IOC Report
Payment Advice.exe

loading gif

Files

File Path
Type
Category
Malicious
Payment Advice.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp6619.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\sFPEKzHsLkYZIz.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BjTxJte.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment Advice.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\sFPEKzHsLkYZIz.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0xbngyaq.g42.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_33p3wgzx.dln.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3txy3oys.blp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fm2dvqgd.hcl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_keru10gn.pnm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m3xa4heo.qmr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qzxa52gb.ecg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uklbcpkl.dko.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp7ACA.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpA082.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpC03F.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\sFPEKzHsLkYZIz.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payment Advice.exe
"C:\Users\user\Desktop\Payment Advice.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment Advice.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\sFPEKzHsLkYZIz.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sFPEKzHsLkYZIz" /XML "C:\Users\user\AppData\Local\Temp\tmp6619.tmp"
malicious
C:\Users\user\Desktop\Payment Advice.exe
"C:\Users\user\Desktop\Payment Advice.exe"
malicious
C:\Users\user\AppData\Roaming\sFPEKzHsLkYZIz.exe
C:\Users\user\AppData\Roaming\sFPEKzHsLkYZIz.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sFPEKzHsLkYZIz" /XML "C:\Users\user\AppData\Local\Temp\tmp7ACA.tmp"
malicious
C:\Users\user\AppData\Roaming\sFPEKzHsLkYZIz.exe
"C:\Users\user\AppData\Roaming\sFPEKzHsLkYZIz.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sFPEKzHsLkYZIz" /XML "C:\Users\user\AppData\Local\Temp\tmpA082.tmp"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sFPEKzHsLkYZIz" /XML "C:\Users\user\AppData\Local\Temp\tmpC03F.tmp"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://mail.seawaysfreight-bd.com
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://api.ipify.org/t
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://seawaysfreight-bd.com
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://api.ipify.org
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://r3.i.lencr.org/09
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://r3.o.lencr.org0
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.seawaysfreight-bd.com
unknown
malicious
seawaysfreight-bd.com
94.100.26.91
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
104.26.13.205
api.ipify.org
United States
94.100.26.91
seawaysfreight-bd.com
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment Advice_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
BjTxJte
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sFPEKzHsLkYZIz_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
FileDirectory
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D5C000
trusted library allocation
page read and write
malicious
41C5000
trusted library allocation
page read and write
malicious
292B000
trusted library allocation
page read and write
malicious
28E1000
trusted library allocation
page read and write
malicious
2D31000
trusted library allocation
page read and write
malicious
3CE4000
trusted library allocation
page read and write
malicious
4E2A000
trusted library allocation
page read and write
malicious
2DD1000
trusted library allocation
page read and write
malicious
2D64000
trusted library allocation
page read and write
malicious
2D9B000
trusted library allocation
page read and write
malicious
431000
remote allocation
page execute and read and write
malicious
2DFC000
trusted library allocation
page read and write
malicious
4C49000
trusted library allocation
page read and write
malicious
7427000
trusted library allocation
page read and write
75F6000
trusted library allocation
page read and write
71B3000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
6870000
heap
page read and write
73C6000
trusted library allocation
page read and write
543C000
stack
page read and write
3E3B000
trusted library allocation
page read and write
75D3000
trusted library allocation
page read and write
103B000
trusted library allocation
page execute and read and write
651E000
stack
page read and write
720A000
heap
page read and write
6DF0000
trusted library allocation
page read and write
2EB3000
trusted library allocation
page read and write
741F000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
7C4000
trusted library allocation
page read and write
74EF000
trusted library allocation
page read and write
74F4000
trusted library allocation
page read and write
75E5000
trusted library allocation
page read and write
1190000
heap
page read and write
5260000
trusted library allocation
page read and write
401B000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
BB0000
heap
page read and write
608E000
stack
page read and write
4656000
trusted library allocation
page read and write
755B000
trusted library allocation
page read and write
3F0B000
trusted library allocation
page read and write
3441000
trusted library allocation
page read and write
74DE000
trusted library allocation
page read and write
750B000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
7349000
trusted library allocation
page read and write
3D8C000
trusted library allocation
page read and write
3F7B000
trusted library allocation
page read and write
74BA000
trusted library allocation
page read and write
2C9E000
stack
page read and write
12C5000
heap
page read and write
52C0000
trusted library section
page readonly
4DAD000
heap
page read and write
4EAB000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
CDE000
stack
page read and write
6860000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
4CFE000
stack
page read and write
BA0000
heap
page read and write
25CE000
stack
page read and write
6B9E000
stack
page read and write
611D000
stack
page read and write
313C000
trusted library allocation
page read and write
2DC5000
trusted library allocation
page read and write
51A0000
heap
page read and write
512B000
trusted library allocation
page read and write
72AD000
trusted library allocation
page read and write
7692000
trusted library allocation
page read and write
3F35000
trusted library allocation
page read and write
73FB000
trusted library allocation
page read and write
4DD6000
trusted library allocation
page read and write
5B8B000
stack
page read and write
EC5000
trusted library allocation
page execute and read and write
E72E000
stack
page read and write
94FB000
heap
page read and write
737A000
trusted library allocation
page read and write
69BC000
stack
page read and write
49BF000
stack
page read and write
606C000
stack
page read and write
67B7000
trusted library allocation
page read and write
7436000
trusted library allocation
page read and write
5E90000
trusted library allocation
page read and write
4D70000
heap
page read and write
72B0000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
577D000
heap
page read and write
730A000
trusted library allocation
page read and write
170D000
trusted library allocation
page execute and read and write
6877000
trusted library allocation
page read and write
7359000
trusted library allocation
page read and write
FA0000
heap
page read and write
E0BE000
stack
page read and write
5360000
heap
page read and write
75EC000
trusted library allocation
page read and write
515E000
stack
page read and write
72DF000
trusted library allocation
page read and write
1170000
heap
page read and write
2D2E000
trusted library allocation
page read and write
2C90000
heap
page read and write
4EC1000
trusted library allocation
page read and write
302C000
trusted library allocation
page read and write
410000
remote allocation
page execute and read and write
DBFE000
stack
page read and write
3DEB000
trusted library allocation
page read and write
104C000
stack
page read and write
F80000
trusted library allocation
page execute and read and write
756A000
trusted library allocation
page read and write
527C000
stack
page read and write
7318000
trusted library allocation
page read and write
592D000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
74A7000
trusted library allocation
page read and write
5146000
trusted library allocation
page read and write
7366000
trusted library allocation
page read and write
968000
stack
page read and write
6010000
trusted library allocation
page execute and read and write
5500000
heap
page read and write
3E5B000
trusted library allocation
page read and write
73B5000
trusted library allocation
page read and write
DE5000
heap
page read and write
7527000
trusted library allocation
page read and write
C68000
heap
page read and write
E94000
trusted library allocation
page read and write
3E26000
trusted library allocation
page read and write
2B56000
trusted library allocation
page read and write
1133000
trusted library allocation
page execute and read and write
10C5000
trusted library allocation
page execute and read and write
9F7E000
stack
page read and write
108D000
trusted library allocation
page execute and read and write
76B9000
trusted library allocation
page read and write
7554000
trusted library allocation
page read and write
456B000
trusted library allocation
page read and write
418A000
trusted library allocation
page read and write
4DA0000
heap
page read and write
112E000
stack
page read and write
13D7000
heap
page read and write
74E6000
trusted library allocation
page read and write
148E000
stack
page read and write
5570000
heap
page read and write
866000
heap
page read and write
38B9000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
56BE000
stack
page read and write
3F8B000
trusted library allocation
page read and write
6190000
heap
page read and write
7D8000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
12F0000
heap
page read and write
74E6000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
7217000
trusted library allocation
page read and write
2B90000
heap
page read and write
73C8000
trusted library allocation
page read and write
640D000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
661E000
stack
page read and write
14B0000
trusted library allocation
page read and write
4EA4000
heap
page read and write
756F000
trusted library allocation
page read and write
62B8000
heap
page read and write
7574000
trusted library allocation
page read and write
13D0000
heap
page read and write
559E000
heap
page read and write
60BA000
heap
page read and write
74E9000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
75D6000
trusted library allocation
page read and write
6BEC000
stack
page read and write
735E000
stack
page read and write
5570000
trusted library allocation
page read and write
75F7000
trusted library allocation
page read and write
739D000
trusted library allocation
page read and write
74F2000
trusted library allocation
page read and write
568E000
stack
page read and write
12E0000
trusted library allocation
page execute and read and write
3037000
trusted library allocation
page read and write
7C0000
trusted library allocation
page read and write
E33C000
stack
page read and write
5D40000
heap
page read and write
77A0000
trusted library allocation
page execute and read and write
4DC2000
trusted library allocation
page read and write
560B000
trusted library allocation
page read and write
2B9000
stack
page read and write
7350000
trusted library allocation
page read and write
4BD5000
trusted library allocation
page read and write
762A000
trusted library allocation
page read and write
4F8C000
stack
page read and write
E46E000
stack
page read and write
220E000
stack
page read and write
B80000
trusted library allocation
page read and write
73BB000
trusted library allocation
page read and write
3DBC000
trusted library allocation
page read and write
6820000
trusted library allocation
page execute and read and write
D25000
heap
page read and write
7273000
trusted library allocation
page read and write
72B9000
trusted library allocation
page read and write
75DD000
trusted library allocation
page read and write
73D9000
trusted library allocation
page read and write
74ED000
trusted library allocation
page read and write
ECB000
trusted library allocation
page execute and read and write
5FDC000
stack
page read and write
1050000
trusted library allocation
page read and write
73FF000
trusted library allocation
page read and write
75C5000
trusted library allocation
page read and write
5779000
heap
page read and write
5753000
heap
page read and write
407B000
trusted library allocation
page read and write
6459000
heap
page read and write
F17000
trusted library allocation
page execute and read and write
5250000
trusted library allocation
page read and write
C6B000
heap
page read and write
51BB000
trusted library allocation
page read and write
6A3B000
trusted library allocation
page read and write
4DDE000
stack
page read and write
2D30000
heap
page read and write
6A70000
heap
page read and write
DD7000
heap
page read and write
50C5000
heap
page read and write
2E7E000
trusted library allocation
page read and write
E00000
heap
page read and write
63B3000
heap
page read and write
27DA000
heap
page read and write
2F20000
heap
page read and write
67AD000
trusted library allocation
page read and write
50B1000
trusted library allocation
page read and write
736E000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
26A0000
heap
page read and write
101B000
heap
page read and write
DA8000
heap
page read and write
1727000
heap
page read and write
2398000
trusted library allocation
page read and write
7408000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page execute and read and write
5850000
trusted library allocation
page read and write
D8E000
stack
page read and write
57E0000
trusted library allocation
page read and write
7707000
trusted library allocation
page read and write
56DC000
stack
page read and write
154F000
heap
page read and write
1310000
heap
page read and write
2B7B000
stack
page read and write
2C40000
trusted library allocation
page read and write
6886000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
75BE000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2D3E000
trusted library allocation
page read and write
51D6000
trusted library allocation
page read and write
4A2E000
stack
page read and write
E4AD000
stack
page read and write
7223000
trusted library allocation
page read and write
57E0000
trusted library section
page readonly
73AF000
trusted library allocation
page read and write
5F1E000
stack
page read and write
2EAB000
trusted library allocation
page read and write
10AB000
stack
page read and write
74B8000
trusted library allocation
page read and write
10CB000
trusted library allocation
page execute and read and write
7421000
trusted library allocation
page read and write
71C4000
trusted library allocation
page read and write
7348000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
655E000
stack
page read and write
692E000
stack
page read and write
50C0000
heap
page read and write
74F9000
trusted library allocation
page read and write
74CD000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
50E0000
heap
page read and write
61B8000
heap
page read and write
713E000
stack
page read and write
2DFD000
trusted library allocation
page read and write
E4F0000
trusted library allocation
page execute and read and write
F15000
trusted library allocation
page execute and read and write
425000
remote allocation
page execute and read and write
5A1D000
stack
page read and write
F34E000
stack
page read and write
7472000
trusted library allocation
page read and write
6D40000
heap
page read and write
2B80000
trusted library allocation
page read and write
D40000
heap
page read and write
129E000
heap
page read and write
6E10000
heap
page read and write
C3A000
heap
page read and write
42A000
remote allocation
page execute and read and write
7296000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
41F000
remote allocation
page execute and read and write
6662000
heap
page read and write
7FB50000
trusted library allocation
page execute and read and write
6A50000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
6D3C000
stack
page read and write
149E000
stack
page read and write
9210000
heap
page read and write
E90000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
E96E000
stack
page read and write
14D6000
heap
page read and write
3CE1000
trusted library allocation
page read and write
EEB000
stack
page read and write
48DB000
trusted library allocation
page read and write
2C60000
heap
page execute and read and write
4DA0000
heap
page execute and read and write
74B6000
trusted library allocation
page read and write
685E000
stack
page read and write
29AE000
stack
page read and write
1084000
trusted library allocation
page read and write
5805000
heap
page read and write
263D000
stack
page read and write
735E000
trusted library allocation
page read and write
7236000
trusted library allocation
page read and write
73DC000
trusted library allocation
page read and write
135E000
stack
page read and write
7462000
trusted library allocation
page read and write
74B3000
trusted library allocation
page read and write
2FAD000
trusted library allocation
page read and write
1197000
heap
page read and write
763F000
trusted library allocation
page read and write
1162000
trusted library allocation
page read and write
4AC6000
trusted library allocation
page read and write
9E7E000
stack
page read and write
567E000
stack
page read and write
7CD000
trusted library allocation
page execute and read and write
94D4000
heap
page read and write
5A6B000
heap
page read and write
7F2000
trusted library allocation
page read and write
70D0000
heap
page read and write
F77000
heap
page read and write
7474000
trusted library allocation
page read and write
2F5E000
stack
page read and write
6260000
heap
page read and write
4F10000
trusted library allocation
page execute and read and write
73BD000
trusted library allocation
page read and write
620000
heap
page read and write
3DAC000
trusted library allocation
page read and write
403000
remote allocation
page execute and read and write
7581000
trusted library allocation
page read and write
DFBE000
stack
page read and write
76A9000
trusted library allocation
page read and write
4E1B000
heap
page read and write
5A14000
heap
page read and write
6460000
heap
page read and write
318E000
trusted library allocation
page read and write
2927000
trusted library allocation
page read and write
5526000
heap
page read and write
744E000
trusted library allocation
page read and write
5820000
heap
page read and write
5660000
heap
page read and write
747B000
trusted library allocation
page read and write
2D2B000
trusted library allocation
page read and write
2F9C000
trusted library allocation
page read and write
76E9000
trusted library allocation
page read and write
475F000
trusted library allocation
page read and write
307A000
trusted library allocation
page read and write
3ECB000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
A2FC000
stack
page read and write
6624000
heap
page read and write
1194000
heap
page read and write
11A7000
heap
page read and write
B60000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
74BC000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
1003000
trusted library allocation
page execute and read and write
AD0000
heap
page read and write
F4F000
heap
page read and write
6620000
heap
page read and write
72CE000
trusted library allocation
page read and write
E93000
trusted library allocation
page execute and read and write
7390000
trusted library allocation
page read and write
71A8000
trusted library allocation
page read and write
2E15000
trusted library allocation
page read and write
3ECC000
trusted library allocation
page read and write
127C000
stack
page read and write
71C1000
trusted library allocation
page read and write
3E0C000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
30D0000
heap
page execute and read and write
26D0000
heap
page read and write
2770000
trusted library allocation
page read and write
6F20000
heap
page read and write
742C000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
740F000
trusted library allocation
page read and write
7445000
trusted library allocation
page read and write
56DE000
stack
page read and write
7498000
trusted library allocation
page read and write
1315000
heap
page read and write
625E000
stack
page read and write
1000000
trusted library allocation
page read and write
7507000
trusted library allocation
page read and write
FDE000
stack
page read and write
768C000
trusted library allocation
page read and write
743A000
trusted library allocation
page read and write
2EA4000
trusted library allocation
page read and write
7399000
trusted library allocation
page read and write
1318000
trusted library allocation
page read and write
129D000
stack
page read and write
686D000
trusted library allocation
page read and write
EF5000
heap
page read and write
E66F000
stack
page read and write
7259000
trusted library allocation
page read and write
7C3E000
stack
page read and write
1732000
trusted library allocation
page read and write
727000
heap
page read and write
2F23000
trusted library allocation
page read and write
2FC8000
trusted library allocation
page read and write
4C52000
trusted library allocation
page read and write
596E000
stack
page read and write
746E000
trusted library allocation
page read and write
519C000
stack
page read and write
23CE000
stack
page read and write
751D000
trusted library allocation
page read and write
755000
heap
page read and write
2C9D000
trusted library allocation
page read and write
7353000
trusted library allocation
page read and write
2F75000
trusted library allocation
page read and write
47AD000
trusted library allocation
page read and write
2D10000
heap
page execute and read and write
4E63000
heap
page read and write
1018000
trusted library allocation
page read and write
659E000
stack
page read and write
638E000
heap
page read and write
3D09000
trusted library allocation
page read and write
2250000
heap
page read and write
4DE8000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
731C000
trusted library allocation
page read and write
7424000
trusted library allocation
page read and write
EF3C000
stack
page read and write
730D000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
52C5000
trusted library section
page readonly
74FE000
trusted library allocation
page read and write
14A0000
heap
page read and write
CF9000
stack
page read and write
74A1000
trusted library allocation
page read and write
7483000
trusted library allocation
page read and write
7525000
trusted library allocation
page read and write
12DE000
stack
page read and write
7F0000
trusted library allocation
page read and write
737A000
trusted library allocation
page read and write
ED8000
heap
page read and write
5580000
trusted library allocation
page read and write
EBA000
trusted library allocation
page execute and read and write
61A0000
heap
page read and write
72C7000
trusted library allocation
page read and write
74AE000
trusted library allocation
page read and write
545F000
stack
page read and write
2CC0000
heap
page read and write
5120000
trusted library allocation
page read and write
E05000
heap
page read and write
403B000
trusted library allocation
page read and write
759B000
trusted library allocation
page read and write
12EE000
stack
page read and write
745D000
trusted library allocation
page read and write
7561000
trusted library allocation
page read and write
761B000
trusted library allocation
page read and write
5152000
trusted library allocation
page read and write
59AE000
stack
page read and write
51D1000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
114D000
trusted library allocation
page execute and read and write
745D000
trusted library allocation
page read and write
5545000
trusted library allocation
page read and write
68C0000
heap
page read and write
661E000
stack
page read and write
51B4000
trusted library allocation
page read and write
70B0000
heap
page read and write
2929000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
605D000
stack
page read and write
1300000
trusted library allocation
page read and write
5B90000
trusted library section
page readonly
786E000
stack
page read and write
2D81000
trusted library allocation
page read and write
7569000
trusted library allocation
page read and write
2CBC000
stack
page read and write
4EA0000
trusted library allocation
page read and write
CD000
stack
page read and write
31F9000
trusted library allocation
page read and write
1083000
trusted library allocation
page execute and read and write
5860000
heap
page execute and read and write
B9B000
trusted library allocation
page execute and read and write
5B10000
trusted library allocation
page execute and read and write
5300000
heap
page read and write
74B1000
trusted library allocation
page read and write
30AB000
stack
page read and write
73EE000
trusted library allocation
page read and write
756C000
trusted library allocation
page read and write
697E000
stack
page read and write
7645000
trusted library allocation
page read and write
318F000
trusted library allocation
page read and write
30AC000
trusted library allocation
page read and write
73E8000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
73F8000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
102A000
trusted library allocation
page execute and read and write
6480000
trusted library allocation
page execute and read and write
6470000
trusted library allocation
page read and write
68E0000
trusted library allocation
page execute and read and write
E340000
heap
page read and write
4C08000
trusted library allocation
page read and write
4DD1000
trusted library allocation
page read and write
2EBE000
trusted library allocation
page read and write
767A000
trusted library allocation
page read and write
DD0000
heap
page read and write
27FE000
unkown
page read and write
100B000
stack
page read and write
2F38000
trusted library allocation
page read and write
11FF000
stack
page read and write
412000
remote allocation
page execute and read and write
768F000
trusted library allocation
page read and write
73F3000
trusted library allocation
page read and write
52E0000
heap
page read and write
30F8000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
7677000
trusted library allocation
page read and write
485E000
trusted library allocation
page read and write
7566000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
729F000
trusted library allocation
page read and write
2B50000
heap
page read and write
F20C000
stack
page read and write
2E08000
trusted library allocation
page read and write
2D25000
trusted library allocation
page read and write
3D3B000
trusted library allocation
page read and write
4EA4000
trusted library allocation
page read and write
76B6000
trusted library allocation
page read and write
68BD000
stack
page read and write
7663000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
40ED000
trusted library allocation
page read and write
72BF000
trusted library allocation
page read and write
1284000
heap
page read and write
31CD000
trusted library allocation
page read and write
5591000
heap
page read and write
F10B000
stack
page read and write
7477000
trusted library allocation
page read and write
11A0000
heap
page read and write
DABF000
stack
page read and write
10B6000
trusted library allocation
page execute and read and write
32C4000
trusted library allocation
page read and write
7465000
trusted library allocation
page read and write
1716000
trusted library allocation
page read and write
3041000
trusted library allocation
page read and write
309A000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
766D000
trusted library allocation
page read and write
718B000
trusted library allocation
page read and write
1557000
heap
page read and write
7C27000
trusted library allocation
page read and write
558E000
stack
page read and write
6570000
heap
page read and write
133E000
heap
page read and write
754A000
trusted library allocation
page read and write
10A6000
trusted library allocation
page read and write
74C3000
trusted library allocation
page read and write
7750000
trusted library section
page read and write
9D40000
heap
page read and write
6BFC000
stack
page read and write
6EC6000
trusted library allocation
page read and write
7F43000
heap
page read and write
7455000
trusted library allocation
page read and write
72E7000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
9225000
heap
page read and write
743E000
trusted library allocation
page read and write
74D8000
trusted library allocation
page read and write
F1BE000
stack
page read and write
5EC6000
trusted library allocation
page read and write
1022000
trusted library allocation
page read and write
74E8000
trusted library allocation
page read and write
7DD000
trusted library allocation
page execute and read and write
55DE000
stack
page read and write
30B0000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
5400000
trusted library allocation
page read and write
73C5000
trusted library allocation
page read and write
7419000
trusted library allocation
page read and write
4AC0000
heap
page execute and read and write
429000
remote allocation
page execute and read and write
1100000
trusted library allocation
page read and write
728A000
trusted library allocation
page read and write
744B000
trusted library allocation
page read and write
C5C000
heap
page read and write
778B000
trusted library allocation
page read and write
116E000
stack
page read and write
6970000
trusted library allocation
page read and write
724F000
trusted library allocation
page read and write
62DE000
stack
page read and write
75EA000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
7595000
trusted library allocation
page read and write
10EB000
stack
page read and write
7393000
trusted library allocation
page read and write
2EF8000
trusted library allocation
page read and write
3F09000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
579D000
stack
page read and write
9B0000
heap
page read and write
710000
heap
page read and write
2B50000
trusted library allocation
page read and write
60B0000
heap
page read and write
1032000
trusted library allocation
page read and write
7412000
trusted library allocation
page read and write
7448000
trusted library allocation
page read and write
76CA000
trusted library allocation
page read and write
1220000
heap
page read and write
31E3000
trusted library allocation
page read and write
75CE000
trusted library allocation
page read and write
744A000
trusted library allocation
page read and write
632B000
heap
page read and write
9D0000
heap
page read and write
EB2000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
76BE000
trusted library allocation
page read and write
5A2D000
heap
page read and write
115A000
trusted library allocation
page execute and read and write
2E0D000
trusted library allocation
page read and write
5141000
trusted library allocation
page read and write
9C7000
heap
page read and write
E2E000
stack
page read and write
48BE000
stack
page read and write
71CA000
trusted library allocation
page read and write
5034000
trusted library section
page readonly
2D2D000
trusted library allocation
page read and write
700000
heap
page read and write
7537000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
51EC000
stack
page read and write
5210000
heap
page read and write
29ED000
stack
page read and write
C15000
heap
page read and write
51D0000
heap
page read and write
101D000
trusted library allocation
page execute and read and write
750000
heap
page read and write
321F000
trusted library allocation
page read and write
5732000
heap
page read and write
6865000
trusted library allocation
page read and write
75C8000
trusted library allocation
page read and write
73B4000
trusted library allocation
page read and write
838000
heap
page read and write
5240000
trusted library allocation
page execute and read and write
238F000
stack
page read and write
743C000
trusted library allocation
page read and write
2F74000
trusted library allocation
page read and write
1704000
trusted library allocation
page read and write
F07E000
stack
page read and write
5800000
heap
page read and write
929A000
heap
page read and write
7438000
trusted library allocation
page read and write
6272000
heap
page read and write
409000
remote allocation
page execute and read and write
D80000
heap
page read and write
73CD000
trusted library allocation
page read and write
6281000
heap
page read and write
5090000
trusted library allocation
page read and write
47FB000
trusted library allocation
page read and write
1165000
trusted library allocation
page execute and read and write
2EE0000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
224C000
stack
page read and write
2E01000
trusted library allocation
page read and write
3E8C000
trusted library allocation
page read and write
EBED000
stack
page read and write
1310000
heap
page read and write
46DD000
trusted library allocation
page read and write
754C000
trusted library allocation
page read and write
1090000
heap
page read and write
30CC000
trusted library allocation
page read and write
77EE000
stack
page read and write
F50000
trusted library allocation
page execute and read and write
5EA0000
trusted library allocation
page read and write
2F49000
trusted library allocation
page read and write
40F000
remote allocation
page execute and read and write
31FE000
trusted library allocation
page read and write
5A0B000
trusted library allocation
page read and write
7459000
trusted library allocation
page read and write
3E7B000
trusted library allocation
page read and write
7405000
trusted library allocation
page read and write
5E1C000
stack
page read and write
2C3A000
stack
page read and write
3E6C000
trusted library allocation
page read and write
5370000
heap
page execute and read and write
1736000
trusted library allocation
page execute and read and write
7FB40000
trusted library allocation
page execute and read and write
7673000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
7439000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
F04000
heap
page read and write
7518000
trusted library allocation
page read and write
416000
remote allocation
page execute and read and write
74ED000
trusted library allocation
page read and write
7345000
trusted library allocation
page read and write
2B90000
trusted library allocation
page read and write
2F95000
trusted library allocation
page read and write
530C000
stack
page read and write
75FD000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
73BD000
trusted library allocation
page read and write
62A0000
heap
page read and write
3075000
trusted library allocation
page read and write
73E3000
trusted library allocation
page read and write
F0BE000
stack
page read and write
404000
remote allocation
page execute and read and write
CC9000
heap
page read and write
B1E000
stack
page read and write
75B5000
trusted library allocation
page read and write
3E4B000
trusted library allocation
page read and write
50E8000
trusted library allocation
page read and write
7396000
trusted library allocation
page read and write
7329000
trusted library allocation
page read and write
5240000
heap
page read and write
2D16000
trusted library allocation
page read and write
512E000
trusted library allocation
page read and write
173A000
trusted library allocation
page execute and read and write
2EA0000
trusted library allocation
page read and write
CE1000
heap
page read and write
10C0000
trusted library allocation
page read and write
3E2B000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
73F2000
trusted library allocation
page read and write
DD0000
heap
page read and write
73A9000
trusted library allocation
page read and write
1300000
heap
page execute and read and write
7760000
trusted library section
page read and write
7365000
trusted library allocation
page read and write
760B000
trusted library allocation
page read and write
2B0E000
stack
page read and write
D9BF000
stack
page read and write
6A50000
trusted library allocation
page execute and read and write
103D000
heap
page read and write
725F000
stack
page read and write
50AE000
trusted library allocation
page read and write
69C0000
trusted library allocation
page execute and read and write
7477000
trusted library allocation
page read and write
75BC000
trusted library allocation
page read and write
B4A000
stack
page read and write
2D82000
trusted library allocation
page read and write
2CEE000
unkown
page read and write
4B4D000
trusted library allocation
page read and write
72F4000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
3027000
trusted library allocation
page read and write
ED2D000
stack
page read and write
10E0000
trusted library allocation
page read and write
F70000
heap
page read and write
52BB000
stack
page read and write
E38000
heap
page read and write
276C000
stack
page read and write
765F000
trusted library allocation
page read and write
2B70000
heap
page read and write
6A60000
trusted library allocation
page execute and read and write
7306000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
7342000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
3FB2000
trusted library allocation
page read and write
9C3D000
stack
page read and write
30D2000
trusted library allocation
page read and write
10A000
stack
page read and write
B63000
trusted library allocation
page execute and read and write
13B0000
heap
page read and write
5410000
trusted library allocation
page execute and read and write
E93000
trusted library allocation
page execute and read and write
145F000
stack
page read and write
7377000
trusted library allocation
page read and write
7522000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
7648000
trusted library allocation
page read and write
7627000
trusted library allocation
page read and write
6477000
trusted library allocation
page read and write
73C9000
trusted library allocation
page read and write
5760000
heap
page read and write
C3A000
stack
page read and write
6D20000
trusted library allocation
page read and write
717B000
trusted library allocation
page read and write
14A8000
heap
page read and write
4EE0000
trusted library allocation
page read and write
7584000
trusted library allocation
page read and write
F7E000
stack
page read and write
71AA000
heap
page read and write
415000
remote allocation
page execute and read and write
5210000
trusted library allocation
page read and write
726A000
trusted library allocation
page read and write
7627000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page execute and read and write
5132000
trusted library allocation
page read and write
5918000
trusted library allocation
page read and write
14AE000
heap
page read and write
40C000
remote allocation
page execute and read and write
671E000
stack
page read and write
5E9B000
trusted library allocation
page read and write
2E05000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
CF9000
stack
page read and write
6870000
trusted library allocation
page read and write
57E4000
trusted library allocation
page read and write
54A0000
trusted library section
page read and write
41B000
remote allocation
page execute and read and write
766F000
trusted library allocation
page read and write
E67F000
stack
page read and write
1280000
heap
page read and write
3C71000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
FA8000
heap
page read and write
6E00000
trusted library allocation
page execute and read and write
675E000
unkown
page read and write
719F000
trusted library allocation
page read and write
3274000
trusted library allocation
page read and write
748A000
trusted library allocation
page read and write
14E1000
heap
page read and write
2CE1000
trusted library allocation
page read and write
3EFF000
trusted library allocation
page read and write
7535000
trusted library allocation
page read and write
FCA000
heap
page read and write
7386000
trusted library allocation
page read and write
4E2B000
heap
page read and write
E86E000
stack
page read and write
830000
heap
page read and write
4EF0000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
3227000
trusted library allocation
page read and write
5BA0000
heap
page read and write
5A10000
trusted library allocation
page read and write
1038000
heap
page read and write
5517000
heap
page read and write
D38000
stack
page read and write
30C3000
trusted library allocation
page read and write
6A36000
trusted library allocation
page read and write
5200000
heap
page read and write
49DB000
trusted library allocation
page read and write
681E000
stack
page read and write
417000
remote allocation
page execute and read and write
1170000
trusted library allocation
page execute and read and write
16B0000
heap
page read and write
EE6D000
stack
page read and write
4DDD000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
2EA2000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
3F4B000
trusted library allocation
page read and write
73E7000
trusted library allocation
page read and write
3891000
trusted library allocation
page read and write
7F5B0000
trusted library allocation
page execute and read and write
344D000
trusted library allocation
page read and write
5A7A000
heap
page read and write
71B0000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
5A46000
heap
page read and write
2F80000
trusted library allocation
page read and write
A12000
unkown
page readonly
3E2C000
trusted library allocation
page read and write
57EB000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
73EB000
trusted library allocation
page read and write
7638000
trusted library allocation
page read and write
63DF000
stack
page read and write
DF7E000
stack
page read and write
71E2000
trusted library allocation
page read and write
CD2000
heap
page read and write
3FBB000
trusted library allocation
page read and write
4DCD000
heap
page read and write
75B3000
trusted library allocation
page read and write
76D9000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
3EBB000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
2D82000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
2F9F000
stack
page read and write
41A000
remote allocation
page execute and read and write
78EE000
stack
page read and write
319C000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
751B000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
74AA000
trusted library allocation
page read and write
7686000
trusted library allocation
page read and write
306D000
trusted library allocation
page read and write
30AE000
trusted library allocation
page read and write
55BC000
stack
page read and write
7489000
trusted library allocation
page read and write
7658000
trusted library allocation
page read and write
735F000
trusted library allocation
page read and write
6A1E000
stack
page read and write
7210000
trusted library allocation
page read and write
DCE000
stack
page read and write
519C000
stack
page read and write
12D2000
heap
page read and write
5420000
trusted library allocation
page read and write
A47E000
stack
page read and write
72BC000
trusted library allocation
page read and write
3D6C000
trusted library allocation
page read and write
9BFE000
stack
page read and write
DCA000
heap
page read and write
5561000
heap
page read and write
762E000
stack
page read and write
7281000
trusted library allocation
page read and write
71A0000
heap
page read and write
722C000
trusted library allocation
page read and write
7432000
trusted library allocation
page read and write
9A0000
heap
page read and write
2D41000
trusted library allocation
page read and write
65DE000
stack
page read and write
29EE000
stack
page read and write
4765000
trusted library allocation
page read and write
3052000
trusted library allocation
page read and write
764B000
trusted library allocation
page read and write
59C5000
heap
page read and write
2A30000
heap
page read and write
3078000
trusted library allocation
page read and write
7599000
trusted library allocation
page read and write
EB6000
trusted library allocation
page execute and read and write
B97000
trusted library allocation
page execute and read and write
57BC000
stack
page read and write
3F4B000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
5340000
trusted library allocation
page execute and read and write
169F000
stack
page read and write
872000
heap
page read and write
E96D000
stack
page read and write
73B2000
trusted library allocation
page read and write
76A6000
trusted library allocation
page read and write
758C000
trusted library allocation
page read and write
2C4E000
stack
page read and write
8CF000
heap
page read and write
4F00000
trusted library allocation
page read and write
12D0000
heap
page read and write
7670000
heap
page read and write
EAB0000
heap
page read and write
3E9B000
trusted library allocation
page read and write
3EFB000
trusted library allocation
page read and write
2D87000
trusted library allocation
page read and write
B64000
trusted library allocation
page read and write
7208000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
A33D000
stack
page read and write
311C000
trusted library allocation
page read and write
30DA000
trusted library allocation
page read and write
5E4E000
stack
page read and write
5A30000
heap
page read and write
71D4000
trusted library allocation
page read and write
2441000
trusted library allocation
page read and write
38FB000
trusted library allocation
page read and write
75B8000
trusted library allocation
page read and write
651D000
stack
page read and write
5D00000
trusted library allocation
page read and write
2D93000
trusted library allocation
page read and write
F1B000
trusted library allocation
page execute and read and write
5560000
trusted library allocation
page execute and read and write
4ED2000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
E94000
trusted library allocation
page read and write
7395000
trusted library allocation
page read and write
73ED000
trusted library allocation
page read and write
73C5000
trusted library allocation
page read and write
73D3000
trusted library allocation
page read and write
6910000
trusted library allocation
page execute and read and write
4E02000
heap
page read and write
6DCB000
trusted library allocation
page read and write
2EC1000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
73A7000
trusted library allocation
page read and write
939000
stack
page read and write
7C20000
trusted library allocation
page read and write
7399000
trusted library allocation
page read and write
7588000
trusted library allocation
page read and write
6360000
heap
page read and write
2DB6000
trusted library allocation
page read and write
770A000
trusted library allocation
page read and write
411000
remote allocation
page execute and read and write
C5A000
heap
page read and write
2DD9000
trusted library allocation
page read and write
74EB000
trusted library allocation
page read and write
75DC000
trusted library allocation
page read and write
7233000
trusted library allocation
page read and write
171D000
trusted library allocation
page execute and read and write
7601000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
7391000
trusted library allocation
page read and write
4EA0000
heap
page read and write
6B2C000
stack
page read and write
824000
heap
page read and write
7505000
trusted library allocation
page read and write
1156000
trusted library allocation
page execute and read and write
5A18000
heap
page read and write
2ED0000
trusted library allocation
page read and write
5800000
heap
page read and write
2CC0000
trusted library allocation
page read and write
7335000
trusted library allocation
page read and write
7483000
trusted library allocation
page read and write
7485000
trusted library allocation
page read and write
6D90000
heap
page read and write
AB8000
unkown
page readonly
5B94000
trusted library section
page readonly
7FDD0000
trusted library allocation
page execute and read and write
D70000
heap
page read and write
7413000
trusted library allocation
page read and write
EDE000
stack
page read and write
767A000
trusted library allocation
page read and write
6CEC000
stack
page read and write
7612000
trusted library allocation
page read and write
5FAE000
stack
page read and write
430000
remote allocation
page execute and read and write
C5E000
heap
page read and write
7495000
trusted library allocation
page read and write
686E000
stack
page read and write
DE7E000
stack
page read and write
2830000
heap
page read and write
7060000
heap
page read and write
414000
remote allocation
page execute and read and write
5A27000
heap
page read and write
76BC000
trusted library allocation
page read and write
7356000
trusted library allocation
page read and write
760F000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
70C0000
heap
page read and write
631C000
stack
page read and write
721C000
trusted library allocation
page read and write
1550000
heap
page read and write
63FE000
heap
page read and write
5CE0000
trusted library allocation
page read and write
E86E000
stack
page read and write
68D6000
trusted library allocation
page read and write
A43E000
stack
page read and write
4DB0000
trusted library allocation
page read and write
2B88000
trusted library allocation
page read and write
7578000
trusted library allocation
page read and write
7E0C000
stack
page read and write
1317000
heap
page read and write
4DBB000
trusted library allocation
page read and write
74F4000
trusted library allocation
page read and write
7030000
heap
page read and write
30F6000
trusted library allocation
page read and write
7557000
trusted library allocation
page read and write
57F0000
heap
page read and write
59C0000
heap
page read and write
57FE000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
73E7000
trusted library allocation
page read and write
B37000
heap
page read and write
73A6000
trusted library allocation
page read and write
E50000
heap
page read and write
2F6C000
trusted library allocation
page read and write
7214000
trusted library allocation
page read and write
5A99000
heap
page read and write
74E2000
trusted library allocation
page read and write
651E000
stack
page read and write
7437000
trusted library allocation
page read and write
3F5B000
trusted library allocation
page read and write
76D5000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
73EF000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
4CCE000
trusted library allocation
page read and write
424000
remote allocation
page execute and read and write
7475000
trusted library allocation
page read and write
F94000
heap
page read and write
2D2E000
unkown
page read and write
10C0000
trusted library allocation
page read and write
3CA2000
trusted library allocation
page read and write
296F000
unkown
page read and write
7424000
trusted library allocation
page read and write
73DF000
trusted library allocation
page read and write
2280000
heap
page read and write
1035000
trusted library allocation
page execute and read and write
10A8000
trusted library allocation
page read and write
767E000
trusted library allocation
page read and write
10BA000
trusted library allocation
page execute and read and write
7427000
trusted library allocation
page read and write
3081000
trusted library allocation
page read and write
74C7000
trusted library allocation
page read and write
30FA000
trusted library allocation
page read and write
2EF7000
trusted library allocation
page execute and read and write
E74000
heap
page read and write
99BE000
stack
page read and write
ECEE000
stack
page read and write
76B4000
trusted library allocation
page read and write
3EAB000
trusted library allocation
page read and write
2DE1000
trusted library allocation
page read and write
7389000
trusted library allocation
page read and write
52D0000
heap
page read and write
2E0F000
trusted library allocation
page read and write
748E000
trusted library allocation
page read and write
40E9000
trusted library allocation
page read and write
7655000
trusted library allocation
page read and write
94F0000
heap
page read and write
2C4D000
trusted library allocation
page read and write
2D29000
trusted library allocation
page read and write
2EB1000
trusted library allocation
page read and write
6D80000
trusted library allocation
page execute and read and write
553C000
stack
page read and write
EBAE000
stack
page read and write
7508000
trusted library allocation
page read and write
76E7000
trusted library allocation
page read and write
9280000
heap
page read and write
4DE2000
trusted library allocation
page read and write
6827000
trusted library allocation
page read and write
57A9000
trusted library allocation
page read and write
DD40000
heap
page read and write
6D70000
trusted library allocation
page read and write
5B30000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
2DFF000
stack
page read and write
51CE000
trusted library allocation
page read and write
94CD000
heap
page read and write
685F000
stack
page read and write
16F0000
trusted library allocation
page read and write
7EA000
trusted library allocation
page execute and read and write
750E000
trusted library allocation
page read and write
1190000
heap
page read and write
5806000
trusted library allocation
page read and write
73D3000
trusted library allocation
page read and write
3003000
trusted library allocation
page read and write
EC2000
trusted library allocation
page read and write
E05000
heap
page read and write
58FC000
stack
page read and write
76D2000
trusted library allocation
page read and write
75CB000
trusted library allocation
page read and write
2D75000
trusted library allocation
page read and write
9F0000
heap
page read and write
5EB0000
trusted library allocation
page read and write
FD6000
heap
page read and write
72C3000
trusted library allocation
page read and write
3F6B000
trusted library allocation
page read and write
2BCF000
unkown
page read and write
10F0000
trusted library allocation
page read and write
A1AF000
stack
page read and write
73B8000
trusted library allocation
page read and write
555C000
heap
page read and write
7FB000
trusted library allocation
page execute and read and write
40A000
remote allocation
page execute and read and write
2724000
trusted library allocation
page read and write
76EE000
trusted library allocation
page read and write
B86000
trusted library allocation
page execute and read and write
6ABD000
stack
page read and write
30F3000
trusted library allocation
page read and write
6800000
heap
page read and write
ECEE000
stack
page read and write
8DA000
stack
page read and write
6820000
trusted library allocation
page read and write
751F000
trusted library allocation
page read and write
7F9C0000
trusted library allocation
page execute and read and write
6570000
trusted library allocation
page read and write
3E8B000
trusted library allocation
page read and write
B7D000
trusted library allocation
page execute and read and write
4F30000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
6B7C000
stack
page read and write
73F4000
trusted library allocation
page read and write
717F000
trusted library allocation
page read and write
30F3000
trusted library allocation
page read and write
7666000
trusted library allocation
page read and write
75C2000
trusted library allocation
page read and write
43C000
remote allocation
page execute and read and write
2DFA000
trusted library allocation
page read and write
2EF5000
trusted library allocation
page execute and read and write
E7BE000
stack
page read and write
73DB000
trusted library allocation
page read and write
5A6E000
stack
page read and write
755F000
trusted library allocation
page read and write
2B54000
trusted library allocation
page read and write
7464000
trusted library allocation
page read and write
F12000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
100E000
stack
page read and write
100E000
stack
page read and write
696C000
stack
page read and write
62EE000
heap
page read and write
F40000
trusted library allocation
page read and write
4EB0000
heap
page read and write
952F000
heap
page read and write
418000
remote allocation
page execute and read and write
6890000
trusted library allocation
page execute and read and write
4AA0000
heap
page read and write
5CD0000
heap
page read and write
2EAA000
trusted library allocation
page read and write
2B4E000
unkown
page read and write
2CDD000
trusted library allocation
page read and write
735C000
trusted library allocation
page read and write
601D000
stack
page read and write
98A000
stack
page read and write
4DC8000
trusted library allocation
page read and write
E57E000
stack
page read and write
724A000
trusted library allocation
page read and write
7245000
trusted library allocation
page read and write
427000
remote allocation
page execute and read and write
76DC000
trusted library allocation
page read and write
2EFB000
trusted library allocation
page execute and read and write
2D97000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
764E000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
56BE000
stack
page read and write
7488000
trusted library allocation
page read and write
B6D000
trusted library allocation
page execute and read and write
5A00000
trusted library allocation
page read and write
3DFB000
trusted library allocation
page read and write
533E000
stack
page read and write
75CB000
trusted library allocation
page read and write
1190000
heap
page read and write
51E0000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
743F000
trusted library allocation
page read and write
BA7000
heap
page read and write
409B000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
6580000
heap
page read and write
3F2B000
trusted library allocation
page read and write
1026000
trusted library allocation
page execute and read and write
2F34000
trusted library allocation
page read and write
56F4000
heap
page read and write
733D000
trusted library allocation
page read and write
762D000
trusted library allocation
page read and write
3EEB000
trusted library allocation
page read and write
757E000
trusted library allocation
page read and write
F02000
trusted library allocation
page read and write
71B6000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
2EF2000
trusted library allocation
page read and write
A0AE000
stack
page read and write
4EB0000
trusted library allocation
page read and write
74B7000
trusted library allocation
page read and write
4A8B000
trusted library allocation
page read and write
7405000
trusted library allocation
page read and write
309A000
trusted library allocation
page read and write
7689000
trusted library allocation
page read and write
2D4D000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
30FD000
trusted library allocation
page read and write
E6E000
stack
page read and write
75D6000
trusted library allocation
page read and write
73F7000
trusted library allocation
page read and write
14E3000
heap
page read and write
71FC000
trusted library allocation
page read and write
2C7E000
stack
page read and write
60DD000
stack
page read and write
3449000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
47E2000
trusted library allocation
page read and write
9AFE000
stack
page read and write
2FF8000
trusted library allocation
page read and write
580D000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
2ED7000
trusted library allocation
page read and write
71AB000
trusted library allocation
page read and write
DBF000
heap
page read and write
293F000
trusted library allocation
page read and write
74D3000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
71ED000
trusted library allocation
page read and write
2430000
heap
page execute and read and write
740C000
trusted library allocation
page read and write
6C3C000
stack
page read and write
10AD000
trusted library allocation
page execute and read and write
762D000
trusted library allocation
page read and write
71CE000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
2D40000
heap
page execute and read and write
57FC000
stack
page read and write
722E000
trusted library allocation
page read and write
AB0000
heap
page read and write
7630000
trusted library allocation
page read and write
6CC0000
heap
page read and write
2D7A000
trusted library allocation
page read and write
DE0000
heap
page read and write
7010000
heap
page read and write
BD9000
heap
page read and write
764B000
trusted library allocation
page read and write
1385000
heap
page read and write
2AA6000
trusted library allocation
page read and write
5554000
heap
page read and write
2CF0000
trusted library allocation
page read and write
2D5A000
trusted library allocation
page read and write
50D0000
heap
page read and write
75D4000
trusted library allocation
page read and write
1134000
trusted library allocation
page read and write
B470000
trusted library section
page read and write
EF0000
heap
page read and write
9489000
trusted library allocation
page read and write
4E3C000
stack
page read and write
F30000
trusted library allocation
page read and write
EBA000
stack
page read and write
5ED0000
heap
page read and write
3FDB000
trusted library allocation
page read and write
EF6E000
stack
page read and write
327A000
trusted library allocation
page read and write
50BD000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page execute and read and write
3071000
trusted library allocation
page read and write
1152000
trusted library allocation
page read and write
3F0D000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
7445000
trusted library allocation
page read and write
73B2000
trusted library allocation
page read and write
2DC9000
trusted library allocation
page read and write
7F30000
heap
page read and write
74E1000
trusted library allocation
page read and write
79E000
stack
page read and write
2AA0000
trusted library allocation
page read and write
119E000
stack
page read and write
12F0000
trusted library allocation
page read and write
2EF6000
trusted library allocation
page read and write
2FF5000
trusted library allocation
page read and write
6AFB000
unkown
page read and write
D7FE000
stack
page read and write
7780000
trusted library allocation
page read and write
F07000
heap
page read and write
5030000
trusted library section
page readonly
7288000
trusted library allocation
page read and write
24AD000
trusted library allocation
page read and write
B82000
trusted library allocation
page read and write
7522000
trusted library allocation
page read and write
306F000
stack
page read and write
8EC0000
trusted library section
page read and write
820000
heap
page read and write
6810000
trusted library allocation
page read and write
71BE000
trusted library allocation
page read and write
E6BE000
stack
page read and write
2CA0000
heap
page read and write
6790000
trusted library allocation
page read and write
4E35000
heap
page read and write
50A2000
trusted library allocation
page read and write
71A3000
trusted library allocation
page read and write
7E6000
trusted library allocation
page execute and read and write
50B6000
trusted library allocation
page read and write
9E0000
heap
page read and write
729D000
trusted library allocation
page read and write
74A6000
trusted library allocation
page read and write
7498000
trusted library allocation
page read and write
8F8000
heap
page read and write
68FE000
stack
page read and write
7584000
trusted library allocation
page read and write
5350000
heap
page execute and read and write
EC7000
trusted library allocation
page execute and read and write
1740000
heap
page read and write
560D000
trusted library allocation
page read and write
7408000
trusted library allocation
page read and write
F0A000
trusted library allocation
page execute and read and write
170000
heap
page read and write
3DEC000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
7328000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
2D70000
heap
page read and write
FB7000
stack
page read and write
870000
heap
page read and write
51F4000
heap
page read and write
EAAD000
stack
page read and write
7B0000
trusted library allocation
page read and write
565E000
stack
page read and write
57D0000
heap
page read and write
735B000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
9ABE000
stack
page read and write
745A000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
2B80000
heap
page read and write
7452000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
57E0000
heap
page read and write
1346000
heap
page read and write
28C6000
trusted library allocation
page read and write
3EAD000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
453C000
stack
page read and write
D7BE000
stack
page read and write
7377000
trusted library allocation
page read and write
7256000
trusted library allocation
page read and write
2B3E000
stack
page read and write
7517000
trusted library allocation
page read and write
5ED5000
heap
page read and write
3E0B000
trusted library allocation
page read and write
720000
heap
page read and write
5EC0000
trusted library allocation
page read and write
420000
remote allocation
page execute and read and write
7494000
trusted library allocation
page read and write
756D000
trusted library allocation
page read and write
B8A000
trusted library allocation
page execute and read and write
30F5000
trusted library allocation
page read and write
2F80000
heap
page read and write
3EEC000
trusted library allocation
page read and write
3098000
trusted library allocation
page read and write
7669000
trusted library allocation
page read and write
7605000
trusted library allocation
page read and write
5225000
trusted library allocation
page read and write
5810000
heap
page read and write
EF6000
stack
page read and write
3247000
trusted library allocation
page read and write
9C0000
heap
page read and write
74F6000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
152E000
heap
page read and write
3DA9000
trusted library allocation
page read and write
6798000
trusted library allocation
page read and write
765B000
trusted library allocation
page read and write
2FEC000
trusted library allocation
page read and write
C58000
heap
page read and write
51FE000
stack
page read and write
41D000
remote allocation
page execute and read and write
2E86000
trusted library allocation
page read and write
27CA000
stack
page read and write
743B000
trusted library allocation
page read and write
5664000
heap
page read and write
3FA3000
trusted library allocation
page read and write
7495000
trusted library allocation
page read and write
283B000
heap
page read and write
2FEE000
trusted library allocation
page read and write
3D51000
trusted library allocation
page read and write
51C0000
heap
page read and write
644B000
heap
page read and write
E82E000
stack
page read and write
51B0000
heap
page read and write
7331000
trusted library allocation
page read and write
4BFE000
stack
page read and write
74C3000
trusted library allocation
page read and write
76CD000
trusted library allocation
page read and write
DC3D000
stack
page read and write
3D4B000
trusted library allocation
page read and write
3F1B000
trusted library allocation
page read and write
71D1000
trusted library allocation
page read and write
EFD000
trusted library allocation
page execute and read and write
741B000
trusted library allocation
page read and write
DAFE000
stack
page read and write
2F78000
trusted library allocation
page read and write
621E000
stack
page read and write
1710000
trusted library allocation
page read and write
2D6F000
trusted library allocation
page read and write
521E000
stack
page read and write
3E4C000
trusted library allocation
page read and write
73A1000
trusted library allocation
page read and write
7608000
trusted library allocation
page read and write
C38000
heap
page read and write
733A000
trusted library allocation
page read and write
615D000
stack
page read and write
4ECD000
trusted library allocation
page read and write
5A20000
trusted library allocation
page execute and read and write
9D3D000
stack
page read and write
3DCC000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
7491000
trusted library allocation
page read and write
74B9000
trusted library allocation
page read and write
72CB000
trusted library allocation
page read and write
5230000
heap
page execute and read and write
737D000
trusted library allocation
page read and write
2D58000
trusted library allocation
page read and write
3092000
trusted library allocation
page read and write
2780000
heap
page read and write
9D6000
stack
page read and write
E53E000
stack
page read and write
747A000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
73DC000
trusted library allocation
page read and write
1060000
heap
page read and write
3DDB000
trusted library allocation
page read and write
1490000
trusted library allocation
page execute and read and write
6F30000
heap
page read and write
1530000
heap
page read and write
7459000
trusted library allocation
page read and write
6DBD000
stack
page read and write
4E1F000
heap
page read and write
6CBD000
stack
page read and write
40E1000
trusted library allocation
page read and write
4E7D000
stack
page read and write
402E000
trusted library allocation
page read and write
72A9000
trusted library allocation
page read and write
1718000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
7632000
trusted library allocation
page read and write
311E000
trusted library allocation
page read and write
267A000
stack
page read and write
10F5000
heap
page read and write
7197000
trusted library allocation
page read and write
7D6000
trusted library allocation
page read and write
3E1B000
trusted library allocation
page read and write
2E1C000
trusted library allocation
page read and write
762A000
trusted library allocation
page read and write
EE2E000
stack
page read and write
7447000
trusted library allocation
page read and write
BC0000
heap
page read and write
4128000
trusted library allocation
page read and write
2543000
trusted library allocation
page read and write
F24E000
stack
page read and write
61E2000
heap
page read and write
7346000
trusted library allocation
page read and write
4148000
trusted library allocation
page read and write
72D5000
trusted library allocation
page read and write
318C000
trusted library allocation
page read and write
7334000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
CB3000
heap
page read and write
3C7D000
trusted library allocation
page read and write
EFA000
heap
page read and write
2DC8000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
EA7000
heap
page read and write
7635000
trusted library allocation
page read and write
57E8000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
2F6E000
stack
page read and write
739C000
trusted library allocation
page read and write
A1FC000
stack
page read and write
66DD000
stack
page read and write
740B000
trusted library allocation
page read and write
75FA000
trusted library allocation
page read and write
7E2000
trusted library allocation
page read and write
7271000
trusted library allocation
page read and write
73A4000
trusted library allocation
page read and write
2E67000
trusted library allocation
page read and write
74D4000
trusted library allocation
page read and write
2D50000
heap
page read and write
5F0B000
stack
page read and write
746F000
trusted library allocation
page read and write
586B000
stack
page read and write
5A8C000
heap
page read and write
509E000
trusted library allocation
page read and write
EA0000
heap
page read and write
49D0000
trusted library allocation
page read and write
6980000
trusted library allocation
page execute and read and write
2D8F000
trusted library allocation
page read and write
7247000
trusted library allocation
page read and write
655F000
stack
page read and write
3FFB000
trusted library allocation
page read and write
7F620000
trusted library allocation
page execute and read and write
263F000
stack
page read and write
3090000
heap
page read and write
3F01000
trusted library allocation
page read and write
6F43000
heap
page read and write
4D4B000
trusted library allocation
page read and write
749E000
trusted library allocation
page read and write
41E000
remote allocation
page execute and read and write
406D000
trusted library allocation
page read and write
737C000
trusted library allocation
page read and write
28CF000
trusted library allocation
page read and write
6560000
trusted library allocation
page execute and read and write
3B6000
stack
page read and write
3069000
trusted library allocation
page read and write
7640000
heap
page read and write
2F01000
trusted library allocation
page read and write
4D6C000
stack
page read and write
7361000
trusted library allocation
page read and write
743C000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
41C000
remote allocation
page execute and read and write
10C7000
trusted library allocation
page execute and read and write
FD4000
heap
page read and write
4E43000
heap
page read and write
400000
remote allocation
page execute and read and write
720E000
trusted library allocation
page read and write
31C2000
trusted library allocation
page read and write
677E000
stack
page read and write
7200000
heap
page read and write
428000
remote allocation
page execute and read and write
6417000
trusted library allocation
page read and write
7267000
trusted library allocation
page read and write
7301000
trusted library allocation
page read and write
3D79000
trusted library allocation
page read and write
76C1000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
509B000
trusted library allocation
page read and write
E9D000
trusted library allocation
page execute and read and write
749E000
trusted library allocation
page read and write
72FC000
trusted library allocation
page read and write
2E3A000
trusted library allocation
page read and write
26CF000
trusted library allocation
page read and write
530E000
heap
page read and write
104E000
stack
page read and write
810000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
CE4000
heap
page read and write
E9AD000
stack
page read and write
7600000
trusted library allocation
page read and write
7633000
trusted library allocation
page read and write
615E000
stack
page read and write
5595000
heap
page read and write
57A0000
trusted library allocation
page read and write
7443000
trusted library allocation
page read and write
3EAC000
trusted library allocation
page read and write
405B000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
2EF0000
heap
page read and write
6EC0000
trusted library allocation
page read and write
40AB000
trusted library allocation
page read and write
2CF000
unkown
page read and write
4A8D000
trusted library allocation
page read and write
E9D000
trusted library allocation
page execute and read and write
667E000
stack
page read and write
E4E000
stack
page read and write
2270000
trusted library allocation
page execute and read and write
67A5000
trusted library allocation
page read and write
71E9000
trusted library allocation
page read and write
7203000
trusted library allocation
page read and write
74EF000
trusted library allocation
page read and write
7669000
trusted library allocation
page read and write
123E000
stack
page read and write
5801000
trusted library allocation
page read and write
3034000
trusted library allocation
page read and write
2D5B000
heap
page read and write
402000
remote allocation
page execute and read and write
12DC000
stack
page read and write
74CA000
trusted library allocation
page read and write
11DE000
stack
page read and write
75F3000
trusted library allocation
page read and write
3E1C000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
7434000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
74DF000
trusted library allocation
page read and write
ED0000
heap
page read and write
73D8000
trusted library allocation
page read and write
74DB000
trusted library allocation
page read and write
510C000
stack
page read and write
73C0000
trusted library allocation
page read and write
7C3000
trusted library allocation
page execute and read and write
2FAB000
trusted library allocation
page read and write
63F8000
trusted library allocation
page read and write
4FFC000
stack
page read and write
56FC000
heap
page read and write
5556000
heap
page read and write
EAAE000
stack
page read and write
6410000
trusted library allocation
page read and write
51DD000
trusted library allocation
page read and write
3C79000
trusted library allocation
page read and write
1037000
trusted library allocation
page execute and read and write
600E000
stack
page read and write
3D81000
trusted library allocation
page read and write
28DD000
trusted library allocation
page read and write
BD7000
heap
page read and write
2CD0000
heap
page execute and read and write
E00000
heap
page read and write
32A0000
trusted library allocation
page read and write
7B1C000
stack
page read and write
28E000
unkown
page read and write
7F530000
trusted library allocation
page execute and read and write
752B000
trusted library allocation
page read and write
557C000
stack
page read and write
6338000
heap
page read and write
129D000
stack
page read and write
26E0000
heap
page execute and read and write
4EF5000
trusted library allocation
page read and write
F06000
trusted library allocation
page execute and read and write
2D0000
heap
page read and write
691E000
stack
page read and write
71E6000
trusted library allocation
page read and write
DD4000
heap
page read and write
7450000
trusted library allocation
page read and write
71F4000
trusted library allocation
page read and write
1703000
trusted library allocation
page execute and read and write
51B4000
heap
page read and write
2B60000
trusted library allocation
page read and write
2CCB000
heap
page read and write
7F210000
trusted library allocation
page execute and read and write
73E0000
trusted library allocation
page read and write
405000
remote allocation
page execute and read and write
B92000
trusted library allocation
page read and write
2CC0000
heap
page read and write
10C2000
trusted library allocation
page read and write
57EF000
trusted library allocation
page read and write
1720000
heap
page read and write
2D3C000
trusted library allocation
page read and write
1167000
trusted library allocation
page execute and read and write
116B000
trusted library allocation
page execute and read and write
3F0C000
trusted library allocation
page read and write
6816000
trusted library allocation
page read and write
12F7000
heap
page read and write
51E2000
trusted library allocation
page read and write
76A9000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
630D000
heap
page read and write
7262000
trusted library allocation
page read and write
5F60000
trusted library allocation
page execute and read and write
76AC000
trusted library allocation
page read and write
747E000
trusted library allocation
page read and write
1300000
heap
page read and write
12F0000
trusted library allocation
page execute and read and write
766C000
trusted library allocation
page read and write
A8F6000
trusted library allocation
page read and write
2C0E000
stack
page read and write
2EAA000
trusted library allocation
page read and write
7662000
trusted library allocation
page read and write
57F0000
heap
page read and write
B95000
trusted library allocation
page execute and read and write
635E000
stack
page read and write
3FAB000
trusted library allocation
page read and write
3169000
trusted library allocation
page read and write
3EDB000
trusted library allocation
page read and write
14E0000
heap
page execute and read and write
736C000
trusted library allocation
page read and write
94B0000
heap
page read and write
51DE000
stack
page read and write
7382000
trusted library allocation
page read and write
AD5000
heap
page read and write
3DBB000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
764E000
heap
page read and write
75A1000
trusted library allocation
page read and write
9486000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
2774000
trusted library allocation
page read and write
749B000
trusted library allocation
page read and write
EF7D000
stack
page read and write
675E000
stack
page read and write
40B000
remote allocation
page execute and read and write
7374000
trusted library allocation
page read and write
72A6000
trusted library allocation
page read and write
4DBE000
trusted library allocation
page read and write
7F5000
trusted library allocation
page execute and read and write
3170000
trusted library allocation
page read and write
7362000
trusted library allocation
page read and write
3F8D000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
2800000
heap
page read and write
56E0000
heap
page read and write
12E0000
trusted library allocation
page read and write
108B000
stack
page read and write
EAD000
trusted library allocation
page execute and read and write
6A9E000
stack
page read and write
5A10000
heap
page read and write
5CF0000
trusted library allocation
page execute and read and write
C4F000
heap
page read and write
EEF000
heap
page read and write
42F000
remote allocation
page execute and read and write
40E000
remote allocation
page execute and read and write
1160000
trusted library allocation
page read and write
1290000
heap
page read and write
50F0000
heap
page read and write
744D000
trusted library allocation
page read and write
72F1000
trusted library allocation
page read and write
2B80000
heap
page read and write
2ECD000
trusted library allocation
page read and write
2EC6000
trusted library allocation
page read and write
749B000
trusted library allocation
page read and write
C30000
heap
page read and write
2DF8000
trusted library allocation
page read and write
758F000
trusted library allocation
page read and write
E23C000
stack
page read and write
2EF0000
trusted library allocation
page read and write
2EA4000
trusted library allocation
page read and write
2891000
trusted library allocation
page read and write
3F3B000
trusted library allocation
page read and write
7654000
trusted library allocation
page read and write
71FF000
trusted library allocation
page read and write
B30000
heap
page read and write
7456000
trusted library allocation
page read and write
BCB000
heap
page read and write
51F0000
heap
page read and write
DA0000
heap
page read and write
48E6000
trusted library allocation
page read and write
72A3000
trusted library allocation
page read and write
116C000
stack
page read and write
EB0000
trusted library allocation
page read and write
7402000
trusted library allocation
page read and write
4898000
trusted library allocation
page read and write
7464000
trusted library allocation
page read and write
72F7000
trusted library allocation
page read and write
2D46000
trusted library allocation
page read and write
10B2000
trusted library allocation
page read and write
10F0000
heap
page read and write
7386000
trusted library allocation
page read and write
514D000
trusted library allocation
page read and write
336F000
trusted library allocation
page read and write
3E6B000
trusted library allocation
page read and write
30EA000
trusted library allocation
page read and write
68BD000
stack
page read and write
618D000
stack
page read and write
3F9B000
trusted library allocation
page read and write
71C7000
trusted library allocation
page read and write
5A20000
heap
page read and write
DD3D000
stack
page read and write
6D30000
trusted library allocation
page execute and read and write
4EC6000
trusted library allocation
page read and write
948E000
trusted library allocation
page read and write
1016000
trusted library allocation
page read and write
73D6000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
2CE6000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
73AD000
trusted library allocation
page read and write
954E000
heap
page read and write
E76E000
stack
page read and write
2D84000
trusted library allocation
page read and write
1004000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
73E5000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
3135000
trusted library allocation
page read and write
7261000
trusted library allocation
page read and write
413000
remote allocation
page execute and read and write
EBEE000
stack
page read and write
86A000
stack
page read and write
2C71000
trusted library allocation
page read and write
71F7000
trusted library allocation
page read and write
F90000
heap
page read and write
55C0000
trusted library allocation
page read and write
770E000
trusted library allocation
page read and write
738D000
trusted library allocation
page read and write
50C2000
trusted library allocation
page read and write
278D000
stack
page read and write
5845000
trusted library allocation
page read and write
2ED2000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
513E000
trusted library allocation
page read and write
5CCD000
stack
page read and write
7F7000
trusted library allocation
page execute and read and write
67FC000
stack
page read and write
14C8000
heap
page read and write
51C0000
heap
page read and write
7770000
trusted library allocation
page read and write
A2E000
stack
page read and write
A10000
unkown
page readonly
74A1000
trusted library allocation
page read and write
E970000
heap
page read and write
74CD000
trusted library allocation
page read and write
EE3B000
stack
page read and write
10E0000
trusted library allocation
page read and write
26CF000
stack
page read and write
759E000
trusted library allocation
page read and write
1520000
heap
page execute and read and write
42E000
remote allocation
page execute and read and write
27D0000
heap
page read and write
7553000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
7615000
trusted library allocation
page read and write
4DD0000
heap
page read and write
75D1000
trusted library allocation
page read and write
9534000
heap
page read and write
26E0000
heap
page read and write
330000
heap
page read and write
55A7000
heap
page read and write
2D1D000
stack
page read and write
42B000
remote allocation
page execute and read and write
7406000
trusted library allocation
page read and write
5C80000
trusted library allocation
page execute and read and write
A57E000
stack
page read and write
3EFB000
trusted library allocation
page read and write
74C3000
trusted library allocation
page read and write
83E000
heap
page read and write
7399000
trusted library allocation
page read and write
E57E000
stack
page read and write
72B6000
trusted library allocation
page read and write
74D6000
trusted library allocation
page read and write
100D000
trusted library allocation
page execute and read and write
2D32000
trusted library allocation
page read and write
113D000
trusted library allocation
page execute and read and write
5230000
trusted library allocation
page read and write
752E000
trusted library allocation
page read and write
7394000
trusted library allocation
page read and write
5577000
heap
page read and write
421000
remote allocation
page execute and read and write
5DCE000
stack
page read and write
7F20000
heap
page read and write
7422000
trusted library allocation
page read and write
7291000
trusted library allocation
page read and write
There are 1872 hidden memdumps, click here to show them.