IOC Report
2jbMIxCFsK.exe

loading gif

Files

File Path
Type
Category
Malicious
2jbMIxCFsK.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\Wisrysxl
data
dropped
malicious
C:\Users\Public\Libraries\Wisrysxl.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\lxsyrsiW.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Wisrysxl.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Wisrysxl.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\neworigin.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\server_BTC.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\PNO
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Libraries\lxsyrsiW.cmd
DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
C:\Users\Public\alpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\xpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TrojanAIbot.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\server_BTC.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fg4ivyor.q5h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n2wmzfar.vow.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qgeewco4.ffv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rsdkekhz.lf5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpBC1D.tmp.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\7270c52c6967b89b.bin
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Tue Nov 26 06:13:12 2024, mtime=Tue Nov 26 06:13:12 2024, atime=Tue Nov 26 06:13:09 2024, length=231936, window=
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2jbMIxCFsK.exe
"C:\Users\user\Desktop\2jbMIxCFsK.exe"
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\2jbMIxCFsK.exe /d C:\\Users\\Public\\Libraries\\Wisrysxl.PIF /o
malicious
C:\Users\Public\Libraries\lxsyrsiW.pif
C:\Users\Public\Libraries\lxsyrsiW.pif
malicious
C:\Users\user\AppData\Local\Temp\neworigin.exe
"C:\Users\user\AppData\Local\Temp\neworigin.exe"
malicious
C:\Users\user\AppData\Local\Temp\server_BTC.exe
"C:\Users\user\AppData\Local\Temp\server_BTC.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi'
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 02:18 /du 23:59 /sc daily /ri 1 /f
malicious
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
"C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe"
malicious
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
malicious
C:\Windows\SysWOW64\timeout.exe
timeout 6
malicious
C:\Users\Public\Libraries\Wisrysxl.PIF
"C:\Users\Public\Libraries\Wisrysxl.PIF"
malicious
C:\Users\Public\Libraries\lxsyrsiW.pif
C:\Users\Public\Libraries\lxsyrsiW.pif
malicious
C:\Users\user\AppData\Local\Temp\neworigin.exe
"C:\Users\user\AppData\Local\Temp\neworigin.exe"
malicious
C:\Users\user\AppData\Local\Temp\server_BTC.exe
"C:\Users\user\AppData\Local\Temp\server_BTC.exe"
malicious
C:\Users\Public\Libraries\Wisrysxl.PIF
"C:\Users\Public\Libraries\Wisrysxl.PIF"
malicious
C:\Users\Public\Libraries\lxsyrsiW.pif
C:\Users\Public\Libraries\lxsyrsiW.pif
malicious
C:\Users\user\AppData\Local\Temp\neworigin.exe
"C:\Users\user\AppData\Local\Temp\neworigin.exe"
malicious
C:\Users\user\AppData\Local\Temp\server_BTC.exe
"C:\Users\user\AppData\Local\Temp\server_BTC.exe"
malicious
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
"C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\lxsyrsiW.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpBC1D.tmp.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://gxe0.com/yak/233_Wisrysx
unknown
malicious
https://gxe0.com/yak/233_Wisrysxlfss
198.252.105.91
malicious
https://gxe0.com/
unknown
malicious
https://api.ipify.org/
104.26.13.205
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://nuget.org/NuGet.exe
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://r11.o.lencr.org0#
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://www.microsoft.
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://api.ipify.org/t
unknown
https://github.com/Pester/Pester
unknown
http://r11.i.lencr.org/0
unknown
https://api.ipify.org
unknown
https://aka.ms/pscore6lB
unknown
https://gxe0.com/yak/233_Wisrysxlfsse
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://s82.gocheapweb.com
unknown
https://gxe0.com/yak/233_Wisrysxlfssl
unknown
https://gxe0.com:443/yak/233_Wisrysxlfss
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gxe0.com
198.252.105.91
pywolwnvd.biz
54.244.188.177
api.ipify.org
104.26.13.205
s82.gocheapweb.com
51.195.88.199

IPs

IP
Domain
Country
Malicious
198.252.105.91
gxe0.com
Canada
104.26.13.205
api.ipify.org
United States
51.195.88.199
s82.gocheapweb.com
France

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Wisrysxl
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
290C000
trusted library allocation
page read and write
malicious
2421000
trusted library allocation
page read and write
malicious
26B1000
trusted library allocation
page read and write
malicious
7FC50000
direct allocation
page read and write
malicious
28E1000
trusted library allocation
page read and write
malicious
2914000
trusted library allocation
page read and write
malicious
244C000
trusted library allocation
page read and write
malicious
7F920000
direct allocation
page read and write
malicious
242000
unkown
page readonly
malicious
26E3000
trusted library allocation
page read and write
malicious
26D9000
trusted library allocation
page read and write
malicious
2454000
trusted library allocation
page read and write
malicious
2133F000
stack
page read and write
56BC000
trusted library allocation
page read and write
63F000
heap
page read and write
4D2C000
stack
page read and write
640000
heap
page read and write
7FB3F000
direct allocation
page read and write
5F80000
trusted library allocation
page read and write
6BDD000
trusted library allocation
page read and write
25DD000
trusted library allocation
page read and write
20D24000
direct allocation
page read and write
654E000
stack
page read and write
68C4000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
47BE000
stack
page read and write
29B0000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
6C19000
trusted library allocation
page read and write
742000
unkown
page readonly
4E6E000
stack
page read and write
2FEE000
stack
page read and write
6A67000
trusted library allocation
page read and write
34D000
stack
page read and write
32B000
stack
page read and write
690E000
trusted library allocation
page read and write
2883000
heap
page read and write
AE0000
trusted library allocation
page read and write
2BAE000
stack
page read and write
5F90000
trusted library allocation
page read and write
484000
unkown
page read and write
CD5000
heap
page read and write
7560000
heap
page execute and read and write
874000
trusted library allocation
page read and write
95B000
unkown
page read and write
69B8000
trusted library allocation
page read and write
6A38000
trusted library allocation
page read and write
970000
heap
page read and write
57E000
heap
page read and write
4B4C000
heap
page read and write
6A09000
trusted library allocation
page read and write
6EAA000
trusted library allocation
page read and write
4B4E000
stack
page read and write
4F63000
trusted library allocation
page read and write
26F5000
trusted library allocation
page read and write
C1E000
stack
page read and write
1580000
trusted library allocation
page read and write
6000000
trusted library allocation
page execute and read and write
6FD000
stack
page read and write
77AE000
stack
page read and write
25AF000
trusted library allocation
page read and write
6B06000
trusted library allocation
page read and write
6B1D000
trusted library allocation
page read and write
66D0000
trusted library allocation
page execute and read and write
2340000
direct allocation
page execute and read and write
6A54000
trusted library allocation
page read and write
6914000
trusted library allocation
page read and write
7024000
trusted library allocation
page read and write
4D9F000
stack
page read and write
531E000
stack
page read and write
6F46000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
158D000
trusted library allocation
page execute and read and write
2EE7000
direct allocation
page execute and read and write
6C2A000
trusted library allocation
page read and write
4D36000
trusted library allocation
page read and write
9F8000
heap
page read and write
69A8000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
6FC5000
trusted library allocation
page read and write
6AE3000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
4B65000
heap
page read and write
4D60000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
1590000
heap
page read and write
56F7000
trusted library allocation
page read and write
2520000
heap
page read and write
6630000
trusted library allocation
page execute and read and write
9E0000
heap
page read and write
3637000
trusted library allocation
page read and write
6ADB000
trusted library allocation
page read and write
4645000
heap
page read and write
7FC20000
trusted library allocation
page execute and read and write
7F430000
trusted library allocation
page execute and read and write
7EE30000
direct allocation
page read and write
4F59000
trusted library allocation
page read and write
4F51000
trusted library allocation
page read and write
4620000
heap
page read and write
1346000
heap
page read and write
685000
heap
page read and write
1694000
trusted library allocation
page read and write
82D0000
trusted library allocation
page read and write
70E8000
trusted library allocation
page read and write
6EC6000
trusted library allocation
page read and write
7D870000
direct allocation
page read and write
21750000
remote allocation
page read and write
40D000
unkown
page write copy
64F000
heap
page read and write
740000
unkown
page readonly
2523000
heap
page read and write
4A97000
trusted library allocation
page read and write
626000
heap
page read and write
311C000
stack
page read and write
7EF0F000
direct allocation
page read and write
6A6D000
trusted library allocation
page read and write
E77000
heap
page read and write
6CA9000
trusted library allocation
page read and write
70C6000
trusted library allocation
page read and write
86A0000
trusted library allocation
page read and write
2832000
trusted library allocation
page read and write
900000
unkown
page execute and read and write
20D67000
direct allocation
page read and write
6AD7000
trusted library allocation
page read and write
2280000
heap
page read and write
608E000
stack
page read and write
5672000
trusted library allocation
page read and write
DD000
stack
page read and write
8CE000
stack
page read and write
89F9000
stack
page read and write
7EFAF000
direct allocation
page read and write
A44000
heap
page read and write
484000
unkown
page read and write
2A62000
trusted library allocation
page read and write
CEE000
stack
page read and write
6AE9000
trusted library allocation
page read and write
6E6C000
trusted library allocation
page read and write
2109F000
stack
page read and write
4950000
trusted library allocation
page read and write
A43000
trusted library allocation
page execute and read and write
960000
heap
page read and write
22CA000
direct allocation
page read and write
700E000
trusted library allocation
page read and write
C5B000
trusted library allocation
page execute and read and write
280000
unkown
page readonly
B7D000
heap
page read and write
65CE000
stack
page read and write
2BD60000
direct allocation
page read and write
9BE000
unkown
page read and write
A20000
heap
page read and write
6C86000
trusted library allocation
page read and write
43D8000
trusted library allocation
page read and write
5A5000
heap
page read and write
6BCA000
trusted library allocation
page read and write
83B0000
trusted library allocation
page execute and read and write
2320000
heap
page read and write
4B1E000
stack
page read and write
31CC000
trusted library allocation
page read and write
211DF000
stack
page read and write
2270000
heap
page execute and read and write
22AD000
direct allocation
page read and write
6945000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
4D8E000
stack
page read and write
6F4A000
trusted library allocation
page read and write
6922000
trusted library allocation
page read and write
99E000
stack
page read and write
701C000
trusted library allocation
page read and write
754000
unkown
page readonly
6E66000
trusted library allocation
page read and write
63E000
heap
page read and write
4B1D000
stack
page read and write
2300000
heap
page read and write
6977000
trusted library allocation
page read and write
4F9E000
stack
page read and write
6F20000
trusted library allocation
page read and write
2121E000
stack
page read and write
273D000
trusted library allocation
page read and write
4A7F000
stack
page read and write
71E9000
trusted library allocation
page read and write
44AC000
stack
page read and write
2BE3000
trusted library allocation
page read and write
37F6000
trusted library allocation
page read and write
288C000
heap
page read and write
6350000
trusted library allocation
page execute and read and write
2189F000
stack
page read and write
C50000
heap
page read and write
14E5000
heap
page read and write
4CCE000
stack
page read and write
2BEF000
stack
page read and write
7E280000
direct allocation
page read and write
6981000
trusted library allocation
page read and write
2B8D000
heap
page read and write
5F70000
trusted library allocation
page read and write
29EB000
heap
page read and write
8474000
heap
page read and write
2229C000
heap
page read and write
2F72000
trusted library allocation
page read and write
215D0000
trusted library allocation
page read and write
D7D000
heap
page read and write
2467000
trusted library allocation
page read and write
22CE000
stack
page read and write
7121000
trusted library allocation
page read and write
960000
trusted library allocation
page read and write
2F75000
trusted library allocation
page execute and read and write
731B000
stack
page read and write
570000
heap
page read and write
7860000
trusted library allocation
page read and write
A25000
heap
page read and write
2220F000
heap
page read and write
2630000
trusted library allocation
page read and write
29EA000
heap
page read and write
2F94000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
730000
heap
page read and write
7EFAF000
direct allocation
page read and write
630000
heap
page read and write
75DF000
heap
page read and write
2131F000
stack
page read and write
6F9A000
trusted library allocation
page read and write
22B4000
direct allocation
page read and write
C34000
trusted library allocation
page read and write
69D8000
trusted library allocation
page read and write
4D6E000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
C62000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
63E000
heap
page read and write
2B44000
trusted library allocation
page read and write
3AD7000
trusted library allocation
page read and write
7161000
trusted library allocation
page read and write
C67000
trusted library allocation
page execute and read and write
780000
heap
page read and write
6B3A000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
6EBC000
trusted library allocation
page read and write
810000
heap
page read and write
7D4D9000
direct allocation
page read and write
241D000
trusted library allocation
page read and write
215BF000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
62DC000
unkown
page read and write
693D000
trusted library allocation
page read and write
C57000
trusted library allocation
page execute and read and write
29F2000
heap
page read and write
2BD60000
direct allocation
page read and write
69F7000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
401000
unkown
page execute read
6F9C000
trusted library allocation
page read and write
7DB80000
direct allocation
page read and write
2DCE000
direct allocation
page read and write
4B6B000
heap
page read and write
6EE9000
trusted library allocation
page read and write
71B3000
trusted library allocation
page read and write
293F000
stack
page read and write
7046000
trusted library allocation
page read and write
7D779000
direct allocation
page read and write
7061000
trusted library allocation
page read and write
12F7000
stack
page read and write
7E180000
direct allocation
page read and write
943000
trusted library allocation
page execute and read and write
269C000
trusted library allocation
page read and write
6ECE000
trusted library allocation
page read and write
2B17000
trusted library allocation
page read and write
63E000
heap
page read and write
210FE000
stack
page read and write
BF8000
trusted library allocation
page read and write
2260000
trusted library allocation
page execute and read and write
AFD000
trusted library allocation
page execute and read and write
63E000
heap
page read and write
215B0000
trusted library allocation
page read and write
487000
unkown
page read and write
4F20000
heap
page execute and read and write
57A0000
heap
page read and write
6F3A000
trusted library allocation
page read and write
16E0000
trusted library allocation
page read and write
6B7A000
heap
page read and write
554E000
stack
page read and write
4DA5000
trusted library allocation
page read and write
4FEE000
stack
page read and write
6E41000
trusted library allocation
page read and write
706E000
stack
page read and write
2415000
trusted library allocation
page read and write
84B2000
heap
page read and write
63E000
heap
page read and write
70AA000
stack
page read and write
77E000
stack
page read and write
CD0000
heap
page read and write
A10000
heap
page read and write
6C7A000
trusted library allocation
page read and write
7178000
trusted library allocation
page read and write
DAE000
unkown
page read and write
5681000
trusted library allocation
page read and write
3AD5000
trusted library allocation
page read and write
2937000
heap
page read and write
65E0000
trusted library allocation
page read and write
CC0000
unkown
page execute and read and write
89BE000
stack
page read and write
2880000
trusted library allocation
page read and write
2814000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
333E000
stack
page read and write
6BF8000
trusted library allocation
page read and write
3060000
trusted library allocation
page execute and read and write
6EA8000
trusted library allocation
page read and write
7DC60000
direct allocation
page read and write
4C10000
heap
page execute and read and write
71AF000
trusted library allocation
page read and write
7DD3F000
direct allocation
page read and write
80E000
stack
page read and write
F7B000
stack
page read and write
2780000
heap
page read and write
E30000
heap
page read and write
706B000
trusted library allocation
page read and write
20D44000
direct allocation
page read and write
2BD60000
direct allocation
page read and write
5118000
trusted library allocation
page read and write
82DB000
trusted library allocation
page read and write
68D0000
heap
page read and write
69C4000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
EAC000
stack
page read and write
966000
trusted library allocation
page execute and read and write
7DC50000
direct allocation
page read and write
2BC80000
direct allocation
page read and write
73DE000
stack
page read and write
21E5D000
heap
page read and write
4DD0000
heap
page read and write
4590000
heap
page read and write
522E000
stack
page read and write
6FD7000
trusted library allocation
page read and write
2250000
heap
page read and write
83CA000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
7EF60000
direct allocation
page read and write
6F7C000
trusted library allocation
page read and write
5E4E000
stack
page read and write
3985000
trusted library allocation
page read and write
E1E000
stack
page read and write
47FF000
stack
page read and write
3140000
heap
page read and write
6E74000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
649B000
stack
page read and write
51EE000
unkown
page read and write
2CA3000
heap
page read and write
35B7000
trusted library allocation
page read and write
7DB00000
direct allocation
page read and write
4B6B000
heap
page read and write
6B17000
trusted library allocation
page read and write
698F000
trusted library allocation
page read and write
69F3000
trusted library allocation
page read and write
6B38000
trusted library allocation
page read and write
2F42000
trusted library allocation
page read and write
479000
unkown
page execute and read and write
628E000
stack
page read and write
4D42000
trusted library allocation
page read and write
2E8E000
direct allocation
page read and write
4F3B000
trusted library allocation
page read and write
6B6F000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
6A58000
trusted library allocation
page read and write
8672000
trusted library allocation
page read and write
6F1C000
trusted library allocation
page read and write
624000
heap
page read and write
3F0000
heap
page read and write
7E30F000
direct allocation
page read and write
51AE000
stack
page read and write
5F78000
trusted library allocation
page read and write
4B6B000
heap
page read and write
11A000
stack
page read and write
48CC000
stack
page read and write
2A9D000
trusted library allocation
page read and write
670000
heap
page read and write
630E000
stack
page read and write
70B0000
heap
page read and write
70D7000
trusted library allocation
page read and write
6C82000
trusted library allocation
page read and write
6B70000
heap
page read and write
900000
unkown
page execute and read and write
516E000
stack
page read and write
D00000
heap
page read and write
4922000
trusted library allocation
page read and write
2830000
heap
page read and write
19D000
stack
page read and write
6C47000
trusted library allocation
page read and write
624000
heap
page read and write
6EB4000
trusted library allocation
page read and write
7D5EC000
direct allocation
page read and write
33A7000
heap
page read and write
5ABE000
stack
page read and write
86B0000
trusted library allocation
page read and write
3010000
heap
page execute and read and write
4F90000
trusted library allocation
page read and write
10063000
unkown
page execute and read and write
7C0000
trusted library allocation
page read and write
2824000
trusted library allocation
page read and write
28D1000
trusted library allocation
page read and write
22640000
trusted library allocation
page read and write
3040000
heap
page read and write
2825000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
301F000
stack
page read and write
99C000
unkown
page read and write
390000
heap
page read and write
4BCD000
heap
page read and write
4FA0000
trusted library allocation
page read and write
645F000
stack
page read and write
416000
unkown
page readonly
6937000
trusted library allocation
page read and write
6C88000
trusted library allocation
page read and write
292F000
stack
page read and write
2AC7000
trusted library allocation
page read and write
6B36000
trusted library allocation
page read and write
1641000
heap
page read and write
7DCF0000
direct allocation
page read and write
2275E000
heap
page read and write
6E4B000
trusted library allocation
page read and write
63F000
heap
page read and write
5523000
trusted library allocation
page read and write
6F7E000
trusted library allocation
page read and write
63ED000
stack
page read and write
8470000
heap
page read and write
63F0000
heap
page read and write
EE9000
trusted library allocation
page read and write
2308000
direct allocation
page read and write
2A0E000
heap
page read and write
6F4C000
trusted library allocation
page read and write
20DBF000
direct allocation
page read and write
5B8D000
stack
page read and write
5D2D000
stack
page read and write
2360000
heap
page read and write
269F000
trusted library allocation
page read and write
477B000
stack
page read and write
5BA1000
trusted library allocation
page read and write
400000
unkown
page readonly
9DE000
stack
page read and write
7DD1F000
direct allocation
page read and write
5DBE000
heap
page read and write
63F000
heap
page read and write
6E06000
trusted library allocation
page read and write
4BB5000
heap
page read and write
5B8F000
stack
page read and write
5BE000
unkown
page read and write
691A000
trusted library allocation
page read and write
516D000
stack
page read and write
28D9000
trusted library allocation
page read and write
6B2E000
trusted library allocation
page read and write
7DD2F000
direct allocation
page read and write
7F190000
direct allocation
page read and write
25DB000
unkown
page read and write
65A0000
trusted library allocation
page execute and read and write
70A0000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
46EE000
stack
page read and write
B06000
trusted library allocation
page execute and read and write
6E76000
trusted library allocation
page read and write
CBE000
stack
page read and write
A40000
trusted library allocation
page read and write
7FA30000
direct allocation
page read and write
6BF4000
trusted library allocation
page read and write
A20000
heap
page read and write
20CE1000
direct allocation
page read and write
21A74000
heap
page read and write
1310000
heap
page read and write
6A60000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
26EE000
trusted library allocation
page read and write
759F000
heap
page read and write
63E000
heap
page read and write
6E91000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
735E000
stack
page read and write
20CA1000
direct allocation
page read and write
CE0000
heap
page read and write
6997000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
7E220000
direct allocation
page read and write
2121E000
stack
page read and write
29BF000
unkown
page read and write
7E9CF000
direct allocation
page read and write
22297000
heap
page read and write
5740000
heap
page read and write
75EC000
heap
page read and write
A50000
heap
page read and write
E13000
trusted library allocation
page execute and read and write
A25000
heap
page read and write
7EFAF000
direct allocation
page read and write
3065000
trusted library allocation
page read and write
6EE7000
trusted library allocation
page read and write
2F47000
trusted library allocation
page execute and read and write
68D7000
trusted library allocation
page read and write
6E6A000
trusted library allocation
page read and write
2226F000
heap
page read and write
7890000
trusted library allocation
page read and write
21CF3000
heap
page read and write
697F000
trusted library allocation
page read and write
6BA6000
trusted library allocation
page read and write
7EC50000
direct allocation
page read and write
6600000
heap
page read and write
3E0000
heap
page read and write
6A8E000
trusted library allocation
page read and write
56C5000
trusted library allocation
page read and write
6912000
trusted library allocation
page read and write
49CE000
stack
page read and write
63E000
heap
page read and write
EC6000
trusted library allocation
page read and write
6FEE000
stack
page read and write
6EB0000
trusted library allocation
page read and write
139C000
heap
page read and write
975000
trusted library allocation
page execute and read and write
10000000
unkown
page execute and read and write
7ECD0000
direct allocation
page read and write
4C80000
heap
page read and write
6A2D000
trusted library allocation
page read and write
3567000
trusted library allocation
page read and write
5BE000
heap
page read and write
A8A000
heap
page read and write
4F80000
trusted library allocation
page read and write
6AC4000
trusted library allocation
page read and write
7442000
heap
page read and write
624000
heap
page read and write
6A90000
trusted library allocation
page read and write
6200000
trusted library allocation
page read and write
4BCB000
heap
page read and write
839E000
stack
page read and write
2BD60000
direct allocation
page read and write
4B6B000
heap
page read and write
6FAD000
trusted library allocation
page read and write
7004000
trusted library allocation
page read and write
4DB0000
heap
page read and write
66CF000
stack
page read and write
2254000
heap
page read and write
51EE000
stack
page read and write
3617000
trusted library allocation
page read and write
24BC000
stack
page read and write
78D0000
trusted library allocation
page read and write
20F3F000
stack
page read and write
7DC1F000
direct allocation
page read and write
8488000
heap
page read and write
2BD60000
direct allocation
page read and write
BEF000
stack
page read and write
D07000
heap
page read and write
6941000
trusted library allocation
page read and write
10000000
unkown
page execute and read and write
2CCD000
heap
page read and write
2834000
trusted library allocation
page read and write
44D0000
heap
page read and write
6F7000
stack
page read and write
33F9000
trusted library allocation
page read and write
6AD9000
trusted library allocation
page read and write
7016000
trusted library allocation
page read and write
15BE000
heap
page read and write
7850000
trusted library allocation
page read and write
6F83000
trusted library allocation
page read and write
264E000
trusted library allocation
page read and write
1E5000
heap
page read and write
90A000
stack
page read and write
2AB5000
trusted library allocation
page read and write
4B65000
heap
page read and write
7E30F000
direct allocation
page read and write
2A0E000
heap
page read and write
2407000
trusted library allocation
page read and write
69F5000
trusted library allocation
page read and write
20DB8000
direct allocation
page read and write
4B00000
heap
page read and write
6B19000
trusted library allocation
page read and write
9B000
stack
page read and write
6EEF000
trusted library allocation
page read and write
7ED7A000
direct allocation
page read and write
63E000
heap
page read and write
61E8000
trusted library allocation
page read and write
463D000
heap
page read and write
4F9000
stack
page read and write
26F7000
trusted library allocation
page read and write
6E7A000
trusted library allocation
page read and write
B10000
heap
page read and write
2F90000
trusted library allocation
page read and write
2240000
trusted library allocation
page read and write
A40000
trusted library allocation
page execute and read and write
280F000
stack
page read and write
A50000
trusted library allocation
page read and write
5F8E000
stack
page read and write
7F370000
direct allocation
page read and write
6F40000
trusted library allocation
page read and write
4BDC000
stack
page read and write
BF0000
heap
page read and write
558B000
stack
page read and write
35D7000
trusted library allocation
page read and write
14E0000
heap
page read and write
698D000
trusted library allocation
page read and write
20E4E000
stack
page execute and read and write
6F81000
trusted library allocation
page read and write
A50000
heap
page read and write
7DFD0000
direct allocation
page read and write
2878000
heap
page read and write
AC9000
heap
page read and write
1334000
heap
page read and write
977000
trusted library allocation
page execute and read and write
30DC000
stack
page read and write
47F0000
heap
page read and write
CCA000
heap
page read and write
7C20000
heap
page read and write
7189000
trusted library allocation
page read and write
210BF000
stack
page read and write
AD7000
heap
page read and write
6E53000
trusted library allocation
page read and write
63E000
heap
page read and write
6971000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
2123E000
stack
page read and write
C50000
trusted library allocation
page execute and read and write
400000
unkown
page execute and read and write
6F6B000
trusted library allocation
page read and write
54B0000
heap
page read and write
C10000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
6FD5000
trusted library allocation
page read and write
7E09F000
direct allocation
page read and write
20E3F000
stack
page read and write
465B000
heap
page read and write
20F8E000
stack
page read and write
C80000
heap
page read and write
7EF4F000
direct allocation
page read and write
7ECA0000
direct allocation
page read and write
4BC6000
heap
page read and write
C90000
trusted library allocation
page execute and read and write
6390000
trusted library allocation
page read and write
566F000
stack
page read and write
2A0E000
heap
page read and write
54A0000
trusted library allocation
page read and write
B50000
heap
page read and write
B60000
heap
page read and write
69EF000
trusted library allocation
page read and write
7DD2F000
direct allocation
page read and write
245E000
trusted library allocation
page read and write
38AF000
trusted library allocation
page read and write
5F88000
trusted library allocation
page read and write
2ABF000
stack
page read and write
5FE0000
heap
page read and write
7EF60000
direct allocation
page read and write
286D000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
5C2E000
stack
page read and write
745000
heap
page read and write
6ADD000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
7ED30000
direct allocation
page read and write
5FA000
stack
page read and write
23D1000
trusted library allocation
page read and write
4B4A000
heap
page read and write
6933000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
776E000
stack
page read and write
6F3E000
trusted library allocation
page read and write
4D2E000
trusted library allocation
page read and write
701E000
trusted library allocation
page read and write
4A85000
trusted library allocation
page read and write
6F87000
trusted library allocation
page read and write
63E000
heap
page read and write
2BD60000
direct allocation
page read and write
6F0000
heap
page read and write
63F000
heap
page read and write
6C58000
trusted library allocation
page read and write
C33000
heap
page read and write
70FB000
trusted library allocation
page read and write
8F8000
stack
page read and write
6A17000
trusted library allocation
page read and write
7ED55000
direct allocation
page read and write
64F0000
trusted library allocation
page read and write
478000
unkown
page read and write
2837000
trusted library allocation
page read and write
69C6000
trusted library allocation
page read and write
7E30F000
direct allocation
page read and write
567E000
trusted library allocation
page read and write
4E7E000
trusted library allocation
page read and write
7F2F0000
direct allocation
page read and write
6AD5000
trusted library allocation
page read and write
2619000
trusted library allocation
page read and write
2827000
trusted library allocation
page read and write
2B08000
trusted library allocation
page read and write
4ADB000
stack
page read and write
7DD4F000
direct allocation
page read and write
4925000
trusted library allocation
page read and write
2EF0000
heap
page read and write
2CC9000
heap
page read and write
4645000
heap
page read and write
4D1E000
trusted library allocation
page read and write
4656000
heap
page read and write
70B5000
trusted library allocation
page read and write
2FF8000
trusted library allocation
page read and write
6918000
trusted library allocation
page read and write
7048000
trusted library allocation
page read and write
2750000
heap
page read and write
71EE000
trusted library allocation
page read and write
63F000
heap
page read and write
F09000
stack
page read and write
2223E000
heap
page read and write
3090000
heap
page read and write
99C000
stack
page read and write
64AE000
stack
page read and write
2147F000
stack
page read and write
4D0F000
stack
page read and write
6AF5000
trusted library allocation
page read and write
7165000
trusted library allocation
page read and write
2E27000
direct allocation
page execute and read and write
27FB000
trusted library allocation
page read and write
D2E000
heap
page read and write
536E000
stack
page read and write
8529000
heap
page read and write
172E000
stack
page read and write
5F8D000
trusted library allocation
page read and write
715F000
trusted library allocation
page read and write
2A91000
trusted library allocation
page read and write
40D000
unkown
page write copy
214AE000
stack
page read and write
6B73000
trusted library allocation
page read and write
281D000
trusted library allocation
page execute and read and write
7E30F000
direct allocation
page read and write
702E000
stack
page read and write
20D16000
direct allocation
page read and write
7DD70000
direct allocation
page read and write
6A9A000
trusted library allocation
page read and write
71CC000
trusted library allocation
page read and write
64EC000
stack
page read and write
46FA000
stack
page read and write
CA0000
heap
page read and write
6EB2000
trusted library allocation
page read and write
7570000
heap
page read and write
6F54000
trusted library allocation
page read and write
2927000
trusted library allocation
page read and write
705D000
trusted library allocation
page read and write
3AD1000
trusted library allocation
page read and write
6F26000
trusted library allocation
page read and write
E40000
heap
page read and write
461F000
stack
page read and write
219DE000
stack
page read and write
7035000
trusted library allocation
page read and write
211FF000
stack
page read and write
5930000
trusted library allocation
page read and write
5D0E000
stack
page read and write
5DA6000
heap
page read and write
25E0000
trusted library allocation
page read and write
4B90000
heap
page read and write
9E0000
heap
page execute and read and write
5E4E000
stack
page read and write
2F70000
trusted library allocation
page read and write
159A000
heap
page read and write
94D000
trusted library allocation
page execute and read and write
52E2000
trusted library allocation
page read and write
20D1D000
direct allocation
page read and write
CE0000
heap
page read and write
2F70000
trusted library allocation
page execute and read and write
78C0000
trusted library allocation
page read and write
4B6D000
heap
page read and write
5544000
trusted library allocation
page read and write
63F000
heap
page read and write
C70000
heap
page read and write
4A94000
trusted library allocation
page read and write
7640000
heap
page read and write
6EB000
stack
page read and write
6F96000
trusted library allocation
page read and write
8CD000
stack
page read and write
284B000
trusted library allocation
page execute and read and write
5B1000
heap
page read and write
7ED80000
direct allocation
page read and write
4EAF000
stack
page read and write
20E4A000
stack
page read and write
E60000
trusted library allocation
page read and write
478000
unkown
page write copy
5D2C000
heap
page read and write
2419000
trusted library allocation
page read and write
6FB8000
trusted library allocation
page read and write
9EE000
stack
page read and write
9FE000
heap
page read and write
3030000
heap
page read and write
4A80000
heap
page read and write
E80000
heap
page read and write
6AF1000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
576D000
stack
page read and write
5400000
trusted library allocation
page read and write
20DEA000
direct allocation
page read and write
2BD60000
direct allocation
page read and write
709E000
trusted library allocation
page read and write
2C28000
heap
page read and write
2330000
heap
page read and write
9BB000
trusted library allocation
page execute and read and write
600000
heap
page read and write
739F000
stack
page read and write
EC4000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
7E190000
direct allocation
page read and write
693F000
trusted library allocation
page read and write
6FC1000
trusted library allocation
page read and write
4DC0000
heap
page read and write
C24000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
512E000
stack
page read and write
4AD0000
heap
page read and write
5BC9000
trusted library allocation
page read and write
20D99000
direct allocation
page read and write
2BD60000
direct allocation
page read and write
5D30000
heap
page read and write
269E000
stack
page read and write
2BD60000
direct allocation
page read and write
A2F000
heap
page read and write
7DF00000
direct allocation
page read and write
6939000
trusted library allocation
page read and write
8B4E000
stack
page read and write
22201000
heap
page read and write
23DC000
trusted library allocation
page read and write
15BA000
heap
page read and write
7F948000
direct allocation
page read and write
7EFB0000
direct allocation
page read and write
27E7000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
26A9000
trusted library allocation
page read and write
4E81000
trusted library allocation
page read and write
625000
heap
page read and write
4F1E000
stack
page read and write
AB8000
heap
page read and write
4FFE000
stack
page read and write
7578000
heap
page read and write
6B30000
trusted library allocation
page read and write
7DCF0000
direct allocation
page read and write
6FB6000
trusted library allocation
page read and write
DB0000
heap
page read and write
2820000
trusted library allocation
page read and write
CC0000
unkown
page execute and read and write
6916000
trusted library allocation
page read and write
6A11000
trusted library allocation
page read and write
57A000
heap
page read and write
19D000
stack
page read and write
2F1C000
stack
page read and write
6A4D000
trusted library allocation
page read and write
6EE5000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
2E37000
direct allocation
page execute and read and write
A57000
heap
page read and write
6EC0000
trusted library allocation
page read and write
1770000
heap
page read and write
6FD1000
trusted library allocation
page read and write
A4D000
trusted library allocation
page execute and read and write
2BD60000
direct allocation
page read and write
278C000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
63E000
heap
page read and write
2804000
trusted library allocation
page read and write
4B55000
heap
page read and write
66AC000
stack
page read and write
B65000
heap
page read and write
598D000
stack
page read and write
7DE70000
direct allocation
page read and write
51DE000
stack
page read and write
D2A000
heap
page read and write
8690000
trusted library allocation
page execute and read and write
5660000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
69B2000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
7E7000
stack
page read and write
6F09000
trusted library allocation
page read and write
2BD70000
direct allocation
page read and write
22D8000
direct allocation
page read and write
22D1000
direct allocation
page read and write
7EDF0000
direct allocation
page read and write
7DDBF000
direct allocation
page read and write
20CC0000
direct allocation
page read and write
847C000
heap
page read and write
7E30F000
direct allocation
page read and write
2BD60000
direct allocation
page read and write
6A65000
trusted library allocation
page read and write
20D14000
direct allocation
page read and write
55F7000
trusted library allocation
page read and write
2A0A000
heap
page read and write
EC0000
trusted library allocation
page read and write
6AE1000
trusted library allocation
page read and write
316B000
heap
page read and write
63E000
heap
page read and write
3AB7000
trusted library allocation
page read and write
7F190000
direct allocation
page read and write
6CD8000
trusted library allocation
page read and write
AE4000
trusted library allocation
page read and write
5D45000
trusted library allocation
page read and write
1574000
trusted library allocation
page read and write
873000
trusted library allocation
page execute and read and write
7ECD0000
direct allocation
page read and write
7E8C7000
direct allocation
page read and write
63E000
heap
page read and write
20DF8000
direct allocation
page read and write
E10000
heap
page read and write
1E0000
heap
page read and write
7880000
trusted library allocation
page read and write
7EE7F000
direct allocation
page read and write
6500000
trusted library allocation
page execute and read and write
6C8A000
trusted library allocation
page read and write
7EF7F000
direct allocation
page read and write
7F8D0000
direct allocation
page read and write
531E000
stack
page read and write
2950000
trusted library allocation
page read and write
1500000
heap
page read and write
2604000
trusted library allocation
page read and write
7E220000
direct allocation
page read and write
5680000
trusted library allocation
page read and write
2949000
trusted library allocation
page read and write
22EC000
direct allocation
page read and write
6F4E000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
4DBC000
stack
page read and write
6B1B000
trusted library allocation
page read and write
20CDA000
direct allocation
page read and write
2136E000
stack
page read and write
5715000
trusted library allocation
page read and write
7F370000
direct allocation
page read and write
48F0000
trusted library allocation
page read and write
546E000
stack
page read and write
65B0000
trusted library allocation
page execute and read and write
3577000
trusted library allocation
page read and write
6EF3000
trusted library allocation
page read and write
71AB000
trusted library allocation
page read and write
4D3D000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
850000
direct allocation
page execute and read and write
772E000
stack
page read and write
5B0000
heap
page read and write
8820000
trusted library allocation
page read and write
7EF60000
direct allocation
page read and write
5D34000
trusted library allocation
page read and write
513E000
stack
page read and write
7FAAF000
direct allocation
page read and write
305F000
trusted library allocation
page read and write
463A000
heap
page read and write
6B84000
trusted library allocation
page read and write
4C01000
trusted library allocation
page read and write
496E000
trusted library allocation
page read and write
8A3E000
stack
page read and write
29E0000
heap
page read and write
7EF0F000
direct allocation
page read and write
7FCD0000
direct allocation
page read and write
6C0D000
trusted library allocation
page read and write
2FDE000
stack
page read and write
970000
heap
page read and write
2FDB000
direct allocation
page execute and read and write
944000
trusted library allocation
page read and write
6EC8000
trusted library allocation
page read and write
6947000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
ED7000
heap
page read and write
20D0F000
direct allocation
page read and write
625000
heap
page read and write
7622000
heap
page read and write
4BCD000
heap
page read and write
6F5C000
trusted library allocation
page read and write
211CF000
stack
page read and write
6A15000
trusted library allocation
page read and write
82C0000
trusted library allocation
page execute and read and write
6EE3000
trusted library allocation
page read and write
729E000
stack
page read and write
6A4F000
trusted library allocation
page read and write
556E000
stack
page read and write
7DFC0000
direct allocation
page read and write
588B000
stack
page read and write
7065000
trusted library allocation
page read and write
15C8000
heap
page read and write
21CF2000
heap
page read and write
3981000
trusted library allocation
page read and write
76AE000
stack
page read and write
400000
unkown
page execute and read and write
6E72000
trusted library allocation
page read and write
65A0000
heap
page read and write
6F42000
trusted library allocation
page read and write
16A4000
trusted library allocation
page read and write
B30000
heap
page read and write
5F6E000
stack
page read and write
8515000
heap
page read and write
2BD60000
direct allocation
page read and write
63E000
heap
page read and write
FE0000
heap
page read and write
6E6E000
trusted library allocation
page read and write
46BD000
stack
page read and write
5743000
heap
page read and write
A8F000
heap
page read and write
20E3E000
stack
page execute and read and write
E00000
trusted library allocation
page read and write
2E61000
direct allocation
page execute read
40D000
unkown
page write copy
7EF60000
direct allocation
page read and write
63E000
heap
page read and write
E14000
trusted library allocation
page read and write
7FC20000
direct allocation
page read and write
2696000
trusted library allocation
page read and write
479000
unkown
page read and write
56D0000
trusted library allocation
page read and write
4779000
stack
page read and write
69C2000
trusted library allocation
page read and write
4B0E000
stack
page read and write
65F0000
trusted library allocation
page execute and read and write
625000
heap
page read and write
4E0E000
stack
page read and write
A97000
heap
page read and write
63F000
heap
page read and write
7D940000
direct allocation
page read and write
2813000
trusted library allocation
page execute and read and write
97B000
trusted library allocation
page execute and read and write
20DE3000
direct allocation
page read and write
2840000
trusted library allocation
page read and write
20E4F000
stack
page read and write
625000
heap
page read and write
484000
unkown
page read and write
2551000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
4E8E000
stack
page read and write
7123000
trusted library allocation
page read and write
6EA4000
trusted library allocation
page read and write
2BC80000
direct allocation
page read and write
166F000
stack
page read and write
624000
heap
page read and write
52C0000
trusted library allocation
page read and write
A7E000
stack
page read and write
B02000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
4F56000
trusted library allocation
page read and write
215DF000
trusted library allocation
page read and write
4645000
heap
page read and write
2810000
trusted library allocation
page read and write
4BCB000
heap
page read and write
D3B000
heap
page read and write
8A7F000
stack
page read and write
699C000
trusted library allocation
page read and write
625000
heap
page read and write
2BD60000
direct allocation
page read and write
59A000
heap
page read and write
3A57000
trusted library allocation
page read and write
4645000
heap
page read and write
2E05000
direct allocation
page read and write
6C84000
trusted library allocation
page read and write
B15000
heap
page read and write
2F80000
trusted library allocation
page read and write
22F3000
direct allocation
page read and write
6A56000
trusted library allocation
page read and write
6973000
trusted library allocation
page read and write
75A5000
heap
page read and write
4FCC000
stack
page read and write
570000
heap
page read and write
7E8A0000
direct allocation
page read and write
400000
unkown
page readonly
6398000
trusted library allocation
page read and write
8970000
trusted library allocation
page execute and read and write
6FCB000
trusted library allocation
page read and write
50B0000
direct allocation
page read and write
6C32000
trusted library allocation
page read and write
2F6A000
trusted library allocation
page execute and read and write
2B70000
heap
page read and write
7014000
trusted library allocation
page read and write
3697000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
5664000
trusted library allocation
page read and write
4D6E000
stack
page read and write
2768000
trusted library allocation
page read and write
69ED000
trusted library allocation
page read and write
6E51000
trusted library allocation
page read and write
2370000
heap
page read and write
9FF000
stack
page read and write
91E000
stack
page read and write
6A7E000
trusted library allocation
page read and write
4EDE000
stack
page read and write
4942000
trusted library allocation
page read and write
3098000
heap
page read and write
4BB5000
heap
page read and write
4B54000
heap
page read and write
7DC1F000
direct allocation
page read and write
5C09000
trusted library allocation
page read and write
4CCF000
stack
page read and write
6A3A000
trusted library allocation
page read and write
20DF1000
direct allocation
page read and write
694D000
trusted library allocation
page read and write
6F5E000
trusted library allocation
page read and write
305F000
stack
page read and write
730000
heap
page read and write
20D38000
direct allocation
page read and write
2264F000
trusted library allocation
page read and write
B37000
stack
page read and write
16C7000
trusted library allocation
page execute and read and write
EAE000
stack
page read and write
1E0000
heap
page read and write
6FAB000
stack
page read and write
29C0000
heap
page read and write
61D1000
heap
page read and write
7840000
trusted library allocation
page read and write
84F000
stack
page read and write
28B0000
trusted library allocation
page execute and read and write
6FBF000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
570000
heap
page read and write
4055000
trusted library allocation
page read and write
2264F000
heap
page read and write
B58000
heap
page read and write
2DB1000
direct allocation
page execute read
20D31000
direct allocation
page read and write
596E000
stack
page read and write
2330000
direct allocation
page execute and read and write
3891000
trusted library allocation
page read and write
20E7E000
stack
page read and write
2BD60000
direct allocation
page read and write
7EE00000
direct allocation
page read and write
41F0000
heap
page read and write
6E1D000
trusted library allocation
page read and write
6E49000
trusted library allocation
page read and write
6A27000
trusted library allocation
page read and write
2AA1000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
48D000
unkown
page readonly
7DA9F000
direct allocation
page read and write
7ED90000
direct allocation
page read and write
6EC3000
trusted library allocation
page read and write
20DCD000
direct allocation
page read and write
7D460000
direct allocation
page read and write
720000
unkown
page execute and read and write
60CE000
stack
page read and write
6A1F000
trusted library allocation
page read and write
6A85000
trusted library allocation
page read and write
6FC9000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
6400000
trusted library allocation
page execute and read and write
217C000
stack
page read and write
69BA000
trusted library allocation
page read and write
8810000
trusted library allocation
page read and write
6600000
heap
page read and write
2108F000
stack
page read and write
715B000
trusted library allocation
page read and write
3A0000
heap
page read and write
23F3000
heap
page read and write
401000
unkown
page execute read
4770000
heap
page read and write
4E74000
trusted library allocation
page read and write
A80000
heap
page read and write
700A000
trusted library allocation
page read and write
2BEA0000
direct allocation
page read and write
A73000
heap
page read and write
6ECA000
trusted library allocation
page read and write
7FD90000
direct allocation
page read and write
2C8E000
heap
page read and write
16C0000
trusted library allocation
page read and write
2B80000
heap
page read and write
624000
heap
page read and write
492E000
trusted library allocation
page read and write
22293000
heap
page read and write
FBE000
stack
page read and write
4E66000
trusted library allocation
page read and write
15D4000
heap
page read and write
2F60000
trusted library allocation
page read and write
2B67000
heap
page read and write
2825000
trusted library allocation
page read and write
4D22000
trusted library allocation
page read and write
625000
heap
page read and write
2BCE0000
direct allocation
page read and write
6E64000
trusted library allocation
page read and write
D05000
heap
page read and write
4CF5000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
3A77000
trusted library allocation
page read and write
6239000
heap
page read and write
4656000
heap
page read and write
73E000
unkown
page read and write
54DC000
trusted library allocation
page read and write
27EE000
stack
page read and write
4B6D000
heap
page read and write
22B4000
direct allocation
page read and write
7E130000
direct allocation
page read and write
52EE000
stack
page read and write
2BD70000
direct allocation
page read and write
2B40000
heap
page read and write
6A1D000
trusted library allocation
page read and write
7008000
trusted library allocation
page read and write
2F2B000
direct allocation
page execute and read and write
5A6000
heap
page read and write
2BD60000
direct allocation
page read and write
5B6E000
stack
page read and write
2AAE000
heap
page read and write
697B000
trusted library allocation
page read and write
7D0000
trusted library allocation
page execute and read and write
6EF1000
trusted library allocation
page read and write
4C7E000
stack
page read and write
51AD000
stack
page read and write
63F000
heap
page read and write
7EF0F000
direct allocation
page read and write
7125000
trusted library allocation
page read and write
13F5000
heap
page read and write
2BD60000
direct allocation
page read and write
693B000
trusted library allocation
page read and write
7F2A0000
trusted library allocation
page execute and read and write
156E000
stack
page read and write
7D6E0000
direct allocation
page read and write
2ACF000
stack
page read and write
7D1F0000
direct allocation
page read and write
6ADF000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
486000
unkown
page read and write
5E8000
heap
page read and write
7F8D0000
direct allocation
page read and write
2FC0000
heap
page read and write
66E000
stack
page read and write
493D000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
5BA000
heap
page read and write
8478000
heap
page read and write
176E000
stack
page read and write
725E000
stack
page read and write
2BD60000
direct allocation
page read and write
A30000
trusted library allocation
page read and write
7DCA0000
direct allocation
page read and write
31D6000
trusted library allocation
page read and write
7DA00000
direct allocation
page read and write
16CB000
trusted library allocation
page execute and read and write
641E000
stack
page read and write
2794000
trusted library allocation
page read and write
1F0000
heap
page read and write
880000
trusted library allocation
page read and write
6B34000
trusted library allocation
page read and write
4BA1000
trusted library allocation
page read and write
3020000
heap
page execute and read and write
8538000
heap
page read and write
63E000
heap
page read and write
7DF9F000
direct allocation
page read and write
7EFB0000
direct allocation
page read and write
4ABC000
stack
page read and write
69B0000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
22D1000
direct allocation
page read and write
4C20000
heap
page read and write
21750000
remote allocation
page read and write
2BD60000
direct allocation
page read and write
7820000
trusted library allocation
page read and write
6EBE000
trusted library allocation
page read and write
317E000
stack
page read and write
6AEF000
trusted library allocation
page read and write
7870000
trusted library allocation
page read and write
12F7000
stack
page read and write
6F3C000
trusted library allocation
page read and write
400000
unkown
page readonly
4F89000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
4A1E000
stack
page read and write
6EDB000
trusted library allocation
page read and write
624000
heap
page read and write
9A0000
trusted library allocation
page read and write
43D000
stack
page read and write
6A89000
trusted library allocation
page read and write
5D48000
trusted library allocation
page read and write
22CA000
direct allocation
page read and write
3667000
trusted library allocation
page read and write
75F4000
heap
page read and write
20CC3000
direct allocation
page read and write
7DB00000
direct allocation
page read and write
25EE000
stack
page read and write
740000
heap
page read and write
6F48000
trusted library allocation
page read and write
590000
unkown
page execute and read and write
7FAD0000
direct allocation
page read and write
6194000
heap
page read and write
2440000
heap
page read and write
6C09000
trusted library allocation
page read and write
6A5C000
trusted library allocation
page read and write
7DDC0000
direct allocation
page read and write
8BE000
stack
page read and write
2B6F000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
8E0000
unkown
page execute and read and write
5F97000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
2981000
trusted library allocation
page read and write
4FE0000
heap
page read and write
2BCE0000
direct allocation
page read and write
6A25000
trusted library allocation
page read and write
9E0000
trusted library allocation
page execute and read and write
7EF37000
direct allocation
page read and write
6EAE000
trusted library allocation
page read and write
4D54000
trusted library allocation
page read and write
6E78000
trusted library allocation
page read and write
54AE000
stack
page read and write
4BAA000
heap
page read and write
5D4C000
trusted library allocation
page read and write
75DB000
heap
page read and write
54D8000
trusted library allocation
page read and write
2BEA0000
direct allocation
page read and write
EA0000
trusted library section
page read and write
10063000
unkown
page execute and read and write
5A0000
heap
page read and write
7DCD7000
direct allocation
page read and write
22264000
heap
page read and write
20D2A000
direct allocation
page read and write
6F6D000
stack
page read and write
7580000
heap
page read and write
2850000
heap
page execute and read and write
479000
unkown
page execute and read and write
6C69000
trusted library allocation
page read and write
7EEA0000
direct allocation
page read and write
570000
heap
page read and write
7127000
trusted library allocation
page read and write
2650000
heap
page execute and read and write
215CF000
stack
page read and write
4BCE000
stack
page read and write
B67000
unkown
page execute and read and write
2160E000
stack
page read and write
CA0000
heap
page read and write
6E45000
trusted library allocation
page read and write
5A8E000
stack
page read and write
E00000
trusted library allocation
page read and write
4936000
trusted library allocation
page read and write
69AC000
trusted library allocation
page read and write
720000
unkown
page execute and read and write
610000
heap
page read and write
565000
heap
page read and write
28C0000
heap
page execute and read and write
63E000
heap
page read and write
6F67000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
2BD70000
direct allocation
page read and write
691E000
trusted library allocation
page read and write
521E000
stack
page read and write
20F9E000
stack
page read and write
2DA1000
direct allocation
page execute read
7EF40000
direct allocation
page read and write
27F4000
trusted library allocation
page read and write
3551000
trusted library allocation
page read and write
225FF000
direct allocation
page read and write
568D000
trusted library allocation
page read and write
4645000
heap
page read and write
83C0000
trusted library allocation
page read and write
68FD000
trusted library allocation
page read and write
465B000
heap
page read and write
2148E000
stack
page read and write
83C7000
trusted library allocation
page read and write
6E4F000
trusted library allocation
page read and write
2836000
trusted library allocation
page execute and read and write
25F4000
trusted library allocation
page read and write
CAF000
stack
page read and write
6949000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
713E000
trusted library allocation
page read and write
69B4000
trusted library allocation
page read and write
560000
heap
page read and write
6C9B000
trusted library allocation
page read and write
2131F000
stack
page read and write
A58000
heap
page read and write
15D2000
heap
page read and write
2BC80000
direct allocation
page read and write
2ABA000
trusted library allocation
page read and write
283A000
trusted library allocation
page execute and read and write
614E000
stack
page read and write
608000
heap
page read and write
2873000
heap
page read and write
2F60000
trusted library allocation
page read and write
624000
heap
page read and write
590000
unkown
page execute and read and write
1520000
heap
page read and write
1318000
heap
page read and write
7207000
trusted library allocation
page read and write
2F70000
heap
page read and write
7E060000
direct allocation
page read and write
2BD60000
direct allocation
page read and write
4BCB000
heap
page read and write
80E000
stack
page read and write
3A27000
trusted library allocation
page read and write
2CC5000
heap
page read and write
6A0F000
trusted library allocation
page read and write
35F7000
trusted library allocation
page read and write
765C000
heap
page read and write
5FE000
stack
page read and write
550000
heap
page read and write
71E6000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
7163000
trusted library allocation
page read and write
83A0000
heap
page read and write
6A2B000
trusted library allocation
page read and write
A30000
heap
page read and write
686C000
stack
page read and write
7EE50000
direct allocation
page read and write
2BD60000
direct allocation
page read and write
2607000
trusted library allocation
page read and write
77E000
stack
page read and write
701A000
trusted library allocation
page read and write
2448000
trusted library allocation
page read and write
2625000
trusted library allocation
page read and write
69D4000
trusted library allocation
page read and write
20D0D000
direct allocation
page read and write
69D6000
trusted library allocation
page read and write
57AE000
stack
page read and write
6999000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
6BC8000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
19D000
stack
page read and write
16A0000
trusted library allocation
page read and write
380000
heap
page read and write
2F1B000
direct allocation
page execute and read and write
2906000
trusted library allocation
page read and write
502C000
stack
page read and write
45DE000
stack
page read and write
2F30000
trusted library allocation
page read and write
BAE000
stack
page read and write
8A9000
unkown
page execute and read and write
509F000
stack
page read and write
20CD1000
direct allocation
page read and write
41E0000
heap
page read and write
4F65000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
AF0000
trusted library allocation
page read and write
7EF10000
direct allocation
page read and write
6C00000
heap
page read and write
2BD60000
direct allocation
page read and write
2970000
heap
page execute and read and write
4AF0000
heap
page read and write
F70000
heap
page read and write
6F98000
trusted library allocation
page read and write
6EDD000
trusted library allocation
page read and write
2F5C000
stack
page read and write
2BEA0000
direct allocation
page read and write
815000
heap
page read and write
72DE000
stack
page read and write
A72000
trusted library allocation
page read and write
5208000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
3C0000
heap
page read and write
A75000
trusted library allocation
page execute and read and write
4BC7000
heap
page read and write
10000000
unkown
page execute and read and write
E24000
trusted library allocation
page read and write
A6E000
heap
page read and write
6F8B000
trusted library allocation
page read and write
2F7A000
heap
page read and write
3865000
trusted library allocation
page read and write
624000
heap
page read and write
4F5E000
stack
page read and write
3A97000
trusted library allocation
page read and write
63E000
heap
page read and write
ED0000
heap
page read and write
4760000
heap
page read and write
475E000
stack
page read and write
CD0000
heap
page read and write
2830000
trusted library allocation
page read and write
7800000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
4F77000
trusted library allocation
page read and write
852C000
heap
page read and write
137D000
heap
page read and write
868000
heap
page read and write
506E000
stack
page read and write
6F8D000
trusted library allocation
page read and write
283F000
trusted library allocation
page read and write
6250000
heap
page read and write
20D3A000
direct allocation
page read and write
2190000
heap
page read and write
7ECD0000
direct allocation
page read and write
6DF5000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
DB5000
heap
page read and write
6F89000
trusted library allocation
page read and write
29BF000
unkown
page read and write
2310000
heap
page read and write
52C2000
trusted library allocation
page read and write
63DC000
stack
page read and write
835D000
stack
page read and write
33A0000
heap
page read and write
576E000
stack
page read and write
20D06000
direct allocation
page read and write
A28000
heap
page read and write
6620000
heap
page read and write
A00000
heap
page read and write
6CE000
stack
page read and write
3439000
trusted library allocation
page read and write
2810000
heap
page read and write
1EA000
stack
page read and write
3597000
trusted library allocation
page read and write
7006000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
694F000
trusted library allocation
page read and write
2CC9000
heap
page read and write
5DB6000
heap
page read and write
AE0000
unkown
page execute and read and write
2BD60000
direct allocation
page read and write
6E7C000
trusted library allocation
page read and write
D2C000
heap
page read and write
6F44000
trusted library allocation
page read and write
5C0E000
stack
page read and write
27AE000
stack
page read and write
6A0D000
trusted library allocation
page read and write
6FE2000
trusted library allocation
page read and write
20D1C000
direct allocation
page read and write
D40000
heap
page read and write
DEF000
stack
page read and write
3080000
heap
page execute and read and write
305C000
trusted library allocation
page read and write
6F52000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
25FF000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
8310000
heap
page read and write
625000
heap
page read and write
5A4000
heap
page read and write
3085000
heap
page execute and read and write
6AA0000
trusted library allocation
page read and write
71B5000
trusted library allocation
page read and write
2829000
trusted library allocation
page read and write
68B3000
trusted library allocation
page read and write
259C000
unkown
page read and write
6DE4000
trusted library allocation
page read and write
71B9000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
6EAC000
trusted library allocation
page read and write
AD0000
heap
page read and write
F47000
heap
page read and write
624D000
stack
page read and write
91F000
stack
page read and write
4B38000
heap
page read and write
6EA2000
trusted library allocation
page read and write
22BC000
direct allocation
page read and write
2B82000
heap
page read and write
6E3F000
trusted library allocation
page read and write
20DC6000
direct allocation
page read and write
7EE50000
direct allocation
page read and write
705F000
trusted library allocation
page read and write
5DB3000
heap
page read and write
69F1000
trusted library allocation
page read and write
488000
unkown
page write copy
4B00000
heap
page execute and read and write
FB0000
heap
page read and write
5C7000
heap
page read and write
810000
heap
page read and write
4E6B000
trusted library allocation
page read and write
6150000
heap
page read and write
5940000
heap
page execute and read and write
6935000
trusted library allocation
page read and write
20FBE000
stack
page read and write
4051000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
63E000
heap
page read and write
C6B000
trusted library allocation
page execute and read and write
3070000
trusted library allocation
page read and write
4B4A000
heap
page read and write
6983000
trusted library allocation
page read and write
6207000
trusted library allocation
page read and write
28C7000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
63E000
heap
page read and write
6270000
trusted library allocation
page execute and read and write
5686000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
7EEA0000
direct allocation
page read and write
13F0000
heap
page read and write
3177000
heap
page read and write
4E80000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
20DD4000
direct allocation
page read and write
D00000
heap
page read and write
639D000
trusted library allocation
page read and write
676B000
stack
page read and write
20C91000
direct allocation
page read and write
6E0A000
trusted library allocation
page read and write
491E000
trusted library allocation
page read and write
22300000
heap
page read and write
6FBD000
trusted library allocation
page read and write
88F000
stack
page read and write
990000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
7E190000
direct allocation
page read and write
4657000
heap
page read and write
2E32000
direct allocation
page read and write
10063000
unkown
page execute and read and write
6AEB000
trusted library allocation
page read and write
AE3000
trusted library allocation
page execute and read and write
6F69000
trusted library allocation
page read and write
FFE000
stack
page read and write
A73000
heap
page read and write
3A37000
trusted library allocation
page read and write
291E000
trusted library allocation
page read and write
975000
heap
page read and write
69A6000
trusted library allocation
page read and write
6F5A000
trusted library allocation
page read and write
6EF5000
trusted library allocation
page read and write
7F370000
direct allocation
page read and write
69DA000
trusted library allocation
page read and write
7DBE0000
direct allocation
page read and write
4A20000
direct allocation
page read and write
D65000
heap
page read and write
508D000
stack
page read and write
2BD60000
direct allocation
page read and write
5E6E000
stack
page read and write
EB0000
trusted library allocation
page read and write
7DC0F000
direct allocation
page read and write
6A87000
trusted library allocation
page read and write
7F8D0000
direct allocation
page read and write
56E5000
trusted library allocation
page read and write
560000
heap
page read and write
2B38000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
4D1E000
stack
page read and write
6ED7000
trusted library allocation
page read and write
4D4C000
stack
page read and write
2179E000
stack
page read and write
20D33000
direct allocation
page read and write
6943000
trusted library allocation
page read and write
608E000
stack
page read and write
6A6B000
trusted library allocation
page read and write
2290000
direct allocation
page read and write
2BD60000
direct allocation
page read and write
A77000
trusted library allocation
page execute and read and write
6A49000
trusted library allocation
page read and write
6B5C000
trusted library allocation
page read and write
E4B000
trusted library allocation
page execute and read and write
6BDF000
trusted library allocation
page read and write
7EA70000
direct allocation
page read and write
7FC40000
direct allocation
page read and write
C80000
trusted library allocation
page read and write
6975000
trusted library allocation
page read and write
68C000
heap
page read and write
6FF3000
trusted library allocation
page read and write
4931000
trusted library allocation
page read and write
6F85000
trusted library allocation
page read and write
8420000
trusted library allocation
page read and write
4B6D000
heap
page read and write
C90000
heap
page read and write
CCE000
stack
page read and write
D15000
heap
page read and write
7C10000
heap
page read and write
71B7000
trusted library allocation
page read and write
25A2000
trusted library allocation
page read and write
967000
unkown
page execute and read and write
7E07F000
direct allocation
page read and write
502E000
stack
page read and write
4E64000
trusted library allocation
page read and write
4B5E000
stack
page read and write
7209000
trusted library allocation
page read and write
473D000
stack
page read and write
210DE000
stack
page read and write
987000
unkown
page execute and read and write
5188000
trusted library allocation
page read and write
50DE000
stack
page read and write
895000
heap
page read and write
5D4E000
stack
page read and write
20D48000
direct allocation
page read and write
A3B000
stack
page read and write
719000
unkown
page execute and read and write
CD7000
heap
page read and write
2229D000
heap
page read and write
6B32000
trusted library allocation
page read and write
2228F000
heap
page read and write
7E280000
direct allocation
page read and write
6A19000
trusted library allocation
page read and write
2BD70000
direct allocation
page read and write
22AD000
direct allocation
page read and write
6A5E000
trusted library allocation
page read and write
6AB3000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
70A4000
trusted library allocation
page read and write
546D000
stack
page read and write
21750000
remote allocation
page read and write
33D1000
trusted library allocation
page read and write
719000
unkown
page execute and read and write
65B0000
trusted library allocation
page read and write
7DFA0000
direct allocation
page read and write
6F32000
trusted library allocation
page read and write
6EDF000
trusted library allocation
page read and write
8AE0000
heap
page read and write
401000
unkown
page execute read
2600000
trusted library allocation
page read and write
715D000
trusted library allocation
page read and write
5D72000
heap
page read and write
3070000
heap
page execute and read and write
70F9000
trusted library allocation
page read and write
4AA0000
heap
page read and write
4F8D000
stack
page read and write
694B000
trusted library allocation
page read and write
22C3000
direct allocation
page read and write
7D5F0000
direct allocation
page read and write
2847000
trusted library allocation
page execute and read and write
451E000
stack
page read and write
4A9D000
stack
page read and write
215CD000
stack
page read and write
214CE000
stack
page read and write
6ED1000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
4DC4000
heap
page read and write
5D61000
heap
page read and write
23DF000
stack
page read and write
60E0000
trusted library allocation
page execute and read and write
7D5A0000
direct allocation
page read and write
2BD60000
direct allocation
page read and write
159E000
heap
page read and write
465B000
heap
page read and write
7140000
trusted library allocation
page read and write
2811000
trusted library allocation
page read and write
69C0000
trusted library allocation
page read and write
2146E000
stack
page read and write
6AF3000
trusted library allocation
page read and write
77ED000
stack
page read and write
2933000
heap
page read and write
6F1E000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
25F0000
trusted library allocation
page read and write
5F4E000
stack
page read and write
2A0E000
heap
page read and write
650E000
stack
page read and write
25E1000
trusted library allocation
page read and write
2B64000
heap
page read and write
1E5000
heap
page read and write
6BF0000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
20E3C000
stack
page read and write
6C34000
trusted library allocation
page read and write
5070000
heap
page read and write
6AED000
trusted library allocation
page read and write
52DE000
trusted library allocation
page read and write
6A5A000
trusted library allocation
page read and write
5C1D000
stack
page read and write
4AB5000
trusted library allocation
page read and write
6D0E000
stack
page read and write
244A000
trusted library allocation
page read and write
2BF10000
direct allocation
page read and write
5F4C000
stack
page read and write
2860000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
60DF000
stack
page read and write
8410000
trusted library allocation
page read and write
6A1B000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
D0F000
heap
page read and write
2C2C000
heap
page read and write
22200000
heap
page read and write
63E000
heap
page read and write
7DC60000
direct allocation
page read and write
4E4E000
stack
page read and write
8B0D000
stack
page read and write
38F9000
trusted library allocation
page read and write
2B36000
trusted library allocation
page read and write
4980000
heap
page read and write
7067000
trusted library allocation
page read and write
61C000
heap
page read and write
AC0000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
289C000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
6F03000
trusted library allocation
page read and write
157D000
trusted library allocation
page execute and read and write
D87000
heap
page read and write
E20000
trusted library allocation
page read and write
4F34000
trusted library allocation
page read and write
6A23000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
31B000
stack
page read and write
2C4F000
stack
page read and write
4F95000
trusted library allocation
page read and write
416000
unkown
page readonly
EC0000
trusted library allocation
page read and write
C23000
trusted library allocation
page execute and read and write
4F70000
trusted library allocation
page read and write
A5D000
trusted library allocation
page execute and read and write
7167000
trusted library allocation
page read and write
4E5E000
stack
page read and write
7DC50000
direct allocation
page read and write
401000
unkown
page execute read
210CE000
stack
page read and write
416000
unkown
page readonly
2275000
direct allocation
page read and write
22C3000
direct allocation
page read and write
59C000
heap
page read and write
5970000
heap
page read and write
463A000
heap
page read and write
8A9000
unkown
page execute and read and write
4189000
trusted library allocation
page read and write
8FE000
stack
page read and write
4BC6000
heap
page read and write
6F22000
trusted library allocation
page read and write
6994000
trusted library allocation
page read and write
61CF000
stack
page read and write
3DD000
stack
page read and write
4D31000
trusted library allocation
page read and write
6BCC000
trusted library allocation
page read and write
2170E000
stack
page read and write
594F000
stack
page read and write
5F83000
trusted library allocation
page read and write
45AE000
stack
page read and write
2380000
heap
page read and write
84F6000
heap
page read and write
26A8000
trusted library allocation
page read and write
22E4000
direct allocation
page read and write
7DEFA000
direct allocation
page read and write
6393000
trusted library allocation
page read and write
455F000
stack
page read and write
691C000
trusted library allocation
page read and write
A79000
heap
page read and write
7D909000
direct allocation
page read and write
5980000
heap
page read and write
658E000
stack
page read and write
659C000
stack
page read and write
71AD000
trusted library allocation
page read and write
699F000
trusted library allocation
page read and write
884000
trusted library allocation
page read and write
2BCE0000
direct allocation
page read and write
4DC0000
trusted library allocation
page read and write
4181000
trusted library allocation
page read and write
164E000
heap
page read and write
FD0000
heap
page read and write
D6E000
unkown
page read and write
63F000
heap
page read and write
4B54000
heap
page read and write
65C3000
trusted library allocation
page read and write
5C4E000
stack
page read and write
8521000
heap
page read and write
AC5000
heap
page read and write
B5E000
heap
page read and write
2B26000
trusted library allocation
page read and write
890000
heap
page read and write
4A3E000
stack
page read and write
2BCE0000
direct allocation
page read and write
23CE000
stack
page read and write
848C000
heap
page read and write
2871000
trusted library allocation
page read and write
9FF000
unkown
page read and write
4B54000
heap
page read and write
4F36000
trusted library allocation
page read and write
5670000
trusted library allocation
page execute and read and write
88AF000
stack
page read and write
1693000
trusted library allocation
page execute and read and write
2661000
trusted library allocation
page read and write
E47000
trusted library allocation
page execute and read and write
B93000
heap
page read and write
2AE6000
trusted library allocation
page read and write
7DC10000
direct allocation
page read and write
6A36000
trusted library allocation
page read and write
4956000
trusted library allocation
page read and write
638E000
stack
page read and write
7ECD0000
direct allocation
page read and write
240000
unkown
page readonly
625000
heap
page read and write
58C000
unkown
page execute and read and write
31EA000
trusted library allocation
page read and write
495D000
stack
page read and write
75D6000
heap
page read and write
5692000
trusted library allocation
page read and write
DFE000
stack
page read and write
6E7E000
trusted library allocation
page read and write
7EEF0000
direct allocation
page read and write
6870000
trusted library allocation
page read and write
1550000
heap
page read and write
624000
heap
page read and write
6AB1000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
7DBE0000
direct allocation
page read and write
6979000
trusted library allocation
page read and write
7D6E0000
direct allocation
page read and write
6C2C000
trusted library allocation
page read and write
9D8000
stack
page read and write
7EEC0000
direct allocation
page read and write
58E000
heap
page read and write
6A92000
trusted library allocation
page read and write
4A5E000
stack
page read and write
68DB000
trusted library allocation
page read and write
578000
heap
page read and write
63F000
heap
page read and write
2DF5000
direct allocation
page read and write
2137E000
stack
page read and write
20DDC000
direct allocation
page read and write
CC0000
trusted library allocation
page execute and read and write
882000
heap
page read and write
3689000
trusted library allocation
page read and write
4B6D000
heap
page read and write
2138E000
stack
page read and write
4960000
trusted library allocation
page read and write
3657000
trusted library allocation
page read and write
56F4000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
6C80000
trusted library allocation
page read and write
7E047000
direct allocation
page read and write
7E30F000
direct allocation
page read and write
6A52000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
4FAF000
stack
page read and write
6A96000
trusted library allocation
page read and write
704C000
trusted library allocation
page read and write
F80000
heap
page read and write
8400000
trusted library allocation
page read and write
4B30000
heap
page read and write
4E1F000
stack
page read and write
76EE000
stack
page read and write
5F6000
heap
page read and write
4E70000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
609E000
stack
page read and write
6F8000
stack
page read and write
5F8E000
stack
page read and write
20E3A000
stack
page read and write
20F3E000
stack
page execute and read and write
E70000
heap
page read and write
2830000
trusted library allocation
page read and write
29AC000
stack
page read and write
7069000
trusted library allocation
page read and write
285C000
trusted library allocation
page read and write
6E08000
trusted library allocation
page read and write
20F7F000
stack
page read and write
60F000
heap
page read and write
8B8F000
stack
page read and write
A97000
heap
page read and write
624000
heap
page read and write
69AE000
trusted library allocation
page read and write
7D870000
direct allocation
page read and write
26ED000
trusted library allocation
page read and write
6BF6000
trusted library allocation
page read and write
2223D000
heap
page read and write
82B0000
heap
page read and write
9B000
stack
page read and write
337F000
stack
page read and write
FF0000
heap
page read and write
2BD60000
direct allocation
page read and write
2C50000
heap
page read and write
6AE7000
trusted library allocation
page read and write
21B29000
heap
page read and write
6AA4000
trusted library allocation
page read and write
6F8F000
trusted library allocation
page read and write
740000
heap
page read and write
82E0000
trusted library allocation
page read and write
22B2000
direct allocation
page read and write
F40000
heap
page read and write
A62000
trusted library allocation
page read and write
86C0000
trusted library allocation
page read and write
7018000
trusted library allocation
page read and write
707C000
trusted library allocation
page read and write
7D457000
direct allocation
page read and write
7E840000
direct allocation
page read and write
704A000
trusted library allocation
page read and write
566B000
trusted library allocation
page read and write
7148000
trusted library allocation
page read and write
6F58000
trusted library allocation
page read and write
26C0000
heap
page read and write
6B4B000
trusted library allocation
page read and write
4BAA000
heap
page read and write
68D5000
trusted library allocation
page read and write
6C21000
trusted library allocation
page read and write
4B90000
heap
page read and write
20D2C000
direct allocation
page read and write
8A7D000
stack
page read and write
9B7000
trusted library allocation
page execute and read and write
7EDD0000
direct allocation
page read and write
50EE000
stack
page read and write
38B9000
trusted library allocation
page read and write
4F32000
trusted library allocation
page read and write
3DE000
stack
page read and write
20D60000
direct allocation
page read and write
2891000
trusted library allocation
page read and write
629C000
stack
page read and write
278E000
trusted library allocation
page read and write
6A4B000
trusted library allocation
page read and write
6C16000
trusted library allocation
page read and write
B67000
unkown
page execute and read and write
F30000
trusted library allocation
page read and write
A66000
trusted library allocation
page execute and read and write
70FD000
trusted library allocation
page read and write
4BCD000
heap
page read and write
2BD60000
direct allocation
page read and write
1570000
trusted library allocation
page read and write
2831000
trusted library allocation
page read and write
4B99000
heap
page read and write
720000
unkown
page execute and read and write
7FC60000
direct allocation
page read and write
6AA6000
trusted library allocation
page read and write
61C6000
heap
page read and write
2861000
trusted library allocation
page read and write
9CF000
stack
page read and write
75F7000
heap
page read and write
C65000
trusted library allocation
page execute and read and write
7E280000
direct allocation
page read and write
78E000
stack
page read and write
7FB80000
trusted library allocation
page execute and read and write
719000
unkown
page execute and read and write
634E000
stack
page read and write
2443000
heap
page read and write
6A0B000
trusted library allocation
page read and write
ED4000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
8ACE000
stack
page read and write
4900000
trusted library allocation
page read and write
6E43000
trusted library allocation
page read and write
262E000
stack
page read and write
478000
unkown
page read and write
4656000
heap
page read and write
25F5000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
A90000
heap
page read and write
28DD000
trusted library allocation
page read and write
7FB60000
direct allocation
page read and write
2FA0000
heap
page read and write
9B000
stack
page read and write
63AC000
stack
page read and write
7EE7F000
direct allocation
page read and write
C4F000
stack
page read and write
830000
heap
page read and write
6E5000
heap
page read and write
714A000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
962000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
6E47000
trusted library allocation
page read and write
2AF3000
trusted library allocation
page read and write
2120000
heap
page read and write
604E000
stack
page read and write
83D0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
58C000
unkown
page execute and read and write
6C7C000
trusted library allocation
page read and write
2E60000
direct allocation
page readonly
A7B000
trusted library allocation
page execute and read and write
EB0000
heap
page read and write
22DD000
direct allocation
page read and write
860000
heap
page read and write
E3F000
stack
page read and write
F6F000
stack
page read and write
4D1B000
trusted library allocation
page read and write
719A000
trusted library allocation
page read and write
6F91000
trusted library allocation
page read and write
6A21000
trusted library allocation
page read and write
83B000
stack
page read and write
6E0C000
trusted library allocation
page read and write
25D1000
trusted library allocation
page read and write
6C7E000
trusted library allocation
page read and write
491B000
trusted library allocation
page read and write
9DE000
stack
page read and write
5588000
trusted library allocation
page read and write
2DDE000
direct allocation
page read and write
14FE000
stack
page read and write
68D9000
trusted library allocation
page read and write
7D780000
direct allocation
page read and write
2690000
trusted library allocation
page read and write
47E0000
heap
page read and write
2E22000
direct allocation
page read and write
96A000
trusted library allocation
page execute and read and write
71B1000
trusted library allocation
page read and write
4BB5000
heap
page read and write
51D0000
heap
page read and write
3661000
trusted library allocation
page read and write
63F000
heap
page read and write
61FD000
trusted library allocation
page read and write
6C0F000
trusted library allocation
page read and write
26AD000
trusted library allocation
page read and write
EDD000
trusted library allocation
page execute and read and write
288F000
stack
page read and write
4BCD000
heap
page read and write
C19000
heap
page read and write
7BE000
stack
page read and write
400000
unkown
page execute and read and write
4954000
trusted library allocation
page read and write
71BB000
trusted library allocation
page read and write
6B5E000
trusted library allocation
page read and write
AE0000
unkown
page execute and read and write
7159000
trusted library allocation
page read and write
7022000
trusted library allocation
page read and write
9F0000
heap
page read and write
33EF000
trusted library allocation
page read and write
68EC000
trusted library allocation
page read and write
A31000
heap
page read and write
930000
trusted library allocation
page read and write
ED3000
trusted library allocation
page execute and read and write
6BB7000
trusted library allocation
page read and write
6985000
trusted library allocation
page read and write
36C8000
trusted library allocation
page read and write
4E95000
trusted library allocation
page read and write
7012000
trusted library allocation
page read and write
2813000
trusted library allocation
page read and write
708D000
trusted library allocation
page read and write
28D5000
trusted library allocation
page read and write
6F0B000
trusted library allocation
page read and write
5D55000
trusted library allocation
page read and write
2740000
heap
page execute and read and write
2F3A000
trusted library allocation
page execute and read and write
4B4C000
heap
page read and write
560000
heap
page read and write
6E68000
trusted library allocation
page read and write
817000
heap
page read and write
214CE000
stack
page read and write
B87000
heap
page read and write
82DD000
trusted library allocation
page read and write
2301000
direct allocation
page read and write
FF0000
heap
page read and write
6E2E000
trusted library allocation
page read and write
2A6F000
trusted library allocation
page read and write
700C000
trusted library allocation
page read and write
20F3A000
stack
page read and write
465B000
heap
page read and write
2236B000
heap
page read and write
E60000
heap
page read and write
13D0000
heap
page read and write
741E000
stack
page read and write
4BCB000
heap
page read and write
7DB80000
direct allocation
page read and write
CD7000
heap
page read and write
7540000
trusted library allocation
page read and write
713C000
trusted library allocation
page read and write
6B71000
trusted library allocation
page read and write
3148000
heap
page read and write
2BC80000
direct allocation
page read and write
3677000
trusted library allocation
page read and write
A44000
trusted library allocation
page read and write
6B95000
trusted library allocation
page read and write
EB0000
trusted library section
page read and write
2ABF000
trusted library allocation
page read and write
4D40000
heap
page read and write
6F05000
trusted library allocation
page read and write
6EA6000
trusted library allocation
page read and write
1573000
trusted library allocation
page execute and read and write
7E30F000
direct allocation
page read and write
A20000
heap
page read and write
5E2000
heap
page read and write
6410000
trusted library allocation
page execute and read and write
69DC000
trusted library allocation
page read and write
7FC38000
trusted library allocation
page execute and read and write
2D4E000
heap
page read and write
710E000
trusted library allocation
page read and write
6A01000
trusted library allocation
page read and write
7138000
trusted library allocation
page read and write
6C36000
trusted library allocation
page read and write
302C000
stack
page read and write
2FDE000
direct allocation
page execute and read and write
990000
heap
page read and write
5DCF000
stack
page read and write
6C30000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
215AF000
stack
page read and write
E5E000
stack
page read and write
7DF20000
direct allocation
page read and write
77F0000
trusted library allocation
page read and write
8B0F000
stack
page read and write
6C2E000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
242E000
stack
page read and write
5D10000
heap
page read and write
32F0000
heap
page read and write
3555000
trusted library allocation
page read and write
254E000
stack
page read and write
8823000
trusted library allocation
page read and write
479000
unkown
page execute and read and write
22201000
heap
page read and write
590000
unkown
page execute and read and write
268E000
stack
page read and write
50FE000
stack
page read and write
6F28000
trusted library allocation
page read and write
63E000
heap
page read and write
5A4F000
stack
page read and write
4E6E000
stack
page read and write
2FE0000
heap
page readonly
6AE5000
trusted library allocation
page read and write
4F4E000
trusted library allocation
page read and write
7EEA0000
direct allocation
page read and write
7EF0F000
direct allocation
page read and write
6A69000
trusted library allocation
page read and write
535E000
stack
page read and write
4BC6000
heap
page read and write
4EAE000
stack
page read and write
D25000
heap
page read and write
2AD1000
trusted library allocation
page read and write
7DAB0000
direct allocation
page read and write
523E000
stack
page read and write
6F56000
trusted library allocation
page read and write
CBE000
heap
page read and write
CA8000
heap
page read and write
5050000
direct allocation
page read and write
53D000
stack
page read and write
4FB0000
direct allocation
page read and write
7DC90000
direct allocation
page read and write
7DCCF000
direct allocation
page read and write
4B65000
heap
page read and write
58C000
unkown
page execute and read and write
B0A000
trusted library allocation
page execute and read and write
70A2000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
7EE50000
direct allocation
page read and write
54EE000
stack
page read and write
7DF87000
direct allocation
page read and write
57AA000
heap
page read and write
69A2000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
27DD000
stack
page read and write
22C0000
direct allocation
page read and write
972000
trusted library allocation
page read and write
6A29000
trusted library allocation
page read and write
2BD60000
direct allocation
page read and write
6ED5000
trusted library allocation
page read and write
937000
stack
page read and write
290A000
trusted library allocation
page read and write
2A0E000
heap
page read and write
6FAF000
trusted library allocation
page read and write
20D41000
direct allocation
page read and write
56D3000
trusted library allocation
page read and write
69B6000
trusted library allocation
page read and write
6F07000
trusted library allocation
page read and write
7E220000
direct allocation
page read and write
4FA8000
trusted library allocation
page read and write
5BCF000
stack
page read and write
7E30F000
direct allocation
page read and write
6E0000
heap
page read and write
762C000
heap
page read and write
697D000
trusted library allocation
page read and write
2F4B000
trusted library allocation
page execute and read and write
7EF60000
direct allocation
page read and write
22FA000
direct allocation
page read and write
7EA20000
direct allocation
page read and write
4D10000
trusted library allocation
page read and write
23CE000
stack
page read and write
7F0000
heap
page read and write
4628000
heap
page read and write
61F0000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
3D0000
heap
page read and write
6991000
trusted library allocation
page read and write
FC0000
trusted library allocation
page execute and read and write
987000
unkown
page execute and read and write
6BF2000
trusted library allocation
page read and write
6E4D000
trusted library allocation
page read and write
7644000
heap
page read and write
4910000
trusted library allocation
page read and write
A2E000
stack
page read and write
6F24000
trusted library allocation
page read and write
2FD0000
heap
page read and write
6EE1000
trusted library allocation
page read and write
390000
heap
page read and write
22A03000
heap
page read and write
7EEB0000
direct allocation
page read and write
31B1000
heap
page read and write
20F4F000
stack
page read and write
6F7A000
trusted library allocation
page read and write
8484000
heap
page read and write
7EE60000
direct allocation
page read and write
25FA000
trusted library allocation
page read and write
2F36000
trusted library allocation
page execute and read and write
7D3D0000
direct allocation
page read and write
A6A000
trusted library allocation
page execute and read and write
7E190000
direct allocation
page read and write
28AE000
stack
page read and write
625000
heap
page read and write
7063000
trusted library allocation
page read and write
6960000
trusted library allocation
page read and write
68C0000
trusted library allocation
page execute and read and write
625000
heap
page read and write
626000
heap
page read and write
23F0000
heap
page read and write
4AB0000
trusted library allocation
page read and write
711F000
trusted library allocation
page read and write
4F44000
trusted library allocation
page read and write
886E000
stack
page read and write
2226000
direct allocation
page read and write
20D23000
direct allocation
page read and write
63A7000
trusted library allocation
page read and write
6A13000
trusted library allocation
page read and write
4C10000
heap
page read and write
218DE000
stack
page read and write
7EEF0000
direct allocation
page read and write
8AC000
heap
page read and write
895000
heap
page read and write
AED000
trusted library allocation
page execute and read and write
2BB7000
trusted library allocation
page read and write
8A9000
unkown
page execute and read and write
There are 2256 hidden memdumps, click here to show them.