IOC Report
payment_invoice.exe

loading gif

Files

File Path
Type
Category
Malicious
payment_invoice.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\notepad.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\notepad.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\payment_invoice.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Ahaqlwdjt.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Ajeqbh.tmpdb
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Bfbbbybxdyd.tmpdb
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Bicfm.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Bwsqsvl.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Cjvwjs.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Cyjei.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Dkmtdj.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\Edgqvqch.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\Ewnbwzml.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Frmzxhgdbr.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Gcoosfgyq.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Goiyicukkt.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\Gutsoz.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\Hlkysy.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Hzrohnjb.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Jpvytoxgk.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Lumjh.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\Mnwtrcw.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\Mobmrv.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Mxcygcbej.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\Ncajqts.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Ncgngjsjz.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\Negkmtdkw.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Nprogdwul.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\Nwsmsn.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Ojodw.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\Ojxmnllbck.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\Prxluycphib.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Pxmovid.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Qaqikmltoa.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
modified
C:\Users\user\AppData\Local\Temp\Qfriiu.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Qnzssrtix.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Qrcyl.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\Qruxq.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\Sepivl.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Sjksbgl.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\Sumoegih.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Tgkuvbosdm.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Tzgva.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\Ubcnfbmz.tmpdb
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Upgngqlau.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Uuciapjhqgf.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Vvjlgxzn.tmpdb
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Wuifubn.tmpdb
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Yktopcninho.tmpdb
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Zrdedvz.tmpdb
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Zwftrxlhf.tmpdb
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1hvcfyay.ego.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dv2jdp32.0l1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n2satjmq.4gq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_umypflq0.mfm.ps1
ASCII text, with no line terminators
dropped
There are 47 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\payment_invoice.exe
"C:\Users\user\Desktop\payment_invoice.exe"
malicious
C:\Users\user\Desktop\payment_invoice.exe
"C:\Users\user\Desktop\payment_invoice.exe"
malicious
C:\Users\user\AppData\Local\notepad.exe
"C:\Users\user\AppData\Local\notepad.exe"
malicious
C:\Users\user\AppData\Local\notepad.exe
"C:\Users\user\AppData\Local\notepad.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'payment_invoice';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'payment_invoice' -Value '"C:\Users\user\Desktop\payment_invoice.exe"' -PropertyType 'String'
malicious
C:\Users\user\Desktop\payment_invoice.exe
"C:\Users\user\Desktop\payment_invoice.exe"
malicious
C:\Users\user\AppData\Local\notepad.exe
"C:\Users\user\AppData\Local\notepad.exe"
malicious
C:\Users\user\Desktop\payment_invoice.exe
"C:\Users\user\Desktop\payment_invoice.exe"
malicious
C:\Users\user\AppData\Local\notepad.exe
"C:\Users\user\AppData\Local\notepad.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'notepad';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'notepad' -Value '"C:\Users\user\AppData\Local\notepad.exe"' -PropertyType 'String'
malicious
C:\Users\user\Desktop\payment_invoice.exe
"C:\Users\user\Desktop\payment_invoice.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
http://www.codeplex.com/DotNetZip
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
purfufu3flujs.duckdns.org
91.92.255.61
malicious
10.76.9.0.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
91.92.255.61
purfufu3flujs.duckdns.org
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
notepad
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
payment_invoice
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
notepad
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5250000
trusted library section
page read and write
malicious
4733000
trusted library allocation
page read and write
malicious
4651000
trusted library allocation
page read and write
malicious
5220000
trusted library section
page read and write
malicious
2EE1000
trusted library allocation
page read and write
malicious
2FD1000
trusted library allocation
page read and write
malicious
5D00000
trusted library section
page read and write
malicious
71A0000
trusted library section
page read and write
malicious
4991000
trusted library allocation
page read and write
malicious
4324000
trusted library allocation
page read and write
malicious
30E4000
trusted library allocation
page read and write
malicious
2C51000
trusted library allocation
page read and write
malicious
31A9000
trusted library allocation
page read and write
malicious
2A71000
trusted library allocation
page read and write
malicious
2A04000
trusted library allocation
page read and write
malicious
4638000
trusted library allocation
page read and write
malicious
2CF2000
trusted library allocation
page read and write
malicious
54F0000
trusted library section
page read and write
malicious
2E83000
trusted library allocation
page read and write
malicious
28F1000
trusted library allocation
page read and write
malicious
2AC9000
trusted library allocation
page read and write
malicious
2BB2000
trusted library allocation
page read and write
malicious
30C6000
trusted library allocation
page read and write
malicious
42C1000
trusted library allocation
page read and write
malicious
5740000
trusted library section
page read and write
malicious
6CAE000
heap
page read and write
1090000
heap
page read and write
4271000
trusted library allocation
page read and write
4FDD000
stack
page read and write
79D0000
trusted library allocation
page read and write
2CB7000
trusted library allocation
page read and write
7A6F000
trusted library allocation
page read and write
2C9C000
trusted library allocation
page read and write
7F500000
trusted library allocation
page execute and read and write
CF7000
stack
page read and write
2EDB000
heap
page read and write
727A000
stack
page read and write
562B000
trusted library allocation
page read and write
E9BA000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
3350000
heap
page read and write
5670000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
7BFB000
trusted library allocation
page read and write
7D8A000
trusted library allocation
page read and write
3A8F000
trusted library allocation
page read and write
7D11000
trusted library allocation
page read and write
7BA5000
trusted library allocation
page read and write
4EFE000
stack
page read and write
5E01000
trusted library allocation
page read and write
7871000
trusted library allocation
page read and write
77E000
stack
page read and write
84B0000
trusted library allocation
page execute and read and write
7A2F000
trusted library allocation
page read and write
3495000
trusted library allocation
page read and write
6248000
trusted library allocation
page read and write
5D90000
trusted library allocation
page execute and read and write
3050000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
5D79000
trusted library allocation
page read and write
414C000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
2F8E000
stack
page read and write
1454000
trusted library allocation
page read and write
78E9000
trusted library allocation
page read and write
CA2000
heap
page read and write
C12000
trusted library allocation
page read and write
78AF000
trusted library allocation
page read and write
3C51000
trusted library allocation
page read and write
2CE1000
trusted library allocation
page read and write
56AA000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
BFC000
heap
page read and write
612E000
stack
page read and write
5B5B000
trusted library allocation
page read and write
796C000
trusted library allocation
page read and write
2E5C000
stack
page read and write
7AE0000
trusted library allocation
page execute and read and write
542A000
heap
page read and write
78C1000
trusted library allocation
page read and write
631C000
stack
page read and write
400000
remote allocation
page execute and read and write
5B3B000
trusted library allocation
page read and write
770B000
trusted library allocation
page read and write
781D000
trusted library allocation
page read and write
7A7D000
trusted library allocation
page read and write
7881000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
2CE8000
trusted library allocation
page read and write
7DCD000
trusted library allocation
page read and write
E4E000
stack
page read and write
5BFB000
stack
page read and write
6D10000
heap
page read and write
767F000
trusted library allocation
page read and write
6F9000
trusted library allocation
page read and write
280E000
stack
page read and write
577B000
trusted library allocation
page read and write
6644000
trusted library allocation
page read and write
6251000
trusted library allocation
page read and write
2F3E000
stack
page read and write
7A90000
trusted library allocation
page read and write
7E89000
trusted library allocation
page read and write
599E000
stack
page read and write
5540000
trusted library allocation
page read and write
7C45000
trusted library allocation
page read and write
4A1B000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
14CA000
heap
page read and write
5352000
trusted library allocation
page read and write
796F000
trusted library allocation
page read and write
BFD000
trusted library allocation
page execute and read and write
7837000
trusted library allocation
page read and write
78BD000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
2870000
heap
page read and write
7A29000
trusted library allocation
page read and write
66E0000
heap
page read and write
7A1F000
trusted library allocation
page read and write
12F0000
heap
page read and write
7A6B000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
787F000
trusted library allocation
page read and write
50CB000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
325A000
trusted library allocation
page execute and read and write
5998000
trusted library allocation
page read and write
780C000
trusted library allocation
page read and write
7536000
trusted library allocation
page read and write
4BE2000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
6600000
trusted library allocation
page execute and read and write
157E000
stack
page read and write
2ABC000
trusted library allocation
page read and write
79BD000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
1287000
trusted library allocation
page execute and read and write
50FA000
trusted library allocation
page read and write
4170000
heap
page execute and read and write
7A6A000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
5DF0000
heap
page read and write
7AB7000
trusted library allocation
page read and write
125E000
stack
page read and write
6665000
trusted library allocation
page read and write
2A8B000
heap
page read and write
3165000
trusted library allocation
page read and write
D83000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
4972000
trusted library allocation
page read and write
78B5000
trusted library allocation
page read and write
414E000
stack
page read and write
4EE0000
trusted library allocation
page read and write
7B99000
trusted library allocation
page read and write
79D1000
trusted library allocation
page read and write
859E000
stack
page read and write
7E69000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
37D5000
trusted library allocation
page read and write
71CE000
stack
page read and write
334A000
trusted library allocation
page read and write
78BB000
trusted library allocation
page read and write
7280000
trusted library section
page read and write
460000
heap
page read and write
7FAA0000
trusted library allocation
page execute and read and write
40DA000
trusted library allocation
page read and write
7AD0000
trusted library allocation
page read and write
EBA000
trusted library allocation
page execute and read and write
66BD000
stack
page read and write
3C51000
trusted library allocation
page read and write
3346000
trusted library allocation
page read and write
625D000
trusted library allocation
page read and write
7D5E000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
76C5000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
57AE000
stack
page read and write
A951000
trusted library allocation
page read and write
656B000
stack
page read and write
3FDB000
trusted library allocation
page read and write
12D3000
trusted library allocation
page read and write
D3D000
stack
page read and write
30AB000
trusted library allocation
page read and write
334C000
trusted library allocation
page read and write
7AA1000
trusted library allocation
page read and write
78F7000
trusted library allocation
page read and write
785E000
trusted library allocation
page read and write
EF0000
trusted library allocation
page execute and read and write
12FB000
trusted library allocation
page execute and read and write
C00000
trusted library allocation
page read and write
7A4B000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
53F0000
heap
page read and write
4D3000
heap
page read and write
54E0000
trusted library allocation
page read and write
66C0000
trusted library allocation
page execute and read and write
57AE000
stack
page read and write
7AAD000
trusted library allocation
page read and write
75B0000
heap
page execute and read and write
4B3C000
stack
page read and write
6FF0000
trusted library allocation
page read and write
577F000
heap
page read and write
7A77000
trusted library allocation
page read and write
5E22000
heap
page read and write
7588000
trusted library allocation
page read and write
7896000
trusted library allocation
page read and write
2E3E000
stack
page read and write
78A4000
trusted library allocation
page read and write
7AB3000
trusted library allocation
page read and write
12C4000
trusted library allocation
page read and write
73B000
stack
page read and write
120E000
stack
page read and write
7605000
trusted library allocation
page read and write
D714000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
5606000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
4BC0000
heap
page execute and read and write
15A0000
trusted library allocation
page read and write
334E000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
6634000
trusted library allocation
page read and write
407C000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
77B8000
trusted library allocation
page read and write
5BB4000
heap
page read and write
5561000
trusted library allocation
page read and write
496000
heap
page read and write
78EF000
trusted library allocation
page read and write
6651000
trusted library allocation
page read and write
5A06000
trusted library allocation
page read and write
C27000
trusted library allocation
page execute and read and write
7806000
trusted library allocation
page read and write
5664000
trusted library allocation
page read and write
7841000
trusted library allocation
page read and write
13FF000
stack
page read and write
2E3D000
stack
page read and write
379C000
trusted library allocation
page read and write
74A9000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
7610000
heap
page read and write
3A4A000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
78DE000
trusted library allocation
page read and write
29D6000
trusted library allocation
page read and write
890000
trusted library allocation
page read and write
778D000
trusted library allocation
page read and write
7BAD000
trusted library allocation
page read and write
77FD000
trusted library allocation
page read and write
318F000
trusted library allocation
page read and write
57DC000
heap
page read and write
BC5000
heap
page read and write
7C75000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
7C97000
trusted library allocation
page read and write
5F6E000
stack
page read and write
4F57000
trusted library allocation
page read and write
723E000
stack
page read and write
6428000
stack
page read and write
7833000
trusted library allocation
page read and write
57E4000
heap
page read and write
5A10000
trusted library allocation
page read and write
6C99000
heap
page read and write
790C000
trusted library allocation
page read and write
7AA5000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
7578000
trusted library allocation
page read and write
786D000
trusted library allocation
page read and write
423E000
stack
page read and write
6ED000
trusted library allocation
page execute and read and write
7B3D000
trusted library allocation
page read and write
7866000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
7AC6000
trusted library allocation
page read and write
75D2000
trusted library allocation
page read and write
853E000
stack
page read and write
7A58000
trusted library allocation
page read and write
59B9000
trusted library allocation
page read and write
EAE000
stack
page read and write
2E40000
heap
page execute and read and write
7D2F000
trusted library allocation
page read and write
776A000
trusted library allocation
page read and write
2CA2000
trusted library allocation
page read and write
6D04000
heap
page read and write
33D2000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
57D2000
heap
page read and write
451C000
trusted library allocation
page read and write
7817000
trusted library allocation
page read and write
547F000
heap
page read and write
78A7000
trusted library allocation
page read and write
72BD000
stack
page read and write
3060000
heap
page read and write
7AB5000
trusted library allocation
page read and write
3397000
trusted library allocation
page read and write
7C35000
trusted library allocation
page read and write
4F6000
heap
page read and write
7730000
heap
page read and write
4E73000
trusted library allocation
page read and write
7A98000
trusted library allocation
page read and write
789A000
trusted library allocation
page read and write
2F80000
heap
page read and write
B8A000
heap
page read and write
784C000
trusted library allocation
page read and write
5D6F000
stack
page read and write
12E0000
heap
page read and write
53E0000
trusted library allocation
page execute and read and write
4DED000
trusted library allocation
page read and write
7A50000
trusted library allocation
page read and write
ED0000
heap
page read and write
5610000
trusted library allocation
page read and write
1175000
heap
page read and write
7750000
heap
page read and write
5B20000
trusted library allocation
page read and write
7A0A000
trusted library allocation
page read and write
2BCC000
stack
page read and write
7926000
trusted library allocation
page read and write
B80000
heap
page read and write
2C5E000
trusted library allocation
page read and write
2C79000
trusted library allocation
page read and write
7BE7000
trusted library allocation
page read and write
78ED000
trusted library allocation
page read and write
76B1000
trusted library allocation
page read and write
61EC000
stack
page read and write
695E000
stack
page read and write
78AD000
trusted library allocation
page read and write
7A75000
trusted library allocation
page read and write
57CE000
stack
page read and write
6CA0000
heap
page read and write
44AF000
trusted library allocation
page read and write
622E000
stack
page read and write
475C000
trusted library allocation
page read and write
148B000
trusted library allocation
page execute and read and write
715000
trusted library allocation
page execute and read and write
DA2000
trusted library allocation
page read and write
71FE000
stack
page read and write
7AB0000
trusted library allocation
page read and write
34CA000
trusted library allocation
page read and write
5530000
trusted library allocation
page execute and read and write
154C000
stack
page read and write
7854000
trusted library allocation
page read and write
3863000
trusted library allocation
page read and write
4DF0000
heap
page execute and read and write
1CE000
stack
page read and write
663B000
trusted library allocation
page read and write
753E000
stack
page read and write
D90000
heap
page read and write
E90000
trusted library allocation
page read and write
17593000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
613E000
stack
page read and write
79AE000
trusted library allocation
page read and write
4D1E000
stack
page read and write
1272000
trusted library allocation
page read and write
7B10000
trusted library allocation
page read and write
5720000
trusted library allocation
page execute and read and write
41FE000
stack
page read and write
7B10000
trusted library allocation
page read and write
76BD000
trusted library allocation
page read and write
761D000
stack
page read and write
F78000
heap
page read and write
7673000
trusted library allocation
page read and write
79DA000
trusted library allocation
page read and write
4F4000
heap
page read and write
9A1C000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
78C4000
trusted library allocation
page read and write
395B000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
3185000
trusted library allocation
page read and write
3EC3000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
128B000
trusted library allocation
page execute and read and write
77F9000
trusted library allocation
page read and write
565C000
trusted library allocation
page read and write
C16000
trusted library allocation
page execute and read and write
1000000
heap
page read and write
7828000
trusted library allocation
page read and write
2F4E000
stack
page read and write
77E9000
trusted library allocation
page read and write
4E01000
trusted library allocation
page read and write
583D000
heap
page read and write
7A80000
trusted library allocation
page read and write
668E000
stack
page read and write
FD3000
heap
page read and write
326F000
trusted library allocation
page read and write
76F2000
heap
page read and write
126D000
trusted library allocation
page execute and read and write
60AE000
stack
page read and write
5240000
heap
page execute and read and write
7A0000
heap
page read and write
76CD000
trusted library allocation
page read and write
3BC4000
trusted library allocation
page read and write
7823000
trusted library allocation
page read and write
78DC000
trusted library allocation
page read and write
3774000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
75DA000
trusted library allocation
page read and write
7839000
trusted library allocation
page read and write
59A0000
trusted library allocation
page execute and read and write
6FCD000
stack
page read and write
7A60000
trusted library allocation
page read and write
7DE9000
trusted library allocation
page read and write
76F1000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
EFE000
stack
page read and write
7A5A000
trusted library allocation
page read and write
7DED000
trusted library allocation
page read and write
6A50000
heap
page read and write
5BB8000
heap
page read and write
F10000
heap
page read and write
11C0000
heap
page read and write
1570000
heap
page read and write
7DCF000
trusted library allocation
page read and write
7E8000
trusted library allocation
page read and write
45E0000
trusted library allocation
page read and write
2C7B000
trusted library allocation
page read and write
74EB000
trusted library allocation
page read and write
9951000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
15F0000
trusted library allocation
page execute and read and write
7670000
heap
page read and write
3098000
heap
page read and write
6662000
trusted library allocation
page read and write
3359000
heap
page read and write
4513000
trusted library allocation
page read and write
75CF000
stack
page read and write
146A000
trusted library allocation
page read and write
57C2000
heap
page read and write
12A0000
heap
page read and write
15EE000
stack
page read and write
C10000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
7873000
trusted library allocation
page read and write
9D21000
trusted library allocation
page read and write
677E000
stack
page read and write
78E6000
trusted library allocation
page read and write
1191000
heap
page read and write
5EAC000
stack
page read and write
E94000
trusted library allocation
page read and write
5640000
trusted library allocation
page execute and read and write
3260000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
51E000
heap
page read and write
6A2E000
stack
page read and write
7652000
heap
page read and write
F00000
trusted library allocation
page execute and read and write
569E000
stack
page read and write
6870000
trusted library allocation
page execute and read and write
E8C000
stack
page read and write
780A000
trusted library allocation
page read and write
3177000
trusted library allocation
page read and write
6E3000
trusted library allocation
page execute and read and write
5690000
trusted library allocation
page read and write
3FD1000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
55F4000
trusted library allocation
page read and write
4C50000
heap
page read and write
7AA3000
trusted library allocation
page read and write
980000
heap
page read and write
12F2000
trusted library allocation
page read and write
D47000
heap
page read and write
145D000
trusted library allocation
page execute and read and write
7CE1000
trusted library allocation
page read and write
7A79000
trusted library allocation
page read and write
EC2000
trusted library allocation
page read and write
BC1000
heap
page read and write
6B6E000
stack
page read and write
BF0000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
7303000
heap
page read and write
6A5E000
stack
page read and write
40F9000
trusted library allocation
page read and write
2CA4000
trusted library allocation
page read and write
623F000
trusted library allocation
page read and write
1282000
trusted library allocation
page read and write
7B0C000
trusted library allocation
page read and write
662E000
stack
page read and write
B3E000
stack
page read and write
5BF2000
heap
page read and write
EB0000
trusted library allocation
page read and write
3901000
trusted library allocation
page read and write
61AD000
stack
page read and write
2C72000
trusted library allocation
page read and write
69DE000
stack
page read and write
775D000
trusted library allocation
page read and write
2C40000
heap
page execute and read and write
3987000
trusted library allocation
page read and write
4EBE000
stack
page read and write
7AAF000
trusted library allocation
page read and write
4CDE000
stack
page read and write
305E000
trusted library allocation
page read and write
78E5000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
7A9E000
trusted library allocation
page read and write
7897000
trusted library allocation
page read and write
3B63000
trusted library allocation
page read and write
507D000
stack
page read and write
6CE5000
heap
page read and write
7669000
heap
page read and write
CC000
stack
page read and write
57E0000
trusted library allocation
page execute and read and write
EA0000
trusted library allocation
page read and write
781F000
trusted library allocation
page read and write
32AF000
trusted library allocation
page read and write
4081000
trusted library allocation
page read and write
7677000
trusted library allocation
page read and write
D1AA000
trusted library allocation
page read and write
D74000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
7A9C000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
785A000
trusted library allocation
page read and write
796E000
stack
page read and write
77BE000
stack
page read and write
5B50000
trusted library allocation
page execute and read and write
2C20000
trusted library allocation
page read and write
562E000
stack
page read and write
5B30000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
751A000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
84CA000
trusted library allocation
page read and write
3265000
trusted library allocation
page execute and read and write
33A6000
trusted library allocation
page read and write
1370000
heap
page read and write
6656000
trusted library allocation
page read and write
1359000
heap
page read and write
5F6E000
stack
page read and write
784E000
trusted library allocation
page read and write
6B5E000
stack
page read and write
E97000
trusted library allocation
page execute and read and write
2ED6000
heap
page read and write
57AE000
heap
page read and write
6750000
heap
page read and write
58FE000
stack
page read and write
F37000
stack
page read and write
75E0000
heap
page read and write
DB0000
heap
page read and write
5B1E000
stack
page read and write
7AC8000
trusted library allocation
page read and write
7A57000
trusted library allocation
page read and write
5DDD000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
2CB5000
trusted library allocation
page read and write
3B0000
unkown
page readonly
1D0000
heap
page read and write
2C64000
trusted library allocation
page read and write
7831000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
3AA0000
trusted library allocation
page read and write
7A98000
trusted library allocation
page read and write
8DC8000
trusted library allocation
page read and write
2A10000
trusted library allocation
page execute and read and write
5694000
trusted library allocation
page read and write
3FD9000
trusted library allocation
page read and write
2C68000
trusted library allocation
page read and write
55AF000
stack
page read and write
7A49000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
78CC000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
7875000
trusted library allocation
page read and write
625E000
stack
page read and write
5570000
trusted library allocation
page read and write
6B82000
heap
page read and write
10FE000
stack
page read and write
75D6000
trusted library allocation
page read and write
556C000
trusted library allocation
page read and write
1560000
heap
page execute and read and write
76A3000
trusted library allocation
page read and write
789F000
trusted library allocation
page read and write
59DE000
stack
page read and write
540E000
heap
page read and write
7AAB000
trusted library allocation
page read and write
3C87000
trusted library allocation
page read and write
65C0000
heap
page read and write
3187000
trusted library allocation
page read and write
583E000
stack
page read and write
62EA000
stack
page read and write
7799000
trusted library allocation
page read and write
3941000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
3233000
trusted library allocation
page execute and read and write
1577000
heap
page read and write
6E10000
heap
page execute and read and write
774D000
trusted library allocation
page read and write
14BE000
heap
page read and write
6C80000
heap
page read and write
7858000
trusted library allocation
page read and write
43F000
stack
page read and write
6C5E000
stack
page read and write
6811000
heap
page read and write
2E95000
trusted library allocation
page read and write
4A1D000
trusted library allocation
page read and write
BF4000
trusted library allocation
page read and write
2EFE000
stack
page read and write
1600000
heap
page read and write
7AC4000
trusted library allocation
page read and write
495B000
trusted library allocation
page read and write
39BD000
trusted library allocation
page read and write
4649000
trusted library allocation
page read and write
7CEE000
trusted library allocation
page read and write
65E0000
heap
page read and write
8590000
trusted library allocation
page execute and read and write
7A33000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
7653000
trusted library allocation
page read and write
10E9000
heap
page read and write
54B0000
trusted library allocation
page read and write
7919000
trusted library allocation
page read and write
56D8000
trusted library allocation
page read and write
BC0000
heap
page read and write
597B000
stack
page read and write
78F1000
trusted library allocation
page read and write
4C0E000
stack
page read and write
3200000
heap
page read and write
3348000
trusted library allocation
page read and write
6F0000
trusted library allocation
page read and write
710000
trusted library allocation
page read and write
BC3000
heap
page read and write
7C0000
heap
page readonly
5B3D000
trusted library allocation
page read and write
3CB0000
trusted library allocation
page read and write
32FC000
trusted library allocation
page read and write
297E000
stack
page read and write
7A3A000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
7A8E000
trusted library allocation
page read and write
3183000
trusted library allocation
page read and write
3FDD000
trusted library allocation
page read and write
7BD9000
trusted library allocation
page read and write
62A0000
trusted library allocation
page execute and read and write
5DB3000
trusted library allocation
page read and write
27CE000
stack
page read and write
585E000
stack
page read and write
31D0000
heap
page read and write
2E20000
trusted library allocation
page read and write
542E000
stack
page read and write
7B3B000
trusted library allocation
page read and write
12B0000
heap
page read and write
E3B000
stack
page read and write
4CA000
heap
page read and write
4B6E000
stack
page read and write
5463000
heap
page read and write
59E000
stack
page read and write
6B62000
heap
page read and write
3926000
trusted library allocation
page read and write
7683000
heap
page read and write
38FB000
trusted library allocation
page read and write
6CFE000
heap
page read and write
6B2E000
stack
page read and write
F87000
stack
page read and write
6679000
trusted library allocation
page read and write
3E41000
trusted library allocation
page read and write
7860000
trusted library allocation
page read and write
70CB000
stack
page read and write
7B8B000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
562B000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
27A0000
heap
page read and write
7400000
heap
page read and write
7928000
trusted library allocation
page read and write
75F7000
heap
page read and write
78BE000
stack
page read and write
14AE000
stack
page read and write
5456000
trusted library allocation
page read and write
556A000
trusted library allocation
page read and write
75B7000
trusted library allocation
page read and write
147A000
trusted library allocation
page execute and read and write
74A5000
trusted library allocation
page read and write
61F3000
trusted library allocation
page read and write
9D0000
heap
page read and write
84C0000
trusted library allocation
page read and write
6F0E000
stack
page read and write
7856000
trusted library allocation
page read and write
4F1000
heap
page read and write
75C6000
trusted library allocation
page read and write
624E000
trusted library allocation
page read and write
2C8D000
trusted library allocation
page read and write
5DDE000
stack
page read and write
5890000
trusted library allocation
page read and write
2F7E000
stack
page read and write
712000
trusted library allocation
page read and write
7A7B000
trusted library allocation
page read and write
7BF7000
trusted library allocation
page read and write
5022000
trusted library allocation
page read and write
78D2000
trusted library allocation
page read and write
14D3000
heap
page read and write
7547000
trusted library allocation
page read and write
7A8A000
trusted library allocation
page read and write
5B39000
trusted library allocation
page read and write
65CA000
heap
page read and write
50C9000
trusted library allocation
page read and write
4A58000
trusted library allocation
page read and write
87E000
stack
page read and write
5785000
heap
page read and write
2AB6000
trusted library allocation
page read and write
6265000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
59BB000
trusted library allocation
page read and write
2C6C000
trusted library allocation
page read and write
F6C000
heap
page read and write
7B0000
heap
page read and write
7F7000
stack
page read and write
7900000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
3898000
trusted library allocation
page read and write
7D0000
heap
page read and write
78EE000
trusted library allocation
page read and write
79BB000
trusted library allocation
page read and write
5B9E000
stack
page read and write
4EA0000
heap
page read and write
78BF000
trusted library allocation
page read and write
5AAE000
stack
page read and write
7A10000
trusted library allocation
page read and write
4E40000
trusted library allocation
page execute and read and write
766F000
trusted library allocation
page read and write
7C25000
trusted library allocation
page read and write
646C000
stack
page read and write
CA4000
heap
page read and write
4260000
heap
page read and write
5DFC000
heap
page read and write
798C000
trusted library allocation
page read and write
552E000
stack
page read and write
5D80000
trusted library allocation
page read and write
6AEF000
stack
page read and write
7A54000
trusted library allocation
page read and write
7843000
trusted library allocation
page read and write
78B3000
trusted library allocation
page read and write
C98000
heap
page read and write
352C000
trusted library allocation
page read and write
770F000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
785A000
trusted library allocation
page read and write
7A4D000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
6CF0000
heap
page read and write
546F000
heap
page read and write
5050000
trusted library allocation
page read and write
73FE000
stack
page read and write
12E0000
trusted library allocation
page read and write
78CC000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
699E000
stack
page read and write
126A000
trusted library allocation
page read and write
653E000
stack
page read and write
43C2000
trusted library allocation
page read and write
12F5000
heap
page read and write
781B000
trusted library allocation
page read and write
7A71000
trusted library allocation
page read and write
C22000
trusted library allocation
page read and write
771B000
trusted library allocation
page read and write
5D8D000
trusted library allocation
page read and write
52FF000
trusted library allocation
page read and write
79B5000
trusted library allocation
page read and write
2D11000
trusted library allocation
page read and write
73CF000
stack
page read and write
76FF000
trusted library allocation
page read and write
5C6E000
stack
page read and write
48EA000
trusted library allocation
page read and write
7976000
trusted library allocation
page read and write
5477000
heap
page read and write
EB2000
trusted library allocation
page read and write
4C4E000
stack
page read and write
337C000
trusted library allocation
page read and write
7919000
trusted library allocation
page read and write
F2E000
heap
page read and write
4BC5000
heap
page execute and read and write
788A000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
788B000
trusted library allocation
page read and write
593E000
stack
page read and write
668D000
trusted library allocation
page read and write
7761000
trusted library allocation
page read and write
5FEE000
stack
page read and write
790E000
trusted library allocation
page read and write
7AD3000
trusted library allocation
page read and write
78AB000
trusted library allocation
page read and write
74EF000
trusted library allocation
page read and write
36B2000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
6CF2000
heap
page read and write
6F80000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
3249000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
39BF000
trusted library allocation
page read and write
6230000
trusted library allocation
page read and write
7B08000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
7A4C000
trusted library allocation
page read and write
7A96000
trusted library allocation
page read and write
6FB000
stack
page read and write
3E4D000
trusted library allocation
page read and write
12BA000
heap
page read and write
6E30000
trusted library allocation
page execute and read and write
57FA000
heap
page read and write
597E000
trusted library allocation
page read and write
7E5000
heap
page read and write
29B0000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
2C87000
trusted library allocation
page read and write
5B0000
trusted library allocation
page read and write
1360000
trusted library allocation
page execute and read and write
6262000
trusted library allocation
page read and write
7759000
trusted library allocation
page read and write
7CE5000
trusted library allocation
page read and write
5C6E000
stack
page read and write
E6F000
stack
page read and write
606D000
stack
page read and write
78CA000
trusted library allocation
page read and write
5ADE000
stack
page read and write
753A000
trusted library allocation
page read and write
782D000
trusted library allocation
page read and write
1620000
heap
page read and write
2C62000
trusted library allocation
page read and write
60EE000
stack
page read and write
75E3000
trusted library allocation
page read and write
14FE000
stack
page read and write
35EF000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
7D2B000
trusted library allocation
page read and write
684C000
stack
page read and write
7A30000
trusted library allocation
page read and write
7C03000
trusted library allocation
page read and write
7A67000
trusted library allocation
page read and write
EB6000
trusted library allocation
page execute and read and write
7B5B000
trusted library allocation
page read and write
E50000
heap
page read and write
508E000
trusted library allocation
page read and write
79BE000
stack
page read and write
7826000
trusted library allocation
page read and write
5656000
trusted library allocation
page read and write
48A000
heap
page read and write
7713000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
336E000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
7A50000
trusted library allocation
page read and write
2E93000
trusted library allocation
page read and write
4FD8000
trusted library allocation
page read and write
3115000
trusted library allocation
page read and write
545C000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
7621000
trusted library allocation
page read and write
48BA000
trusted library allocation
page read and write
6FD2000
trusted library allocation
page read and write
7A47000
trusted library allocation
page read and write
373E000
trusted library allocation
page read and write
7CD1000
trusted library allocation
page read and write
2E32000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
623B000
trusted library allocation
page read and write
2CDB000
trusted library allocation
page read and write
317F000
heap
page read and write
4DEB000
trusted library allocation
page read and write
48B6000
trusted library allocation
page read and write
7879000
trusted library allocation
page read and write
7BD7000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
4131000
trusted library allocation
page read and write
723E000
stack
page read and write
7A20000
trusted library allocation
page read and write
30A9000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page execute and read and write
7993000
trusted library allocation
page read and write
5A9F000
stack
page read and write
7A69000
trusted library allocation
page read and write
4C9E000
stack
page read and write
5FBE000
stack
page read and write
7DF9000
trusted library allocation
page read and write
7A56000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
53BE000
stack
page read and write
54D0000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
5BF6000
heap
page read and write
3143000
trusted library allocation
page read and write
2C66000
trusted library allocation
page read and write
758C000
trusted library allocation
page read and write
5629000
trusted library allocation
page read and write
3EFD000
trusted library allocation
page read and write
39E9000
trusted library allocation
page read and write
50A1000
trusted library allocation
page read and write
7A5A000
trusted library allocation
page read and write
3328000
trusted library allocation
page read and write
5B24000
trusted library allocation
page read and write
3712000
trusted library allocation
page read and write
78E3000
trusted library allocation
page read and write
12F2000
heap
page read and write
114D000
trusted library allocation
page execute and read and write
56C0000
trusted library allocation
page read and write
9F7000
heap
page read and write
E9D000
trusted library allocation
page execute and read and write
110E000
stack
page read and write
67BD000
stack
page read and write
3E49000
trusted library allocation
page read and write
30C9000
heap
page read and write
4D5E000
stack
page read and write
318D000
trusted library allocation
page read and write
78AE000
stack
page read and write
5464000
trusted library allocation
page read and write
7E1D000
trusted library allocation
page read and write
5471000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
2C6C000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
7A62000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
2C9E000
trusted library allocation
page read and write
5271000
trusted library allocation
page read and write
751C000
trusted library allocation
page read and write
5D3E000
stack
page read and write
DA6000
trusted library allocation
page execute and read and write
1140000
trusted library allocation
page read and write
D73000
trusted library allocation
page execute and read and write
330F000
stack
page read and write
462A000
trusted library allocation
page read and write
7B4B000
trusted library allocation
page read and write
788C000
trusted library allocation
page read and write
E9B000
trusted library allocation
page execute and read and write
7D79000
trusted library allocation
page read and write
75B9000
trusted library allocation
page read and write
7576000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
7CDD000
trusted library allocation
page read and write
6040000
trusted library allocation
page execute and read and write
2CEC000
trusted library allocation
page read and write
7A13000
trusted library allocation
page read and write
7A81000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
69AD000
stack
page read and write
6A2D000
stack
page read and write
4150000
heap
page read and write
E93000
trusted library allocation
page execute and read and write
78F5000
trusted library allocation
page read and write
7A40000
trusted library allocation
page read and write
3033000
trusted library allocation
page read and write
C0A000
trusted library allocation
page read and write
7921000
trusted library allocation
page read and write
79C4000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
2C64000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
7B19000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
792D000
trusted library allocation
page read and write
3090000
heap
page read and write
7569000
trusted library allocation
page read and write
6ECE000
stack
page read and write
3A71000
trusted library allocation
page read and write
7845000
trusted library allocation
page read and write
7DF1000
trusted library allocation
page read and write
3B01000
trusted library allocation
page read and write
7AA0000
trusted library allocation
page read and write
2A60000
heap
page read and write
5744000
trusted library allocation
page read and write
4B03000
trusted library allocation
page read and write
7813000
trusted library allocation
page read and write
7982000
trusted library allocation
page read and write
EC7000
trusted library allocation
page execute and read and write
12C3000
trusted library allocation
page execute and read and write
12C0000
trusted library allocation
page read and write
4175000
heap
page execute and read and write
7ABD000
trusted library allocation
page read and write
336B000
trusted library allocation
page read and write
55E0000
trusted library allocation
page execute and read and write
7810000
trusted library allocation
page read and write
67FA000
stack
page read and write
2980000
trusted library section
page read and write
667B000
trusted library allocation
page read and write
7E48000
trusted library allocation
page read and write
69EA000
heap
page read and write
7A2B000
trusted library allocation
page read and write
6658000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
14A8000
heap
page read and write
1270000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
3037000
trusted library allocation
page read and write
1420000
heap
page read and write
2A9D000
trusted library allocation
page read and write
5510000
trusted library section
page read and write
6E4000
trusted library allocation
page read and write
782F000
trusted library allocation
page read and write
2F92000
trusted library allocation
page read and write
1144000
trusted library allocation
page read and write
78D6000
trusted library allocation
page read and write
65EE000
stack
page read and write
F20000
heap
page read and write
665D000
trusted library allocation
page read and write
773D000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
4085000
trusted library allocation
page read and write
56C2000
heap
page read and write
7AD1000
trusted library allocation
page read and write
5485000
trusted library allocation
page read and write
BCB000
heap
page read and write
4E2E000
stack
page read and write
135E000
stack
page read and write
7902000
trusted library allocation
page read and write
3353000
trusted library allocation
page read and write
78F3000
trusted library allocation
page read and write
76EF000
trusted library allocation
page read and write
7D1F000
trusted library allocation
page read and write
7888000
trusted library allocation
page read and write
2D19000
trusted library allocation
page read and write
7AED000
trusted library allocation
page read and write
7912000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
3388000
trusted library allocation
page read and write
57E8000
heap
page read and write
7908000
trusted library allocation
page read and write
1570000
heap
page read and write
34F6000
trusted library allocation
page read and write
66FB000
stack
page read and write
78A9000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
717B000
stack
page read and write
3801000
trusted library allocation
page read and write
30BD000
heap
page read and write
5816000
trusted library allocation
page read and write
774A000
trusted library allocation
page read and write
792E000
stack
page read and write
9F0000
heap
page read and write
521F000
stack
page read and write
1260000
trusted library allocation
page read and write
79E1000
trusted library allocation
page read and write
7ABF000
trusted library allocation
page read and write
7656000
heap
page read and write
7AF0000
trusted library allocation
page read and write
2E0C000
stack
page read and write
2A00000
trusted library allocation
page read and write
51C7000
trusted library allocation
page read and write
38FD000
trusted library allocation
page read and write
3C25000
trusted library allocation
page read and write
5860000
trusted library allocation
page execute and read and write
F46000
heap
page read and write
3234000
trusted library allocation
page read and write
E80000
heap
page read and write
78A2000
trusted library allocation
page read and write
2C6E000
trusted library allocation
page read and write
306A000
trusted library allocation
page read and write
5E61000
trusted library allocation
page read and write
7A03000
trusted library allocation
page read and write
31D8000
trusted library allocation
page read and write
1550000
trusted library allocation
page execute and read and write
5450000
trusted library allocation
page read and write
7D7D000
trusted library allocation
page read and write
4B79000
trusted library allocation
page read and write
78B7000
trusted library allocation
page read and write
7886000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
BF3000
trusted library allocation
page execute and read and write
5F10000
heap
page read and write
2E38000
stack
page read and write
7000000
trusted library allocation
page read and write
7808000
trusted library allocation
page read and write
2A9B000
trusted library allocation
page read and write
7AC1000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
10BE000
stack
page read and write
6670000
trusted library allocation
page read and write
7AFC000
trusted library allocation
page read and write
78F9000
trusted library allocation
page read and write
10DE000
heap
page read and write
4D1000
heap
page read and write
6B60000
heap
page read and write
7A9A000
trusted library allocation
page read and write
780E000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
7E3F000
trusted library allocation
page read and write
6DF000
stack
page read and write
38FA000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
77A7000
trusted library allocation
page read and write
C951000
trusted library allocation
page read and write
12F5000
trusted library allocation
page execute and read and write
7A27000
trusted library allocation
page read and write
7676000
heap
page read and write
5CF8000
stack
page read and write
4E70000
trusted library allocation
page read and write
567D000
trusted library allocation
page read and write
78EB000
trusted library allocation
page read and write
2C1F000
trusted library allocation
page read and write
7AB1000
trusted library allocation
page read and write
35B9000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
7615000
trusted library allocation
page read and write
65D2000
heap
page read and write
10F6000
heap
page read and write
2EB0000
trusted library allocation
page read and write
5760000
heap
page read and write
3369000
trusted library allocation
page read and write
105B000
stack
page read and write
1276000
trusted library allocation
page execute and read and write
1070000
heap
page read and write
3ACC000
trusted library allocation
page read and write
5964000
trusted library allocation
page read and write
7847000
trusted library allocation
page read and write
6B5E000
stack
page read and write
2CA8000
trusted library allocation
page read and write
6232000
trusted library allocation
page read and write
5110000
heap
page execute and read and write
894F000
stack
page read and write
3837000
trusted library allocation
page read and write
74A3000
trusted library allocation
page read and write
7A88000
trusted library allocation
page read and write
7851000
trusted library allocation
page read and write
27B0000
trusted library allocation
page execute and read and write
7A6E000
trusted library allocation
page read and write
635F000
stack
page read and write
789E000
trusted library allocation
page read and write
108E000
stack
page read and write
3CE8000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
7819000
trusted library allocation
page read and write
28E0000
heap
page execute and read and write
5770000
trusted library allocation
page read and write
C1A000
trusted library allocation
page execute and read and write
69E0000
heap
page read and write
7983000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
48F0000
trusted library allocation
page read and write
59EA000
trusted library allocation
page read and write
2C89000
trusted library allocation
page read and write
3EE1000
trusted library allocation
page read and write
2D15000
trusted library allocation
page read and write
421C000
trusted library allocation
page read and write
1126000
heap
page read and write
7877000
trusted library allocation
page read and write
5D40000
trusted library allocation
page execute and read and write
2C6A000
trusted library allocation
page read and write
367C000
trusted library allocation
page read and write
3D11000
trusted library allocation
page read and write
7E2B000
trusted library allocation
page read and write
DAA000
trusted library allocation
page execute and read and write
5ABE000
stack
page read and write
FF0000
heap
page read and write
6256000
trusted library allocation
page read and write
7612000
trusted library allocation
page read and write
2ED0000
heap
page read and write
5756000
trusted library allocation
page read and write
7647000
heap
page read and write
7C65000
trusted library allocation
page read and write
5DE0000
heap
page read and write
304C000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page execute and read and write
2D13000
trusted library allocation
page read and write
3310000
heap
page readonly
566E000
trusted library allocation
page read and write
3D14000
trusted library allocation
page read and write
3F58000
trusted library allocation
page read and write
7C27000
trusted library allocation
page read and write
5670000
trusted library allocation
page execute and read and write
783F000
trusted library allocation
page read and write
5690000
heap
page read and write
C0D000
trusted library allocation
page execute and read and write
67E0000
trusted library allocation
page read and write
F39000
heap
page read and write
2860000
trusted library allocation
page read and write
7D3C000
trusted library allocation
page read and write
764F000
heap
page read and write
7AA9000
trusted library allocation
page read and write
785C000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
7F9A0000
trusted library allocation
page execute and read and write
5F70000
trusted library allocation
page execute and read and write
32D1000
trusted library allocation
page read and write
7894000
trusted library allocation
page read and write
797F000
trusted library allocation
page read and write
6258000
trusted library allocation
page read and write
7A4A000
trusted library allocation
page read and write
361B000
trusted library allocation
page read and write
7C93000
trusted library allocation
page read and write
14D6000
heap
page read and write
6D1D000
heap
page read and write
4250000
trusted library allocation
page read and write
7A23000
trusted library allocation
page read and write
7A92000
trusted library allocation
page read and write
7A18000
trusted library allocation
page read and write
12EA000
trusted library allocation
page execute and read and write
78A8000
trusted library allocation
page read and write
7A8C000
trusted library allocation
page read and write
7986000
trusted library allocation
page read and write
79D4000
trusted library allocation
page read and write
D999000
trusted library allocation
page read and write
4EB0000
heap
page read and write
2D0F000
trusted library allocation
page read and write
778B000
trusted library allocation
page read and write
320E000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
7BF3000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
50A8000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
2F86000
heap
page read and write
796E000
trusted library allocation
page read and write
4DE9000
trusted library allocation
page read and write
6A40000
trusted library allocation
page execute and read and write
78E1000
trusted library allocation
page read and write
12E2000
trusted library allocation
page read and write
E95000
trusted library allocation
page execute and read and write
51B0000
trusted library allocation
page execute and read and write
4DED000
stack
page read and write
59E0000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
7869000
trusted library allocation
page read and write
5BAD000
trusted library allocation
page read and write
3361000
trusted library allocation
page read and write
52D7000
trusted library allocation
page read and write
3A77000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
7D6D000
trusted library allocation
page read and write
7815000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
30A7000
trusted library allocation
page read and write
4D4000
remote allocation
page execute and read and write
7898000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
752A000
trusted library allocation
page read and write
7A66000
trusted library allocation
page read and write
3433000
trusted library allocation
page read and write
67F0000
heap
page read and write
5760000
trusted library allocation
page execute and read and write
5694000
heap
page read and write
7B48000
trusted library allocation
page read and write
7BE000
stack
page read and write
5B50000
trusted library allocation
page read and write
2A5E000
stack
page read and write
7835000
trusted library allocation
page read and write
B7D000
stack
page read and write
2790000
heap
page execute and read and write
C70000
heap
page read and write
7E6B000
trusted library allocation
page read and write
6D5E000
stack
page read and write
77AB000
trusted library allocation
page read and write
757E000
stack
page read and write
7625000
trusted library allocation
page read and write
38F1000
trusted library allocation
page read and write
2E60000
heap
page read and write
5C1E000
heap
page read and write
3FE1000
trusted library allocation
page read and write
9A2F000
trusted library allocation
page read and write
5640000
heap
page execute and read and write
4B7E000
stack
page read and write
7A44000
trusted library allocation
page read and write
4E60000
trusted library allocation
page execute and read and write
314B000
trusted library allocation
page read and write
7E3B000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
7A5C000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
108000
stack
page read and write
779B000
trusted library allocation
page read and write
7E79000
trusted library allocation
page read and write
7864000
trusted library allocation
page read and write
78DA000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
78DA000
trusted library allocation
page read and write
FF5000
heap
page read and write
D51000
heap
page read and write
2C1E000
stack
page read and write
7810000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
127A000
trusted library allocation
page execute and read and write
6A6E000
stack
page read and write
78C6000
trusted library allocation
page read and write
3558000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
3E47000
trusted library allocation
page read and write
79E0000
heap
page read and write
D97000
heap
page read and write
791B000
trusted library allocation
page read and write
670E000
unkown
page read and write
75D0000
heap
page read and write
615E000
stack
page read and write
36E0000
trusted library allocation
page read and write
3B8F000
trusted library allocation
page read and write
78EA000
trusted library allocation
page read and write
7584000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
679E000
stack
page read and write
5A70000
trusted library allocation
page read and write
787D000
trusted library allocation
page read and write
78D8000
trusted library allocation
page read and write
7ACC000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
B7E000
stack
page read and write
6234000
trusted library allocation
page read and write
7631000
trusted library allocation
page read and write
7904000
trusted library allocation
page read and write
6CD4000
heap
page read and write
4FFE000
stack
page read and write
71BE000
stack
page read and write
880000
trusted library allocation
page execute and read and write
74A1000
trusted library allocation
page read and write
64B0000
heap
page read and write
4925000
trusted library allocation
page read and write
7D8000
heap
page read and write
53D0000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
7BA9000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
EF91000
trusted library allocation
page read and write
7A40000
trusted library allocation
page read and write
593C000
stack
page read and write
ECB000
trusted library allocation
page execute and read and write
8E10000
trusted library allocation
page read and write
632B000
stack
page read and write
787B000
trusted library allocation
page read and write
12DE000
stack
page read and write
5685000
trusted library allocation
page read and write
7AFA000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
7E1B000
trusted library allocation
page read and write
5810000
trusted library allocation
page execute and read and write
7663000
trusted library allocation
page read and write
6B70000
heap
page read and write
A60000
heap
page read and write
2CF0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
2A60000
heap
page execute and read and write
6648000
trusted library allocation
page read and write
3B2000
unkown
page readonly
54BA000
trusted library allocation
page read and write
7A31000
trusted library allocation
page read and write
78EF000
stack
page read and write
BB0000
heap
page read and write
6632000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
57C4000
heap
page read and write
7A9A000
trusted library allocation
page read and write
6CB1000
heap
page read and write
54E0000
trusted library allocation
page read and write
7A3C000
trusted library allocation
page read and write
74CE000
stack
page read and write
7A28000
trusted library allocation
page read and write
5A60000
trusted library allocation
page execute and read and write
7A76000
trusted library allocation
page read and write
783D000
trusted library allocation
page read and write
1143000
trusted library allocation
page execute and read and write
7A1C000
trusted library allocation
page read and write
7E85000
trusted library allocation
page read and write
78C8000
trusted library allocation
page read and write
12CD000
trusted library allocation
page execute and read and write
28DB000
trusted library allocation
page read and write
6430000
heap
page read and write
4C02000
trusted library allocation
page read and write
7BB5000
trusted library allocation
page read and write
104E000
stack
page read and write
49EE000
stack
page read and write
56A0000
trusted library allocation
page read and write
7DDD000
trusted library allocation
page read and write
79ED000
stack
page read and write
4D4D000
stack
page read and write
2C00000
trusted library allocation
page read and write
B80000
heap
page read and write
6430000
trusted library allocation
page execute and read and write
5639000
trusted library allocation
page read and write
7A0C000
trusted library allocation
page read and write
7A52000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
5750000
trusted library allocation
page execute and read and write
2FC0000
heap
page read and write
402000
remote allocation
page execute and read and write
3020000
trusted library allocation
page read and write
6244000
trusted library allocation
page read and write
319C000
trusted library allocation
page read and write
3A1E000
trusted library allocation
page read and write
5B36000
trusted library allocation
page read and write
7E37000
trusted library allocation
page read and write
1157000
stack
page read and write
5200000
trusted library allocation
page read and write
78F7000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
580E000
stack
page read and write
1500000
heap
page read and write
EE0000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
518E000
stack
page read and write
7C73000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
1097000
heap
page read and write
7960000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
85A1000
trusted library allocation
page read and write
753E000
trusted library allocation
page read and write
83C000
stack
page read and write
1472000
trusted library allocation
page read and write
6AAE000
stack
page read and write
7F6A0000
trusted library allocation
page execute and read and write
7B14000
trusted library allocation
page read and write
5590000
heap
page execute and read and write
7C41000
trusted library allocation
page read and write
516E000
stack
page read and write
1482000
trusted library allocation
page read and write
1453000
trusted library allocation
page execute and read and write
5490000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
5A18000
trusted library allocation
page read and write
78FB000
trusted library allocation
page read and write
7B89000
trusted library allocation
page read and write
2C8B000
trusted library allocation
page read and write
38C4000
trusted library allocation
page read and write
41BE000
stack
page read and write
3979000
trusted library allocation
page read and write
7A3E000
trusted library allocation
page read and write
4EC0000
heap
page read and write
3AA8000
trusted library allocation
page read and write
790A000
trusted library allocation
page read and write
38F9000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
7AA7000
trusted library allocation
page read and write
7630000
heap
page read and write
180000
heap
page read and write
7CC3000
trusted library allocation
page read and write
C78000
heap
page read and write
5DD0000
trusted library allocation
page read and write
10C0000
heap
page read and write
1506000
heap
page read and write
664E000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page execute and read and write
2C68000
trusted library allocation
page read and write
7A5E000
trusted library allocation
page read and write
78FD000
trusted library allocation
page read and write
7EFD0000
trusted library allocation
page execute and read and write
5299000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
29F0000
trusted library allocation
page execute and read and write
5DAE000
stack
page read and write
6CFA000
heap
page read and write
553E000
stack
page read and write
509E000
trusted library allocation
page read and write
36DC000
trusted library allocation
page read and write
8D0000
heap
page execute and read and write
5A50000
trusted library allocation
page execute and read and write
7C8F000
trusted library allocation
page read and write
30E9000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
7801000
trusted library allocation
page read and write
7862000
trusted library allocation
page read and write
31CF000
stack
page read and write
2D0D000
trusted library allocation
page read and write
7A38000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
C2B000
trusted library allocation
page execute and read and write
562F000
trusted library allocation
page read and write
9CE000
stack
page read and write
7931000
trusted library allocation
page read and write
793E000
trusted library allocation
page read and write
7A35000
trusted library allocation
page read and write
5B3F000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
7B57000
trusted library allocation
page read and write
7607000
trusted library allocation
page read and write
77DB000
trusted library allocation
page read and write
7852000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
7A7F000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page execute and read and write
284C000
stack
page read and write
2780000
trusted library allocation
page read and write
5094000
trusted library allocation
page read and write
3B2D000
trusted library allocation
page read and write
288C000
stack
page read and write
3367000
trusted library allocation
page read and write
1150000
heap
page read and write
7629000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
79C9000
trusted library allocation
page read and write
786B000
trusted library allocation
page read and write
D59000
heap
page read and write
65D0000
heap
page read and write
12E6000
trusted library allocation
page execute and read and write
79D8000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
3407000
trusted library allocation
page read and write
379A000
trusted library allocation
page read and write
3921000
trusted library allocation
page read and write
85D0000
heap
page read and write
52D1000
trusted library allocation
page read and write
2D17000
trusted library allocation
page read and write
78CA000
trusted library allocation
page read and write
3031000
trusted library allocation
page read and write
E19C000
trusted library allocation
page read and write
7655000
trusted library allocation
page read and write
5370000
heap
page execute and read and write
1594000
heap
page read and write
32BF000
trusted library allocation
page read and write
7883000
trusted library allocation
page read and write
30B9000
trusted library allocation
page read and write
30DB000
trusted library allocation
page read and write
42CD000
trusted library allocation
page read and write
2C7D000
trusted library allocation
page read and write
7595000
trusted library allocation
page read and write
14A0000
heap
page read and write
329B000
trusted library allocation
page read and write
5086000
trusted library allocation
page read and write
D951000
trusted library allocation
page read and write
5547000
trusted library allocation
page read and write
5751000
trusted library allocation
page read and write
796D000
trusted library allocation
page read and write
546E000
trusted library allocation
page read and write
54F0000
trusted library allocation
page execute and read and write
7641000
heap
page read and write
51D0000
trusted library allocation
page read and write
2B8F000
stack
page read and write
7B67000
trusted library allocation
page read and write
5660000
trusted library allocation
page execute and read and write
5950000
trusted library allocation
page execute and read and write
8951000
trusted library allocation
page read and write
5414000
heap
page read and write
5520000
trusted library allocation
page execute and read and write
5630000
trusted library allocation
page read and write
87B5000
trusted library allocation
page read and write
5D90000
trusted library allocation
page execute and read and write
6F4D000
stack
page read and write
3035000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
3262000
trusted library allocation
page read and write
72FB000
stack
page read and write
76A1000
trusted library allocation
page read and write
787C000
trusted library allocation
page read and write
77FF000
trusted library allocation
page read and write
402E000
trusted library allocation
page read and write
10A0000
heap
page read and write
3382000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
75A7000
trusted library allocation
page read and write
1476000
trusted library allocation
page execute and read and write
468000
heap
page read and write
358D000
trusted library allocation
page read and write
5A7A000
stack
page read and write
1590000
heap
page read and write
2A80000
heap
page read and write
7C51000
trusted library allocation
page read and write
7803000
trusted library allocation
page read and write
3321000
trusted library allocation
page read and write
5910000
trusted library allocation
page execute and read and write
450000
heap
page read and write
79CD000
trusted library allocation
page read and write
10D000
stack
page read and write
6D00000
heap
page read and write
663F000
trusted library allocation
page read and write
7821000
trusted library allocation
page read and write
79FD000
trusted library allocation
page read and write
857E000
stack
page read and write
4E61000
trusted library allocation
page read and write
DE33000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
2C6A000
trusted library allocation
page read and write
52F2000
trusted library allocation
page read and write
4511000
trusted library allocation
page read and write
3469000
trusted library allocation
page read and write
30FE000
heap
page read and write
5550000
trusted library allocation
page read and write
AF7000
stack
page read and write
303D000
trusted library allocation
page read and write
69EA000
stack
page read and write
54C0000
trusted library allocation
page read and write
6801000
heap
page read and write
5822000
heap
page read and write
51EC000
trusted library allocation
page read and write
323A000
trusted library allocation
page read and write
71D0000
trusted library allocation
page execute and read and write
7971000
trusted library allocation
page read and write
8580000
heap
page read and write
323D000
trusted library allocation
page execute and read and write
D129000
trusted library allocation
page read and write
3A6A000
trusted library allocation
page read and write
147F000
stack
page read and write
798A000
trusted library allocation
page read and write
7B5F000
trusted library allocation
page read and write
3BF1000
trusted library allocation
page read and write
57EA000
heap
page read and write
78B1000
trusted library allocation
page read and write
28D9000
trusted library allocation
page read and write
7910000
trusted library allocation
page read and write
789C000
trusted library allocation
page read and write
3A79000
trusted library allocation
page read and write
A010000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
559E000
stack
page read and write
77AF000
trusted library allocation
page read and write
789B000
trusted library allocation
page read and write
58CE000
stack
page read and write
2EB0000
heap
page read and write
146D000
trusted library allocation
page execute and read and write
786F000
trusted library allocation
page read and write
7D6B000
trusted library allocation
page read and write
DB5000
heap
page read and write
59A5000
trusted library allocation
page read and write
79AE000
stack
page read and write
79F0000
trusted library allocation
page execute and read and write
2C81000
trusted library allocation
page read and write
783B000
trusted library allocation
page read and write
7A84000
trusted library allocation
page read and write
3023000
trusted library allocation
page read and write
75E2000
heap
page read and write
8615000
trusted library allocation
page read and write
2BFC000
stack
page read and write
6180000
trusted library allocation
page execute and read and write
5671000
trusted library allocation
page read and write
7ADE000
stack
page read and write
2C3B000
trusted library allocation
page read and write
E9A8000
trusted library allocation
page read and write
3340000
trusted library allocation
page execute and read and write
D5C000
heap
page read and write
2E90000
heap
page execute and read and write
797B000
trusted library allocation
page read and write
5950000
trusted library allocation
page execute and read and write
73A0000
heap
page read and write
5C0000
heap
page read and write
782B000
trusted library allocation
page read and write
7D81000
trusted library allocation
page read and write
502F000
trusted library allocation
page read and write
547A000
heap
page read and write
7A86000
trusted library allocation
page read and write
2CEA000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
7A30000
heap
page read and write
6280000
trusted library allocation
page read and write
D7D000
trusted library allocation
page execute and read and write
B8E000
heap
page read and write
76C1000
trusted library allocation
page read and write
1155000
heap
page read and write
50E0000
trusted library allocation
page read and write
7A2D000
trusted library allocation
page read and write
28CE000
stack
page read and write
78CE000
trusted library allocation
page read and write
30DE000
trusted library allocation
page read and write
7906000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
12BE000
heap
page read and write
78E7000
trusted library allocation
page read and write
5610000
trusted library allocation
page execute and read and write
4B80000
trusted library allocation
page read and write
7974000
trusted library allocation
page read and write
2CDF000
trusted library allocation
page read and write
6E8E000
stack
page read and write
EAD000
trusted library allocation
page execute and read and write
2CA0000
trusted library allocation
page read and write
F90000
heap
page read and write
5710000
trusted library allocation
page read and write
2E1F000
stack
page read and write
5760000
heap
page read and write
2A50000
trusted library allocation
page read and write
7935000
trusted library allocation
page read and write
61F0000
trusted library allocation
page execute and read and write
66D0000
trusted library allocation
page execute and read and write
91C000
stack
page read and write
1320000
heap
page read and write
2CEE000
trusted library allocation
page read and write
572D000
stack
page read and write
76AA000
heap
page read and write
74E7000
trusted library allocation
page read and write
3FF4000
trusted library allocation
page read and write
7E0000
heap
page read and write
32CE000
stack
page read and write
79B7000
trusted library allocation
page read and write
58DE000
stack
page read and write
5E09000
trusted library allocation
page read and write
788E000
trusted library allocation
page read and write
7A6D000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
50B5000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
1377000
heap
page read and write
75C4000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
7C49000
trusted library allocation
page read and write
7BB0000
heap
page read and write
5A02000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
50D9000
trusted library allocation
page read and write
3189000
trusted library allocation
page read and write
65E1000
trusted library allocation
page read and write
10C8000
heap
page read and write
78B9000
trusted library allocation
page read and write
512000
heap
page read and write
77F5000
trusted library allocation
page read and write
B951000
trusted library allocation
page read and write
5060000
trusted library allocation
page execute and read and write
65F0000
heap
page read and write
62B0000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
337E000
trusted library allocation
page read and write
5653000
trusted library allocation
page read and write
2C66000
trusted library allocation
page read and write
335C000
heap
page read and write
E90000
trusted library allocation
page read and write
62C0000
heap
page read and write
5B30000
trusted library allocation
page read and write
673E000
stack
page read and write
1487000
trusted library allocation
page execute and read and write
78D4000
trusted library allocation
page read and write
7A65000
trusted library allocation
page read and write
7D33000
trusted library allocation
page read and write
7A42000
trusted library allocation
page read and write
E92000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
65BE000
stack
page read and write
7ACA000
trusted library allocation
page read and write
3A7D000
trusted library allocation
page read and write
7A0E000
trusted library allocation
page read and write
73BE000
stack
page read and write
C50000
trusted library allocation
page execute and read and write
7CA0000
trusted library allocation
page read and write
7A94000
trusted library allocation
page read and write
5BBD000
stack
page read and write
7C83000
trusted library allocation
page read and write
7A20000
heap
page read and write
303B000
trusted library allocation
page read and write
5710000
trusted library allocation
page execute and read and write
7A00000
trusted library allocation
page execute and read and write
674C000
unkown
page read and write
74F8000
trusted library allocation
page read and write
7A9E000
stack
page read and write
277E000
stack
page read and write
6570000
trusted library allocation
page execute and read and write
12F7000
trusted library allocation
page execute and read and write
There are 1739 hidden memdumps, click here to show them.