IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Myjsn.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Myjsn.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\InstallUtil.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
malicious
C:\Users\user\AppData\Roaming\Myjsn.exe
"C:\Users\user\AppData\Roaming\Myjsn.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 51.222.111.116:80 -u 46E9UkTFqALXNh2mSbA7WGDoa2i6h4WVgUgPVdT9ZdtweLRvAhWmbvuY1dhEmfjHbsavKXo3eGf5ZRb4qJzFXLVHGYH4moQ.x -p x --algo rx/0 --cpu-max-threads-hint=50
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 51.222.111.116:80 -u 46E9UkTFqALXNh2mSbA7WGDoa2i6h4WVgUgPVdT9ZdtweLRvAhWmbvuY1dhEmfjHbsavKXo3eGf5ZRb4qJzFXLVHGYH4moQ.x -p x --algo rx/0 --cpu-max-threads-hint=50
malicious
C:\Users\user\AppData\Roaming\Myjsn.exe
"C:\Users\user\AppData\Roaming\Myjsn.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
malicious

URLs

Name
IP
Malicious
https://github.com/mgravell/protobuf-neti
unknown
malicious
https://stackoverflow.com/q/14436606/23354
unknown
malicious
https://github.com/mgravell/protobuf-netJ
unknown
malicious
https://sck-dns.ws/plugin3.dll
104.21.80.31
malicious
http://31.13.224.51/Vtlvm.pdf
31.13.224.51
malicious
https://stackoverflow.com/q/11564914/23354;
unknown
malicious
https://stackoverflow.com/q/2152978/23354
unknown
malicious
https://xmrig.com/wizard%s
unknown
malicious
https://xmrig.com/docs/algorithms
unknown
malicious
https://github.com/mgravell/protobuf-net
unknown
malicious
https://files.catbox.moe/k541xr.dllJ
unknown
malicious
https://xmrig.com/benchmark/%s
unknown
malicious
https://files.catbox.moe/k541xr.dll
unknown
malicious
https://xmrig.com/wizard
unknown
malicious
http://31.13.224.51
unknown
malicious
https://files.catbox.moe/kwfxr7.dll
unknown
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
malicious
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sck-dns.ws
104.21.80.31

IPs

IP
Domain
Country
Malicious
51.222.111.116
unknown
France
malicious
104.21.80.31
sck-dns.ws
United States
31.13.224.51
unknown
Bulgaria
213.152.162.15
unknown
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Myjsn
HKEY_CURRENT_USER\SOFTWARE\ae95951adaa9fb49e58c5c9658a1ef7f
56b8a872ff11b812671a9630383a20c4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\ae95951adaa9fb49e58c5c9658a1ef7f
46CA954A242393AFA5371FD73A9FB577
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Myjsn_RASMANCS
FileDirectory
There are 35 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2337CDC8000
heap
page read and write
malicious
264C99A7000
trusted library allocation
page read and write
malicious
23510535000
trusted library allocation
page read and write
malicious
264D9B95000
trusted library allocation
page read and write
malicious
264C9891000
trusted library allocation
page read and write
malicious
28DC43D1000
trusted library allocation
page read and write
malicious
25091008000
heap
page read and write
malicious
28DD56C4000
trusted library allocation
page read and write
malicious
28200043000
trusted library allocation
page read and write
malicious
2509103D000
heap
page read and write
malicious
235733B0000
trusted library section
page read and write
malicious
23510305000
trusted library allocation
page read and write
malicious
140000000
remote allocation
page execute and read and write
malicious
23500001000
trusted library allocation
page read and write
malicious
2509106A000
heap
page read and write
malicious
28DD5B36000
trusted library allocation
page read and write
malicious
1F307243000
trusted library allocation
page read and write
malicious
298C9EB3000
trusted library allocation
page read and write
malicious
140799000
remote allocation
page execute and read and write
malicious
298E2B80000
trusted library section
page read and write
malicious
140465000
remote allocation
page execute and read and write
malicious
28DC4A4E000
trusted library allocation
page read and write
28DDCC84000
heap
page read and write
282003D5000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
28DC4651000
trusted library allocation
page read and write
1F305710000
trusted library allocation
page read and write
298DA232000
trusted library allocation
page read and write
7FFD9BB96000
trusted library allocation
page read and write
C6C9BFA000
stack
page read and write
1F3057A8000
heap
page read and write
7FFD9B7ED000
trusted library allocation
page execute and read and write
298CA10C000
trusted library allocation
page read and write
298CA0DD000
trusted library allocation
page read and write
28DC4726000
trusted library allocation
page read and write
7FFD9BB6C000
trusted library allocation
page read and write
28DDCBEE000
heap
page read and write
1F307456000
trusted library allocation
page read and write
1F307608000
trusted library allocation
page read and write
2827B030000
heap
page execute and read and write
7FFD9B8CC000
trusted library allocation
page execute and read and write
28DC45B5000
trusted library allocation
page read and write
28DD526B000
trusted library allocation
page read and write
23570FC0000
heap
page read and write
1F307574000
trusted library allocation
page read and write
28200227000
trusted library allocation
page read and write
298CA0F0000
trusted library allocation
page read and write
282002CB000
trusted library allocation
page read and write
1F307612000
trusted library allocation
page read and write
1F307585000
trusted library allocation
page read and write
298CA2E7000
trusted library allocation
page read and write
298CA2F8000
trusted library allocation
page read and write
23573240000
heap
page read and write
298C84CC000
heap
page read and write
1F307927000
trusted library allocation
page read and write
1F307415000
trusted library allocation
page read and write
7FFD9B9E3000
trusted library allocation
page read and write
28200214000
trusted library allocation
page read and write
7FFD9B7FD000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
298CA276000
trusted library allocation
page read and write
28200482000
trusted library allocation
page read and write
C7C47FF000
stack
page read and write
2820025A000
trusted library allocation
page read and write
1F307567000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
28200766000
trusted library allocation
page read and write
28200292000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1F307651000
trusted library allocation
page read and write
7FFD9B8A6000
trusted library allocation
page read and write
264C7D78000
heap
page read and write
1F3202DB000
heap
page read and write
298C84C0000
heap
page read and write
298CA2FF000
trusted library allocation
page read and write
7FFD9BAC8000
trusted library allocation
page read and write
298C9E60000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
28DDCFEC000
heap
page read and write
1F3075CE000
trusted library allocation
page read and write
298CA0D0000
trusted library allocation
page read and write
28279700000
trusted library allocation
page read and write
298CA32E000
trusted library allocation
page read and write
A692DFF000
stack
page read and write
7FFD9BA45000
trusted library allocation
page read and write
298E21FA000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1F3074AA000
trusted library allocation
page read and write
264E2260000
heap
page read and write
298CA1ED000
trusted library allocation
page read and write
264E2140000
heap
page execute and read and write
298CA23E000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
282002DA000
trusted library allocation
page read and write
7FFD9B957000
trusted library allocation
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1F307453000
trusted library allocation
page read and write
7FFD9B98B000
trusted library allocation
page read and write
28200444000
trusted library allocation
page read and write
2509341E000
heap
page read and write
1F307699000
trusted library allocation
page read and write
1F305720000
heap
page read and write
E94ABFD000
stack
page read and write
1F3074AC000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9B80D000
trusted library allocation
page execute and read and write
28DD4761000
trusted library allocation
page read and write
28DD50B3000
trusted library allocation
page read and write
1F3202A0000
heap
page read and write
1F307010000
heap
page read and write
1F3075E8000
trusted library allocation
page read and write
298CA2A3000
trusted library allocation
page read and write
1F307475000
trusted library allocation
page read and write
7FFD9BA1E000
trusted library allocation
page read and write
28200285000
trusted library allocation
page read and write
28200423000
trusted library allocation
page read and write
298CA292000
trusted library allocation
page read and write
28DC2915000
heap
page read and write
298CA099000
trusted library allocation
page read and write
C7C42FC000
stack
page read and write
23572914000
heap
page read and write
28200203000
trusted library allocation
page read and write
7FFD9B813000
trusted library allocation
page execute and read and write
28DC28F0000
heap
page read and write
1F3075FF000
trusted library allocation
page read and write
2820034F000
trusted library allocation
page read and write
7FFD9BB98000
trusted library allocation
page read and write
28200460000
trusted library allocation
page read and write
7FFD9BA54000
trusted library allocation
page read and write
A01BDFF000
stack
page read and write
298CA09D000
trusted library allocation
page read and write
298C83C0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
28200475000
trusted library allocation
page read and write
A01B9FE000
stack
page read and write
C6C67F7000
stack
page read and write
282004B8000
trusted library allocation
page read and write
1F3075CA000
trusted library allocation
page read and write
28DDCE20000
heap
page read and write
1F30761B000
trusted library allocation
page read and write
28DD4589000
trusted library allocation
page read and write
298C83C5000
heap
page read and write
1F307956000
trusted library allocation
page read and write
28DD4C84000
trusted library allocation
page read and write
2827B970000
heap
page execute and read and write
298CA2A7000
trusted library allocation
page read and write
23571160000
heap
page read and write
7FFD9B9E8000
trusted library allocation
page read and write
A6932FE000
stack
page read and write
7FFD9B82D000
trusted library allocation
page execute and read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
28210001000
trusted library allocation
page read and write
E948FFE000
stack
page read and write
2820071E000
trusted library allocation
page read and write
7FFD9B99B000
trusted library allocation
page read and write
A692CFC000
stack
page read and write
298CA290000
trusted library allocation
page read and write
1F307884000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
A01C9FD000
stack
page read and write
298CA20B000
trusted library allocation
page read and write
28200218000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1F307495000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1F307201000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
298C83F0000
heap
page read and write
298C8501000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
46365FF000
stack
page read and write
7FFD9B834000
trusted library allocation
page read and write
7FFD9B80B000
trusted library allocation
page read and write
264C7DB6000
heap
page read and write
28DC44FA000
trusted library allocation
page read and write
28DC49F6000
trusted library allocation
page read and write
2827BB30000
heap
page read and write
298C84EC000
heap
page read and write
298CA271000
trusted library allocation
page read and write
298CA339000
trusted library allocation
page read and write
28DC4680000
trusted library allocation
page read and write
298CA16E000
trusted library allocation
page read and write
264D9A55000
trusted library allocation
page read and write
1F307596000
trusted library allocation
page read and write
1F30720F000
trusted library allocation
page read and write
1F307408000
trusted library allocation
page read and write
28DD472B000
trusted library allocation
page read and write
264C7FF0000
heap
page read and write
28DC4749000
trusted library allocation
page read and write
298CA263000
trusted library allocation
page read and write
298CA187000
trusted library allocation
page read and write
1F307482000
trusted library allocation
page read and write
298CA21C000
trusted library allocation
page read and write
2820026D000
trusted library allocation
page read and write
282003EA000
trusted library allocation
page read and write
28DD510B000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
7FFD9BA10000
trusted library allocation
page execute and read and write
7FFD9BBB0000
trusted library allocation
page read and write
28200366000
trusted library allocation
page read and write
235000C5000
trusted library allocation
page read and write
298CA10E000
trusted library allocation
page read and write
7FFD9BAA2000
trusted library allocation
page read and write
28200471000
trusted library allocation
page read and write
298CA41B000
trusted library allocation
page read and write
235710CC000
heap
page read and write
1F3075FD000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
298CA071000
trusted library allocation
page read and write
1F3078F2000
trusted library allocation
page read and write
28DC4B0F000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1F307621000
trusted library allocation
page read and write
23573237000
heap
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
28200247000
trusted library allocation
page read and write
264C7D40000
heap
page read and write
28DC299C000
heap
page read and write
1F307451000
trusted library allocation
page read and write
298CA1CB000
trusted library allocation
page read and write
298CA192000
trusted library allocation
page read and write
28DD447D000
trusted library allocation
page read and write
140784000
remote allocation
page execute and read and write
298CA08A000
trusted library allocation
page read and write
298CA1EF000
trusted library allocation
page read and write
2827B730000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
46371FD000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
2827B0A0000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1F3075EA000
trusted library allocation
page read and write
1F307680000
trusted library allocation
page read and write
7FFD9B9C5000
trusted library allocation
page read and write
28DC46BC000
trusted library allocation
page read and write
1F30754E000
trusted library allocation
page read and write
C7C46FE000
stack
page read and write
E94AFFE000
stack
page read and write
264E1C1E000
heap
page read and write
298E2A35000
heap
page read and write
1F3074FD000
trusted library allocation
page read and write
28279530000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
1F307543000
trusted library allocation
page read and write
28DDCFFA000
heap
page read and write
298D9E81000
trusted library allocation
page read and write
298CA357000
trusted library allocation
page read and write
7FFD9BB8C000
trusted library allocation
page read and write
23571096000
heap
page read and write
28DDC751000
heap
page read and write
28DC2958000
heap
page read and write
C6C8FFA000
stack
page read and write
298CA0E1000
trusted library allocation
page read and write
298CA05C000
trusted library allocation
page read and write
7FFD9BA5E000
trusted library allocation
page read and write
28DC2BF0000
heap
page read and write
298CA595000
trusted library allocation
page read and write
7FFD9BA21000
trusted library allocation
page read and write
264C7DAC000
heap
page read and write
1F307936000
trusted library allocation
page read and write
25095C1E000
heap
page read and write
298DA846000
trusted library allocation
page read and write
1F3078F9000
trusted library allocation
page read and write
1F317A96000
trusted library allocation
page read and write
298CA09B000
trusted library allocation
page read and write
1F30764B000
trusted library allocation
page read and write
23570F90000
heap
page read and write
1F30791A000
trusted library allocation
page read and write
28200431000
trusted library allocation
page read and write
A01D9FD000
stack
page read and write
1F30760A000
trusted library allocation
page read and write
28DDCE83000
heap
page execute and read and write
9C2FDFD000
stack
page read and write
298CA205000
trusted library allocation
page read and write
298CA26F000
trusted library allocation
page read and write
1F307486000
trusted library allocation
page read and write
7FFD9B81B000
trusted library allocation
page execute and read and write
28200462000
trusted library allocation
page read and write
2337CDB5000
heap
page read and write
28DC46A6000
trusted library allocation
page read and write
9C301FF000
stack
page read and write
282006FE000
trusted library allocation
page read and write
282003FB000
trusted library allocation
page read and write
298E2640000
heap
page read and write
1F3056A0000
heap
page read and write
1F307516000
trusted library allocation
page read and write
7FFD9B7F3000
trusted library allocation
page execute and read and write
1F305690000
heap
page read and write
7FFD9B9A5000
trusted library allocation
page read and write
28DC4AA4000
trusted library allocation
page read and write
28200234000
trusted library allocation
page read and write
282004F6000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1F307893000
trusted library allocation
page read and write
2357324E000
heap
page read and write
298CA2D9000
trusted library allocation
page read and write
28DC455E000
trusted library allocation
page read and write
282003D7000
trusted library allocation
page read and write
28DC469E000
trusted library allocation
page read and write
1F307905000
trusted library allocation
page read and write
28DC2A3C000
heap
page read and write
282004C5000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
298CA22F000
trusted library allocation
page read and write
28DC4917000
trusted library allocation
page read and write
28DD4DBD000
trusted library allocation
page read and write
28279512000
heap
page read and write
1F305695000
heap
page read and write
28279450000
heap
page read and write
7FFD9B7FD000
trusted library allocation
page execute and read and write
298CA359000
trusted library allocation
page read and write
7FFD9B7F3000
trusted library allocation
page read and write
1F3074AE000
trusted library allocation
page read and write
298C84C6000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
28DC45FD000
trusted library allocation
page read and write
46381FD000
stack
page read and write
264C9956000
trusted library allocation
page read and write
46385FE000
stack
page read and write
298CA29F000
trusted library allocation
page read and write
298E1EA0000
trusted library allocation
page read and write
28200395000
trusted library allocation
page read and write
282002D8000
trusted library allocation
page read and write
298E2CD0000
heap
page read and write
7FFD9BA14000
trusted library allocation
page read and write
298C8594000
heap
page read and write
250928F0000
heap
page read and write
28DC4643000
trusted library allocation
page read and write
140785000
remote allocation
page execute and read and write
2820041C000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
282003A6000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
28200455000
trusted library allocation
page read and write
28DC45C4000
trusted library allocation
page read and write
28DC29BD000
heap
page read and write
28DC2BF5000
heap
page read and write
7FFD9B83D000
trusted library allocation
page execute and read and write
282003A2000
trusted library allocation
page read and write
28DC4A22000
trusted library allocation
page read and write
298C8410000
heap
page read and write
C7C43FF000
stack
page read and write
298CA599000
trusted library allocation
page read and write
1F30750E000
trusted library allocation
page read and write
298CA07B000
trusted library allocation
page read and write
7FFD9BAB2000
trusted library allocation
page read and write
282003F9000
trusted library allocation
page read and write
28DC29A7000
heap
page read and write
28DD495B000
trusted library allocation
page read and write
298C9E40000
heap
page execute and read and write
28DC4B0C000
trusted library allocation
page read and write
1F30753F000
trusted library allocation
page read and write
28DC43C0000
heap
page execute and read and write
7FFD9B9FE000
trusted library allocation
page read and write
250928F9000
heap
page read and write
1F307431000
trusted library allocation
page read and write
1F307501000
trusted library allocation
page read and write
7FFD9B9EF000
trusted library allocation
page read and write
28DD4521000
trusted library allocation
page read and write
1F307530000
trusted library allocation
page read and write
1F30757F000
trusted library allocation
page read and write
28DC48D4000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
282001F3000
trusted library allocation
page read and write
28DD55CB000
trusted library allocation
page read and write
1F307514000
trusted library allocation
page read and write
23571078000
heap
page read and write
1F307949000
trusted library allocation
page read and write
264D99E1000
trusted library allocation
page read and write
1F3078E5000
trusted library allocation
page read and write
E94B3FE000
stack
page read and write
1F3179EA000
trusted library allocation
page read and write
298CA0F9000
trusted library allocation
page read and write
298CA5DF000
trusted library allocation
page read and write
9C2F5FF000
stack
page read and write
298CA1DE000
trusted library allocation
page read and write
7FFD9BA2C000
trusted library allocation
page read and write
298CA273000
trusted library allocation
page read and write
7AE09FE000
stack
page read and write
298CA151000
trusted library allocation
page read and write
1F317207000
trusted library allocation
page read and write
298CA11D000
trusted library allocation
page read and write
1F31FE50000
heap
page read and write
28DC4A7C000
trusted library allocation
page read and write
28DDCBF2000
heap
page read and write
28DDCDD0000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
264C7D94000
heap
page read and write
7FFD9B8D6000
trusted library allocation
page execute and read and write
7FFD9BB70000
trusted library allocation
page read and write
C6C83FB000
stack
page read and write
1F30795C000
trusted library allocation
page read and write
264C7CF0000
heap
page read and write
28DC4757000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
28DC4627000
trusted library allocation
page read and write
7FFD9BA14000
trusted library allocation
page read and write
1F307653000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9B7E3000
trusted library allocation
page execute and read and write
28200446000
trusted library allocation
page read and write
1F31753C000
trusted library allocation
page read and write
28DDCBFA000
heap
page read and write
1F305713000
trusted library allocation
page read and write
1F30746F000
trusted library allocation
page read and write
298CA119000
trusted library allocation
page read and write
298CA593000
trusted library allocation
page read and write
298CA30A000
trusted library allocation
page read and write
A6933FF000
stack
page read and write
23573230000
heap
page read and write
1F307484000
trusted library allocation
page read and write
1F3177B6000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
28DD4FAB000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
298CA2C3000
trusted library allocation
page read and write
1F3074B7000
trusted library allocation
page read and write
298C8790000
heap
page read and write
298CA2FC000
trusted library allocation
page read and write
1404FC000
remote allocation
page execute and read and write
28DC4A05000
trusted library allocation
page read and write
264C9880000
heap
page read and write
28DC485D000
trusted library allocation
page read and write
282002C9000
trusted library allocation
page read and write
1F30765E000
trusted library allocation
page read and write
282794E5000
heap
page read and write
1F307695000
trusted library allocation
page read and write
1F307945000
trusted library allocation
page read and write
1F305765000
heap
page read and write
28200598000
trusted library allocation
page read and write
7FFD9BA0C000
trusted library allocation
page read and write
235710B6000
heap
page read and write
1F31F8C0000
heap
page read and write
1F30768F000
trusted library allocation
page read and write
28DD5003000
trusted library allocation
page read and write
1F307882000
trusted library allocation
page read and write
28200377000
trusted library allocation
page read and write
298CA086000
trusted library allocation
page read and write
2820025D000
trusted library allocation
page read and write
28DC47A4000
trusted library allocation
page read and write
298CA2E3000
trusted library allocation
page read and write
298CA1A5000
trusted library allocation
page read and write
1F307918000
trusted library allocation
page read and write
28DC2910000
heap
page read and write
1F307026000
heap
page read and write
28DD4A80000
trusted library allocation
page read and write
1F307493000
trusted library allocation
page read and write
2820032F000
trusted library allocation
page read and write
A692FFE000
stack
page read and write
28DD4595000
trusted library allocation
page read and write
298CA0CE000
trusted library allocation
page read and write
28DC499E000
trusted library allocation
page read and write
2509701E000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
28200258000
trusted library allocation
page read and write
264C9954000
trusted library allocation
page read and write
282002B4000
trusted library allocation
page read and write
1F3075BB000
trusted library allocation
page read and write
28DD4567000
trusted library allocation
page read and write
298C8480000
trusted library allocation
page read and write
282006E4000
trusted library allocation
page read and write
7FFD9BA27000
trusted library allocation
page read and write
1F307434000
trusted library allocation
page read and write
28DC4963000
trusted library allocation
page read and write
282794F0000
heap
page read and write
2820046F000
trusted library allocation
page read and write
298CA32A000
trusted library allocation
page read and write
25092901000
heap
page read and write
28210192000
trusted library allocation
page read and write
1F317211000
trusted library allocation
page read and write
264C7DCC000
heap
page read and write
28DC46A0000
trusted library allocation
page read and write
A01D5FE000
stack
page read and write
25091000000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
1F31743E000
trusted library allocation
page read and write
28210AEE000
trusted library allocation
page read and write
1F3075DD000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page execute and read and write
28200238000
trusted library allocation
page read and write
28200205000
trusted library allocation
page read and write
1F30756E000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
282004E7000
trusted library allocation
page read and write
23510001000
trusted library allocation
page read and write
7FFD9B7F2000
trusted library allocation
page read and write
23571040000
trusted library allocation
page read and write
C6C73FE000
stack
page read and write
A01CDFF000
stack
page read and write
28DC2940000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9B9EF000
trusted library allocation
page read and write
282002A3000
trusted library allocation
page read and write
298CA1A3000
trusted library allocation
page read and write
298CA360000
trusted library allocation
page read and write
1F305740000
heap
page read and write
7FFD9BB88000
trusted library allocation
page read and write
1F3074A8000
trusted library allocation
page read and write
264D993D000
trusted library allocation
page read and write
28DD49B1000
trusted library allocation
page read and write
298CA2F6000
trusted library allocation
page read and write
1F307903000
trusted library allocation
page read and write
7FFD9BA68000
trusted library allocation
page read and write
1F30752C000
trusted library allocation
page read and write
28DDCDB0000
heap
page execute and read and write
C6C53FD000
stack
page read and write
7FFD9BAC3000
trusted library allocation
page read and write
1F307686000
trusted library allocation
page read and write
298CA161000
trusted library allocation
page read and write
1F3074D9000
trusted library allocation
page read and write
28200731000
trusted library allocation
page read and write
7FFD9B9CA000
trusted library allocation
page read and write
1F305700000
trusted library allocation
page read and write
C6C77FA000
stack
page read and write
298CA15F000
trusted library allocation
page read and write
7FFD9B9B8000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page read and write
7FFD9B9FF000
trusted library allocation
page read and write
28DDCC2E000
heap
page read and write
1F30767C000
trusted library allocation
page read and write
28200256000
trusted library allocation
page read and write
28DC4678000
trusted library allocation
page read and write
7FFD9B7E2000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
298CA108000
trusted library allocation
page read and write
2827BB5E000
heap
page read and write
298CA5A8000
trusted library allocation
page read and write
28DC494E000
trusted library allocation
page read and write
298CA05E000
trusted library allocation
page read and write
7FFD9B8C6000
trusted library allocation
page read and write
7FFD9B86C000
trusted library allocation
page execute and read and write
264C7CD0000
heap
page read and write
7FFD9BA0E000
trusted library allocation
page read and write
28DD4B2C000
trusted library allocation
page read and write
282003AA000
trusted library allocation
page read and write
28DC4AE3000
trusted library allocation
page read and write
298CA19A000
trusted library allocation
page read and write
298CA20E000
trusted library allocation
page read and write
1F30760C000
trusted library allocation
page read and write
28200700000
trusted library allocation
page read and write
1F30765C000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
298CA37D000
trusted library allocation
page read and write
2337CC60000
heap
page read and write
28DC489B000
trusted library allocation
page read and write
282004EC000
trusted library allocation
page read and write
23570F95000
heap
page read and write
298C8493000
trusted library allocation
page read and write
28200225000
trusted library allocation
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
7FFD9B8D6000
trusted library allocation
page execute and read and write
9C305FE000
stack
page read and write
28DDCC46000
heap
page read and write
7FFD9B9C7000
trusted library allocation
page read and write
28DC42B0000
heap
page read and write
28DD4CDA000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
282002A7000
trusted library allocation
page read and write
298CA36E000
trusted library allocation
page read and write
28DC4A31000
trusted library allocation
page read and write
1F30763E000
trusted library allocation
page read and write
282001EE000
trusted library allocation
page read and write
298CA36C000
trusted library allocation
page read and write
28DC460B000
trusted library allocation
page read and write
1F3075B3000
trusted library allocation
page read and write
1F307211000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
1F307731000
trusted library allocation
page read and write
1F307891000
trusted library allocation
page read and write
140799000
remote allocation
page execute and read and write
7FFD9BA40000
trusted library allocation
page read and write
28200742000
trusted library allocation
page read and write
7FFD9B81D000
trusted library allocation
page execute and read and write
7FFD9BB80000
trusted library allocation
page read and write
298C8795000
heap
page read and write
28200755000
trusted library allocation
page read and write
298CA14A000
trusted library allocation
page read and write
28DD4F53000
trusted library allocation
page read and write
E94A3FE000
stack
page read and write
7FFD9BA20000
trusted library allocation
page execute and read and write
28DD4EA3000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page read and write
23570E90000
heap
page read and write
298CA181000
trusted library allocation
page read and write
2337CD90000
direct allocation
page execute read
28DC4711000
trusted library allocation
page read and write
28210896000
trusted library allocation
page read and write
1F307444000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
282001EC000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
282004A1000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1F305768000
heap
page read and write
C6C93FA000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
2337E770000
heap
page read and write
1F3074BB000
trusted library allocation
page read and write
A01C5FE000
stack
page read and write
28200368000
trusted library allocation
page read and write
2827BE20000
heap
page read and write
1F307411000
trusted library allocation
page read and write
28200223000
trusted library allocation
page read and write
7FFD9B80D000
trusted library allocation
page execute and read and write
7AE0DFE000
stack
page read and write
298CA231000
trusted library allocation
page read and write
282002EF000
trusted library allocation
page read and write
28200335000
trusted library allocation
page read and write
28200315000
trusted library allocation
page read and write
28DD5360000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1F3075B5000
trusted library allocation
page read and write
28DC28B0000
heap
page read and write
298CA1C5000
trusted library allocation
page read and write
1F3074CE000
trusted library allocation
page read and write
1F30701E000
heap
page read and write
1F307587000
trusted library allocation
page read and write
298CA249000
trusted library allocation
page read and write
C7C48FE000
stack
page read and write
282003D9000
trusted library allocation
page read and write
298CA117000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9B9D7000
trusted library allocation
page read and write
1F30755F000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
298CA0BF000
trusted library allocation
page read and write
7FFD9B8C6000
trusted library allocation
page execute and read and write
298CA148000
trusted library allocation
page read and write
7FFD9BB9C000
trusted library allocation
page read and write
282003EC000
trusted library allocation
page read and write
282004C9000
trusted library allocation
page read and write
7FFD9BAAF000
trusted library allocation
page read and write
1F317514000
trusted library allocation
page read and write
1F3075F7000
trusted library allocation
page read and write
298CA25C000
trusted library allocation
page read and write
282004E3000
trusted library allocation
page read and write
298CA2EC000
trusted library allocation
page read and write
28200342000
trusted library allocation
page read and write
1F307907000
trusted library allocation
page read and write
25090F60000
heap
page read and write
298E2A2D000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
1F30788F000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page execute and read and write
1F3078C5000
trusted library allocation
page read and write
298E2A10000
heap
page read and write
C6C3CEE000
stack
page read and write
298CA250000
trusted library allocation
page read and write
28DC29A3000
heap
page read and write
7FFD9BA6A000
trusted library allocation
page read and write
282003AC000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
282794FC000
heap
page read and write
28DD546A000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
298CA317000
trusted library allocation
page read and write
7FFD9B80D000
trusted library allocation
page execute and read and write
1F3071F0000
heap
page execute and read and write
E948BED000
stack
page read and write
282004FA000
trusted library allocation
page read and write
28200236000
trusted library allocation
page read and write
7FFD9B834000
trusted library allocation
page read and write
1F307629000
trusted library allocation
page read and write
282004D9000
trusted library allocation
page read and write
4B6000
remote allocation
page execute and read and write
28DD46D5000
trusted library allocation
page read and write
7FFD9BB7C000
trusted library allocation
page read and write
2820030F000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
28DC49BD000
trusted library allocation
page read and write
28200715000
trusted library allocation
page read and write
1F30764F000
trusted library allocation
page read and write
7FFD9BB6B000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
298CA08D000
trusted library allocation
page read and write
28DC4703000
trusted library allocation
page read and write
298CA2D6000
trusted library allocation
page read and write
298CA097000
trusted library allocation
page read and write
1F307598000
trusted library allocation
page read and write
7FFD9BA65000
trusted library allocation
page read and write
4638DFD000
stack
page read and write
2820041A000
trusted library allocation
page read and write
1F307545000
trusted library allocation
page read and write
298CA0EE000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
298CA56B000
trusted library allocation
page read and write
298CA1A7000
trusted library allocation
page read and write
298CA35B000
trusted library allocation
page read and write
2820042F000
trusted library allocation
page read and write
298CA2C5000
trusted library allocation
page read and write
298CA33D000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1F307572000
trusted library allocation
page read and write
7AE01FF000
stack
page read and write
28200254000
trusted library allocation
page read and write
298DA0BE000
trusted library allocation
page read and write
7FFD9BA2E000
trusted library allocation
page read and write
2357114A000
heap
page read and write
28210007000
trusted library allocation
page read and write
298CA319000
trusted library allocation
page read and write
298CA17F000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page execute and read and write
2820023C000
trusted library allocation
page read and write
9C2F1E1000
stack
page read and write
7FF4C9880000
trusted library allocation
page execute and read and write
E9493FE000
stack
page read and write
1F307909000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
264C99BB000
trusted library allocation
page read and write
298C8504000
heap
page read and write
7FFD9B7F3000
trusted library allocation
page execute and read and write
28DD52C2000
trusted library allocation
page read and write
298CA597000
trusted library allocation
page read and write
282796F0000
trusted library allocation
page read and write
298C9E71000
trusted library allocation
page read and write
28DD4DF4000
trusted library allocation
page read and write
28200477000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
7FFD9BA4D000
trusted library allocation
page read and write
282002EB000
trusted library allocation
page read and write
28279480000
heap
page read and write
28DDCC5D000
heap
page read and write
1F30763C000
trusted library allocation
page read and write
7FFD9B803000
trusted library allocation
page read and write
28DD51BB000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
28DC4972000
trusted library allocation
page read and write
28200320000
trusted library allocation
page read and write
298CA0DB000
trusted library allocation
page read and write
7FFD9B9F8000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
298CA185000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page read and write
1F30752A000
trusted library allocation
page read and write
2820026B000
trusted library allocation
page read and write
282004F8000
trusted library allocation
page read and write
298CA242000
trusted library allocation
page read and write
1F307693000
trusted library allocation
page read and write
7FFD9B997000
trusted library allocation
page read and write
28DC4A43000
trusted library allocation
page read and write
2827AFF0000
heap
page read and write
7FFD9B804000
trusted library allocation
page read and write
298CA06F000
trusted library allocation
page read and write
298CA36A000
trusted library allocation
page read and write
282794F6000
heap
page read and write
1F307503000
trusted library allocation
page read and write
1F307406000
trusted library allocation
page read and write
298CA12A000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
1F307440000
trusted library allocation
page read and write
282004BA000
trusted library allocation
page read and write
298CA0B0000
trusted library allocation
page read and write
A01E9FE000
stack
page read and write
28200720000
trusted library allocation
page read and write
282003D3000
trusted library allocation
page read and write
28DDCC23000
heap
page read and write
C6C4FFE000
stack
page read and write
7FFD9B8A6000
trusted library allocation
page read and write
28DDCFE1000
heap
page read and write
2827B06E000
heap
page read and write
7FFD9B82D000
trusted library allocation
page execute and read and write
298CA0C6000
trusted library allocation
page read and write
298CA0E3000
trusted library allocation
page read and write
28200294000
trusted library allocation
page read and write
1F307018000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
1F307442000
trusted library allocation
page read and write
1F307916000
trusted library allocation
page read and write
298CA2B4000
trusted library allocation
page read and write
1F3202A8000
heap
page read and write
28DD54C2000
trusted library allocation
page read and write
7FFD9B9C9000
trusted library allocation
page read and write
2337CDB0000
heap
page read and write
1F3078E3000
trusted library allocation
page read and write
C6C5BFE000
stack
page read and write
28DC472C000
trusted library allocation
page read and write
28279560000
heap
page read and write
28200327000
trusted library allocation
page read and write
1F3078DA000
trusted library allocation
page read and write
28DD4EFB000
trusted library allocation
page read and write
7FFD9B86C000
trusted library allocation
page execute and read and write
7FFD9B7F4000
trusted library allocation
page read and write
298CA1DC000
trusted library allocation
page read and write
7FFD9B807000
trusted library allocation
page read and write
28DDCC7B000
heap
page read and write
1F307880000
trusted library allocation
page read and write
7FFD9B9E7000
trusted library allocation
page read and write
298C82E0000
heap
page read and write
23572A20000
heap
page read and write
298CA2CB000
trusted library allocation
page read and write
1F3075FB000
trusted library allocation
page read and write
298CA183000
trusted library allocation
page read and write
28200375000
trusted library allocation
page read and write
C6C3D2F000
stack
page read and write
1F307642000
trusted library allocation
page read and write
28DDCBE6000
heap
page read and write
282794E0000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1F307684000
trusted library allocation
page read and write
28DD4A2A000
trusted library allocation
page read and write
28DC4A95000
trusted library allocation
page read and write
282003C6000
trusted library allocation
page read and write
298CA15B000
trusted library allocation
page read and write
28200484000
trusted library allocation
page read and write
25093E1E000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
28DD4B81000
trusted library allocation
page read and write
28DC4AD1000
trusted library allocation
page read and write
264C7F90000
heap
page execute and read and write
28200494000
trusted library allocation
page read and write
1F307480000
trusted library allocation
page read and write
298CA11F000
trusted library allocation
page read and write
1F3074EA000
trusted library allocation
page read and write
28200358000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1F3075B9000
trusted library allocation
page read and write
C6C97FA000
stack
page read and write
28210011000
trusted library allocation
page read and write
7FFD9BA7A000
trusted library allocation
page read and write
4637DFE000
stack
page read and write
28DC4220000
trusted library allocation
page read and write
28279715000
heap
page read and write
28DC4765000
trusted library allocation
page read and write
235101A9000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B814000
trusted library allocation
page read and write
282001F0000
trusted library allocation
page read and write
298CA106000
trusted library allocation
page read and write
7FFD9BAA7000
trusted library allocation
page read and write
1F3078C7000
trusted library allocation
page read and write
7FFD9B83D000
trusted library allocation
page execute and read and write
28279460000
heap
page read and write
1F30759A000
trusted library allocation
page read and write
1F30743E000
trusted library allocation
page read and write
1F307581000
trusted library allocation
page read and write
1F307419000
trusted library allocation
page read and write
1F307938000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
298CA23C000
trusted library allocation
page read and write
250910ED000
heap
page read and write
28DC4AD8000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
264D9C83000
trusted library allocation
page read and write
1F307671000
trusted library allocation
page read and write
7FFD9BA04000
trusted library allocation
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
282003BD000
trusted library allocation
page read and write
23570F70000
heap
page read and write
7FFD9BBB3000
trusted library allocation
page read and write
1F3074CA000
trusted library allocation
page read and write
298DA64B000
trusted library allocation
page read and write
1F30790C000
trusted library allocation
page read and write
1F3078D2000
trusted library allocation
page read and write
264C7D96000
heap
page read and write
282002F1000
trusted library allocation
page read and write
282002E9000
trusted library allocation
page read and write
28DC29A9000
heap
page read and write
46379FE000
stack
page read and write
7FFD9BA37000
trusted library allocation
page read and write
298CA2BA000
trusted library allocation
page read and write
28DC46EC000
trusted library allocation
page read and write
298CA373000
trusted library allocation
page read and write
298CA0AC000
trusted library allocation
page read and write
282003DB000
trusted library allocation
page read and write
28DC4594000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
298CA088000
trusted library allocation
page read and write
298CA064000
trusted library allocation
page read and write
298CA58A000
trusted library allocation
page read and write
28DD43D1000
trusted library allocation
page read and write
298CA1B6000
trusted library allocation
page read and write
7FFD9B81B000
trusted library allocation
page execute and read and write
1F3178FA000
trusted library allocation
page read and write
28DC4808000
trusted library allocation
page read and write
A01B5ED000
stack
page read and write
264C7D10000
heap
page read and write
298CA22B000
trusted library allocation
page read and write
7FFD9B936000
trusted library allocation
page execute and read and write
28200353000
trusted library allocation
page read and write
1F307510000
trusted library allocation
page read and write
2820045E000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
7FFD9BA6F000
trusted library allocation
page read and write
28200212000
trusted library allocation
page read and write
298CA5DD000
trusted library allocation
page read and write
28DC29E3000
heap
page read and write
1404FC000
remote allocation
page execute and read and write
1F30767E000
trusted library allocation
page read and write
298C8537000
heap
page read and write
298D9E71000
trusted library allocation
page read and write
7FFD9B934000
trusted library allocation
page execute and read and write
1F307592000
trusted library allocation
page read and write
298CA2E9000
trusted library allocation
page read and write
282003F0000
trusted library allocation
page read and write
1F307563000
trusted library allocation
page read and write
7FFD9B81E000
trusted library allocation
page execute and read and write
282004B4000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
282002A9000
trusted library allocation
page read and write
298CA22D000
trusted library allocation
page read and write
28200433000
trusted library allocation
page read and write
28DC45F4000
trusted library allocation
page read and write
298CA2C9000
trusted library allocation
page read and write
E94B7FD000
stack
page read and write
298C81F8000
unkown
page readonly
7FFD9B89C000
trusted library allocation
page execute and read and write
25092A1E000
heap
page read and write
1F30787D000
trusted library allocation
page read and write
282796D0000
trusted library allocation
page read and write
2337CD40000
heap
page read and write
1F30753D000
trusted library allocation
page read and write
28200355000
trusted library allocation
page read and write
1F307402000
trusted library allocation
page read and write
28200492000
trusted library allocation
page read and write
A01E5FD000
stack
page read and write
28DC4A35000
trusted library allocation
page read and write
298CA2A1000
trusted library allocation
page read and write
28200764000
trusted library allocation
page read and write
298C8092000
unkown
page readonly
7FFD9BB90000
trusted library allocation
page read and write
298CA0CC000
trusted library allocation
page read and write
28DD4FCB000
trusted library allocation
page read and write
28200479000
trusted library allocation
page read and write
28200281000
trusted library allocation
page read and write
298C83D0000
heap
page read and write
28DD4531000
trusted library allocation
page read and write
298CA128000
trusted library allocation
page read and write
28200348000
trusted library allocation
page read and write
235000C3000
trusted library allocation
page read and write
7FFD9B9D9000
trusted library allocation
page read and write
1F307413000
trusted library allocation
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
282004FF000
trusted library allocation
page read and write
264D9DC5000
trusted library allocation
page read and write
282103A5000
trusted library allocation
page read and write
235733A0000
heap
page execute and read and write
28DC4AE1000
trusted library allocation
page read and write
2820042D000
trusted library allocation
page read and write
28DD4BD7000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
28DC49DE000
trusted library allocation
page read and write
264D9891000
trusted library allocation
page read and write
1F3075DF000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
28DD49F3000
trusted library allocation
page read and write
1F30760E000
trusted library allocation
page read and write
1F307691000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
2827B060000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
298CA164000
trusted library allocation
page read and write
298CA0B9000
trusted library allocation
page read and write
28DC2986000
heap
page read and write
298CA062000
trusted library allocation
page read and write
7FFD9B814000
trusted library allocation
page read and write
1F30762B000
trusted library allocation
page read and write
282794A0000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B80D000
trusted library allocation
page execute and read and write
1F3078D8000
trusted library allocation
page read and write
1F3078B0000
trusted library allocation
page read and write
28DC4A16000
trusted library allocation
page read and write
1F307697000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
298CA1DA000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
298CA1B8000
trusted library allocation
page read and write
7FFD9B9CF000
trusted library allocation
page read and write
298CA326000
trusted library allocation
page read and write
1F305560000
heap
page read and write
7ADF9FF000
stack
page read and write
7FFD9B814000
trusted library allocation
page read and write
28DC46AE000
trusted library allocation
page read and write
46369FF000
stack
page read and write
2820044F000
trusted library allocation
page read and write
28DD567C000
trusted library allocation
page read and write
298CA25A000
trusted library allocation
page read and write
1404EF000
remote allocation
page execute and read and write
7FFD9B80B000
trusted library allocation
page execute and read and write
C6C9FFA000
stack
page read and write
282004B6000
trusted library allocation
page read and write
1F305725000
heap
page read and write
1404F9000
remote allocation
page execute and read and write
28200296000
trusted library allocation
page read and write
2820048E000
trusted library allocation
page read and write
28DC4A3E000
trusted library allocation
page read and write
298CA5D9000
trusted library allocation
page read and write
28200497000
trusted library allocation
page read and write
28DC4833000
trusted library allocation
page read and write
282004A5000
trusted library allocation
page read and write
25090E80000
heap
page read and write
7FFD9B803000
trusted library allocation
page read and write
1F30796B000
trusted library allocation
page read and write
7FFD9BA2E000
trusted library allocation
page read and write
28200201000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9BB83000
trusted library allocation
page read and write
282002BC000
trusted library allocation
page read and write
28DC45A2000
trusted library allocation
page read and write
28DC4879000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9BA20000
trusted library allocation
page execute and read and write
7FFD9BA78000
trusted library allocation
page read and write
298E2A47000
heap
page read and write
2820022B000
trusted library allocation
page read and write
298CA196000
trusted library allocation
page read and write
28200229000
trusted library allocation
page read and write
1F305660000
heap
page read and write
7FFD9BB7C000
trusted library allocation
page read and write
28DDCE80000
heap
page execute and read and write
1F307552000
trusted library allocation
page read and write
1F307943000
trusted library allocation
page read and write
46389FE000
stack
page read and write
C7C49FF000
stack
page read and write
7FFD9BAA5000
trusted library allocation
page read and write
7FFD9BA95000
trusted library allocation
page read and write
46375FE000
stack
page read and write
298C8780000
heap
page execute and read and write
1F307404000
trusted library allocation
page read and write
298CA073000
trusted library allocation
page read and write
298CA194000
trusted library allocation
page read and write
28DD4C2D000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
A01C1FE000
stack
page read and write
1F30762F000
trusted library allocation
page read and write
23571070000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
1F305640000
heap
page read and write
28DC28D0000
heap
page read and write
1F307610000
trusted library allocation
page read and write
298CA0D9000
trusted library allocation
page read and write
2820041E000
trusted library allocation
page read and write
1F31744E000
trusted library allocation
page read and write
7FFD9BB9A000
trusted library allocation
page read and write
28DC456E000
trusted library allocation
page read and write
28200270000
trusted library allocation
page read and write
1F3074D1000
trusted library allocation
page read and write
1F30742D000
trusted library allocation
page read and write
28DC4A51000
trusted library allocation
page read and write
282107EA000
trusted library allocation
page read and write
46361ED000
stack
page read and write
298CA229000
trusted library allocation
page read and write
264C7DB0000
heap
page read and write
7FFD9BA9C000
trusted library allocation
page read and write
264C7CC0000
heap
page read and write
28DC29A5000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
1F3075C8000
trusted library allocation
page read and write
28200313000
trusted library allocation
page read and write
28200001000
trusted library allocation
page read and write
28DC2950000
heap
page read and write
1F30795A000
trusted library allocation
page read and write
A01DDFE000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
28DC48AB000
trusted library allocation
page read and write
28200267000
trusted library allocation
page read and write
28DC47EC000
trusted library allocation
page read and write
282003C8000
trusted library allocation
page read and write
C6C6FFC000
stack
page read and write
28200490000
trusted library allocation
page read and write
264C7F40000
trusted library allocation
page read and write
298CA131000
trusted library allocation
page read and write
1F307417000
trusted library allocation
page read and write
9C309FE000
stack
page read and write
1F31791B000
trusted library allocation
page read and write
1F317201000
trusted library allocation
page read and write
1F3078B7000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
282003A8000
trusted library allocation
page read and write
1F3078BF000
trusted library allocation
page read and write
28DC491E000
trusted library allocation
page read and write
282002ED000
trusted library allocation
page read and write
1F3074DF000
trusted library allocation
page read and write
23572A40000
trusted library section
page read and write
298CA1F1000
trusted library allocation
page read and write
298CA139000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
7FFD9B81D000
trusted library allocation
page execute and read and write
7FFD9BAC0000
trusted library allocation
page read and write
1F3074FF000
trusted library allocation
page read and write
1F3078B4000
trusted library allocation
page read and write
E9497FF000
stack
page read and write
28200283000
trusted library allocation
page read and write
282003E8000
trusted library allocation
page read and write
1F30766D000
trusted library allocation
page read and write
2827AEC5000
heap
page read and write
28DDC400000
trusted library allocation
page read and write
298CA260000
trusted library allocation
page read and write
1F307471000
trusted library allocation
page read and write
7FFD9B822000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
298C9E6E000
heap
page read and write
264C7FF5000
heap
page read and write
264C7DF3000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B8AC000
trusted library allocation
page execute and read and write
298CA0FC000
trusted library allocation
page read and write
7FFD9BA58000
trusted library allocation
page read and write
23571020000
trusted library allocation
page read and write
282002D6000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
28DC46F5000
trusted library allocation
page read and write
28200486000
trusted library allocation
page read and write
298E2C80000
trusted library section
page read and write
298C8490000
trusted library allocation
page read and write
28200751000
trusted library allocation
page read and write
7FFD9BA06000
trusted library allocation
page read and write
1F3074F0000
trusted library allocation
page read and write
2509521E000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
28DD5163000
trusted library allocation
page read and write
1F3075F5000
trusted library allocation
page read and write
7FFD9B7FD000
trusted library allocation
page execute and read and write
7FFD9B81D000
trusted library allocation
page execute and read and write
298CA218000
trusted library allocation
page read and write
28DC47F9000
trusted library allocation
page read and write
7FFD9B8D6000
trusted library allocation
page execute and read and write
298CA2B2000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B8F6000
trusted library allocation
page execute and read and write
1F30577E000
heap
page read and write
28200411000
trusted library allocation
page read and write
298CA2B6000
trusted library allocation
page read and write
298CA32C000
trusted library allocation
page read and write
28DD47B7000
trusted library allocation
page read and write
282003BB000
trusted library allocation
page read and write
7FFD9B9DD000
trusted library allocation
page read and write
28DC47BB000
trusted library allocation
page read and write
298CA0EC000
trusted library allocation
page read and write
298CA1BC000
trusted library allocation
page read and write
28DC4A26000
trusted library allocation
page read and write
28200269000
trusted library allocation
page read and write
A01E1FE000
stack
page read and write
C6C63FE000
stack
page read and write
1404F5000
remote allocation
page execute and read and write
2827BB4F000
heap
page read and write
298CA5C4000
trusted library allocation
page read and write
25090FC5000
heap
page read and write
7FFD9B802000
trusted library allocation
page read and write
298CA0DF000
trusted library allocation
page read and write
28DC45EF000
trusted library allocation
page read and write
298CA2D2000
trusted library allocation
page read and write
298CA066000
trusted library allocation
page read and write
28DC4A5C000
trusted library allocation
page read and write
7FFD9B992000
trusted library allocation
page read and write
1F307512000
trusted library allocation
page read and write
1F30763A000
trusted library allocation
page read and write
25090FC0000
heap
page read and write
7FFD9BA71000
trusted library allocation
page read and write
28DDCBF6000
heap
page read and write
7FFD9BA24000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
1F307556000
trusted library allocation
page read and write
7FFD9B9BC000
trusted library allocation
page read and write
28DDCFE9000
heap
page read and write
28DC27D0000
heap
page read and write
28DC45ED000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
2820024A000
trusted library allocation
page read and write
298CA315000
trusted library allocation
page read and write
1F30746D000
trusted library allocation
page read and write
1F307565000
trusted library allocation
page read and write
250928B0000
heap
page read and write
E949BFD000
stack
page read and write
282004CB000
trusted library allocation
page read and write
28200397000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page execute and read and write
28200703000
trusted library allocation
page read and write
28279519000
heap
page read and write
28DC4A13000
trusted library allocation
page read and write
298CA313000
trusted library allocation
page read and write
28DC46E6000
trusted library allocation
page read and write
298CA21A000
trusted library allocation
page read and write
28DC48E3000
trusted library allocation
page read and write
2827955B000
heap
page read and write
235710F3000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page read and write
28DC454E000
trusted library allocation
page read and write
235710AC000
heap
page read and write
28DDCBA0000
heap
page read and write
23573232000
heap
page read and write
28200311000
trusted library allocation
page read and write
7FFD9B823000
trusted library allocation
page read and write
282003EE000
trusted library allocation
page read and write
298CA31B000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1F3056E0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page execute and read and write
7FFD9B83B000
trusted library allocation
page execute and read and write
7FFD9B96A000
trusted library allocation
page execute and read and write
7ADFDFE000
stack
page read and write
1F307972000
trusted library allocation
page read and write
28200464000
trusted library allocation
page read and write
28DD4905000
trusted library allocation
page read and write
7FFD9B9DF000
trusted library allocation
page read and write
2820045C000
trusted library allocation
page read and write
28279535000
heap
page read and write
2820072F000
trusted library allocation
page read and write
7FFD9BAB2000
trusted library allocation
page read and write
1F3078F4000
trusted library allocation
page read and write
298C852B000
heap
page read and write
298CA1D4000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
2827B06A000
heap
page read and write
28DD5308000
trusted library allocation
page read and write
298CA1D8000
trusted library allocation
page read and write
1F3078C3000
trusted library allocation
page read and write
25092A00000
heap
page read and write
7FFD9B7E4000
trusted library allocation
page read and write
28200351000
trusted library allocation
page read and write
1F3074B9000
trusted library allocation
page read and write
298CA1D6000
trusted library allocation
page read and write
7FFD9B8AC000
trusted library allocation
page execute and read and write
1F3074EE000
trusted library allocation
page read and write
25091038000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
28DC47C1000
trusted library allocation
page read and write
250910CC000
heap
page read and write
28DD4AD6000
trusted library allocation
page read and write
28DC49EA000
trusted library allocation
page read and write
E949FFF000
stack
page read and write
1F317572000
trusted library allocation
page read and write
1F30741B000
trusted library allocation
page read and write
2820036B000
trusted library allocation
page read and write
28DD5573000
trusted library allocation
page read and write
7FFD9B8C6000
trusted library allocation
page read and write
298CA370000
trusted library allocation
page read and write
298CA060000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1F307488000
trusted library allocation
page read and write
28279703000
trusted library allocation
page read and write
282002C5000
trusted library allocation
page read and write
28DD551A000
trusted library allocation
page read and write
28DDCBE0000
heap
page read and write
7FFD9BBA2000
trusted library allocation
page read and write
1F30761F000
trusted library allocation
page read and write
28DC46DE000
trusted library allocation
page read and write
C6C8BFE000
stack
page read and write
23572BA0000
trusted library allocation
page read and write
9C2F9FE000
stack
page read and write
298CA33F000
trusted library allocation
page read and write
28DC457E000
trusted library allocation
page read and write
7FFD9BA99000
trusted library allocation
page read and write
E94A7FE000
stack
page read and write
1F307673000
trusted library allocation
page read and write
1F307130000
heap
page read and write
C7C45FD000
stack
page read and write
298CA1A9000
trusted library allocation
page read and write
1F3074DB000
trusted library allocation
page read and write
28DC46D8000
trusted library allocation
page read and write
2827B068000
heap
page read and write
9C30DFE000
stack
page read and write
1F307886000
trusted library allocation
page read and write
282003B5000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
264C7F60000
trusted library allocation
page read and write
298CA25E000
trusted library allocation
page read and write
28DC4690000
trusted library allocation
page read and write
28DD5411000
trusted library allocation
page read and write
1F3074C0000
trusted library allocation
page read and write
7FFD9BB4A000
trusted library allocation
page read and write
2820076A000
trusted library allocation
page read and write
298CA14C000
trusted library allocation
page read and write
2337CD70000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
28200379000
trusted library allocation
page read and write
298CA2E5000
trusted library allocation
page read and write
7FFD9BA15000
trusted library allocation
page read and write
7FFD9B83B000
trusted library allocation
page execute and read and write
298CA1E7000
trusted library allocation
page read and write
2509661E000
heap
page read and write
7FFD9B814000
trusted library allocation
page read and write
28200391000
trusted library allocation
page read and write
298CA348000
trusted library allocation
page read and write
298CA297000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
298CA0C8000
trusted library allocation
page read and write
282106C4000
trusted library allocation
page read and write
1F307662000
trusted library allocation
page read and write
1F3075F9000
trusted library allocation
page read and write
28DC4223000
trusted library allocation
page read and write
298C8460000
trusted library allocation
page read and write
298CA0CA000
trusted library allocation
page read and write
C6C43E1000
stack
page read and write
7FFD9BA3E000
trusted library allocation
page read and write
28DC4982000
trusted library allocation
page read and write
298CA28E000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
282004E9000
trusted library allocation
page read and write
7FFD9BABB000
trusted library allocation
page read and write
28DC4AF8000
trusted library allocation
page read and write
7FFD9B9F4000
trusted library allocation
page read and write
28200322000
trusted library allocation
page read and write
2827BB10000
heap
page read and write
7FFD9B9EE000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
2820039A000
trusted library allocation
page read and write
23570FA0000
heap
page read and write
1F307533000
trusted library allocation
page read and write
282003E6000
trusted library allocation
page read and write
7FFD9B96C000
trusted library allocation
page execute and read and write
28200364000
trusted library allocation
page read and write
C6C6BFA000
stack
page read and write
1F307466000
trusted library allocation
page read and write
264C7D45000
heap
page read and write
298CA328000
trusted library allocation
page read and write
282002AC000
trusted library allocation
page read and write
28DD5624000
trusted library allocation
page read and write
7FFD9BA7A000
trusted library allocation
page read and write
298CA1BA000
trusted library allocation
page read and write
28200208000
trusted library allocation
page read and write
7FFD9B82B000
trusted library allocation
page read and write
A692EFF000
stack
page read and write
28DC4503000
trusted library allocation
page read and write
7FFD9B95A000
trusted library allocation
page execute and read and write
1F30791C000
trusted library allocation
page read and write
282004C3000
trusted library allocation
page read and write
2337CDF8000
heap
page read and write
28200324000
trusted library allocation
page read and write
28DC492C000
trusted library allocation
page read and write
1F317392000
trusted library allocation
page read and write
1F3074E1000
trusted library allocation
page read and write
7FFD9B93F000
trusted library allocation
page execute and read and write
298CA35D000
trusted library allocation
page read and write
A6931FF000
stack
page read and write
7FFD9BB32000
trusted library allocation
page read and write
1F317500000
trusted library allocation
page read and write
7FFD9B9CF000
trusted library allocation
page read and write
298CA1E9000
trusted library allocation
page read and write
4636DFE000
stack
page read and write
28279559000
heap
page read and write
1F3057A6000
heap
page read and write
28DD4D2F000
trusted library allocation
page read and write
C7C4CFF000
stack
page read and write
7ADF5E1000
stack
page read and write
7FFD9B8A6000
trusted library allocation
page read and write
2820029B000
trusted library allocation
page read and write
28279710000
heap
page read and write
28DC4599000
trusted library allocation
page read and write
2820074F000
trusted library allocation
page read and write
28DDCFD0000
heap
page read and write
298CA24B000
trusted library allocation
page read and write
7FFD9B813000
trusted library allocation
page execute and read and write
A6930FF000
stack
page read and write
28DC4841000
trusted library allocation
page read and write
7FFD9B814000
trusted library allocation
page read and write
28DC4635000
trusted library allocation
page read and write
28DD4D67000
trusted library allocation
page read and write
7FFD9B7F3000
trusted library allocation
page execute and read and write
298C8090000
unkown
page readonly
28DC4772000
trusted library allocation
page read and write
282107D1000
trusted library allocation
page read and write
28200420000
trusted library allocation
page read and write
1F3074A6000
trusted library allocation
page read and write
28DD4E4C000
trusted library allocation
page read and write
23571000000
heap
page read and write
28200216000
trusted library allocation
page read and write
1F30761D000
trusted library allocation
page read and write
28200442000
trusted library allocation
page read and write
28DDCBEA000
heap
page read and write
28200466000
trusted library allocation
page read and write
7FFD9BA68000
trusted library allocation
page read and write
1F3078F6000
trusted library allocation
page read and write
298CA2C7000
trusted library allocation
page read and write
28200362000
trusted library allocation
page read and write
298CA11B000
trusted library allocation
page read and write
1F30742F000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
298CA207000
trusted library allocation
page read and write
282004FC000
trusted library allocation
page read and write
298CA59C000
trusted library allocation
page read and write
250910E5000
heap
page read and write
298D9E77000
trusted library allocation
page read and write
28DC45E1000
trusted library allocation
page read and write
282003FD000
trusted library allocation
page read and write
1F3202BD000
heap
page read and write
298CA15D000
trusted library allocation
page read and write
28DC4A40000
trusted library allocation
page read and write
1F30577B000
heap
page read and write
7FFD9BB9C000
trusted library allocation
page read and write
7FFD9B942000
trusted library allocation
page execute and read and write
7FFD9B7FD000
trusted library allocation
page execute and read and write
2509481E000
heap
page read and write
28DDCBFE000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
1F3075D7000
trusted library allocation
page read and write
2337CE2A000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
1F31FB60000
heap
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
250929B0000
direct allocation
page execute and read and write
1F30764D000
trusted library allocation
page read and write
7FFD9BA3E000
trusted library allocation
page read and write
28DC46CA000
trusted library allocation
page read and write
282004A3000
trusted library allocation
page read and write
28DDD035000
heap
page read and write
28DC493A000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
298CA5D7000
trusted library allocation
page read and write
25090F90000
heap
page read and write
282004E5000
trusted library allocation
page read and write
1F307947000
trusted library allocation
page read and write
298C9DE0000
trusted library section
page read and write
264E18C0000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
28DD53B9000
trusted library allocation
page read and write
298CA2FA000
trusted library allocation
page read and write
28DC49CD000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
235710F5000
heap
page read and write
1F30743C000
trusted library allocation
page read and write
1F307594000
trusted library allocation
page read and write
7FFD9B99B000
trusted library allocation
page read and write
28DD505B000
trusted library allocation
page read and write
7FFD9BB66000
trusted library allocation
page read and write
7FFD9BA35000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1F30701A000
heap
page read and write
7FFD9B896000
trusted library allocation
page read and write
298CA240000
trusted library allocation
page read and write
2337CDC0000
heap
page read and write
1F307583000
trusted library allocation
page read and write
282002DE000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
298CA5DB000
trusted library allocation
page read and write
A01D1FE000
stack
page read and write
298CA308000
trusted library allocation
page read and write
28279532000
heap
page read and write
28DC4670000
trusted library allocation
page read and write
282002BA000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
282002A5000
trusted library allocation
page read and write
1F30762D000
trusted library allocation
page read and write
28DC4AFA000
trusted library allocation
page read and write
282004B2000
trusted library allocation
page read and write
2827BB3A000
heap
page read and write
298CA1EB000
trusted library allocation
page read and write
28DC4210000
trusted library allocation
page read and write
28DC49AD000
trusted library allocation
page read and write
23572B60000
heap
page execute and read and write
28200473000
trusted library allocation
page read and write
1F307930000
trusted library allocation
page read and write
298CA10A000
trusted library allocation
page read and write
7FFD9B7F4000
trusted library allocation
page read and write
1F3078AE000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
23571005000
heap
page read and write
1F307473000
trusted library allocation
page read and write
282002DC000
trusted library allocation
page read and write
7FFD9BA3B000
trusted library allocation
page read and write
1F307682000
trusted library allocation
page read and write
298CA084000
trusted library allocation
page read and write
282004D4000
trusted library allocation
page read and write
1F31F230000
trusted library allocation
page read and write
298CA1C9000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
7FFD9BAA0000
trusted library allocation
page read and write
140789000
remote allocation
page execute and read and write
7FFD9BB90000
trusted library allocation
page read and write
1F3075CC000
trusted library allocation
page read and write
28DD4593000
trusted library allocation
page read and write
298E2880000
trusted library section
page read and write
28200726000
trusted library allocation
page read and write
298CA26D000
trusted library allocation
page read and write
7FFD9B81D000
trusted library allocation
page execute and read and write
298CA209000
trusted library allocation
page read and write
7FFD9B8F6000
trusted library allocation
page execute and read and write
298C8750000
heap
page read and write
264C7D70000
heap
page read and write
298CA14E000
trusted library allocation
page read and write
282003FF000
trusted library allocation
page read and write
1F30752E000
trusted library allocation
page read and write
1F305748000
heap
page read and write
28200762000
trusted library allocation
page read and write
7AE05FD000
stack
page read and write
282002B6000
trusted library allocation
page read and write
7FFD9B7F4000
trusted library allocation
page read and write
28DD5213000
trusted library allocation
page read and write
298CA569000
trusted library allocation
page read and write
There are 1487 hidden memdumps, click here to show them.