IOC Report
RFQ_PO_N39859JFK_ORDER_SPECIFICATIONS_OM.bat

loading gif

Files

File Path
Type
Category
Malicious
RFQ_PO_N39859JFK_ORDER_SPECIFICATIONS_OM.bat
Microsoft Cabinet archive data, Windows 2000/XP setup, 4294967295 bytes, 1 file, at 0x75 +A "x.exe", number 1, 43 datablocks, 0 compression
initial sample
malicious
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\Wisrysxl
data
dropped
malicious
C:\Users\Public\Libraries\Wisrysxl.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\lxsyrsiW.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Wisrysxl.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Wisrysxl.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\neworigin.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\server_BTC.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\x.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\PNO
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Libraries\lxsyrsiW.cmd
DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
C:\Users\Public\alpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\xpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TrojanAIbot.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\server_BTC.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0moxwmft.i0z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ibna5siq.erj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lrpjcaz1.52d.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_obrtyv3z.10u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpFF65.tmp.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\74b31e1c42af9477.bin
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Thu Nov 21 15:00:25 2024, mtime=Thu Nov 21 15:00:25 2024, atime=Thu Nov 21 15:00:23 2024, length=231936, window=
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\x.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\AppData\Local\Temp\x.exe /d C:\\Users\\Public\\Libraries\\Wisrysxl.PIF /o
malicious
C:\Users\Public\Libraries\lxsyrsiW.pif
C:\Users\Public\Libraries\lxsyrsiW.pif
malicious
C:\Users\user\AppData\Local\Temp\neworigin.exe
"C:\Users\user\AppData\Local\Temp\neworigin.exe"
malicious
C:\Users\user\AppData\Local\Temp\server_BTC.exe
"C:\Users\user\AppData\Local\Temp\server_BTC.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi'
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 11:05 /du 23:59 /sc daily /ri 1 /f
malicious
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
"C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe"
malicious
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
malicious
C:\Users\Public\Libraries\Wisrysxl.PIF
"C:\Users\Public\Libraries\Wisrysxl.PIF"
malicious
C:\Users\Public\Libraries\lxsyrsiW.pif
C:\Users\Public\Libraries\lxsyrsiW.pif
malicious
C:\Users\user\AppData\Local\Temp\neworigin.exe
"C:\Users\user\AppData\Local\Temp\neworigin.exe"
malicious
C:\Users\user\AppData\Local\Temp\server_BTC.exe
"C:\Users\user\AppData\Local\Temp\server_BTC.exe"
malicious
C:\Users\Public\Libraries\Wisrysxl.PIF
"C:\Users\Public\Libraries\Wisrysxl.PIF"
malicious
C:\Users\Public\Libraries\lxsyrsiW.pif
C:\Users\Public\Libraries\lxsyrsiW.pif
malicious
C:\Users\user\AppData\Local\Temp\neworigin.exe
"C:\Users\user\AppData\Local\Temp\neworigin.exe"
malicious
C:\Users\user\AppData\Local\Temp\server_BTC.exe
"C:\Users\user\AppData\Local\Temp\server_BTC.exe"
malicious
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
"C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\RFQ_PO_N39859JFK_ORDER_SPECIFICATIONS_OM.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\extrac32.exe
extrac32 /y "C:\Users\user\Desktop\RFQ_PO_N39859JFK_ORDER_SPECIFICATIONS_OM.bat" "C:\Users\user\AppData\Local\Temp\x.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\lxsyrsiW.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpFF65.tmp.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 6
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 23 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://gxe0.com/yak/233_Wisrysx
unknown
malicious
https://gxe0.com/yak/233_Wisrysxlfss
198.252.105.91
malicious
https://gxe0.com/
unknown
malicious
https://api.ipify.org/
104.26.13.205
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://nuget.org/NuGet.exe
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://r11.o.lencr.org0#
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://gxe0.com/yak/233_WisrysxlfsseV
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://api.ipify.org/t
unknown
https://github.com/Pester/Pester
unknown
http://r11.i.lencr.org/0
unknown
https://api.ipify.org
unknown
http://crl.micro
unknown
https://aka.ms/pscore6lB
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://s82.gocheapweb.com
unknown
https://gxe0.com:443/yak/233_Wisrysxlfss
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gxe0.com
198.252.105.91
api.ipify.org
104.26.13.205
s82.gocheapweb.com
51.195.88.199
s-part-0035.t-0009.t-msedge.net
13.107.246.63

IPs

IP
Domain
Country
Malicious
198.252.105.91
gxe0.com
Canada
104.26.13.205
api.ipify.org
United States
51.195.88.199
s82.gocheapweb.com
France

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Wisrysxl
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2DBB000
trusted library allocation
page read and write
malicious
2DCE000
trusted library allocation
page read and write
malicious
7FC50000
direct allocation
page read and write
malicious
A62000
unkown
page readonly
malicious
2D91000
trusted library allocation
page read and write
malicious
2DC3000
trusted library allocation
page read and write
malicious
2BEB000
trusted library allocation
page read and write
malicious
7F920000
direct allocation
page read and write
malicious
98F000
stack
page read and write
7F250000
trusted library allocation
page execute and read and write
BC0000
heap
page read and write
2E25000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
363E000
heap
page read and write
2C1E000
trusted library allocation
page read and write
52A0000
heap
page read and write
5000000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
7D780000
direct allocation
page read and write
40D000
unkown
page write copy
5240000
heap
page execute and read and write
559C000
heap
page read and write
FF7000
heap
page read and write
3037000
heap
page read and write
2BE7000
trusted library allocation
page read and write
2113E000
stack
page read and write
6EF0000
trusted library allocation
page execute and read and write
5F00000
heap
page read and write
13BF000
stack
page read and write
20E8D000
direct allocation
page read and write
3197000
trusted library allocation
page read and write
7EF4F000
direct allocation
page read and write
677E000
stack
page read and write
5582000
trusted library allocation
page read and write
69BE000
stack
page read and write
5335000
trusted library allocation
page read and write
7EE00000
direct allocation
page read and write
2C61000
trusted library allocation
page read and write
363E000
heap
page read and write
11CE000
stack
page read and write
1BD70000
direct allocation
page read and write
FE2000
trusted library allocation
page read and write
75FA000
heap
page read and write
17FF000
stack
page read and write
77C000
heap
page read and write
6BC000
heap
page read and write
573E000
stack
page read and write
329A000
trusted library allocation
page read and write
7DFC0000
direct allocation
page read and write
B50000
heap
page read and write
4E15000
heap
page read and write
84A4000
heap
page read and write
5D36000
trusted library allocation
page read and write
6FEE000
stack
page read and write
30AE000
stack
page read and write
920000
trusted library allocation
page read and write
670000
heap
page read and write
3ED1000
trusted library allocation
page read and write
25F0000
heap
page read and write
5D4A000
trusted library allocation
page read and write
2175F000
stack
page read and write
6A00000
trusted library allocation
page execute and read and write
3040000
trusted library allocation
page read and write
20FBF000
stack
page read and write
8330000
heap
page read and write
363E000
heap
page read and write
28C8000
heap
page read and write
540C000
stack
page read and write
8ABF000
stack
page read and write
A90000
trusted library allocation
page read and write
479000
unkown
page execute and read and write
3626000
heap
page read and write
2CAA000
heap
page read and write
2DC5000
heap
page read and write
251E000
stack
page read and write
7DC0F000
direct allocation
page read and write
74E000
heap
page read and write
94E000
heap
page read and write
2DD4000
trusted library allocation
page read and write
5A0E000
stack
page read and write
D2F000
stack
page read and write
11DC000
stack
page read and write
4C95000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
72AA000
heap
page read and write
1010000
heap
page read and write
2EC7000
direct allocation
page execute and read and write
8D9000
heap
page read and write
7471000
heap
page read and write
4FE0000
heap
page read and write
3365000
trusted library allocation
page read and write
363E000
heap
page read and write
6F2C000
stack
page read and write
93F000
stack
page read and write
5329000
trusted library allocation
page read and write
9B000
stack
page read and write
19D000
stack
page read and write
4F50000
heap
page read and write
7EF10000
direct allocation
page read and write
6737000
heap
page read and write
14B0000
heap
page read and write
70B0000
heap
page read and write
3FE0000
trusted library allocation
page read and write
7E07F000
direct allocation
page read and write
7F180000
trusted library allocation
page execute and read and write
9D0000
heap
page read and write
2D7F000
trusted library allocation
page read and write
30D8000
trusted library allocation
page read and write
2215C000
heap
page read and write
401000
unkown
page execute read
557E000
stack
page read and write
4A9D000
stack
page read and write
2FFA000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
1046000
trusted library allocation
page execute and read and write
2DF8000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
3626000
heap
page read and write
5360000
heap
page read and write
4D0E000
stack
page read and write
580000
heap
page read and write
479000
unkown
page execute and read and write
68B0000
trusted library allocation
page read and write
987000
unkown
page execute and read and write
84B8000
heap
page read and write
D30000
heap
page read and write
363E000
heap
page read and write
363E000
heap
page read and write
B8F000
trusted library allocation
page read and write
2DB3000
trusted library allocation
page read and write
D10000
heap
page read and write
6916000
heap
page read and write
4966000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page execute and read and write
173D000
stack
page read and write
7DCF0000
direct allocation
page read and write
488000
unkown
page write copy
2D26000
trusted library allocation
page read and write
68F7000
heap
page read and write
52D0000
direct allocation
page read and write
AF0000
heap
page read and write
400000
unkown
page readonly
7DE70000
direct allocation
page read and write
1094000
trusted library allocation
page read and write
3093000
heap
page read and write
6630000
heap
page read and write
5C0B000
trusted library allocation
page read and write
363E000
heap
page read and write
1442000
trusted library allocation
page read and write
6A70000
heap
page read and write
6F90000
heap
page read and write
A70000
heap
page read and write
3BD000
stack
page read and write
16FE000
stack
page read and write
3625000
heap
page read and write
20E11000
direct allocation
page read and write
11D0000
heap
page read and write
3623000
heap
page read and write
363E000
heap
page read and write
1460000
trusted library allocation
page read and write
2DDE000
trusted library allocation
page read and write
5937000
trusted library allocation
page read and write
3FC0000
trusted library allocation
page read and write
B24000
heap
page read and write
3DA9000
trusted library allocation
page read and write
66D5000
heap
page read and write
49A0000
trusted library allocation
page read and write
2F2C000
trusted library allocation
page read and write
2E75000
trusted library allocation
page read and write
3626000
heap
page read and write
5315000
trusted library allocation
page read and write
765000
heap
page read and write
363E000
heap
page read and write
21D23000
heap
page read and write
12A7000
trusted library allocation
page execute and read and write
7E190000
direct allocation
page read and write
2DAB000
trusted library allocation
page read and write
2123F000
stack
page read and write
765000
heap
page read and write
305B000
direct allocation
page execute and read and write
31CA000
trusted library allocation
page read and write
2121F000
stack
page read and write
2DB9000
trusted library allocation
page read and write
7EE50000
direct allocation
page read and write
363E000
heap
page read and write
301E000
trusted library allocation
page read and write
13E0000
heap
page read and write
20E54000
direct allocation
page read and write
5210000
heap
page read and write
2C8A000
stack
page read and write
1274000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
8A9000
unkown
page execute and read and write
8A9000
unkown
page execute and read and write
6FC000
heap
page read and write
2FBB000
direct allocation
page execute and read and write
2D23000
trusted library allocation
page read and write
4E2B000
heap
page read and write
70AA000
stack
page read and write
22124000
heap
page read and write
4986000
trusted library allocation
page read and write
478000
unkown
page read and write
4960000
trusted library allocation
page read and write
2FA9000
trusted library allocation
page read and write
6B6F000
stack
page read and write
9CA000
stack
page read and write
7B0000
heap
page read and write
506D000
stack
page read and write
580E000
stack
page read and write
921000
heap
page read and write
75FD000
heap
page read and write
57C0000
trusted library allocation
page execute and read and write
309B000
direct allocation
page execute and read and write
318B000
trusted library allocation
page read and write
363E000
heap
page read and write
3C36000
trusted library allocation
page read and write
65F3000
trusted library allocation
page read and write
2BAC000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
2212F000
heap
page read and write
2F63000
trusted library allocation
page execute and read and write
68B7000
trusted library allocation
page read and write
2214F000
heap
page read and write
478000
unkown
page read and write
7630000
heap
page read and write
739E000
stack
page read and write
76DE000
stack
page read and write
2CEF000
heap
page read and write
5264000
trusted library allocation
page read and write
690000
heap
page read and write
6BC0000
trusted library allocation
page read and write
4F8D000
stack
page read and write
2321000
direct allocation
page read and write
3154000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
7E190000
direct allocation
page read and write
12C0000
heap
page read and write
20DB4000
direct allocation
page read and write
5332000
trusted library allocation
page read and write
57CE000
stack
page read and write
69EE000
stack
page read and write
115E000
stack
page read and write
2FA4000
trusted library allocation
page read and write
13EB000
trusted library allocation
page execute and read and write
656E000
stack
page read and write
570000
heap
page read and write
780000
heap
page read and write
BDE000
stack
page read and write
2D30000
heap
page execute and read and write
7FCD0000
direct allocation
page read and write
54C0000
trusted library allocation
page read and write
363E000
heap
page read and write
10B6000
trusted library allocation
page execute and read and write
310B000
trusted library allocation
page read and write
2C8E000
stack
page execute and read and write
2FAE000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
68A3000
trusted library allocation
page read and write
987000
unkown
page execute and read and write
104A000
trusted library allocation
page execute and read and write
2FA7000
direct allocation
page execute and read and write
3047000
trusted library allocation
page execute and read and write
3F95000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
6707000
heap
page read and write
66FA000
heap
page read and write
839D000
stack
page read and write
4F74000
heap
page read and write
6882000
heap
page read and write
5F26000
heap
page read and write
363E000
heap
page read and write
3624000
heap
page read and write
4F85000
heap
page read and write
5E5000
heap
page read and write
22FD000
direct allocation
page read and write
584E000
stack
page read and write
1BD60000
direct allocation
page read and write
4C6B000
trusted library allocation
page read and write
765F000
heap
page read and write
1470000
heap
page read and write
2CFF000
stack
page read and write
480000
heap
page read and write
3626000
heap
page read and write
122E000
heap
page read and write
317D000
trusted library allocation
page read and write
3621000
heap
page read and write
52F4000
trusted library allocation
page read and write
1230000
heap
page read and write
314F000
stack
page read and write
4DF9000
heap
page read and write
363E000
heap
page read and write
2BE3000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
84BC000
heap
page read and write
3621000
heap
page read and write
3099000
trusted library allocation
page read and write
1F06FA20000
heap
page read and write
7710000
heap
page execute and read and write
75B000
heap
page read and write
2BAC000
heap
page read and write
2EE1000
direct allocation
page execute read
3624000
heap
page read and write
7DFD0000
direct allocation
page read and write
116B000
trusted library allocation
page execute and read and write
EF8000
stack
page read and write
1F06FAAB000
heap
page read and write
790000
heap
page read and write
213BE000
stack
page read and write
6A10000
trusted library allocation
page read and write
7EFAF000
direct allocation
page read and write
4FEE000
stack
page read and write
7E30F000
direct allocation
page read and write
2F65000
trusted library allocation
page read and write
2DB7000
trusted library allocation
page read and write
72E000
heap
page read and write
21C0000
heap
page read and write
3FA000
stack
page read and write
78F0000
trusted library allocation
page read and write
82F0000
trusted library allocation
page execute and read and write
855F000
heap
page read and write
28C2000
heap
page read and write
7EF0F000
direct allocation
page read and write
7E130000
direct allocation
page read and write
220FE000
heap
page read and write
3DDA000
trusted library allocation
page read and write
7F948000
direct allocation
page read and write
76EA000
trusted library allocation
page read and write
13F0000
heap
page read and write
1273000
trusted library allocation
page execute and read and write
51E0000
trusted library allocation
page execute and read and write
9B000
stack
page read and write
77E000
heap
page read and write
6DE0000
heap
page read and write
13F8000
heap
page read and write
1160000
trusted library allocation
page read and write
302B000
heap
page read and write
4A00000
heap
page read and write
2B4C000
stack
page read and write
6600000
heap
page read and write
3621000
heap
page read and write
3625000
heap
page read and write
4D4E000
stack
page read and write
20D40000
direct allocation
page read and write
4970000
trusted library allocation
page read and write
363E000
heap
page read and write
2F1F000
trusted library allocation
page read and write
5032000
trusted library allocation
page read and write
ACF000
stack
page read and write
210BF000
stack
page read and write
4974000
trusted library allocation
page read and write
3C0B000
trusted library allocation
page read and write
2E71000
trusted library allocation
page read and write
2610000
heap
page read and write
10C0000
trusted library allocation
page read and write
4060000
trusted library allocation
page read and write
702F000
stack
page read and write
2215D000
heap
page read and write
DFE000
stack
page read and write
4CA0000
trusted library allocation
page read and write
8320000
heap
page read and write
7FB3F000
direct allocation
page read and write
2350000
heap
page read and write
7DC50000
direct allocation
page read and write
300C000
trusted library allocation
page read and write
7DCD7000
direct allocation
page read and write
2660000
heap
page read and write
697E000
stack
page read and write
210DF000
stack
page read and write
1F06FAAD000
heap
page read and write
8EF000
stack
page read and write
3626000
heap
page read and write
2F40000
trusted library allocation
page read and write
7F190000
direct allocation
page read and write
3D51000
trusted library allocation
page read and write
830D000
trusted library allocation
page read and write
5576000
heap
page read and write
1260000
heap
page read and write
775000
heap
page read and write
3EC1000
trusted library allocation
page read and write
2BD7000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
8CC000
stack
page read and write
70BD000
stack
page read and write
6710000
heap
page read and write
31B5000
trusted library allocation
page read and write
950000
heap
page read and write
3625000
heap
page read and write
4E6D000
stack
page read and write
68BA000
heap
page read and write
70C1000
heap
page read and write
22C2000
direct allocation
page read and write
491E000
stack
page read and write
231A000
direct allocation
page read and write
19D000
stack
page read and write
238A000
direct allocation
page read and write
666E000
stack
page read and write
B85000
heap
page read and write
62E000
heap
page read and write
3626000
heap
page read and write
F7C000
stack
page read and write
1BEF0000
direct allocation
page read and write
5923000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
2318000
direct allocation
page read and write
2398000
trusted library allocation
page read and write
7EF60000
direct allocation
page read and write
5DEB000
unkown
page read and write
1E0000
heap
page read and write
144B000
trusted library allocation
page execute and read and write
7DA00000
direct allocation
page read and write
4040000
trusted library allocation
page read and write
2F92000
trusted library allocation
page read and write
363E000
heap
page read and write
2374000
direct allocation
page read and write
48D000
unkown
page readonly
2165E000
stack
page read and write
1F071560000
heap
page read and write
7820000
trusted library allocation
page read and write
66E6000
heap
page read and write
83DE000
stack
page read and write
FC3000
trusted library allocation
page execute and read and write
56CE000
stack
page read and write
FA0000
heap
page read and write
1414000
heap
page read and write
2A1E000
stack
page read and write
590F000
stack
page read and write
1050000
heap
page read and write
4E7E000
stack
page read and write
597E000
stack
page read and write
CF8000
stack
page read and write
1040000
trusted library allocation
page read and write
680000
heap
page read and write
4DF0000
heap
page read and write
2F80000
trusted library allocation
page read and write
8310000
trusted library allocation
page read and write
20EA3000
direct allocation
page read and write
10C7000
trusted library allocation
page execute and read and write
4000000
trusted library allocation
page read and write
3625000
heap
page read and write
3626000
heap
page read and write
1410000
trusted library allocation
page read and write
1228000
heap
page read and write
502E000
stack
page read and write
730000
heap
page read and write
12F7000
stack
page read and write
735E000
stack
page read and write
30F0000
trusted library allocation
page execute and read and write
5F0000
heap
page read and write
363E000
heap
page read and write
3E3A000
trusted library allocation
page read and write
1167000
trusted library allocation
page execute and read and write
5380000
heap
page read and write
2AE8000
trusted library allocation
page read and write
22FC000
direct allocation
page read and write
2DA1000
trusted library allocation
page read and write
3623000
heap
page read and write
532E000
trusted library allocation
page read and write
43B000
stack
page read and write
1430000
trusted library allocation
page read and write
C1E000
stack
page read and write
1F06FAAB000
heap
page read and write
1220000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
D4B000
stack
page read and write
2C9F000
trusted library allocation
page read and write
390E000
stack
page read and write
94C000
heap
page read and write
20DCA000
direct allocation
page read and write
3626000
heap
page read and write
115F000
stack
page read and write
1409000
heap
page read and write
54BB000
trusted library allocation
page read and write
7EF37000
direct allocation
page read and write
3162000
trusted library allocation
page read and write
42F5000
trusted library allocation
page read and write
214BE000
stack
page read and write
88D3000
trusted library allocation
page read and write
2E59000
trusted library allocation
page read and write
693E000
heap
page read and write
3361000
trusted library allocation
page read and write
1F06FA76000
heap
page read and write
20E71000
direct allocation
page read and write
870000
heap
page read and write
5550000
heap
page read and write
3626000
heap
page read and write
4C01000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
8ABD000
stack
page read and write
363E000
heap
page read and write
A2C000
stack
page read and write
1160000
trusted library allocation
page execute and read and write
7DC50000
direct allocation
page read and write
647E000
stack
page read and write
2E65000
trusted library allocation
page read and write
504B000
trusted library allocation
page read and write
5070000
heap
page read and write
363E000
heap
page read and write
7D5F0000
direct allocation
page read and write
6682000
heap
page read and write
2FCE000
trusted library allocation
page read and write
75D2000
heap
page read and write
363E000
heap
page read and write
3625000
heap
page read and write
22231000
heap
page read and write
7ED30000
direct allocation
page read and write
7EFAF000
direct allocation
page read and write
7870000
trusted library allocation
page read and write
3F80000
trusted library allocation
page read and write
4ECE000
stack
page read and write
20E4D000
direct allocation
page read and write
5A0000
heap
page read and write
2450000
heap
page read and write
152000
unkown
page readonly
2C8F000
trusted library allocation
page read and write
496B000
trusted library allocation
page read and write
7EE60000
direct allocation
page read and write
4C66000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
48F8000
trusted library allocation
page read and write
FE6000
trusted library allocation
page execute and read and write
5BC9000
trusted library allocation
page read and write
1F06FAAB000
heap
page read and write
6900000
heap
page read and write
548D000
stack
page read and write
7FAAF000
direct allocation
page read and write
5D57000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
102D000
trusted library allocation
page execute and read and write
6DEE000
stack
page read and write
3231000
trusted library allocation
page read and write
2966000
heap
page read and write
20D79000
direct allocation
page read and write
58C000
unkown
page execute and read and write
9CC000
stack
page read and write
2E80000
heap
page execute and read and write
77C000
heap
page read and write
23C6000
trusted library allocation
page read and write
4F6C000
heap
page read and write
590E000
stack
page read and write
6A00000
trusted library allocation
page read and write
51FE000
stack
page read and write
3F91000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
692A000
heap
page read and write
657E000
stack
page read and write
2E41000
direct allocation
page execute read
400000
unkown
page readonly
34E0000
heap
page read and write
59E000
stack
page read and write
1098000
heap
page read and write
68A0000
trusted library allocation
page read and write
7170000
heap
page read and write
3BC9000
trusted library allocation
page read and write
11D5000
heap
page read and write
3F40000
trusted library allocation
page read and write
775E000
stack
page read and write
1224000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
23D4000
trusted library allocation
page read and write
95B000
trusted library allocation
page execute and read and write
66C5000
heap
page read and write
142D000
trusted library allocation
page execute and read and write
C80000
heap
page read and write
120E000
stack
page read and write
1BC70000
direct allocation
page read and write
2F8A000
trusted library allocation
page execute and read and write
6B6E000
stack
page read and write
3624000
heap
page read and write
5F31000
heap
page read and write
1090000
trusted library allocation
page read and write
6A08000
trusted library allocation
page read and write
7DF87000
direct allocation
page read and write
2D7C000
trusted library allocation
page read and write
2965000
heap
page read and write
400000
unkown
page readonly
103C000
stack
page read and write
12A0000
trusted library allocation
page read and write
2D16000
trusted library allocation
page read and write
5B4E000
stack
page read and write
4239000
trusted library allocation
page read and write
920000
heap
page read and write
3F60000
trusted library allocation
page read and write
59E000
stack
page read and write
21E0000
heap
page read and write
210FF000
stack
page read and write
2E31000
trusted library allocation
page read and write
551F000
trusted library allocation
page read and write
20D47000
direct allocation
page read and write
7F8D0000
direct allocation
page read and write
B39000
heap
page read and write
323D000
trusted library allocation
page read and write
7EFAF000
direct allocation
page read and write
4DFE000
stack
page read and write
583E000
stack
page read and write
CC0000
unkown
page execute and read and write
3625000
heap
page read and write
31EF000
trusted library allocation
page read and write
A43000
trusted library allocation
page execute and read and write
3185000
trusted library allocation
page read and write
20EAA000
direct allocation
page read and write
20FFE000
stack
page read and write
10B2000
trusted library allocation
page read and write
2391000
direct allocation
page read and write
2B0E000
stack
page read and write
740000
direct allocation
page execute and read and write
FF0000
heap
page read and write
1162000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
3626000
heap
page read and write
109D000
trusted library allocation
page execute and read and write
670000
heap
page read and write
4F1E000
stack
page read and write
363E000
heap
page read and write
7F370000
direct allocation
page read and write
145A000
heap
page read and write
10000000
unkown
page execute and read and write
4CA9000
trusted library allocation
page read and write
616E000
stack
page read and write
2FBE000
trusted library allocation
page read and write
75A000
heap
page read and write
B1F000
unkown
page read and write
2E40000
direct allocation
page readonly
5720000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
7EF60000
direct allocation
page read and write
95C000
heap
page read and write
5330000
trusted library allocation
page read and write
2DB7000
trusted library allocation
page read and write
52DD000
trusted library allocation
page read and write
11D3000
trusted library allocation
page execute and read and write
78A0000
trusted library allocation
page read and write
4A4E000
stack
page read and write
7625000
heap
page read and write
7EE30000
direct allocation
page read and write
100E000
stack
page read and write
54B4000
trusted library allocation
page read and write
7649000
heap
page read and write
5109000
trusted library allocation
page read and write
561C000
stack
page read and write
3DF1000
trusted library allocation
page read and write
363E000
heap
page read and write
4FA7000
trusted library allocation
page read and write
2ADF000
stack
page read and write
20E9C000
direct allocation
page read and write
2F8E000
stack
page read and write
1BC70000
direct allocation
page read and write
720000
heap
page read and write
5D4E000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
239E000
stack
page read and write
D15000
heap
page read and write
C7F000
stack
page read and write
111A000
heap
page read and write
5C4E000
stack
page read and write
852D000
heap
page read and write
7E8C7000
direct allocation
page read and write
2FBE000
direct allocation
page execute and read and write
770000
heap
page read and write
5341000
trusted library allocation
page read and write
3626000
heap
page read and write
4EEE000
stack
page read and write
7DBE0000
direct allocation
page read and write
779E000
stack
page read and write
20FDF000
stack
page read and write
692D000
heap
page read and write
10C5000
trusted library allocation
page execute and read and write
4F3E000
stack
page read and write
3D41000
trusted library allocation
page read and write
855B000
heap
page read and write
776000
heap
page read and write
356E000
stack
page read and write
54E5000
trusted library allocation
page read and write
7E220000
direct allocation
page read and write
13CE000
stack
page read and write
54D1000
trusted library allocation
page read and write
4C9D000
stack
page read and write
1639000
heap
page read and write
16F0000
heap
page read and write
478000
unkown
page write copy
696000
heap
page read and write
3287000
trusted library allocation
page read and write
568F000
stack
page read and write
C5F000
stack
page read and write
2F50000
heap
page read and write
84A0000
heap
page read and write
DA0000
trusted library section
page read and write
7EF7F000
direct allocation
page read and write
7D5EC000
direct allocation
page read and write
22F4000
direct allocation
page read and write
2F67000
direct allocation
page execute and read and write
7ECD0000
direct allocation
page read and write
11E0000
heap
page read and write
1BD60000
direct allocation
page read and write
75F3000
heap
page read and write
719000
unkown
page execute and read and write
7E047000
direct allocation
page read and write
361B000
heap
page read and write
12FD000
heap
page read and write
20EDE000
stack
page execute and read and write
363E000
heap
page read and write
7DDC0000
direct allocation
page read and write
2DC5000
trusted library allocation
page read and write
220C7000
heap
page read and write
7E09F000
direct allocation
page read and write
7613000
heap
page read and write
215DE000
stack
page read and write
40C0000
trusted library allocation
page read and write
73DE000
stack
page read and write
2350000
direct allocation
page read and write
687F000
stack
page read and write
28C9000
heap
page read and write
34B0000
heap
page read and write
5295000
trusted library allocation
page read and write
6898000
trusted library allocation
page read and write
48E0000
heap
page readonly
6920000
trusted library allocation
page execute and read and write
1237000
heap
page read and write
2969000
heap
page read and write
830B000
trusted library allocation
page read and write
2DD9000
trusted library allocation
page read and write
1060000
heap
page read and write
9EE000
stack
page read and write
50C012F000
stack
page read and write
21F0000
direct allocation
page execute and read and write
10E0000
trusted library allocation
page read and write
11E5000
heap
page read and write
2C20000
trusted library allocation
page read and write
8BBF000
stack
page read and write
4560000
heap
page read and write
7ED55000
direct allocation
page read and write
1659000
heap
page read and write
2E2D000
trusted library allocation
page read and write
E7C000
stack
page read and write
52E0000
heap
page read and write
416000
unkown
page readonly
3190000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
4F8D000
heap
page read and write
FB0000
heap
page read and write
7880000
trusted library allocation
page read and write
591E000
stack
page read and write
B67000
unkown
page execute and read and write
A7B000
trusted library allocation
page execute and read and write
78E0000
trusted library allocation
page read and write
230C000
direct allocation
page read and write
3013000
trusted library allocation
page execute and read and write
1136000
heap
page read and write
54B6000
trusted library allocation
page read and write
1602000
heap
page read and write
363E000
heap
page read and write
4F8D000
heap
page read and write
5E0000
heap
page read and write
17C0000
heap
page read and write
8DE000
heap
page read and write
533E000
trusted library allocation
page read and write
3E7A000
trusted library allocation
page read and write
2B78000
heap
page read and write
146E000
stack
page read and write
571C000
stack
page read and write
143A000
trusted library allocation
page execute and read and write
2E50000
trusted library allocation
page read and write
2111E000
stack
page read and write
1BD50000
direct allocation
page read and write
4D48000
trusted library allocation
page read and write
1F06FC95000
heap
page read and write
7DC1F000
direct allocation
page read and write
2376000
trusted library allocation
page read and write
8F7000
stack
page read and write
20DC3000
direct allocation
page read and write
5480000
heap
page execute and read and write
20FBF000
stack
page read and write
3626000
heap
page read and write
68E0000
heap
page read and write
82E0000
heap
page read and write
315B000
trusted library allocation
page read and write
84B0000
heap
page read and write
1BEF0000
direct allocation
page read and write
4020000
trusted library allocation
page read and write
2BDF000
trusted library allocation
page read and write
7FDC0000
trusted library allocation
page execute and read and write
8B3D000
stack
page read and write
1365000
heap
page read and write
1170000
trusted library allocation
page read and write
664C000
heap
page read and write
363E000
heap
page read and write
21610000
remote allocation
page read and write
5BE000
stack
page read and write
228C5000
heap
page read and write
68A8000
trusted library allocation
page read and write
25B0000
heap
page read and write
21939000
heap
page read and write
4B90000
heap
page execute and read and write
2383000
trusted library allocation
page read and write
486000
unkown
page read and write
7E180000
direct allocation
page read and write
23C8000
trusted library allocation
page read and write
3176000
trusted library allocation
page read and write
590000
heap
page read and write
770000
heap
page read and write
B7A000
stack
page read and write
7FC60000
direct allocation
page read and write
710000
heap
page read and write
A1E000
stack
page read and write
68FD000
stack
page read and write
10063000
unkown
page execute and read and write
1880000
trusted library allocation
page read and write
363E000
heap
page read and write
52EA000
heap
page read and write
AF0000
trusted library allocation
page execute and read and write
11C6000
heap
page read and write
68AE000
stack
page read and write
7620000
heap
page read and write
A30000
trusted library allocation
page read and write
512E000
stack
page read and write
3DFA000
trusted library allocation
page read and write
2189E000
stack
page read and write
719000
unkown
page execute and read and write
2FC2000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
3621000
heap
page read and write
544F000
trusted library allocation
page read and write
3621000
heap
page read and write
792000
heap
page read and write
6A3000
heap
page read and write
6AF000
heap
page read and write
D8E000
stack
page read and write
220C1000
heap
page read and write
923000
trusted library allocation
page execute and read and write
2FBB000
trusted library allocation
page read and write
3621000
heap
page read and write
484000
unkown
page read and write
6B2E000
stack
page read and write
2D7E000
stack
page read and write
7D909000
direct allocation
page read and write
2F08000
trusted library allocation
page read and write
22153000
heap
page read and write
9EE000
stack
page read and write
10BA000
trusted library allocation
page execute and read and write
1180000
trusted library allocation
page read and write
6D6E000
stack
page read and write
4E26000
heap
page read and write
5A0E000
stack
page read and write
7E9CF000
direct allocation
page read and write
A54000
trusted library allocation
page read and write
A7E000
stack
page read and write
7130000
heap
page read and write
700000
heap
page read and write
1495000
heap
page read and write
4B35000
heap
page execute and read and write
94C000
heap
page read and write
1620000
heap
page read and write
10C2000
trusted library allocation
page read and write
10FB000
heap
page read and write
776000
heap
page read and write
7617000
heap
page read and write
7DC10000
direct allocation
page read and write
980000
trusted library allocation
page execute and read and write
1BD60000
direct allocation
page read and write
363E000
heap
page read and write
363E000
heap
page read and write
2328000
direct allocation
page read and write
4080000
trusted library allocation
page read and write
23D0000
heap
page read and write
501E000
trusted library allocation
page read and write
20DD1000
direct allocation
page read and write
595000
heap
page read and write
5BA1000
trusted library allocation
page read and write
5289000
trusted library allocation
page read and write
363E000
heap
page read and write
6DD0000
trusted library allocation
page execute and read and write
3171000
trusted library allocation
page read and write
877E000
stack
page read and write
363E000
heap
page read and write
3626000
heap
page read and write
7EF60000
direct allocation
page read and write
5380000
trusted library allocation
page read and write
4F8B000
heap
page read and write
2C5D000
trusted library allocation
page read and write
4E7C000
unkown
page read and write
5940000
heap
page read and write
558C000
stack
page read and write
95C000
heap
page read and write
2E8F000
trusted library allocation
page read and write
51BC000
stack
page read and write
3520000
heap
page read and write
7DBE0000
direct allocation
page read and write
894E000
stack
page read and write
304B000
trusted library allocation
page execute and read and write
678000
heap
page read and write
1165000
trusted library allocation
page execute and read and write
3DD1000
trusted library allocation
page read and write
478000
unkown
page read and write
841E000
stack
page read and write
18A0000
heap
page read and write
72A000
heap
page read and write
4CB5000
trusted library allocation
page read and write
486000
unkown
page read and write
86E0000
trusted library allocation
page read and write
141D000
trusted library allocation
page execute and read and write
4D7B000
stack
page read and write
4F75000
heap
page read and write
2179E000
stack
page read and write
7DD4F000
direct allocation
page read and write
6840000
heap
page read and write
2C98000
trusted library allocation
page read and write
2313000
direct allocation
page read and write
6F80000
trusted library allocation
page execute and read and write
2D00000
trusted library allocation
page read and write
83C000
stack
page read and write
244F000
trusted library allocation
page read and write
2FC4000
trusted library allocation
page read and write
7EA20000
direct allocation
page read and write
C60000
heap
page read and write
76F0000
trusted library allocation
page read and write
6F9000
heap
page read and write
4CC0000
trusted library allocation
page read and write
7EEA0000
direct allocation
page read and write
1430000
heap
page read and write
2D60000
heap
page execute and read and write
84A8000
heap
page read and write
7FAD0000
direct allocation
page read and write
7E30F000
direct allocation
page read and write
3253000
trusted library allocation
page read and write
1F071563000
heap
page read and write
A60000
unkown
page readonly
3FE8000
trusted library allocation
page read and write
500B000
trusted library allocation
page read and write
1360000
heap
page read and write
187C000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
3625000
heap
page read and write
4981000
trusted library allocation
page read and write
20E46000
direct allocation
page read and write
22D0000
direct allocation
page read and write
7D457000
direct allocation
page read and write
1436000
trusted library allocation
page execute and read and write
7DD2F000
direct allocation
page read and write
7D5A0000
direct allocation
page read and write
22E6000
direct allocation
page read and write
7900000
trusted library allocation
page read and write
2F16000
trusted library allocation
page read and write
2620000
trusted library allocation
page read and write
6C3F000
stack
page read and write
720000
heap
page read and write
500E000
trusted library allocation
page read and write
7E190000
direct allocation
page read and write
5DE000
stack
page read and write
620000
heap
page read and write
68C4000
heap
page read and write
7CD000
stack
page read and write
14D0000
heap
page read and write
7120000
heap
page read and write
86A2000
trusted library allocation
page read and write
2A1D000
heap
page read and write
7D6E0000
direct allocation
page read and write
3020000
trusted library allocation
page read and write
7EE7F000
direct allocation
page read and write
6BFE000
stack
page read and write
316E000
trusted library allocation
page read and write
5800000
heap
page execute and read and write
741F000
stack
page read and write
7DD1F000
direct allocation
page read and write
946000
trusted library allocation
page execute and read and write
4E2B000
heap
page read and write
1F06FA60000
heap
page read and write
66C4000
heap
page read and write
3156000
trusted library allocation
page read and write
3621000
heap
page read and write
5388000
trusted library allocation
page read and write
2D41000
trusted library allocation
page read and write
4F6A000
heap
page read and write
6F40000
trusted library allocation
page read and write
52BE000
trusted library allocation
page read and write
363E000
heap
page read and write
97F000
stack
page read and write
3626000
heap
page read and write
363E000
heap
page read and write
7FA30000
direct allocation
page read and write
1414000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
BE0000
heap
page read and write
1744000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
144D000
heap
page read and write
4CB0000
trusted library allocation
page read and write
1404000
heap
page read and write
220CD000
heap
page read and write
13E0000
trusted library allocation
page execute and read and write
289A000
heap
page read and write
63E000
stack
page read and write
380F000
unkown
page read and write
21610000
remote allocation
page read and write
3286000
trusted library allocation
page read and write
13D0000
heap
page read and write
31D0000
heap
page read and write
940000
heap
page read and write
590000
unkown
page execute and read and write
4F85000
heap
page read and write
3E1A000
trusted library allocation
page read and write
586F000
stack
page read and write
30AC000
trusted library allocation
page read and write
CCE000
unkown
page read and write
53D0000
direct allocation
page read and write
8B0000
heap
page read and write
2E4E000
stack
page read and write
554E000
stack
page read and write
7EE7F000
direct allocation
page read and write
3FA0000
trusted library allocation
page read and write
12AB000
trusted library allocation
page execute and read and write
75C5000
heap
page read and write
1000000
heap
page read and write
FC0000
trusted library allocation
page read and write
3DA1000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
2D4D000
trusted library allocation
page read and write
A87000
trusted library allocation
page read and write
1055000
heap
page read and write
566E000
stack
page read and write
3625000
heap
page read and write
141E000
stack
page read and write
2F54000
trusted library allocation
page read and write
8D0000
heap
page read and write
32EE000
stack
page read and write
7EEA0000
direct allocation
page read and write
4E30000
heap
page read and write
3E31000
trusted library allocation
page read and write
20E51000
direct allocation
page read and write
1F0719B0000
trusted library allocation
page read and write
6A6D000
stack
page read and write
2F70000
trusted library allocation
page read and write
4962000
trusted library allocation
page read and write
BC5000
heap
page read and write
48DF000
stack
page read and write
72A0000
heap
page read and write
244E000
stack
page read and write
22500000
trusted library allocation
page read and write
6724000
heap
page read and write
214DE000
stack
page read and write
1020000
trusted library allocation
page read and write
5074000
heap
page read and write
2C55000
trusted library allocation
page read and write
3268000
trusted library allocation
page read and write
7DC60000
direct allocation
page read and write
3610000
heap
page read and write
781D000
stack
page read and write
1650000
trusted library allocation
page read and write
363E000
heap
page read and write
12D3000
heap
page read and write
363E000
heap
page read and write
6B8000
heap
page read and write
5021000
trusted library allocation
page read and write
6ABD000
stack
page read and write
2F4E000
direct allocation
page read and write
7F8D0000
direct allocation
page read and write
363E000
heap
page read and write
20E6A000
direct allocation
page read and write
7EE50000
direct allocation
page read and write
52F0000
trusted library allocation
page read and write
306D000
trusted library allocation
page read and write
1F06FA10000
heap
page read and write
4F74000
heap
page read and write
65E0000
trusted library allocation
page execute and read and write
7D870000
direct allocation
page read and write
276E000
stack
page read and write
6E2C000
stack
page read and write
242F000
stack
page read and write
363E000
heap
page read and write
7EF0F000
direct allocation
page read and write
CAB000
stack
page read and write
652E000
stack
page read and write
F87000
heap
page read and write
363E000
heap
page read and write
3000000
trusted library allocation
page read and write
7641000
heap
page read and write
1447000
trusted library allocation
page execute and read and write
5180000
heap
page read and write
2DD7000
trusted library allocation
page read and write
2480000
heap
page read and write
673E000
heap
page read and write
2FC7000
trusted library allocation
page read and write
2B56000
trusted library allocation
page read and write
1F06FA7A000
heap
page read and write
3626000
heap
page read and write
9D5000
heap
page read and write
4C4E000
stack
page read and write
776000
heap
page read and write
3EF1000
trusted library allocation
page read and write
1413000
trusted library allocation
page execute and read and write
2DEB000
trusted library allocation
page read and write
7F2F0000
direct allocation
page read and write
6E0000
heap
page read and write
1008000
heap
page read and write
2250C000
heap
page read and write
2B60000
trusted library allocation
page read and write
1337000
stack
page read and write
3C2B000
trusted library allocation
page read and write
4E1C000
stack
page read and write
CC0000
unkown
page execute and read and write
7F190000
direct allocation
page read and write
10000000
unkown
page execute and read and write
810000
heap
page read and write
2135F000
stack
page read and write
7860000
trusted library allocation
page read and write
6D2E000
stack
page read and write
1BD60000
direct allocation
page read and write
6CE000
stack
page read and write
22D2000
direct allocation
page read and write
7EEA0000
direct allocation
page read and write
13CF000
stack
page read and write
720000
unkown
page execute and read and write
3024000
trusted library allocation
page read and write
54F0000
heap
page read and write
121B000
stack
page read and write
A3B000
stack
page read and write
5B0F000
stack
page read and write
3140000
heap
page execute and read and write
4E26000
heap
page read and write
52E6000
trusted library allocation
page read and write
316E000
trusted library allocation
page read and write
1380000
heap
page read and write
840000
direct allocation
page execute and read and write
576E000
stack
page read and write
7F370000
direct allocation
page read and write
B2B000
heap
page read and write
50C01AF000
stack
page read and write
B80000
heap
page read and write
4F0E000
stack
page read and write
E35000
heap
page read and write
84B4000
heap
page read and write
315B000
trusted library allocation
page read and write
DA7000
stack
page read and write
2DED000
trusted library allocation
page read and write
2DEF000
trusted library allocation
page read and write
23DC000
stack
page read and write
745000
heap
page read and write
1420000
heap
page read and write
1750000
heap
page execute and read and write
8B3F000
stack
page read and write
16AF000
stack
page read and write
1F06FA68000
heap
page read and write
1065000
heap
page read and write
A90000
heap
page read and write
121E000
stack
page read and write
5026000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
7ECD0000
direct allocation
page read and write
1420000
heap
page read and write
4F8D000
heap
page read and write
E40000
heap
page read and write
55F4000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
7FD90000
direct allocation
page read and write
3E51000
trusted library allocation
page read and write
363E000
heap
page read and write
3D91000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
7FC40000
direct allocation
page read and write
2E6B000
trusted library allocation
page read and write
B20000
heap
page read and write
5A30000
heap
page read and write
7EF000
stack
page read and write
10C7000
heap
page read and write
642F000
stack
page read and write
731D000
stack
page read and write
671C000
heap
page read and write
3624000
heap
page read and write
62A000
heap
page read and write
70E000
heap
page read and write
3623000
heap
page read and write
7EEC0000
direct allocation
page read and write
1885000
trusted library allocation
page read and write
92D000
trusted library allocation
page execute and read and write
236D000
direct allocation
page read and write
84AC000
heap
page read and write
C3E000
stack
page read and write
A8E000
stack
page read and write
2CF8000
trusted library allocation
page read and write
7E280000
direct allocation
page read and write
6D7C000
stack
page read and write
1F0721B0000
heap
page read and write
F80000
heap
page read and write
580E000
stack
page read and write
3621000
heap
page read and write
67E000
stack
page read and write
7ECD0000
direct allocation
page read and write
553E000
stack
page read and write
2361000
trusted library allocation
page read and write
7EF0F000
direct allocation
page read and write
87C000
stack
page read and write
9E0000
heap
page read and write
363E000
heap
page read and write
924000
trusted library allocation
page read and write
1210000
trusted library allocation
page execute and read and write
1F06FA8B000
heap
page read and write
63CC000
stack
page read and write
DB0000
trusted library section
page read and write
2CBB000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
A39000
stack
page read and write
71EE000
stack
page read and write
2DAF000
trusted library allocation
page read and write
830000
heap
page read and write
110B000
heap
page read and write
40D000
unkown
page write copy
6A10000
trusted library allocation
page read and write
58C000
unkown
page execute and read and write
873E000
stack
page read and write
592D000
trusted library allocation
page read and write
13E7000
trusted library allocation
page execute and read and write
318F000
trusted library allocation
page read and write
7ECA0000
direct allocation
page read and write
4F6A000
heap
page read and write
3110000
heap
page read and write
4CF5000
trusted library allocation
page read and write
2E29000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
4B7E000
stack
page read and write
51B000
stack
page read and write
7DB80000
direct allocation
page read and write
1036000
heap
page read and write
1F06FA73000
heap
page read and write
575E000
stack
page read and write
220C0000
heap
page read and write
57CE000
stack
page read and write
1F0000
heap
page read and write
15EF000
stack
page read and write
20E94000
direct allocation
page read and write
2F62000
direct allocation
page read and write
1810000
heap
page read and write
86C0000
trusted library allocation
page execute and read and write
43A000
stack
page read and write
7EFB0000
direct allocation
page read and write
76E0000
trusted library allocation
page read and write
1F06FA86000
heap
page read and write
3160000
trusted library allocation
page read and write
7E30F000
direct allocation
page read and write
305B000
trusted library allocation
page read and write
1042000
trusted library allocation
page read and write
8A9000
unkown
page execute and read and write
10063000
unkown
page execute and read and write
7DD2F000
direct allocation
page read and write
363E000
heap
page read and write
2F6D000
trusted library allocation
page execute and read and write
6D6C000
stack
page read and write
1F0721B3000
heap
page read and write
217C000
stack
page read and write
29F1000
heap
page read and write
51B0000
trusted library allocation
page read and write
D90000
heap
page read and write
498C000
stack
page read and write
7FDD8000
trusted library allocation
page execute and read and write
2B93000
heap
page read and write
77C000
heap
page read and write
7F8D0000
direct allocation
page read and write
4964000
trusted library allocation
page read and write
2A39000
heap
page read and write
2EDC000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
296A000
heap
page read and write
7DF00000
direct allocation
page read and write
2654000
trusted library allocation
page read and write
1134000
heap
page read and write
7110000
heap
page read and write
1F06FC90000
heap
page read and write
B00000
heap
page read and write
52C0000
trusted library allocation
page read and write
7EFB0000
direct allocation
page read and write
7EE000
stack
page read and write
4F80000
trusted library allocation
page read and write
7E30F000
direct allocation
page read and write
9A0000
heap
page read and write
67F000
stack
page read and write
910000
trusted library allocation
page read and write
1F06FA40000
heap
page read and write
1BF30000
direct allocation
page read and write
AC0000
direct allocation
page read and write
587E000
stack
page read and write
BF0000
heap
page read and write
2C8E000
stack
page read and write
596E000
stack
page read and write
957000
trusted library allocation
page execute and read and write
31C0000
trusted library allocation
page read and write
7FB60000
direct allocation
page read and write
1BD70000
direct allocation
page read and write
8AFE000
stack
page read and write
3171000
trusted library allocation
page read and write
92E000
stack
page read and write
7690000
trusted library allocation
page execute and read and write
6F0000
heap
page read and write
58C000
unkown
page execute and read and write
14AD000
stack
page read and write
6FAB000
stack
page read and write
31B0000
trusted library allocation
page read and write
2D2E000
heap
page read and write
1660000
heap
page read and write
150000
unkown
page readonly
6660000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
2250F000
trusted library allocation
page read and write
59CE000
stack
page read and write
363E000
heap
page read and write
20FBA000
stack
page read and write
2F95000
trusted library allocation
page execute and read and write
AF7000
heap
page read and write
7EDD0000
direct allocation
page read and write
13E0000
trusted library allocation
page read and write
534D000
trusted library allocation
page read and write
660000
heap
page read and write
61EC000
stack
page read and write
493F000
stack
page read and write
2E7F000
trusted library allocation
page read and write
2FE9000
trusted library allocation
page read and write
20EDA000
stack
page read and write
7DC1F000
direct allocation
page read and write
6FE000
stack
page read and write
3621000
heap
page read and write
65D0000
heap
page read and write
662D000
stack
page read and write
9B000
stack
page read and write
4B1E000
stack
page read and write
5F57000
heap
page read and write
3098000
heap
page read and write
10CB000
trusted library allocation
page execute and read and write
7E30F000
direct allocation
page read and write
2F95000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
1034000
heap
page read and write
4989000
trusted library allocation
page read and write
1F06FA7A000
heap
page read and write
2B54000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
6FC000
stack
page read and write
7EF0F000
direct allocation
page read and write
2B80000
trusted library allocation
page read and write
363E000
heap
page read and write
3625000
heap
page read and write
672F000
heap
page read and write
1F06FAA8000
heap
page read and write
6DAE000
stack
page read and write
546E000
stack
page read and write
1BC70000
direct allocation
page read and write
32F1000
trusted library allocation
page read and write
1740000
trusted library allocation
page read and write
32B1000
trusted library allocation
page read and write
1254000
heap
page read and write
61FD000
stack
page read and write
1870000
trusted library allocation
page read and write
DFE000
stack
page read and write
2B80000
heap
page read and write
10063000
unkown
page execute and read and write
8A7E000
stack
page read and write
2C59000
trusted library allocation
page read and write
52BE000
stack
page read and write
1657000
trusted library allocation
page read and write
2E0A000
heap
page read and write
544B000
stack
page read and write
96A000
stack
page read and write
7F670000
trusted library allocation
page execute and read and write
123B000
stack
page read and write
67AE000
stack
page read and write
65F0000
trusted library allocation
page read and write
719000
unkown
page execute and read and write
2F3E000
stack
page read and write
5320000
trusted library allocation
page read and write
363E000
heap
page read and write
5340000
trusted library allocation
page read and write
2149D000
stack
page read and write
1654000
trusted library allocation
page read and write
6670000
heap
page read and write
1DD000
stack
page read and write
3EB1000
trusted library allocation
page read and write
42F1000
trusted library allocation
page read and write
3000000
heap
page read and write
2F64000
trusted library allocation
page read and write
4995000
trusted library allocation
page read and write
7DF9F000
direct allocation
page read and write
5390000
heap
page execute and read and write
14B7000
heap
page read and write
75E2000
heap
page read and write
3193000
trusted library allocation
page read and write
3621000
heap
page read and write
580000
heap
page read and write
740000
heap
page read and write
7E30F000
direct allocation
page read and write
6B0000
heap
page read and write
532E000
stack
page read and write
798000
heap
page read and write
930000
heap
page read and write
3246000
trusted library allocation
page read and write
7DF20000
direct allocation
page read and write
319E000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
3220000
heap
page read and write
3625000
heap
page read and write
3626000
heap
page read and write
22157000
heap
page read and write
2F71000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
224BF000
direct allocation
page read and write
1190000
heap
page execute and read and write
15C8000
heap
page read and write
2FA2000
direct allocation
page read and write
7ED7A000
direct allocation
page read and write
A77000
trusted library allocation
page execute and read and write
7EDF0000
direct allocation
page read and write
7290000
heap
page read and write
53A0000
heap
page read and write
2657000
trusted library allocation
page read and write
20E78000
direct allocation
page read and write
7D940000
direct allocation
page read and write
2137F000
stack
page read and write
20DAD000
direct allocation
page read and write
94C000
heap
page read and write
7E060000
direct allocation
page read and write
22E0000
direct allocation
page read and write
6A20000
trusted library allocation
page read and write
7EA70000
direct allocation
page read and write
3154000
trusted library allocation
page read and write
6BAC000
stack
page read and write
16EE000
stack
page read and write
1040000
heap
page read and write
7DAB0000
direct allocation
page read and write
10AD000
trusted library allocation
page execute and read and write
2DC1000
trusted library allocation
page read and write
3626000
heap
page read and write
7DB00000
direct allocation
page read and write
7603000
heap
page read and write
8CE000
stack
page read and write
30BD000
trusted library allocation
page read and write
4E26000
heap
page read and write
3621000
heap
page read and write
6B70000
trusted library allocation
page execute and read and write
52B0000
trusted library allocation
page read and write
4ADB000
stack
page read and write
12C9000
heap
page read and write
706D000
stack
page read and write
2335000
direct allocation
page read and write
19D000
stack
page read and write
7DC60000
direct allocation
page read and write
10C2000
heap
page read and write
4F74000
heap
page read and write
363E000
heap
page read and write
20E3F000
direct allocation
page read and write
1BD50000
direct allocation
page read and write
970000
trusted library allocation
page read and write
3D69000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
2E3F000
trusted library allocation
page read and write
3621000
heap
page read and write
BC0000
heap
page read and write
CFF000
stack
page read and write
B9E000
stack
page read and write
94C000
heap
page read and write
2D87000
trusted library allocation
page read and write
75DD000
heap
page read and write
3100000
trusted library allocation
page read and write
7E30F000
direct allocation
page read and write
7840000
trusted library allocation
page read and write
673E000
stack
page read and write
31D2000
trusted library allocation
page read and write
363E000
heap
page read and write
77C000
heap
page read and write
30ED000
stack
page read and write
68E6000
heap
page read and write
3623000
heap
page read and write
52A0000
trusted library allocation
page read and write
75BE000
heap
page read and write
2F75000
direct allocation
page read and write
3DA5000
trusted library allocation
page read and write
7D1F0000
direct allocation
page read and write
FE0000
trusted library allocation
page read and write
4F8B000
heap
page read and write
2139E000
stack
page read and write
363E000
heap
page read and write
13C4000
trusted library allocation
page read and write
20E63000
direct allocation
page read and write
2F60000
trusted library allocation
page read and write
790000
heap
page read and write
548F000
stack
page read and write
59AE000
stack
page read and write
2DA1000
trusted library allocation
page read and write
3626000
heap
page read and write
4A10000
heap
page read and write
494C000
stack
page read and write
5250000
heap
page read and write
49A0000
trusted library allocation
page read and write
10F7000
stack
page read and write
6AC0000
trusted library allocation
page read and write
4A5E000
stack
page read and write
1100000
heap
page read and write
BB7000
heap
page read and write
5270000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
6924000
heap
page read and write
1F06FC9C000
heap
page read and write
1023000
trusted library allocation
page execute and read and write
2F79000
trusted library allocation
page read and write
211BF000
stack
page read and write
516D000
stack
page read and write
400000
unkown
page readonly
230A000
direct allocation
page read and write
4A80000
heap
page read and write
A80000
trusted library allocation
page read and write
1BCA0000
direct allocation
page read and write
15A0000
trusted library allocation
page execute and read and write
3626000
heap
page read and write
7D779000
direct allocation
page read and write
2F21000
direct allocation
page execute read
20DD8000
direct allocation
page read and write
1024000
trusted library allocation
page read and write
2FB4000
trusted library allocation
page read and write
FCD000
trusted library allocation
page execute and read and write
20EB8000
direct allocation
page read and write
2FBA000
trusted library allocation
page read and write
1417000
heap
page read and write
3E91000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
3D47000
trusted library allocation
page read and write
10C5000
heap
page read and write
8FE000
stack
page read and write
7DD70000
direct allocation
page read and write
3BD000
stack
page read and write
4C7E000
trusted library allocation
page read and write
20E0A000
direct allocation
page read and write
B08000
heap
page read and write
2220000
heap
page read and write
D20000
heap
page read and write
2261B000
heap
page read and write
9D0000
heap
page read and write
589E000
stack
page read and write
363E000
heap
page read and write
7F370000
direct allocation
page read and write
C38000
stack
page read and write
720000
unkown
page execute and read and write
7EC50000
direct allocation
page read and write
2EBE000
trusted library allocation
page read and write
1BD50000
direct allocation
page read and write
7180000
heap
page read and write
1F06FA8B000
heap
page read and write
13F0000
heap
page read and write
7192000
heap
page read and write
2CB3000
trusted library allocation
page read and write
FF2000
trusted library allocation
page read and write
4E15000
heap
page read and write
2440000
trusted library allocation
page read and write
6F6D000
stack
page read and write
363E000
heap
page read and write
13D0000
trusted library allocation
page read and write
4F8B000
heap
page read and write
3621000
heap
page read and write
363E000
heap
page read and write
363E000
heap
page read and write
4F6C000
heap
page read and write
594E000
stack
page read and write
22ED000
direct allocation
page read and write
4E27000
heap
page read and write
2F35000
direct allocation
page read and write
44FE000
stack
page read and write
590000
unkown
page execute and read and write
10B3000
heap
page read and write
31A9000
trusted library allocation
page read and write
102A000
heap
page read and write
1450000
heap
page read and write
10000000
unkown
page execute and read and write
4E0A000
heap
page read and write
AA0000
unkown
page readonly
416000
unkown
page readonly
585E000
stack
page read and write
7D870000
direct allocation
page read and write
1400000
trusted library allocation
page read and write
363E000
heap
page read and write
20DD1000
direct allocation
page read and write
900000
unkown
page execute and read and write
7890000
trusted library allocation
page read and write
1BCA0000
direct allocation
page read and write
86D0000
trusted library allocation
page read and write
7ED80000
direct allocation
page read and write
40A0000
trusted library allocation
page read and write
2304000
direct allocation
page read and write
700000
heap
page read and write
4070000
trusted library allocation
page read and write
4E0A000
heap
page read and write
20EDF000
stack
page read and write
2E6E000
direct allocation
page read and write
13E8000
heap
page read and write
164000
unkown
page readonly
1260000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
7ED90000
direct allocation
page read and write
776000
heap
page read and write
289B000
heap
page read and write
60EE000
stack
page read and write
31E0000
heap
page read and write
40D000
unkown
page write copy
1093000
trusted library allocation
page execute and read and write
5214000
heap
page read and write
6EEF000
stack
page read and write
626E000
stack
page read and write
7DD000
heap
page read and write
86F0000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
3626000
heap
page read and write
3625000
heap
page read and write
900000
unkown
page execute and read and write
54CE000
trusted library allocation
page read and write
4F8D000
heap
page read and write
2F90000
trusted library allocation
page read and write
4DA0000
heap
page read and write
110F000
heap
page read and write
12A2000
heap
page read and write
5170000
direct allocation
page read and write
11D4000
trusted library allocation
page read and write
7D460000
direct allocation
page read and write
4E2B000
heap
page read and write
7DDBF000
direct allocation
page read and write
8450000
trusted library allocation
page read and write
7E30F000
direct allocation
page read and write
B80000
trusted library allocation
page read and write
70F000
unkown
page read and write
8586000
heap
page read and write
6BB0000
trusted library allocation
page execute and read and write
FC4000
trusted library allocation
page read and write
2127E000
stack
page read and write
3624000
heap
page read and write
3E5A000
trusted library allocation
page read and write
502D000
trusted library allocation
page read and write
5E0000
heap
page read and write
400000
unkown
page execute and read and write
68EE000
stack
page read and write
5CE000
stack
page read and write
2D71000
trusted library allocation
page read and write
560000
heap
page read and write
323D000
stack
page read and write
363E000
heap
page read and write
323B000
trusted library allocation
page read and write
683E000
stack
page read and write
76E000
unkown
page read and write
7EE50000
direct allocation
page read and write
1060000
heap
page read and write
3BA1000
trusted library allocation
page read and write
77C000
heap
page read and write
7DA9F000
direct allocation
page read and write
20E86000
direct allocation
page read and write
6D90000
trusted library allocation
page read and write
401000
unkown
page execute read
AE0000
unkown
page execute and read and write
3194000
trusted library allocation
page read and write
10D5000
heap
page read and write
2D24000
trusted library allocation
page read and write
7DCA0000
direct allocation
page read and write
2349000
trusted library allocation
page read and write
363E000
heap
page read and write
255E000
stack
page read and write
1BD60000
direct allocation
page read and write
2B8E000
trusted library allocation
page read and write
1220000
heap
page read and write
3077000
heap
page read and write
20DA6000
direct allocation
page read and write
6890000
trusted library allocation
page read and write
214BF000
stack
page read and write
580E000
stack
page read and write
2DE4000
trusted library allocation
page read and write
B3B000
stack
page read and write
E30000
heap
page read and write
2483000
heap
page read and write
363E000
heap
page read and write
8A39000
stack
page read and write
4B30000
heap
page execute and read and write
7D3D0000
direct allocation
page read and write
1BCA0000
direct allocation
page read and write
77DE000
stack
page read and write
7DEFA000
direct allocation
page read and write
556F000
heap
page read and write
BA0000
heap
page read and write
58DE000
stack
page read and write
2B90000
heap
page read and write
550E000
stack
page read and write
50C047F000
stack
page read and write
3E11000
trusted library allocation
page read and write
3623000
heap
page read and write
50C00AB000
stack
page read and write
66DE000
heap
page read and write
720000
unkown
page execute and read and write
1457000
heap
page read and write
636E000
stack
page read and write
58BE000
stack
page read and write
A44000
trusted library allocation
page read and write
52E4000
trusted library allocation
page read and write
21BB9000
heap
page read and write
3DB1000
trusted library allocation
page read and write
56CF000
stack
page read and write
7DC90000
direct allocation
page read and write
930000
trusted library allocation
page read and write
B7B000
heap
page read and write
3014000
trusted library allocation
page read and write
6640000
heap
page read and write
5F12000
heap
page read and write
233E000
stack
page read and write
3164000
trusted library allocation
page read and write
20D98000
direct allocation
page read and write
7EEF0000
direct allocation
page read and write
7570000
heap
page read and write
13C0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page execute and read and write
20FBE000
stack
page execute and read and write
4C70000
trusted library allocation
page read and write
4C81000
trusted library allocation
page read and write
6BE000
heap
page read and write
2F57000
heap
page read and write
3152000
trusted library allocation
page read and write
722B000
stack
page read and write
7DCF0000
direct allocation
page read and write
219EE000
heap
page read and write
57B0000
trusted library allocation
page read and write
20CA3000
direct allocation
page read and write
5EED000
stack
page read and write
1090000
heap
page read and write
525B000
unkown
page read and write
4F58000
heap
page read and write
2DA7000
trusted library allocation
page read and write
5F2B000
unkown
page read and write
401000
unkown
page execute read
20DBC000
direct allocation
page read and write
67A000
heap
page read and write
8B7E000
stack
page read and write
1610000
trusted library allocation
page read and write
363E000
heap
page read and write
630000
heap
page read and write
2D10000
trusted library allocation
page read and write
484000
unkown
page read and write
7DB80000
direct allocation
page read and write
237C000
direct allocation
page read and write
31D3000
heap
page read and write
6A27000
trusted library allocation
page read and write
1F06FA9D000
heap
page read and write
537000
stack
page read and write
3150000
trusted library allocation
page read and write
2DC3000
trusted library allocation
page read and write
497E000
trusted library allocation
page read and write
5274000
trusted library allocation
page read and write
363E000
heap
page read and write
2E70000
trusted library allocation
page read and write
5D0000
heap
page read and write
598D000
stack
page read and write
B69000
heap
page read and write
363E000
heap
page read and write
7EEF0000
direct allocation
page read and write
529B000
stack
page read and write
2D8D000
trusted library allocation
page read and write
3D71000
trusted library allocation
page read and write
738000
heap
page read and write
20D9F000
direct allocation
page read and write
21E0000
heap
page read and write
BB0000
heap
page read and write
5F28000
heap
page read and write
212BF000
stack
page read and write
4F85000
heap
page read and write
84E2000
heap
page read and write
23B6000
trusted library allocation
page read and write
3621000
heap
page read and write
D97000
heap
page read and write
1284000
trusted library allocation
page read and write
2398000
direct allocation
page read and write
68DA000
heap
page read and write
4E2B000
heap
page read and write
3625000
heap
page read and write
8900000
trusted library allocation
page execute and read and write
AE0000
unkown
page execute and read and write
72DE000
stack
page read and write
517C000
stack
page read and write
8300000
trusted library allocation
page read and write
7E8A0000
direct allocation
page read and write
363E000
heap
page read and write
691B000
heap
page read and write
12FC000
stack
page read and write
5117000
trusted library allocation
page read and write
75A1000
heap
page read and write
1180000
trusted library allocation
page read and write
12C5000
heap
page read and write
6939000
heap
page read and write
94A000
trusted library allocation
page execute and read and write
92D000
stack
page read and write
2453000
heap
page read and write
259E000
stack
page read and write
7D4D9000
direct allocation
page read and write
484000
unkown
page read and write
3625000
heap
page read and write
110D000
heap
page read and write
2DBB000
trusted library allocation
page read and write
15C0000
heap
page read and write
20E11000
direct allocation
page read and write
DB0000
heap
page read and write
3060000
trusted library allocation
page read and write
7E220000
direct allocation
page read and write
2C8F000
stack
page read and write
2B6E000
trusted library allocation
page read and write
FFB000
trusted library allocation
page execute and read and write
20E5C000
direct allocation
page read and write
54CE000
stack
page read and write
7DFA0000
direct allocation
page read and write
2D7F000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
7DD3F000
direct allocation
page read and write
8578000
heap
page read and write
AEE000
stack
page read and write
416000
unkown
page readonly
10B0000
trusted library allocation
page read and write
6688000
heap
page read and write
20D24000
direct allocation
page read and write
62FE000
stack
page read and write
2DA2000
trusted library allocation
page read and write
7420000
heap
page read and write
5012000
trusted library allocation
page read and write
3D51000
trusted library allocation
page read and write
4F4E000
stack
page read and write
5920000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
49A5000
trusted library allocation
page read and write
112A000
heap
page read and write
4F8B000
heap
page read and write
29FC000
heap
page read and write
3781000
trusted library allocation
page read and write
6D80000
trusted library allocation
page execute and read and write
24DF000
stack
page read and write
8E0000
unkown
page execute and read and write
1427000
heap
page read and write
3621000
heap
page read and write
7FC20000
direct allocation
page read and write
1440000
trusted library allocation
page read and write
6E5000
heap
page read and write
2D90000
heap
page execute and read and write
2D84000
trusted library allocation
page read and write
363E000
heap
page read and write
B67000
unkown
page execute and read and write
5928000
trusted library allocation
page read and write
21610000
remote allocation
page read and write
2770000
heap
page execute and read and write
7EF60000
direct allocation
page read and write
11C0000
trusted library allocation
page read and write
1190000
heap
page read and write
7DB00000
direct allocation
page read and write
3D71000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
6C7C000
stack
page read and write
7E280000
direct allocation
page read and write
1490000
heap
page read and write
2311000
direct allocation
page read and write
6A90000
trusted library allocation
page execute and read and write
3626000
heap
page read and write
2DCC000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
363E000
heap
page read and write
187F000
trusted library allocation
page read and write
A30000
heap
page execute and read and write
2383000
direct allocation
page read and write
749000
heap
page read and write
6702000
heap
page read and write
213BE000
stack
page read and write
EF9000
stack
page read and write
2FFE000
stack
page read and write
32D7000
trusted library allocation
page read and write
66EE000
heap
page read and write
68EF000
heap
page read and write
7D6E0000
direct allocation
page read and write
49FE000
stack
page read and write
FF5000
trusted library allocation
page execute and read and write
7DCCF000
direct allocation
page read and write
FF7000
trusted library allocation
page execute and read and write
6A7E000
stack
page read and write
7E840000
direct allocation
page read and write
14B0000
trusted library allocation
page execute and read and write
6CE000
unkown
page read and write
141A000
heap
page read and write
7850000
trusted library allocation
page read and write
FDD000
trusted library allocation
page execute and read and write
7EF60000
direct allocation
page read and write
52E1000
trusted library allocation
page read and write
2250000
heap
page read and write
2125E000
stack
page read and write
1F0000
heap
page read and write
1E5000
heap
page read and write
20CA0000
direct allocation
page read and write
E10000
heap
page read and write
3008000
heap
page read and write
2CEC000
heap
page read and write
2F84000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
1BD60000
direct allocation
page read and write
15F5000
heap
page read and write
2CB7000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
21BB9000
heap
page read and write
2781000
trusted library allocation
page read and write
1F071530000
heap
page read and write
967000
unkown
page execute and read and write
4BA1000
trusted library allocation
page read and write
7E280000
direct allocation
page read and write
C20000
heap
page read and write
7ECD0000
direct allocation
page read and write
3390000
heap
page read and write
3626000
heap
page read and write
5AAE000
stack
page read and write
2F40000
trusted library allocation
page read and write
6A1D000
trusted library allocation
page read and write
2F0E000
direct allocation
page read and write
1240000
heap
page read and write
8440000
trusted library allocation
page read and write
1BC70000
direct allocation
page read and write
364F000
heap
page read and write
1BD60000
direct allocation
page read and write
235E000
stack
page read and write
105E000
stack
page read and write
AA0000
heap
page read and write
2FD0000
heap
page read and write
590000
unkown
page execute and read and write
2BD2000
trusted library allocation
page read and write
578E000
stack
page read and write
92B000
heap
page read and write
3D99000
trusted library allocation
page read and write
76E7000
trusted library allocation
page read and write
10F0000
trusted library allocation
page execute and read and write
1890000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
4E15000
heap
page read and write
68AD000
trusted library allocation
page read and write
5FE000
stack
page read and write
363E000
heap
page read and write
52D0000
heap
page read and write
363E000
heap
page read and write
D0F000
unkown
page read and write
3626000
heap
page read and write
1BD70000
direct allocation
page read and write
34AE000
unkown
page read and write
2BA1000
trusted library allocation
page read and write
3197000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
1F06FA7A000
heap
page read and write
25B3000
heap
page read and write
2303000
direct allocation
page read and write
20EB1000
direct allocation
page read and write
221C0000
heap
page read and write
3910000
heap
page read and write
1F06FAAB000
heap
page read and write
30FC000
trusted library allocation
page read and write
1BD60000
direct allocation
page read and write
6E4000
heap
page read and write
363E000
heap
page read and write
516E000
stack
page read and write
7830000
trusted library allocation
page execute and read and write
1108000
heap
page read and write
FEA000
trusted library allocation
page execute and read and write
333D000
stack
page read and write
15F0000
heap
page read and write
E3E000
stack
page read and write
652E000
stack
page read and write
49B8000
trusted library allocation
page read and write
4993000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
5C3D000
stack
page read and write
3785000
trusted library allocation
page read and write
1BD60000
direct allocation
page read and write
6DC0000
trusted library allocation
page read and write
7E220000
direct allocation
page read and write
4990000
trusted library allocation
page execute and read and write
FB0000
trusted library allocation
page read and write
F39000
stack
page read and write
125E000
heap
page read and write
7EEB0000
direct allocation
page read and write
1F06FA76000
heap
page read and write
52EB000
trusted library allocation
page read and write
15CE000
heap
page read and write
363E000
heap
page read and write
479000
unkown
page execute and read and write
20EBE000
stack
page read and write
3626000
heap
page read and write
2B50000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
8430000
trusted library allocation
page read and write
8EF000
stack
page read and write
220FC000
heap
page read and write
7EF40000
direct allocation
page read and write
52FE000
trusted library allocation
page read and write
637D000
stack
page read and write
2D80000
trusted library allocation
page read and write
68E3000
heap
page read and write
There are 1981 hidden memdumps, click here to show them.