusted library allocation
page read and write
4581000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
2440000
heap
page read and write
C64000
heap
page read and write
61D0000
trusted library allocation
page execute and read and write
201000
unkown
page execute and write copy
6AA0000
trusted library allocation
page read and write
667A000
trusted library allocation
page read and write
3652000
trusted library allocation
page read and write
33D40000
heap
page read and write
7B7000
stack
page read and write
2F63000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
3735000
trusted library allocation
page read and write
3CBF000
stack
page read and write
4EC0000
direct allocation
page read and write
83D0000
trusted library allocation
page execute and read and write
15E4000
heap
page read and write
2A6C000
trusted library allocation
page read and write
A05000
heap
page read and write
54B0000
heap
page execute and read and write
1B497000
heap
page read and write
8CCD000
stack
page read and write
41C000
remote allocation
page execute and read and write
20FCF000
heap
page read and write
D8B000
trusted library allocation
page execute and read and write
3084000
trusted library allocation
page read and write
766E000
stack
page read and write
FCF000
unkown
page execute and write copy
88BE000
stack
page read and write
58E0000
trusted library allocation
page execute and read and write
4581000
heap
page read and write
E75000
unkown
page execute and read and write
1090000
trusted library allocation
page read and write
3550000
heap
page read and write
2CE4000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
5AF0000
trusted library allocation
page read and write
4F01000
heap
page read and write
1065000
heap
page read and write
3799000
trusted library allocation
page read and write
E44000
trusted library allocation
page read and write
E5A000
trusted library allocation
page execute and read and write
340F000
stack
page read and write
5DB2000
heap
page read and write
38E5000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
BE7000
heap
page read and write
61EB7000
direct allocation
page readonly
5794000
heap
page read and write
5BA4000
heap
page read and write
5D74000
heap
page read and write
157B000
trusted library allocation
page execute and read and write
585C000
stack
page read and write
42BE000
trusted library allocation
page read and write
BE0000
heap
page read and write
4ED1000
heap
page read and write
2EB9000
trusted library allocation
page read and write
4E30000
direct allocation
page execute and read and write
4297000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
3190000
trusted library allocation
page read and write
3163000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
FDE000
stack
page read and write
2C66000
trusted library allocation
page read and write
2B0A000
trusted library allocation
page read and write
119E000
stack
page read and write
12AB000
trusted library allocation
page execute and read and write
7580000
trusted library allocation
page execute and read and write
4F01000
heap
page read and write
183D000
heap
page read and write
317F000
stack
page read and write
5680000
heap
page read and write
8D20000
trusted library allocation
page read and write
6A5E000
trusted library allocation
page read and write
DFC000
unkown
page readonly
1B390000
heap
page read and write
5EE5000
heap
page read and write
DB5000
heap
page read and write
79A9000
trusted library allocation
page read and write
27000000
heap
page read and write
BBE000
stack
page read and write
36FF000
stack
page read and write
9E8000
heap
page read and write
6FCB000
stack
page read and write
4581000
heap
page read and write
2F49000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page read and write
2CAB000
trusted library allocation
page read and write
7D57000
heap
page read and write
52EE000
trusted library allocation
page read and write
27A0000
heap
page read and write
C64000
heap
page read and write
B7E000
heap
page read and write
1320000
trusted library allocation
page execute and read and write
23A0000
heap
page execute and read and write
510000
unkown
page write copy
3785000
trusted library allocation
page read and write
2D65000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
68DE000
trusted library allocation
page read and write
B76000
heap
page read and write
8D0E000
stack
page read and write
591E000
stack
page read and write
295E000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
290C000
trusted library allocation
page read and write
1840000
heap
page read and write
15A0000
trusted library allocation
page execute and read and write
516000
unkown
page execute and read and write
312D000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
C64000
heap
page read and write
6D40000
trusted library allocation
page execute and read and write
4BD0000
direct allocation
page execute and read and write
2F3D000
trusted library allocation
page read and write
42CE000
stack
page read and write
E20000
direct allocation
page read and write
4ED1000
heap
page read and write
59D1000
heap
page read and write
132B000
trusted library allocation
page execute and read and write
3793000
trusted library allocation
page read and write
38BC000
trusted library allocation
page read and write
5550000
direct allocation
page execute and read and write
806E000
stack
page read and write
16D8000
heap
page read and write
737E000
stack
page read and write
2BB1000
trusted library allocation
page read and write
20FAB000
heap
page read and write
364D000
stack
page read and write
A39000
stack
page read and write
4529000
trusted library allocation
page read and write
C26000
heap
page read and write
6CC000
unkown
page execute and read and write
A20000
heap
page read and write
77FC000
heap
page read and write
21427000
heap
page read and write
6678000
trusted library allocation
page read and write
69A2000
heap
page read and write
53ED000
stack
page read and write
2A70000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
97000
stack
page read and write
AC1000
unkown
page execute and write copy
61ECC000
direct allocation
page read and write
3CFE000
stack
page read and write
27A3000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
2A3E000
trusted library allocation
page read and write
3DFF000
stack
page read and write
7E15000
heap
page read and write
C90000
direct allocation
page read and write
4581000
heap
page read and write
2C82000
trusted library allocation
page read and write
2FA2000
trusted library allocation
page read and write
30A3000
trusted library allocation
page read and write
1AF20000
heap
page read and write
6870000
trusted library allocation
page execute and read and write
782D000
heap
page read and write
40BE000
stack
page read and write
7594000
trusted library allocation
page read and write
4A3C000
stack
page read and write
8010000
trusted library allocation
page execute and read and write
41E000
remote allocation
page execute and read and write
12F3000
trusted library allocation
page execute and read and write
42C4000
trusted library allocation
page read and write
4F01000
heap
page read and write
37C1000
trusted library allocation
page read and write
EEC000
stack
page read and write
2BD3000
trusted library allocation
page read and write
54DF000
stack
page read and write
923D000
stack
page read and write
26B000
unkown
page execute and read and write
F25000
heap
page read and write
4F01000
heap
page read and write
384E000
trusted library allocation
page read and write
267F000
trusted library allocation
page read and write
3618000
trusted library allocation
page read and write
54E0000
direct allocation
page execute and read and write
F4E000
stack
page read and write
274B4000
heap
page read and write
43C000
remote allocation
page execute and read and write
1000000
direct allocation
page read and write
B35000
trusted library allocation
page execute and read and write
66C0000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
397E000
direct allocation
page read and write
478F000
stack
page read and write
6110000
trusted library allocation
page read and write
2C5A000
trusted library allocation
page read and write
21417000
heap
page read and write
4C1000
unkown
page execute read
2C75000
trusted library allocation
page read and write
2968000
trusted library allocation
page read and write
413E000
stack
page read and write
2D46000
trusted library allocation
page read and write
72BC000
stack
page read and write
7F45000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
612E000
trusted library allocation
page read and write
306F000
stack
page read and write
483F000
stack
page read and write
1AD6D000
stack
page read and write
172F000
heap
page read and write
36E6000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4587000
trusted library allocation
page read and write
5F8E000
stack
page read and write
436A000
trusted library allocation
page read and write
5430000
heap
page read and write
101F000
unkown
page execute and write copy
1B380000
heap
page read and write
E20000
direct allocation
page read and write
2D2B000
trusted library allocation
page read and write
77BD000
heap
page read and write
27FB000
trusted library allocation
page execute and read and write
41B1000
trusted library allocation
page read and write
36BE000
stack
page read and write
64D0000
trusted library allocation
page read and write
4581000
heap
page read and write
16F2000
heap
page read and write
9AE000
stack
page read and write
2DD2000
trusted library allocation
page read and write
588E000
stack
page read and write
49C0000
trusted library allocation
page read and write
609000
unkown
page readonly
36A9000
trusted library allocation
page read and write
12DB000
trusted library allocation
page execute and read and write
4ED1000
heap
page read and write
35A6000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
21424000
heap
page read and write
374E000
stack
page read and write
4F01000
heap
page read and write
8000000
trusted library allocation
page read and write
5540000
direct allocation
page execute and read and write
4476000
trusted library allocation
page read and write
442E000
trusted library allocation
page read and write
295E000
stack
page read and write
76C000
stack
page read and write
3228000
trusted library allocation
page read and write
C64000
heap
page read and write
6AC0000
trusted library allocation
page execute and read and write
4F01000
heap
page read and write
3829000
trusted library allocation
page read and write
C64000
heap
page read and write
B50000
trusted library allocation
page read and write
6FEE000
trusted library allocation
page read and write
20FE4000
heap
page read and write
C64000
heap
page read and write
79A0000
trusted library allocation
page read and write
4ED1000
heap
page read and write
3456000
trusted library allocation
page read and write
2EA6000
trusted library allocation
page read and write
15E4000
heap
page read and write
37BE000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
4581000
heap
page read and write
4581000
heap
page read and write
4ED1000
heap
page read and write
2B8D000
trusted library allocation
page read and write
EA7000
heap
page read and write
3697000
trusted library allocation
page read and write
2F2E000
trusted library allocation
page read and write
4581000
heap
page read and write
20FB5000
heap
page read and write
1072000
heap
page read and write
4ED1000
heap
page read and write
301C000
trusted library allocation
page read and write
F80000
heap
page read and write
3843000
trusted library allocation
page read and write
FED000
heap
page read and write
95B000
unkown
page write copy
C47000
heap
page read and write
710A000
trusted library allocation
page read and write
56FF000
stack
page read and write
52D4000
trusted library allocation
page read and write
FA4000
trusted library allocation
page read and write
7D4F000
heap
page read and write
14EE000
stack
page read and write
43FF000
trusted library allocation
page read and write
6CF000
unkown
page execute and write copy
20FA9000
heap
page read and write
841D000
stack
page read and write
8C72000
heap
page read and write
9E0000
heap
page read and write
70D0000
trusted library allocation
page read and write
2F28000
trusted library allocation
page read and write
3573000
trusted library allocation
page read and write
70F0000
trusted library allocation
page execute and read and write
5101000
heap
page read and write
1062000
heap
page read and write
4581000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
6A30000
trusted library allocation
page read and write
4581000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
15E4000
heap
page read and write
381B000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
510000
unkown
page write copy
287D000
trusted library allocation
page read and write
DF0000
trusted library allocation
page execute and read and write
DCE000
stack
page read and write
304E000
stack
page read and write
7579000
trusted library allocation
page read and write
EAE000
stack
page read and write
5E78000
trusted library allocation
page read and write
8C60000
heap
page read and write
4581000
heap
page read and write
15E4000
heap
page read and write
FFF000
stack
page read and write
5CDA000
trusted library allocation
page read and write
496000
unkown
page readonly
2ABB000
trusted library allocation
page read and write
42C000
remote allocation
page execute and read and write
20FC7000
heap
page read and write
306D000
trusted library allocation
page read and write
1370000
heap
page read and write
4ED1000
heap
page read and write
12CA000
trusted library allocation
page execute and read and write
44EC000
trusted library allocation
page read and write
83BE000
stack
page read and write
172E000
stack
page read and write
1716000
heap
page read and write
68F0000
trusted library allocation
page read and write
15E4000
heap
page read and write
7510000
trusted library allocation
page read and write
2813000
trusted library allocation
page read and write
38AA000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
6D68000
heap
page read and write
2D6ED000
heap
page read and write
6AB0000
trusted library allocation
page read and write
5D63000
heap
page read and write
6140000
trusted library allocation
page read and write
691E000
trusted library allocation
page read and write
2234000
trusted library allocation
page read and write
32BF000
stack
page read and write
C64000
heap
page read and write
4ED1000
heap
page read and write
4F01000
heap
page read and write
2D0B000
trusted library allocation
page read and write
2A89000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
4512000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4537000
trusted library allocation
page read and write
C64000
heap
page read and write
17BC000
heap
page read and write
402000
remote allocation
page execute and read and write
66A0000
trusted library allocation
page execute and read and write
16EE000
stack
page read and write
2C05000
trusted library allocation
page read and write
2CB1000
trusted library allocation
page read and write
B50000
unkown
page readonly
30D1000
trusted library allocation
page read and write
2D06000
trusted library allocation
page read and write
5560000
direct allocation
page execute and read and write
37CE000
trusted library allocation
page read and write
BB9000
unkown
page write copy
50F0000
trusted library allocation
page read and write
612B000
trusted library allocation
page read and write
37D9000
trusted library allocation
page read and write
3FBF000
stack
page read and write
E33000
trusted library allocation
page execute and read and write
1B02A000
heap
page read and write
2FB5000
trusted library allocation
page execute and read and write
1590000
trusted library allocation
page read and write
72A0000
heap
page read and write
75CD000
stack
page read and write
267E000
stack
page read and write
1320000
heap
page read and write
2A59000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
35C4000
trusted library allocation
page read and write
1839000
heap
page read and write
A21000
unkown
page read and write
57E0000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
15E4000
heap
page read and write
2E48000
trusted library allocation
page read and write
20F90000
heap
page read and write
1920000
heap
page read and write
79CA000
trusted library allocation
page read and write
2515000
trusted library allocation
page read and write
1DE000
stack
page read and write
CEA000
heap
page read and write
4ED1000
heap
page read and write
26D4000
trusted library allocation
page read and write
3012000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
E20000
direct allocation
page read and write
781F000
heap
page read and write
2142D000
heap
page read and write
28F0000
heap
page read and write
3814000
trusted library allocation
page read and write
2F8D000
trusted library allocation
page execute and read and write
4253000
trusted library allocation
page read and write
4234000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
20FB5000
heap
page read and write
D10000
heap
page read and write
38F2000
trusted library allocation
page read and write
23B6000
heap
page read and write
1ABBE000
stack
page read and write
4581000
heap
page read and write
3071000
trusted library allocation
page read and write
4F01000
heap
page read and write
77F6000
heap
page read and write
269000
unkown
page write copy
7290000
heap
page read and write
AB5000
heap
page read and write
2A0C000
trusted library allocation
page read and write
201000
unkown
page execute and write copy
4410000
trusted library allocation
page read and write
27513000
heap
page read and write
20FB1000
heap
page read and write
E56000
trusted library allocation
page execute and read and write
51DE000
trusted library allocation
page read and write
4ED1000
heap
page read and write
30D7000
trusted library allocation
page read and write
8C31000
heap
page read and write
5310000
trusted library allocation
page read and write
21419000
heap
page read and write
4F50000
trusted library allocation
page read and write
6D00000
trusted library allocation
page execute and read and write
690000
trusted library allocation
page read and write
2A09000
trusted library allocation
page read and write
2FB2000
trusted library allocation
page read and write
4D1000
remote allocation
page execute and read and write
4EF0000
direct allocation
page read and write
5960000
heap
page read and write
61ECD000
direct allocation
page readonly
2C8E000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
131E000
stack
page read and write
4EC0000
direct allocation
page read and write
21425000
heap
page read and write
7E48000
heap
page read and write
12C0000
trusted library allocation
page read and write
C64000
heap
page read and write
21416000
heap
page read and write
DA0000
heap
page read and write
16D5000
heap
page read and write
615E000
stack
page read and write
3DFF000
stack
page read and write
F00000
heap
page read and write
E17000
heap
page read and write
A01000
unkown
page read and write
3086000
trusted library allocation
page read and write
2CAD000
trusted library allocation
page read and write
4E1000
unkown
page execute and read and write
21411000
heap
page read and write
4C10000
direct allocation
page execute and read and write
6DDD000
heap
page read and write
46A000
remote allocation
page execute and read and write
53D0000
trusted library allocation
page read and write
2B55000
trusted library allocation
page read and write
6FA6000
trusted library allocation
page read and write
9C0000
heap
page read and write
58D0000
trusted library allocation
page read and write
C5E000
heap
page read and write
4ED1000
heap
page read and write
37CC000
trusted library allocation
page read and write
2371000
trusted library allocation
page read and write
8D10000
trusted library allocation
page execute and read and write
B9E000
stack
page read and write
690E000
stack
page read and write
51AE000
trusted library allocation
page read and write
6E3D000
heap
page read and write
20FC4000
heap
page read and write
6E6C000
heap
page read and write
6BDD000
stack
page read and write
EF4000
heap
page read and write
2870000
trusted library allocation
page read and write
77B2000
heap
page read and write
1E0000
heap
page read and write
7FFE000
stack
page read and write
4F57000
trusted library allocation
page read and write
4495000
trusted library allocation
page read and write
44B4000
trusted library allocation
page read and write
DEE000
stack
page read and write
401000
unkown
page execute read
42A8000
trusted library allocation
page read and write
BFA000
heap
page read and write
235B000
trusted library allocation
page read and write
51AD000
stack
page read and write
51A1000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
12AD000
trusted library allocation
page execute and read and write
5850000
trusted library allocation
page read and write
457F000
stack
page read and write
4F01000
heap
page read and write
2EF2000
trusted library allocation
page read and write
1B21E000
stack
page read and write
4ED1000
heap
page read and write
44AE000
trusted library allocation
page read and write
4ED1000
heap
page read and write
2B7F000
stack
page read and write
5F0000
unkown
page readonly
F11000
heap
page read and write
464F000
stack
page read and write
B90000
heap
page read and write
E68000
heap
page read and write
393E000
stack
page read and write
EDE000
heap
page read and write
2850000
trusted library allocation
page read and write
21427000
heap
page read and write
1000000
direct allocation
page read and write
4ED1000
heap
page read and write
7770000
heap
page read and write
20FB5000
heap
page read and write
378E000
trusted library allocation
page read and write
3366000
trusted library allocation
page read and write
405000
unkown
page execute and read and write
307E000
stack
page read and write
4F01000
heap
page read and write
96C000
unkown
page read and write
20FCF000
heap
page read and write
5DFB000
heap
page read and write
4F01000
heap
page read and write
5F1E000
stack
page read and write
D55000
unkown
page execute and read and write
4581000
heap
page read and write
521E000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
353F000
stack
page read and write
347F000
stack
page read and write
2BCB000
trusted library allocation
page read and write
6095000
trusted library allocation
page read and write
4F01000
heap
page read and write
7D0000
heap
page read and write
429E000
trusted library allocation
page read and write
66B9000
trusted library allocation
page read and write
C80000
heap
page read and write
2C14000
trusted library allocation
page read and write
1770000
trusted library allocation
page read and write
2B2A000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
9BE000
heap
page read and write
21427000
heap
page read and write
180F000
heap
page read and write
452F000
trusted library allocation
page read and write
930000
unkown
page readonly
4C0000
unkown
page readonly
4F10000
trusted library allocation
page read and write
44E000
remote allocation
page execute and read and write
2A27000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
F55000
heap
page read and write
B17000
heap
page read and write
4E10000
direct allocation
page execute and read and write
D40000
trusted library allocation
page read and write
21425000
heap
page read and write
70E5000
trusted library allocation
page read and write
447D000
trusted library allocation
page read and write
5510000
direct allocation
page execute and read and write
4559000
trusted library allocation
page read and write
292E000
stack
page read and write
25FF000
trusted library allocation
page read and write
5B93000
heap
page read and write
2236000
trusted library allocation
page read and write
31CE000
stack
page read and write
1AEBE000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
5CE0000
trusted library allocation
page read and write
887C000
stack
page read and write
6921000
trusted library allocation
page read and write
3707000
trusted library allocation
page read and write
C64000
heap
page read and write
650000
trusted library allocation
page read and write
104F000
heap
page read and write
2240000
heap
page read and write
20FA9000
heap
page read and write
2A51000
trusted library allocation
page read and write
A14000
heap
page read and write
2A5D000
trusted library allocation
page read and write
2AD4000
trusted library allocation
page read and write
21434000
heap
page read and write
73FE000
stack
page read and write
3810000
trusted library allocation
page read and write
4930000
trusted library allocation
page execute and read and write
1739000
heap
page read and write
2B62000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
332C000
trusted library allocation
page read and write
62DD000
stack
page read and write
457F000
stack
page read and write
5631000
heap
page read and write
5D20000
heap
page read and write
C64000
heap
page read and write
6AF0000
trusted library allocation
page execute and read and write
20FB5000
heap
page read and write
300E000
stack
page read and write
5F0E000
heap
page read and write
4581000
heap
page read and write
36A2000
trusted library allocation
page read and write
4ED1000
heap
page read and write
C1B000
heap
page read and write
7F50000
trusted library allocation
page read and write
12E0000
heap
page read and write
5D1F000
stack
page read and write
35A9000
trusted library allocation
page read and write
89E000
stack
page read and write
3026000
trusted library allocation
page read and write
220C000
stack
page read and write
354D000
trusted library allocation
page read and write
3DC3000
trusted library allocation
page read and write
315E000
stack
page read and write
3150000
heap
page execute and read and write
26D1000
trusted library allocation
page read and write
AF5000
heap
page read and write
B17000
heap
page read and write
2BF0000
trusted library allocation
page read and write
7576000
trusted library allocation
page read and write
6DD3000
heap
page read and write
2DCD000
trusted library allocation
page read and write
67C0000
heap
page read and write
3790000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
263C000
stack
page read and write
6A00000
trusted library allocation
page read and write
20FD3000
heap
page read and write
F26000
heap
page read and write
37B7000
trusted library allocation
page read and write
6C0000
heap
page read and write
51A7000
trusted library allocation
page read and write
20FC1000
heap
page read and write
4ED1000
heap
page read and write
77A4000
heap
page read and write
38A0000
trusted library allocation
page read and write
21093000
heap
page read and write
3190000
trusted library allocation
page execute and read and write
2D38000
trusted library allocation
page read and write
C5E000
stack
page read and write
2AA0000
trusted library allocation
page read and write
3776000
trusted library allocation
page read and write
757C000
trusted library allocation
page read and write
7200000
trusted library allocation
page execute and read and write
7F25000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
5A70000
remote allocation
page read and write
2A16000
trusted library allocation
page read and write
4580000
heap
page read and write
2E91000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
16D9000
heap
page read and write
12C6000
trusted library allocation
page execute and read and write
3747000
trusted library allocation
page read and write
CF7000
stack
page read and write
31BC000
trusted library allocation
page read and write
29CE000
stack
page read and write
4ED1000
heap
page read and write
6660000
trusted library allocation
page read and write
4B5F000
stack
page read and write
37ED000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page read and write
3378000
trusted library allocation
page read and write
5BE2000
heap
page read and write
26E6000
trusted library allocation
page read and write
1300000
heap
page read and write
2790000
trusted library allocation
page execute and read and write
BB0000
heap
page read and write
B75000
heap
page read and write
2C22000
trusted library allocation
page read and write
C1A000
heap
page read and write
61ECD000
direct allocation
page readonly
1290000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
2B04000
trusted library allocation
page read and write
3A3F000
stack
page read and write
2D4F000
stack
page read and write
2140D000
heap
page read and write
21402000
heap
page read and write
53B0000
heap
page read and write
2D7C000
trusted library allocation
page read and write
4EC0000
direct allocation
page read and write
2FAA000
trusted library allocation
page execute and read and write
3D3F000
stack
page read and write
7855000
heap
page read and write
3839000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
5C8E000
stack
page read and write
6D1C000
heap
page read and write
20FAB000
heap
page read and write
29B3000
trusted library allocation
page read and write
57C0000
heap
page read and write
3899000
trusted library allocation
page read and write
3E7F000
stack
page read and write
30AA000
trusted library allocation
page read and write
20FC1000
heap
page read and write
30D5000
trusted library allocation
page read and write
2230000
trusted library allocation
page read and write
5F84000
heap
page read and write
4F01000
heap
page read and write
4DBE000
stack
page read and write
15E4000
heap
page read and write
EF4000
heap
page read and write
43CF000
stack
page read and write
694E000
stack
page read and write
5199000
trusted library allocation
page read and write
34CF000
stack
page read and write
2915000
trusted library allocation
page read and write
38AD000
trusted library allocation
page read and write
21427000
heap
page read and write
1747000
heap
page read and write
4581000
heap
page read and write
5CD0000
trusted library allocation
page read and write
2A53000
trusted library allocation
page read and write
42DA000
trusted library allocation
page read and write
6E65000
heap
page read and write
363F000
trusted library allocation
page read and write
5345000
trusted library allocation
page read and write
E04000
unkown
page read and write
58D2000
trusted library allocation
page read and write
21435000
heap
page read and write
200000
unkown
page read and write
63B0000
trusted library allocation
page execute and read and write
61E01000
direct allocation
page execute read
2BCD000
trusted library allocation
page read and write
2B7E000
stack
page read and write
31AF000
trusted library allocation
page read and write
4F8D000
stack
page read and write
5D49000
heap
page read and write
F50000
heap
page read and write
7D9D000
heap
page read and write
3052000
trusted library allocation
page read and write
2B0C000
trusted library allocation
page read and write
274B0000
heap
page read and write
200000
unkown
page readonly
400000
remote allocation
page execute and read and write
35F1000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
2CF9000
trusted library allocation
page read and write
6959E000
unkown
page read and write
200000
unkown
page read and write
6D50000
trusted library allocation
page read and write
2EA2000
trusted library allocation
page read and write
2350000
trusted library allocation
page read and write
31A0000
heap
page read and write
360C000
trusted library allocation
page read and write
1823000
heap
page read and write
2A3A000
trusted library allocation
page read and write
2C26000
trusted library allocation
page read and write
30000
unkown
page readonly
4A8D000
stack
page read and write
25BF000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
2A9E000
trusted library allocation
page read and write
4572000
trusted library allocation
page read and write
5500000
direct allocation
page execute and read and write
17A0000
heap
page read and write
424A000
trusted library allocation
page read and write
520000
unkown
page readonly
5A0000
unkown
page readonly
3162000
trusted library allocation
page execute and read and write
2727000
trusted library allocation
page read and write
4ED1000
heap
page read and write
15E4000
heap
page read and write
5D9B000
heap
page read and write
3608000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
2D5B000
trusted library allocation
page read and write
5E8E000
stack
page read and write
55AD000
stack
page read and write
286B000
trusted library allocation
page read and write
2E61000
trusted library allocation
page read and write
6F58000
trusted library allocation
page read and write
37F9000
trusted library allocation
page read and write
530E000
stack
page read and write
21442000
heap
page read and write
2BE8000
trusted library allocation
page read and write
303F000
stack
page read and write
2DC7000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
2B3F000
stack
page read and write
41F3000
trusted library allocation
page read and write
773E000
stack
page read and write
1759000
heap
page read and write
21425000
heap
page read and write
2E50000
trusted library allocation
page read and write
3561000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
4F01000
heap
page read and write
5F53000
heap
page read and write
BE1000
heap
page read and write
2DD0000
trusted library allocation
page read and write
C64000
heap
page read and write
38A1000
trusted library allocation
page read and write
36BE000
stack
page read and write
2AFC000
trusted library allocation
page read and write
28A5000
trusted library allocation
page read and write
5160000
heap
page read and write
12EE000
stack
page read and write
7DFD000
heap
page read and write
4890000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
5510000
direct allocation
page execute and read and write
526000
unkown
page execute and write copy
8FA000
stack
page read and write
6949000
trusted library allocation
page read and write
672A000
stack
page read and write
B90000
heap
page read and write
20FD0000
heap
page read and write
28DF000
stack
page read and write
27FA000
trusted library allocation
page read and write
5F8E000
heap
page read and write
8644000
heap
page read and write
2B70000
heap
page read and write
2BA6000
trusted library allocation
page read and write
6E5D000
heap
page read and write
101E000
unkown
page execute and read and write
6840000
trusted library allocation
page execute and read and write
D9D000
heap
page read and write
39BE000
stack
page read and write
20FAF000
heap
page read and write
4ED1000
heap
page read and write
21417000
heap
page read and write
1500000
heap
page read and write
2DC0000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
323C000
trusted library allocation
page read and write
4F01000
heap
page read and write
116C000
heap
page read and write
There are 3940 hidden memdumps, click here to show them.