IOC Report
SOA FOR APR 2024 PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
SOA FOR APR 2024 PDF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpCB26.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\eeBIYZL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BjTxJte.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SOA FOR APR 2024 PDF.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\eeBIYZL.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0ibc5ldv.n1m.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3y3jasax.ltn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dmva4iqf.d3n.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dr0amdqh.h0i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fqn0tmik.0o2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k1hmvqm3.j5f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_njl2nzqb.hxd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yxgopani.ari.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2ADA.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp9B5.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpE2E4.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\eeBIYZL.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SOA FOR APR 2024 PDF.exe
"C:\Users\user\Desktop\SOA FOR APR 2024 PDF.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SOA FOR APR 2024 PDF.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eeBIYZL.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeBIYZL" /XML "C:\Users\user\AppData\Local\Temp\tmpCB26.tmp"
malicious
C:\Users\user\Desktop\SOA FOR APR 2024 PDF.exe
"C:\Users\user\Desktop\SOA FOR APR 2024 PDF.exe"
malicious
C:\Users\user\AppData\Roaming\eeBIYZL.exe
C:\Users\user\AppData\Roaming\eeBIYZL.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeBIYZL" /XML "C:\Users\user\AppData\Local\Temp\tmpE2E4.tmp"
malicious
C:\Users\user\AppData\Roaming\eeBIYZL.exe
"C:\Users\user\AppData\Roaming\eeBIYZL.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeBIYZL" /XML "C:\Users\user\AppData\Local\Temp\tmp9B5.tmp"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eeBIYZL" /XML "C:\Users\user\AppData\Local\Temp\tmp2ADA.tmp"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
http://r3.o.lencr.org0
unknown
https://api.ipify.org
unknown
http://mail.fascia-arch.com
unknown
http://x1.c6
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r3.i.lencr.org/0
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.fascia-arch.com
50.87.195.61
malicious
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
50.87.195.61
mail.fascia-arch.com
United States
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SOA FOR APR 2024 PDF_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
BjTxJte
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eeBIYZL_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
FileDirectory
There are 38 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
45FC000
trusted library allocation
page read and write
malicious
2E61000
trusted library allocation
page read and write
malicious
2861000
trusted library allocation
page read and write
malicious
3B69000
trusted library allocation
page read and write
malicious
288C000
trusted library allocation
page read and write
malicious
435000
remote allocation
page execute and read and write
malicious
3FAE000
trusted library allocation
page read and write
malicious
3244000
trusted library allocation
page read and write
malicious
34FC000
trusted library allocation
page read and write
malicious
48BB000
trusted library allocation
page read and write
malicious
323C000
trusted library allocation
page read and write
malicious
3504000
trusted library allocation
page read and write
malicious
2EB4000
trusted library allocation
page read and write
malicious
4BEC000
trusted library allocation
page read and write
malicious
3211000
trusted library allocation
page read and write
malicious
34D1000
trusted library allocation
page read and write
malicious
5260000
trusted library section
page read and write
malicious
2EAC000
trusted library allocation
page read and write
malicious
2894000
trusted library allocation
page read and write
malicious
10AE000
stack
page read and write
24A0000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
B80000
heap
page read and write
3B61000
trusted library allocation
page read and write
71DD000
stack
page read and write
2520000
heap
page execute and read and write
66A6000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
784E000
trusted library allocation
page read and write
2EA8000
trusted library allocation
page read and write
72AE000
trusted library allocation
page read and write
2AD9000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
77EF000
trusted library allocation
page read and write
4CF4000
trusted library allocation
page read and write
65E000
stack
page read and write
709A000
trusted library allocation
page read and write
504C000
stack
page read and write
279F000
stack
page read and write
29FC000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
6F78000
trusted library allocation
page read and write
1AFB000
trusted library allocation
page execute and read and write
DAD000
trusted library allocation
page execute and read and write
15DB000
stack
page read and write
8DD0000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
71F2000
trusted library allocation
page read and write
7993000
trusted library allocation
page read and write
5330000
heap
page execute and read and write
3596000
trusted library allocation
page read and write
7BA9000
trusted library allocation
page read and write
D0BF000
stack
page read and write
2D54000
trusted library allocation
page read and write
2EBF000
trusted library allocation
page read and write
7BA3000
trusted library allocation
page read and write
2A62000
trusted library allocation
page read and write
72B2000
trusted library allocation
page read and write
7B9F000
trusted library allocation
page read and write
7B34000
trusted library allocation
page read and write
2A7C000
trusted library allocation
page read and write
7A71000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
842000
trusted library allocation
page read and write
750E000
stack
page read and write
41F000
remote allocation
page execute and read and write
4ED2000
trusted library allocation
page read and write
29B7000
trusted library allocation
page read and write
CE9000
stack
page read and write
721E000
trusted library allocation
page read and write
2A3A000
trusted library allocation
page read and write
CBE000
stack
page read and write
7B4D000
trusted library allocation
page read and write
6B0E000
stack
page read and write
4D36000
trusted library allocation
page read and write
4ED0000
heap
page read and write
413000
remote allocation
page execute and read and write
4E96000
trusted library allocation
page read and write
C5FE000
stack
page read and write
1050000
heap
page read and write
2A1C000
trusted library allocation
page read and write
2A48000
trusted library allocation
page read and write
786F000
trusted library allocation
page read and write
523D000
stack
page read and write
4FE0000
trusted library allocation
page execute and read and write
7B13000
trusted library allocation
page read and write
2A98000
trusted library allocation
page read and write
5320000
heap
page read and write
7B82000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
3E39000
trusted library allocation
page read and write
7E0000
heap
page read and write
57C0000
heap
page read and write
80E3000
heap
page read and write
7826000
trusted library allocation
page read and write
79E9000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
4F10000
heap
page read and write
794C000
trusted library allocation
page read and write
C50000
heap
page read and write
103E000
stack
page read and write
79AA000
trusted library allocation
page read and write
798D000
trusted library allocation
page read and write
6AE0000
heap
page read and write
6B60000
heap
page read and write
2A22000
trusted library allocation
page read and write
52B0000
heap
page read and write
29EC000
trusted library allocation
page read and write
5895000
heap
page read and write
84B000
trusted library allocation
page execute and read and write
7A4D000
trusted library allocation
page read and write
7AAC000
trusted library allocation
page read and write
7279000
trusted library allocation
page read and write
2C80000
heap
page read and write
71B3000
trusted library allocation
page read and write
2EF1000
trusted library allocation
page read and write
4F04000
heap
page read and write
E70000
trusted library allocation
page read and write
7F740000
trusted library allocation
page execute and read and write
7A8B000
trusted library allocation
page read and write
9EC000
stack
page read and write
34FA000
trusted library allocation
page read and write
411000
remote allocation
page execute and read and write
3590000
heap
page read and write
99A4000
trusted library allocation
page read and write
6E67000
trusted library allocation
page read and write
315E000
trusted library allocation
page read and write
7B94000
trusted library allocation
page read and write
6F10000
trusted library allocation
page execute and read and write
546E000
stack
page read and write
1374000
trusted library allocation
page read and write
490E000
trusted library allocation
page read and write
A10000
heap
page read and write
6A60000
trusted library allocation
page read and write
69F5000
trusted library allocation
page read and write
6E1E000
stack
page read and write
7989000
trusted library allocation
page read and write
7871000
trusted library allocation
page read and write
38A9000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
7325000
trusted library allocation
page read and write
F17000
heap
page read and write
34F8000
trusted library allocation
page read and write
2A0A000
trusted library allocation
page read and write
7A0F000
trusted library allocation
page read and write
16BD000
heap
page read and write
2AA2000
trusted library allocation
page read and write
2A18000
trusted library allocation
page read and write
81D000
trusted library allocation
page execute and read and write
24E0000
trusted library allocation
page read and write
71C1000
trusted library allocation
page read and write
2B50000
heap
page execute and read and write
9AE000
stack
page read and write
950000
heap
page read and write
79A8000
trusted library allocation
page read and write
40E000
remote allocation
page execute and read and write
352E000
stack
page read and write
790A000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
88AE000
stack
page read and write
1EF0000
trusted library allocation
page read and write
6A50000
heap
page read and write
4D34000
trusted library allocation
page read and write
78DC000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
1412000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
3E11000
trusted library allocation
page read and write
6BE0000
heap
page read and write
1440000
heap
page read and write
418000
remote allocation
page execute and read and write
6F3D000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
7828000
trusted library allocation
page read and write
42E000
remote allocation
page execute and read and write
5F9000
stack
page read and write
72B9000
heap
page read and write
24AB000
trusted library allocation
page read and write
7A6B000
trusted library allocation
page read and write
72C6000
trusted library allocation
page read and write
5480000
trusted library allocation
page execute and read and write
EFE000
stack
page read and write
5750000
heap
page execute and read and write
716F000
trusted library allocation
page read and write
2F68000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
295B000
stack
page read and write
69F7000
trusted library allocation
page read and write
D77B000
stack
page read and write
7320000
heap
page read and write
DDE000
stack
page read and write
7150000
trusted library allocation
page read and write
63DE000
stack
page read and write
66B0000
trusted library allocation
page execute and read and write
70D7000
trusted library allocation
page read and write
6F35000
trusted library allocation
page read and write
1671000
heap
page read and write
1AE0000
trusted library allocation
page read and write
705E000
heap
page read and write
6F24000
trusted library allocation
page read and write
72C6000
heap
page read and write
7BB3000
trusted library allocation
page read and write
DBD000
trusted library allocation
page execute and read and write
41AC000
trusted library allocation
page read and write
729D000
trusted library allocation
page read and write
7275000
trusted library allocation
page read and write
49C0000
trusted library allocation
page execute and read and write
2A9C000
trusted library allocation
page read and write
4297000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
ADE000
stack
page read and write
2A44000
trusted library allocation
page read and write
6B0000
heap
page read and write
7985000
trusted library allocation
page read and write
366A000
trusted library allocation
page read and write
4A70000
heap
page read and write
1373000
trusted library allocation
page execute and read and write
1658000
heap
page read and write
4EB0000
trusted library allocation
page read and write
B60000
heap
page read and write
2A2E000
trusted library allocation
page read and write
2D80000
heap
page read and write
7137000
trusted library allocation
page read and write
1751000
heap
page read and write
7120000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
4A60000
trusted library allocation
page read and write
431E000
trusted library allocation
page read and write
7126000
trusted library allocation
page read and write
2B1F000
stack
page read and write
1AF5000
trusted library allocation
page execute and read and write
41E9000
trusted library allocation
page read and write
1427000
heap
page read and write
6EC7000
trusted library allocation
page read and write
70EA000
trusted library allocation
page read and write
6497000
heap
page read and write
86F0000
trusted library allocation
page read and write
2DE4000
trusted library allocation
page read and write
7310000
trusted library allocation
page execute and read and write
5250000
trusted library allocation
page read and write
5F1E000
stack
page read and write
34C9000
trusted library allocation
page read and write
7C14000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
71C5000
trusted library allocation
page read and write
7063000
trusted library allocation
page read and write
CEFE000
stack
page read and write
7220000
trusted library allocation
page read and write
D3FD000
stack
page read and write
1713000
heap
page read and write
7C03000
trusted library allocation
page read and write
3839000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
CDFE000
stack
page read and write
499C000
stack
page read and write
53B0000
trusted library section
page read and write
7176000
trusted library allocation
page read and write
E77000
heap
page read and write
C9BE000
stack
page read and write
1060000
heap
page read and write
DF7000
heap
page read and write
348C000
trusted library allocation
page read and write
16C6000
heap
page read and write
3270000
heap
page read and write
1420000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
7C38000
trusted library allocation
page read and write
6F30000
heap
page read and write
CC41000
heap
page read and write
6FFC000
trusted library allocation
page read and write
2A94000
trusted library allocation
page read and write
41C1000
trusted library allocation
page read and write
5A7C000
stack
page read and write
7A69000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
6F41000
trusted library allocation
page read and write
34CF000
unkown
page read and write
7FB00000
trusted library allocation
page execute and read and write
4ED3000
heap
page read and write
7B60000
trusted library allocation
page read and write
1B10000
trusted library allocation
page read and write
1443000
trusted library allocation
page execute and read and write
427000
remote allocation
page execute and read and write
2C60000
trusted library allocation
page execute and read and write
6FCE000
trusted library allocation
page read and write
29D4000
trusted library allocation
page read and write
567B000
stack
page read and write
7B17000
trusted library allocation
page read and write
2B46000
trusted library allocation
page execute and read and write
5430000
heap
page read and write
29EE000
trusted library allocation
page read and write
6B5F000
stack
page read and write
665F000
stack
page read and write
652E000
stack
page read and write
7AF4000
trusted library allocation
page read and write
164B000
heap
page read and write
71B7000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
1444000
trusted library allocation
page read and write
41C000
remote allocation
page execute and read and write
7AE3000
trusted library allocation
page read and write
6F76000
trusted library allocation
page read and write
729F000
trusted library allocation
page read and write
7BCE000
trusted library allocation
page read and write
4E70000
heap
page read and write
6D0E000
stack
page read and write
716D000
trusted library allocation
page read and write
2A02000
trusted library allocation
page read and write
5D6E000
unkown
page read and write
29E8000
trusted library allocation
page read and write
3F27000
trusted library allocation
page read and write
6A50000
heap
page read and write
2A2E000
stack
page read and write
7830000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
79AC000
trusted library allocation
page read and write
F10000
heap
page read and write
4F50000
heap
page read and write
29AB000
heap
page read and write
71EE000
trusted library allocation
page read and write
2A6A000
trusted library allocation
page read and write
5000000
heap
page read and write
289F000
trusted library allocation
page read and write
2A7E000
trusted library allocation
page read and write
6D50000
heap
page read and write
7281000
trusted library allocation
page read and write
4ECD000
trusted library allocation
page read and write
27BF000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
6F1F000
stack
page read and write
3910000
heap
page read and write
6A1B000
heap
page read and write
2AE5000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
71B5000
trusted library allocation
page read and write
6F45000
trusted library allocation
page read and write
40F000
remote allocation
page execute and read and write
1620000
heap
page read and write
1E6E000
stack
page read and write
7BF2000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
25A1000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
2A0E000
trusted library allocation
page read and write
718A000
trusted library allocation
page read and write
6F5D000
trusted library allocation
page read and write
2A2C000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
6DDE000
stack
page read and write
7B1D000
stack
page read and write
CDFE000
stack
page read and write
152C000
stack
page read and write
324B000
heap
page read and write
860000
heap
page read and write
78BF000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
7299000
trusted library allocation
page read and write
2AD4000
trusted library allocation
page read and write
C2D000
trusted library allocation
page execute and read and write
AE0000
trusted library allocation
page read and write
2A12000
trusted library allocation
page read and write
1690000
heap
page read and write
1040000
heap
page read and write
71D3000
trusted library allocation
page read and write
CB2000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
7A37000
trusted library allocation
page read and write
72DD000
trusted library allocation
page read and write
33B0000
heap
page read and write
42F000
remote allocation
page execute and read and write
77DE000
trusted library allocation
page read and write
77A000
stack
page read and write
2ADD000
trusted library allocation
page read and write
1ED1000
trusted library allocation
page read and write
7CDE000
stack
page read and write
68BE000
stack
page read and write
6A5C000
heap
page read and write
6F4D000
trusted library allocation
page read and write
B96000
heap
page read and write
429000
remote allocation
page execute and read and write
2A84000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
A34000
trusted library allocation
page read and write
67A3000
heap
page read and write
3150000
trusted library allocation
page read and write
723F000
trusted library allocation
page read and write
29F6000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
124E000
stack
page read and write
F3E000
stack
page read and write
73D0000
trusted library allocation
page read and write
710E000
stack
page read and write
702C000
trusted library allocation
page read and write
29F2000
trusted library allocation
page read and write
7BBB000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
C4A000
trusted library allocation
page execute and read and write
2D50000
trusted library allocation
page read and write
B3E000
stack
page read and write
4D80000
trusted library allocation
page read and write
2975000
trusted library allocation
page read and write
6F0E000
stack
page read and write
146A000
trusted library allocation
page execute and read and write
CA6000
trusted library allocation
page execute and read and write
433000
remote allocation
page execute and read and write
2DEF000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
CDBE000
stack
page read and write
F76000
heap
page read and write
2A04000
trusted library allocation
page read and write
1466000
trusted library allocation
page execute and read and write
5480000
trusted library allocation
page read and write
7B36000
trusted library allocation
page read and write
7A8E000
stack
page read and write
67A0000
heap
page read and write
C24000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
1EF4000
trusted library allocation
page read and write
6EAF000
stack
page read and write
7B72000
trusted library allocation
page read and write
52F0000
heap
page read and write
28E4000
trusted library allocation
page read and write
446C000
trusted library allocation
page read and write
6A07000
trusted library allocation
page read and write
E4E000
heap
page read and write
7B62000
trusted library allocation
page read and write
6E4E000
stack
page read and write
4887000
trusted library allocation
page read and write
6FCC000
trusted library allocation
page read and write
DA3E000
stack
page read and write
782E000
trusted library allocation
page read and write
7B8C000
trusted library allocation
page read and write
32BA000
stack
page read and write
2B42000
trusted library allocation
page read and write
C8BE000
stack
page read and write
EB1000
heap
page read and write
4F7000
stack
page read and write
6F4E000
stack
page read and write
1B5E000
stack
page read and write
29EA000
trusted library allocation
page read and write
6FEB000
trusted library allocation
page read and write
7B6A000
trusted library allocation
page read and write
4F8C000
stack
page read and write
5860000
trusted library allocation
page execute and read and write
7BDF000
trusted library allocation
page read and write
71C9000
trusted library allocation
page read and write
E90000
trusted library allocation
page execute and read and write
6470000
heap
page read and write
29C4000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
2AC9000
trusted library allocation
page read and write
1EB0000
trusted library allocation
page read and write
70C0000
trusted library allocation
page execute and read and write
3611000
trusted library allocation
page read and write
28ED000
trusted library allocation
page read and write
2DC5000
trusted library allocation
page read and write
2B20000
heap
page read and write
71D7000
trusted library allocation
page read and write
454C000
trusted library allocation
page read and write
7042000
trusted library allocation
page read and write
412000
remote allocation
page execute and read and write
4D11000
trusted library allocation
page read and write
259D000
trusted library allocation
page read and write
2859000
trusted library allocation
page read and write
28B2000
trusted library allocation
page read and write
D16C000
stack
page read and write
7241000
trusted library allocation
page read and write
86A000
heap
page read and write
14EE000
stack
page read and write
5463000
heap
page read and write
3255000
trusted library allocation
page read and write
924E000
stack
page read and write
71E2000
trusted library allocation
page read and write
139E000
stack
page read and write
D59000
heap
page read and write
7ABC000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
832000
trusted library allocation
page read and write
725A000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
2A2A000
trusted library allocation
page read and write
1AEA000
trusted library allocation
page execute and read and write
7277000
trusted library allocation
page read and write
7B0D000
trusted library allocation
page read and write
416000
remote allocation
page execute and read and write
8F8000
heap
page read and write
72C0000
trusted library allocation
page read and write
8123000
heap
page read and write
1472000
trusted library allocation
page read and write
CE5000
heap
page read and write
7A3B000
trusted library allocation
page read and write
419000
remote allocation
page execute and read and write
2AC0000
trusted library allocation
page read and write
71B1000
trusted library allocation
page read and write
C52000
trusted library allocation
page read and write
72B8000
trusted library allocation
page read and write
312E000
stack
page read and write
72CF000
stack
page read and write
72B0000
heap
page read and write
7BB1000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
725E000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
71CF000
trusted library allocation
page read and write
1387000
heap
page read and write
3638000
heap
page read and write
2FB6000
trusted library allocation
page read and write
721C000
trusted library allocation
page read and write
D2AD000
stack
page read and write
7C5A000
trusted library allocation
page read and write
29D6000
trusted library allocation
page read and write
16BA000
heap
page read and write
6F1D000
stack
page read and write
7B0F000
trusted library allocation
page read and write
581C000
stack
page read and write
2AAC000
trusted library allocation
page read and write
78BD000
trusted library allocation
page read and write
356B000
trusted library allocation
page read and write
2BF0000
heap
page read and write
1050000
trusted library allocation
page read and write
4FBE000
stack
page read and write
CC0000
heap
page read and write
7AC2000
trusted library allocation
page read and write
4CFB000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
DC6000
trusted library allocation
page execute and read and write
351E000
trusted library allocation
page read and write
2A34000
trusted library allocation
page read and write
5ECE000
stack
page read and write
1F5C000
stack
page read and write
57FE000
stack
page read and write
7867000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
2A74000
trusted library allocation
page read and write
7096000
trusted library allocation
page read and write
363D000
trusted library allocation
page read and write
2A82000
trusted library allocation
page read and write
73E0000
trusted library allocation
page execute and read and write
630000
unkown
page readonly
A38000
trusted library allocation
page read and write
C23000
trusted library allocation
page execute and read and write
13F3000
trusted library allocation
page execute and read and write
4E7E000
trusted library allocation
page read and write
29E2000
trusted library allocation
page read and write
2B87000
trusted library allocation
page read and write
29E2000
trusted library allocation
page read and write
54E0000
trusted library allocation
page execute and read and write
3220000
heap
page read and write
D8FD000
stack
page read and write
4D55000
heap
page read and write
7C49000
trusted library allocation
page read and write
2A9E000
trusted library allocation
page read and write
49A0000
heap
page read and write
726F000
trusted library allocation
page read and write
715A000
trusted library allocation
page read and write
2B1E000
trusted library allocation
page read and write
D460000
trusted library allocation
page read and write
7A11000
trusted library allocation
page read and write
72BF000
heap
page read and write
681E000
stack
page read and write
441E000
trusted library allocation
page read and write
78C1000
trusted library allocation
page read and write
24A4000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
2AE3000
trusted library allocation
page read and write
782A000
trusted library allocation
page read and write
691D000
stack
page read and write
7ADD000
trusted library allocation
page read and write
C83000
trusted library allocation
page execute and read and write
7E0000
heap
page read and write
714C000
trusted library allocation
page read and write
5000000
trusted library allocation
page execute and read and write
D8B0000
trusted library allocation
page execute and read and write
4422000
trusted library allocation
page read and write
676A000
heap
page read and write
2A60000
trusted library allocation
page read and write
5C6D000
stack
page read and write
6BFF000
stack
page read and write
62EE000
stack
page read and write
4EA2000
trusted library allocation
page read and write
886E000
stack
page read and write
38A1000
trusted library allocation
page read and write
4EB6000
trusted library allocation
page read and write
4A12000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
73F0000
heap
page read and write
7A67000
trusted library allocation
page read and write
6D69000
trusted library allocation
page read and write
7A41000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
48EC000
stack
page read and write
9CB0000
trusted library section
page read and write
1AE2000
trusted library allocation
page read and write
1CA0000
heap
page read and write
426000
remote allocation
page execute and read and write
D06E000
stack
page read and write
A00000
trusted library allocation
page read and write
F28000
heap
page read and write
5020000
trusted library allocation
page execute and read and write
5442000
trusted library allocation
page read and write
5F2D000
stack
page read and write
6F7A000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
7F0000
heap
page read and write
327D000
stack
page read and write
739C000
stack
page read and write
13C0000
heap
page read and write
7983000
trusted library allocation
page read and write
1470000
heap
page read and write
4F40000
trusted library allocation
page execute and read and write
2B14000
trusted library allocation
page read and write
72F2000
trusted library allocation
page read and write
7ADE000
stack
page read and write
2E4F000
trusted library allocation
page read and write
1EDD000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
B94000
heap
page read and write
350E000
stack
page read and write
BF0000
heap
page read and write
52B4000
heap
page read and write
1AF2000
trusted library allocation
page read and write
CB5000
trusted library allocation
page execute and read and write
7B28000
trusted library allocation
page read and write
6D3E000
stack
page read and write
72C4000
trusted library allocation
page read and write
740E000
stack
page read and write
4A73000
heap
page read and write
87F000
heap
page read and write
14BE000
stack
page read and write
76CD000
stack
page read and write
704A000
trusted library allocation
page read and write
2B05000
trusted library allocation
page read and write
3481000
trusted library allocation
page read and write
3290000
heap
page read and write
2DDE000
trusted library allocation
page read and write
7156000
trusted library allocation
page read and write
2A88000
trusted library allocation
page read and write
6FCA000
trusted library allocation
page read and write
920D000
trusted library allocation
page read and write
6F43000
trusted library allocation
page read and write
729B000
stack
page read and write
602E000
stack
page read and write
258D000
stack
page read and write
29DE000
trusted library allocation
page read and write
67DD000
stack
page read and write
7C6B000
trusted library allocation
page read and write
D06C000
stack
page read and write
8720000
trusted library allocation
page execute and read and write
5920000
heap
page read and write
C5B000
trusted library allocation
page execute and read and write
61AE000
stack
page read and write
12F8000
stack
page read and write
52D0000
trusted library allocation
page read and write
6B9E000
stack
page read and write
1C5E000
stack
page read and write
7B78000
trusted library allocation
page read and write
337E000
unkown
page read and write
7854000
trusted library allocation
page read and write
698E000
stack
page read and write
2A9A000
trusted library allocation
page read and write
28AC000
trusted library allocation
page read and write
79C8000
trusted library allocation
page read and write
530000
heap
page read and write
5A70000
heap
page read and write
2A5C000
trusted library allocation
page read and write
7A3F000
trusted library allocation
page read and write
1422000
trusted library allocation
page read and write
1710000
heap
page read and write
140D000
trusted library allocation
page execute and read and write
49D0000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
81A3000
heap
page read and write
7A26000
trusted library allocation
page read and write
41B000
remote allocation
page execute and read and write
50C0000
heap
page execute and read and write
530E000
stack
page read and write
145D000
trusted library allocation
page execute and read and write
2A66000
trusted library allocation
page read and write
315B000
trusted library allocation
page read and write
6F47000
trusted library allocation
page read and write
67B0000
heap
page read and write
4E60000
heap
page read and write
69F0000
trusted library allocation
page read and write
71C7000
trusted library allocation
page read and write
1745000
heap
page read and write
2A64000
trusted library allocation
page read and write
27DC000
stack
page read and write
9A15000
trusted library allocation
page read and write
BDA000
heap
page read and write
89AE000
stack
page read and write
C20000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
7B68000
trusted library allocation
page read and write
1AD0000
trusted library allocation
page read and write
798B000
trusted library allocation
page read and write
4192000
trusted library allocation
page read and write
326E000
unkown
page read and write
7BAD000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
B68000
heap
page read and write
5E0E000
stack
page read and write
3210000
heap
page read and write
2A52000
trusted library allocation
page read and write
3200000
heap
page read and write
783C000
trusted library allocation
page read and write
6B60000
trusted library allocation
page execute and read and write
F00000
trusted library allocation
page execute and read and write
7BAF000
trusted library allocation
page read and write
78C5000
trusted library allocation
page read and write
354F000
stack
page read and write
7243000
trusted library allocation
page read and write
1E70000
trusted library allocation
page execute and read and write
4FFF000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
705D000
trusted library allocation
page read and write
6ED7000
trusted library allocation
page read and write
727B000
trusted library allocation
page read and write
1495000
heap
page read and write
715C000
trusted library allocation
page read and write
7995000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
7B2C000
trusted library allocation
page read and write
7C36000
trusted library allocation
page read and write
4A50000
heap
page execute and read and write
C84000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
76D0000
heap
page read and write
1AC3000
trusted library allocation
page execute and read and write
29D8000
trusted library allocation
page read and write
7BA7000
trusted library allocation
page read and write
2A96000
trusted library allocation
page read and write
D42F000
stack
page read and write
4A20000
trusted library section
page readonly
7148000
trusted library allocation
page read and write
420000
remote allocation
page execute and read and write
1772000
heap
page read and write
3085000
trusted library allocation
page read and write
1350000
heap
page read and write
7050000
heap
page read and write
4A6F000
trusted library allocation
page read and write
2ADF000
trusted library allocation
page read and write
542E000
trusted library allocation
page read and write
41A000
remote allocation
page execute and read and write
5869000
trusted library allocation
page read and write
7AE1000
trusted library allocation
page read and write
99EE000
stack
page read and write
684C000
heap
page read and write
2909000
trusted library allocation
page read and write
316E000
trusted library allocation
page read and write
6B4E000
stack
page read and write
6B1B000
trusted library allocation
page read and write
79E7000
trusted library allocation
page read and write
CC0B000
heap
page read and write
5450000
trusted library allocation
page read and write
29ED000
stack
page read and write
7B96000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
54C0000
heap
page read and write
2DD0000
trusted library allocation
page read and write
7A73000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
BCE000
stack
page read and write
4F90000
trusted library allocation
page read and write
28C0000
heap
page read and write
7061000
trusted library allocation
page read and write
7D0000
heap
page read and write
72C2000
trusted library allocation
page read and write
670A000
heap
page read and write
45B9000
trusted library allocation
page read and write
78C3000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
70F8000
trusted library allocation
page read and write
7B15000
trusted library allocation
page read and write
148E000
stack
page read and write
5CCE000
stack
page read and write
34B6000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
33B5000
trusted library allocation
page read and write
153C000
unkown
page read and write
6E5000
heap
page read and write
2A80000
trusted library allocation
page read and write
1430000
heap
page read and write
8990000
heap
page read and write
7182000
trusted library allocation
page read and write
7B6C000
trusted library allocation
page read and write
425000
remote allocation
page execute and read and write
814000
trusted library allocation
page read and write
1574000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
7A45000
trusted library allocation
page read and write
69C0000
heap
page read and write
7AB2000
trusted library allocation
page read and write
77DC000
trusted library allocation
page read and write
7AA6000
trusted library allocation
page read and write
415000
remote allocation
page execute and read and write
6C3E000
stack
page read and write
DA8C000
stack
page read and write
173F000
heap
page read and write
9A60000
trusted library allocation
page read and write
3171000
trusted library allocation
page read and write
5300000
heap
page read and write
2A4E000
trusted library allocation
page read and write
2A6E000
trusted library allocation
page read and write
6A0C000
stack
page read and write
C9D000
trusted library allocation
page execute and read and write
70F6000
trusted library allocation
page read and write
7BB9000
trusted library allocation
page read and write
24CD000
trusted library allocation
page read and write
7AB8000
trusted library allocation
page read and write
7247000
trusted library allocation
page read and write
CAA000
trusted library allocation
page execute and read and write
7300000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
9A1D000
trusted library allocation
page read and write
7770000
heap
page read and write
72AC000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
99C0000
trusted library allocation
page execute and read and write
A20000
heap
page read and write
6ECF000
stack
page read and write
2A56000
trusted library allocation
page read and write
D16F000
stack
page read and write
34BD000
trusted library allocation
page read and write
6F5F000
trusted library allocation
page read and write
1AF7000
trusted library allocation
page execute and read and write
6F40000
trusted library allocation
page execute and read and write
7073000
trusted library allocation
page read and write
CEF000
heap
page read and write
8F7000
stack
page read and write
5431000
trusted library allocation
page read and write
705F000
trusted library allocation
page read and write
CC00000
heap
page read and write
9F0000
trusted library allocation
page execute and read and write
5437000
trusted library allocation
page read and write
7AC8000
trusted library allocation
page read and write
2A36000
trusted library allocation
page read and write
2980000
heap
page read and write
B2A000
stack
page read and write
29CC000
trusted library allocation
page read and write
C7BE000
stack
page read and write
1370000
trusted library allocation
page read and write
7285000
trusted library allocation
page read and write
7882000
trusted library allocation
page read and write
2A3E000
trusted library allocation
page read and write
CA2000
trusted library allocation
page read and write
5490000
heap
page read and write
4D1D000
trusted library allocation
page read and write
DC8F000
stack
page read and write
7A47000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
71BF000
trusted library allocation
page read and write
950000
heap
page read and write
6AA9000
heap
page read and write
9205000
trusted library allocation
page read and write
CFBE000
stack
page read and write
24E5000
trusted library allocation
page read and write
F47000
heap
page read and write
7A3D000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
67DF000
stack
page read and write
7237000
trusted library allocation
page read and write
462C000
stack
page read and write
651E000
stack
page read and write
7030000
trusted library allocation
page execute and read and write
EAE000
heap
page read and write
831E000
stack
page read and write
7B2E000
trusted library allocation
page read and write
DA3000
trusted library allocation
page execute and read and write
479C000
trusted library allocation
page read and write
1AB0000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
1477000
trusted library allocation
page execute and read and write
66DD000
heap
page read and write
544E000
stack
page read and write
721A000
trusted library allocation
page read and write
D98C000
stack
page read and write
1065000
heap
page read and write
782C000
trusted library allocation
page read and write
D9FF000
stack
page read and write
62AE000
stack
page read and write
2855000
trusted library allocation
page read and write
3531000
trusted library allocation
page read and write
206C000
stack
page read and write
FD0000
heap
page read and write
DA4000
trusted library allocation
page read and write
C9FD000
stack
page read and write
798E000
stack
page read and write
6BFE000
heap
page read and write
7B4B000
trusted library allocation
page read and write
960000
trusted library allocation
page read and write
2AA6000
trusted library allocation
page read and write
7A39000
trusted library allocation
page read and write
4F0E000
stack
page read and write
7249000
trusted library allocation
page read and write
D9E000
stack
page read and write
2D2C000
stack
page read and write
6F00000
trusted library allocation
page read and write
7092000
trusted library allocation
page read and write
69FD000
trusted library allocation
page read and write
535E000
stack
page read and write
5A80000
heap
page execute and read and write
6E60000
trusted library allocation
page read and write
291E000
stack
page read and write
2B70000
trusted library allocation
page read and write
835E000
stack
page read and write
4F70000
heap
page read and write
114E000
unkown
page read and write
4C50000
heap
page read and write
719E000
trusted library allocation
page read and write
6E80000
heap
page read and write
5DE0000
trusted library allocation
page read and write
7171000
trusted library allocation
page read and write
D94F000
stack
page read and write
2B2F000
trusted library allocation
page read and write
49F0000
trusted library allocation
page execute and read and write
38FD000
trusted library allocation
page read and write
F40000
heap
page read and write
526E000
trusted library allocation
page read and write
D5E000
stack
page read and write
3E91000
trusted library allocation
page read and write
3E7C000
trusted library allocation
page read and write
6F39000
trusted library allocation
page read and write
7B74000
trusted library allocation
page read and write
52A0000
heap
page execute and read and write
2E5D000
trusted library allocation
page read and write
7203000
trusted library allocation
page read and write
6B0C000
stack
page read and write
13F4000
trusted library allocation
page read and write
70B9000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
4E9D000
trusted library allocation
page read and write
71D1000
trusted library allocation
page read and write
5914000
heap
page read and write
4EB0000
trusted library allocation
page execute and read and write
1400000
trusted library allocation
page read and write
66A0000
heap
page read and write
71C3000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
7154000
trusted library allocation
page read and write
D1A0000
trusted library allocation
page execute and read and write
4CF0000
trusted library allocation
page read and write
7A15000
trusted library allocation
page read and write
7B0B000
trusted library allocation
page read and write
6690000
heap
page read and write
5240000
trusted library allocation
page execute and read and write
8ACA000
trusted library allocation
page read and write
7F3A0000
trusted library allocation
page execute and read and write
1EBE000
trusted library allocation
page read and write
7224000
trusted library allocation
page read and write
D75000
heap
page read and write
1E90000
trusted library allocation
page read and write
7987000
trusted library allocation
page read and write
29FE000
trusted library allocation
page read and write
D300000
heap
page read and write
836000
trusted library allocation
page execute and read and write
7BB7000
trusted library allocation
page read and write
583E000
stack
page read and write
4EC0000
trusted library allocation
page read and write
1587000
heap
page read and write
4B88000
trusted library allocation
page read and write
5BFE000
stack
page read and write
1ED6000
trusted library allocation
page read and write
6F82000
trusted library allocation
page read and write
2972000
trusted library allocation
page read and write
72EE000
trusted library allocation
page read and write
10F8000
heap
page read and write
2960000
trusted library allocation
page read and write
7933000
trusted library allocation
page read and write
78AA000
trusted library allocation
page read and write
29DC000
trusted library allocation
page read and write
7B86000
trusted library allocation
page read and write
38DD000
trusted library allocation
page read and write
4598000
trusted library allocation
page read and write
2A8A000
trusted library allocation
page read and write
7804000
trusted library allocation
page read and write
7832000
trusted library allocation
page read and write
2DC5000
trusted library allocation
page read and write
7239000
trusted library allocation
page read and write
140E000
stack
page read and write
3E99000
trusted library allocation
page read and write
456C000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
CD8000
heap
page read and write
71B9000
trusted library allocation
page read and write
2F5D000
stack
page read and write
543D000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
7AAA000
trusted library allocation
page read and write
70A2000
trusted library allocation
page read and write
8DDB000
trusted library allocation
page read and write
3176000
trusted library allocation
page read and write
52FC000
stack
page read and write
7A49000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
4F30000
trusted library section
page readonly
D2FD000
stack
page read and write
5730000
heap
page read and write
DD2000
trusted library allocation
page read and write
62DE000
stack
page read and write
4C4B000
stack
page read and write
2901000
trusted library allocation
page read and write
701E000
stack
page read and write
424000
remote allocation
page execute and read and write
7ADB000
trusted library allocation
page read and write
2919000
trusted library allocation
page read and write
5262000
trusted library allocation
page read and write
AF0000
heap
page read and write
70D0000
trusted library allocation
page read and write
2BBE000
stack
page read and write
70CC000
trusted library allocation
page read and write
52CE000
stack
page read and write
70BB000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
51C8000
trusted library allocation
page read and write
6F13000
trusted library allocation
page read and write
1787000
heap
page read and write
6640000
trusted library allocation
page read and write
ECE000
stack
page read and write
D63000
heap
page read and write
738B000
trusted library allocation
page read and write
70A6000
trusted library allocation
page read and write
40B2000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
7207000
trusted library allocation
page read and write
83A000
trusted library allocation
page execute and read and write
6ECD000
trusted library allocation
page read and write
2A08000
trusted library allocation
page read and write
702A000
trusted library allocation
page read and write
719C000
trusted library allocation
page read and write
7865000
trusted library allocation
page read and write
9A0B000
trusted library allocation
page read and write
157B000
stack
page read and write
24F0000
trusted library allocation
page read and write
7295000
trusted library allocation
page read and write
9A5E000
stack
page read and write
6DFD000
trusted library allocation
page read and write
56E0000
heap
page read and write
1176000
heap
page read and write
70FA000
trusted library allocation
page read and write
5340000
heap
page read and write
7991000
trusted library allocation
page read and write
788A000
trusted library allocation
page read and write
508E000
stack
page read and write
67A0000
trusted library allocation
page execute and read and write
1380000
heap
page read and write
9A10000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
7048000
trusted library allocation
page read and write
6F36000
trusted library allocation
page read and write
7AC6000
trusted library allocation
page read and write
2ADB000
trusted library allocation
page read and write
ABE000
stack
page read and write
101F000
stack
page read and write
2A1A000
trusted library allocation
page read and write
6FDA000
trusted library allocation
page read and write
4F2B000
stack
page read and write
7BBD000
trusted library allocation
page read and write
7B5E000
trusted library allocation
page read and write
1080000
heap
page read and write
4F30000
trusted library allocation
page read and write
D1EE000
stack
page read and write
7B84000
trusted library allocation
page read and write
86EC000
stack
page read and write
AF7000
stack
page read and write
7B8E000
trusted library allocation
page read and write
2AF2000
trusted library allocation
page read and write
7B09000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
6E07000
trusted library allocation
page read and write
DCA000
trusted library allocation
page execute and read and write
71EC000
trusted library allocation
page read and write
1447000
heap
page read and write
7122000
trusted library allocation
page read and write
1490000
trusted library allocation
page execute and read and write
4D50000
heap
page read and write
6F99000
trusted library allocation
page read and write
5410000
heap
page read and write
7AA0000
trusted library allocation
page read and write
72BE000
trusted library allocation
page read and write
2B32000
trusted library allocation
page read and write
7869000
trusted library allocation
page read and write
42D000
remote allocation
page execute and read and write
6C3E000
stack
page read and write
2811000
trusted library allocation
page read and write
EF9000
stack
page read and write
6479000
heap
page read and write
144D000
trusted library allocation
page execute and read and write
35C4000
trusted library allocation
page read and write
7283000
trusted library allocation
page read and write
7A8D000
trusted library allocation
page read and write
2655000
trusted library allocation
page read and write
7B8A000
trusted library allocation
page read and write
7222000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
434000
remote allocation
page execute and read and write
2C84000
trusted library allocation
page read and write
24C1000
trusted library allocation
page read and write
6C0E000
heap
page read and write
CC0000
trusted library allocation
page execute and read and write
A30000
trusted library allocation
page read and write
2D8F000
stack
page read and write
53AD000
stack
page read and write
2890000
heap
page read and write
72BA000
trusted library allocation
page read and write
719A000
trusted library allocation
page read and write
71CD000
stack
page read and write
6D40000
heap
page read and write
2A46000
trusted library allocation
page read and write
4A30000
heap
page read and write
80E0000
heap
page read and write
7838000
trusted library allocation
page read and write
41AC000
trusted library allocation
page read and write
78C7000
trusted library allocation
page read and write
6A70000
trusted library allocation
page execute and read and write
1490000
heap
page read and write
7152000
trusted library allocation
page read and write
7124000
trusted library allocation
page read and write
694C000
stack
page read and write
540E000
stack
page read and write
CD0000
heap
page read and write
DF0000
heap
page read and write
29CA000
trusted library allocation
page read and write
52E5000
heap
page read and write
5010000
heap
page read and write
DE7000
stack
page read and write
704C000
trusted library allocation
page read and write
7094000
trusted library allocation
page read and write
2589000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
10D8000
heap
page read and write
5D3E000
stack
page read and write
3630000
heap
page read and write
D5EE000
stack
page read and write
1AE6000
trusted library allocation
page execute and read and write
402000
remote allocation
page execute and read and write
329A000
heap
page read and write
5410000
trusted library allocation
page read and write
B05000
heap
page read and write
C90000
trusted library allocation
page read and write
7347000
trusted library allocation
page read and write
2911000
trusted library allocation
page read and write
450C000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
7FE0000
heap
page read and write
7B98000
trusted library allocation
page read and write
285D000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
72A3000
trusted library allocation
page read and write
DB5000
heap
page read and write
7950000
trusted library allocation
page read and write
7DDE000
stack
page read and write
5820000
heap
page read and write
29D2000
trusted library allocation
page read and write
4F40000
heap
page read and write
821E000
stack
page read and write
2C70000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
16A2000
heap
page read and write
7939000
trusted library allocation
page read and write
317D000
trusted library allocation
page read and write
7B11000
trusted library allocation
page read and write
6EDB000
trusted library allocation
page read and write
5271000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
1067000
heap
page read and write
72B4000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
530E000
stack
page read and write
29F4000
trusted library allocation
page read and write
FCE000
stack
page read and write
71D9000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
678C000
stack
page read and write
1EBB000
trusted library allocation
page read and write
31C1000
trusted library allocation
page read and write
542E000
stack
page read and write
7205000
trusted library allocation
page read and write
7B76000
trusted library allocation
page read and write
79BD000
trusted library allocation
page read and write
3460000
heap
page read and write
E30000
trusted library allocation
page read and write
7A65000
trusted library allocation
page read and write
10D0000
heap
page read and write
4EC6000
trusted library allocation
page read and write
3210000
heap
page read and write
2AAA000
trusted library allocation
page read and write
7B7E000
trusted library allocation
page read and write
7B32000
trusted library allocation
page read and write
2A08000
trusted library allocation
page read and write
72CC000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
649E000
stack
page read and write
79DD000
trusted library allocation
page read and write
7226000
trusted library allocation
page read and write
4D55000
trusted library allocation
page read and write
2B61000
trusted library allocation
page read and write
2A3C000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
C46000
trusted library allocation
page execute and read and write
717A000
trusted library allocation
page read and write
7952000
trusted library allocation
page read and write
B00000
heap
page read and write
5ABE000
stack
page read and write
28AA000
trusted library allocation
page read and write
7836000
trusted library allocation
page read and write
1698000
heap
page read and write
590E000
stack
page read and write
43A5000
trusted library allocation
page read and write
BEC000
heap
page read and write
6FD6000
trusted library allocation
page read and write
6DCE000
stack
page read and write
810000
trusted library allocation
page read and write
7245000
trusted library allocation
page read and write
C55000
heap
page read and write
BF0000
heap
page read and write
7178000
trusted library allocation
page read and write
3662000
trusted library allocation
page read and write
2A1E000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
1CD8000
trusted library allocation
page read and write
718E000
stack
page read and write
1182000
heap
page read and write
63F0000
heap
page read and write
29CE000
trusted library allocation
page read and write
42C000
remote allocation
page execute and read and write
1ACD000
trusted library allocation
page execute and read and write
12F8000
stack
page read and write
2FAA000
stack
page read and write
606D000
stack
page read and write
2A4A000
trusted library allocation
page read and write
D07000
heap
page read and write
7A43000
trusted library allocation
page read and write
70B7000
trusted library allocation
page read and write
52D4000
trusted library allocation
page read and write
6A4E000
stack
page read and write
7218000
trusted library allocation
page read and write
1E80000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
13FD000
trusted library allocation
page execute and read and write
1475000
trusted library allocation
page execute and read and write
56BE000
stack
page read and write
A7E000
stack
page read and write
51CC000
stack
page read and write
791B000
trusted library allocation
page read and write
663D000
trusted library allocation
page read and write
6B50000
trusted library allocation
page execute and read and write
D6EE000
stack
page read and write
527D000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
71CB000
trusted library allocation
page read and write
2B4A000
trusted library allocation
page execute and read and write
6F37000
trusted library allocation
page read and write
CD6E000
stack
page read and write
700A000
trusted library allocation
page read and write
798F000
trusted library allocation
page read and write
7AAE000
trusted library allocation
page read and write
350F000
trusted library allocation
page read and write
2A8C000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
7B2A000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
3E3C000
trusted library allocation
page read and write
1DA000
stack
page read and write
7B92000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
E40000
heap
page read and write
655E000
stack
page read and write
737A000
trusted library allocation
page read and write
D1BE000
stack
page read and write
DD7000
trusted library allocation
page execute and read and write
6FD2000
trusted library allocation
page read and write
894000
heap
page read and write
4F80000
trusted library allocation
page execute and read and write
7A13000
trusted library allocation
page read and write
2B57000
trusted library allocation
page execute and read and write
E10000
trusted library allocation
page execute and read and write
7997000
trusted library allocation
page read and write
5C8E000
stack
page read and write
1416000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
2AEC000
trusted library allocation
page read and write
3238000
trusted library allocation
page read and write
2A76000
trusted library allocation
page read and write
6AFD000
stack
page read and write
710D000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
646B000
heap
page read and write
7C25000
trusted library allocation
page read and write
412F000
trusted library allocation
page read and write
2B2C000
stack
page read and write
27E0000
heap
page execute and read and write
610000
heap
page read and write
540E000
stack
page read and write
1570000
trusted library allocation
page read and write
452C000
trusted library allocation
page read and write
5890000
heap
page read and write
41D000
remote allocation
page execute and read and write
70A4000
trusted library allocation
page read and write
1CC0000
heap
page read and write
6F02000
trusted library allocation
page read and write
10DE000
heap
page read and write
34CD000
trusted library allocation
page read and write
783A000
trusted library allocation
page read and write
657E000
stack
page read and write
391D000
trusted library allocation
page read and write
1ECE000
trusted library allocation
page read and write
C57000
trusted library allocation
page execute and read and write
7AF6000
trusted library allocation
page read and write
C10000
heap
page read and write
25C9000
stack
page read and write
668E000
stack
page read and write
2AA0000
trusted library allocation
page read and write
449F000
trusted library allocation
page read and write
288A000
trusted library allocation
page read and write
C0E000
stack
page read and write
723D000
trusted library allocation
page read and write
2B55000
trusted library allocation
page execute and read and write
6760000
heap
page read and write
5720000
heap
page read and write
1470000
trusted library allocation
page read and write
4F60000
heap
page read and write
8A0000
heap
page read and write
5451000
heap
page read and write
6A67000
trusted library allocation
page read and write
7B38000
trusted library allocation
page read and write
2F9A000
stack
page read and write
5B6E000
stack
page read and write
2AE8000
trusted library allocation
page read and write
34C5000
trusted library allocation
page read and write
1040000
heap
page read and write
9208000
trusted library allocation
page read and write
6F4B000
trusted library allocation
page read and write
5DAE000
stack
page read and write
7AB0000
trusted library allocation
page read and write
7369000
trusted library allocation
page read and write
4FEB000
stack
page read and write
4BA9000
trusted library allocation
page read and write
667D000
stack
page read and write
15F0000
trusted library allocation
page read and write
7A62000
trusted library allocation
page read and write
67C5000
heap
page read and write
9200000
trusted library allocation
page read and write
1AC0000
trusted library allocation
page read and write
6D3E000
stack
page read and write
389D000
trusted library allocation
page read and write
7AB4000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
65E0000
heap
page read and write
2A68000
trusted library allocation
page read and write
142B000
trusted library allocation
page execute and read and write
2AC6000
trusted library allocation
page read and write
CB7000
trusted library allocation
page execute and read and write
351C000
trusted library allocation
page read and write
F2A000
stack
page read and write
7B70000
trusted library allocation
page read and write
7271000
trusted library allocation
page read and write
7BA1000
trusted library allocation
page read and write
CDAE000
stack
page read and write
71AF000
trusted library allocation
page read and write
2AEA000
trusted library allocation
page read and write
7297000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
29A0000
heap
page read and write
2D56000
trusted library allocation
page read and write
4B0C000
trusted library allocation
page read and write
67F3000
heap
page read and write
674F000
stack
page read and write
540F000
stack
page read and write
1450000
heap
page read and write
847000
trusted library allocation
page execute and read and write
29E6000
trusted library allocation
page read and write
5B8B000
stack
page read and write
4FF0000
trusted library section
page readonly
2ECA000
trusted library allocation
page read and write
CBB000
trusted library allocation
page execute and read and write
5290000
heap
page read and write
29E4000
trusted library allocation
page read and write
1EA0000
heap
page execute and read and write
7098000
trusted library allocation
page read and write
4E91000
trusted library allocation
page read and write
6A5D000
stack
page read and write
69DE000
stack
page read and write
4557000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
7303000
trusted library allocation
page read and write
72B6000
trusted library allocation
page read and write
163F000
heap
page read and write
F69000
heap
page read and write
310E000
trusted library allocation
page read and write
95E000
heap
page read and write
86E000
heap
page read and write
78BB000
trusted library allocation
page read and write
4E5D000
stack
page read and write
4DE0000
trusted library allocation
page execute and read and write
1462000
trusted library allocation
page read and write
3320000
heap
page read and write
77F3000
trusted library allocation
page read and write
4E82000
trusted library allocation
page read and write
E48000
heap
page read and write
DB3000
trusted library allocation
page read and write
7834000
trusted library allocation
page read and write
56A0000
trusted library allocation
page execute and read and write
5415000
heap
page read and write
1F00000
trusted library allocation
page read and write
320D000
trusted library allocation
page read and write
16CF000
heap
page read and write
5880000
trusted library allocation
page execute and read and write
7B9D000
trusted library allocation
page read and write
2B52000
trusted library allocation
page read and write
2A5A000
trusted library allocation
page read and write
24BE000
trusted library allocation
page read and write
3240000
heap
page read and write
71F0000
trusted library allocation
page read and write
728B000
trusted library allocation
page read and write
2A58000
trusted library allocation
page read and write
2A0C000
trusted library allocation
page read and write
7BE1000
trusted library allocation
page read and write
68DE000
stack
page read and write
7975000
trusted library allocation
page read and write
2A16000
trusted library allocation
page read and write
428000
remote allocation
page execute and read and write
6F60000
trusted library allocation
page execute and read and write
7EE000
stack
page read and write
7B7C000
trusted library allocation
page read and write
43D0000
trusted library allocation
page read and write
845E000
stack
page read and write
72C8000
trusted library allocation
page read and write
14A0000
heap
page read and write
4D22000
trusted library allocation
page read and write
2E8F000
stack
page read and write
717C000
trusted library allocation
page read and write
172A000
heap
page read and write
1477000
heap
page read and write
6637000
trusted library allocation
page read and write
5834000
heap
page read and write
2EAA000
trusted library allocation
page read and write
14A7000
heap
page read and write
91FB000
trusted library allocation
page read and write
34AF000
unkown
page read and write
A70000
heap
page read and write
EBD000
heap
page read and write
71CD000
trusted library allocation
page read and write
BD7000
heap
page read and write
79DB000
trusted library allocation
page read and write
7173000
trusted library allocation
page read and write
4EA4000
trusted library allocation
page read and write
2A32000
trusted library allocation
page read and write
AD4000
trusted library allocation
page read and write
6CDE000
stack
page read and write
72BC000
trusted library allocation
page read and write
7273000
trusted library allocation
page read and write
31B0000
heap
page execute and read and write
52B0000
trusted library allocation
page execute and read and write
B8A000
heap
page read and write
41E000
remote allocation
page execute and read and write
2A24000
trusted library allocation
page read and write
7922000
trusted library allocation
page read and write
525B000
trusted library allocation
page read and write
601E000
stack
page read and write
2A6C000
trusted library allocation
page read and write
2847000
trusted library allocation
page read and write
D2EE000
stack
page read and write
728D000
trusted library allocation
page read and write
728E000
stack
page read and write
6FD8000
trusted library allocation
page read and write
AD6000
trusted library allocation
page read and write
71BB000
trusted library allocation
page read and write
6FD4000
trusted library allocation
page read and write
1403000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
6FDE000
stack
page read and write
7B66000
trusted library allocation
page read and write
141A000
trusted library allocation
page execute and read and write
2ADE000
stack
page read and write
C3D000
trusted library allocation
page execute and read and write
2A55000
trusted library allocation
page read and write
7A4B000
trusted library allocation
page read and write
73C4000
trusted library allocation
page read and write
CAFD000
stack
page read and write
288E000
stack
page read and write
944000
heap
page read and write
7158000
trusted library allocation
page read and write
2F5E000
trusted library allocation
page read and write
5DCF000
stack
page read and write
7AB6000
trusted library allocation
page read and write
7815000
trusted library allocation
page read and write
28B4000
trusted library allocation
page read and write
323A000
trusted library allocation
page read and write
D3B0000
trusted library allocation
page execute and read and write
6F65000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
1ADD000
trusted library allocation
page execute and read and write
1EC2000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
7BAB000
trusted library allocation
page read and write
16FC000
heap
page read and write
6C9E000
stack
page read and write
72A5000
trusted library allocation
page read and write
290F000
trusted library allocation
page read and write
71BD000
trusted library allocation
page read and write
4E6B000
stack
page read and write
1420000
heap
page read and write
794E000
trusted library allocation
page read and write
5710000
trusted library section
page readonly
D2B0000
heap
page read and write
1427000
trusted library allocation
page execute and read and write
4A00000
trusted library allocation
page read and write
7AA8000
trusted library allocation
page read and write
16C4000
heap
page read and write
6E50000
heap
page read and write
687E000
stack
page read and write
E84000
heap
page read and write
79FE000
trusted library allocation
page read and write
7AC4000
trusted library allocation
page read and write
1628000
heap
page read and write
616F000
stack
page read and write
7EDE000
stack
page read and write
296A000
trusted library allocation
page read and write
710B000
trusted library allocation
page read and write
7ADF000
trusted library allocation
page read and write
7BA5000
trusted library allocation
page read and write
965D000
trusted library allocation
page read and write
4E8E000
trusted library allocation
page read and write
4F73000
heap
page read and write
68DE000
stack
page read and write
311F000
trusted library allocation
page read and write
CC05000
heap
page read and write
D87C000
stack
page read and write
7B90000
trusted library allocation
page read and write
69D000
stack
page read and write
5470000
trusted library allocation
page read and write
6A40000
heap
page read and write
2B30000
trusted library allocation
page read and write
7293000
trusted library allocation
page read and write
727D000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
2D40000
heap
page execute and read and write
7B6E000
trusted library allocation
page read and write
6FAA000
trusted library allocation
page read and write
72A7000
trusted library allocation
page read and write
281E000
stack
page read and write
400000
remote allocation
page execute and read and write
7A8F000
trusted library allocation
page read and write
4995000
trusted library allocation
page read and write
78C9000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
7075000
trusted library allocation
page read and write
137D000
trusted library allocation
page execute and read and write
5000000
trusted library allocation
page read and write
7AF8000
trusted library allocation
page read and write
7A7B000
trusted library allocation
page read and write
7314000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
6EEB000
trusted library allocation
page read and write
24C6000
trusted library allocation
page read and write
709E000
trusted library allocation
page read and write
662E000
stack
page read and write
729B000
trusted library allocation
page read and write
DB3E000
stack
page read and write
728F000
trusted library allocation
page read and write
5004000
trusted library allocation
page read and write
79D9000
trusted library allocation
page read and write
1560000
heap
page read and write
7A60000
trusted library allocation
page read and write
2CAE000
stack
page read and write
6B70000
heap
page read and write
D84E000
stack
page read and write
5910000
heap
page read and write
72CA000
trusted library allocation
page read and write
56D0000
heap
page execute and read and write
6DF0000
trusted library allocation
page read and write
AF8000
stack
page read and write
73A0000
trusted library allocation
page read and write
F73000
heap
page read and write
BD0000
heap
page read and write
D4B000
heap
page read and write
8A2000
heap
page read and write
BFE000
stack
page read and write
410000
remote allocation
page execute and read and write
2EC5000
trusted library allocation
page read and write
38BD000
trusted library allocation
page read and write
641E000
stack
page read and write
5930000
heap
page read and write
4EBE000
trusted library allocation
page read and write
709C000
trusted library allocation
page read and write
49ED000
stack
page read and write
34C0000
heap
page read and write
F80000
heap
page read and write
78ED000
trusted library allocation
page read and write
7358000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
D4FE000
stack
page read and write
6DAE000
stack
page read and write
2510000
trusted library allocation
page read and write
A6D000
stack
page read and write
7289000
trusted library allocation
page read and write
7031000
trusted library allocation
page read and write
44A9000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
5040000
heap
page execute and read and write
44EC000
trusted library allocation
page read and write
3162000
trusted library allocation
page read and write
324F000
trusted library allocation
page read and write
3440000
heap
page read and write
4F60000
trusted library allocation
page execute and read and write
7962000
trusted library allocation
page read and write
2A38000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
6EED000
trusted library allocation
page read and write
5BBE000
stack
page read and write
711E000
trusted library allocation
page read and write
29DA000
trusted library allocation
page read and write
71EA000
trusted library allocation
page read and write
387D000
trusted library allocation
page read and write
6439000
heap
page read and write
5420000
heap
page read and write
6A00000
trusted library allocation
page read and write
2BC8000
trusted library allocation
page read and write
2A54000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
70E8000
trusted library allocation
page read and write
D32E000
stack
page read and write
4228000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
77F1000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
2B3D000
trusted library allocation
page execute and read and write
29F0000
trusted library allocation
page read and write
2F6D000
stack
page read and write
34EE000
stack
page read and write
249E000
stack
page read and write
1530000
trusted library allocation
page execute and read and write
1435000
heap
page read and write
451C000
trusted library allocation
page read and write
417000
remote allocation
page execute and read and write
4EC0000
trusted library allocation
page read and write
72A1000
trusted library allocation
page read and write
7FC80000
trusted library allocation
page execute and read and write
570B000
stack
page read and write
7ABE000
trusted library allocation
page read and write
887000
heap
page read and write
727F000
trusted library allocation
page read and write
7C7C000
trusted library allocation
page read and write
5910000
heap
page read and write
E20000
trusted library allocation
page read and write
8190000
heap
page read and write
6E8A000
heap
page read and write
69BF000
stack
page read and write
85EC000
stack
page read and write
7FDD000
stack
page read and write
1785000
heap
page read and write
2A7A000
trusted library allocation
page read and write
4A40000
heap
page read and write
8EEA000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
414F000
trusted library allocation
page read and write
2E00000
heap
page execute and read and write
458C000
trusted library allocation
page read and write
BE5000
heap
page read and write
2DCC000
stack
page read and write
2886000
trusted library allocation
page read and write
2531000
trusted library allocation
page read and write
6F3F000
trusted library allocation
page read and write
2A28000
trusted library allocation
page read and write
4E7B000
trusted library allocation
page read and write
16AF000
heap
page read and write
1320000
heap
page read and write
3539000
trusted library allocation
page read and write
1060000
heap
page read and write
6F20000
heap
page read and write
A90000
heap
page read and write
147B000
trusted library allocation
page execute and read and write
C42000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
6F49000
trusted library allocation
page read and write
79FC000
trusted library allocation
page read and write
7BB5000
trusted library allocation
page read and write
FFA000
stack
page read and write
CC07000
heap
page read and write
2B50000
trusted library allocation
page read and write
4DC0000
heap
page read and write
691F000
stack
page read and write
4D0E000
trusted library allocation
page read and write
7AA4000
trusted library allocation
page read and write
52E0000
heap
page read and write
2A92000
trusted library allocation
page read and write
725C000
trusted library allocation
page read and write
CF6F000
stack
page read and write
2A4C000
trusted library allocation
page read and write
1087000
heap
page read and write
4E85000
trusted library allocation
page read and write
6E0000
heap
page read and write
1AC4000
trusted library allocation
page read and write
714A000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
DC2000
trusted library allocation
page read and write
3130000
heap
page read and write
E5B000
stack
page read and write
DDB000
trusted library allocation
page execute and read and write
4879000
trusted library allocation
page read and write
2E91000
trusted library allocation
page read and write
57BE000
stack
page read and write
1580000
heap
page read and write
79FA000
trusted library allocation
page read and write
1AF0000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
CFA000
heap
page read and write
69E9000
heap
page read and write
632000
unkown
page readonly
C5BE000
stack
page read and write
4D30000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
714E000
trusted library allocation
page read and write
CB00000
heap
page read and write
C33000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
31F7000
trusted library allocation
page read and write
7A89000
trusted library allocation
page read and write
7336000
trusted library allocation
page read and write
7964000
trusted library allocation
page read and write
4D16000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
7AA2000
trusted library allocation
page read and write
2A42000
trusted library allocation
page read and write
354F000
stack
page read and write
6A1E000
stack
page read and write
350E000
stack
page read and write
585D000
stack
page read and write
9A18000
trusted library allocation
page read and write
1656000
heap
page read and write
4F20000
heap
page read and write
BE0000
heap
page read and write
6B50000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
813000
trusted library allocation
page execute and read and write
7ABA000
trusted library allocation
page read and write
784C000
trusted library allocation
page read and write
C8D000
trusted library allocation
page execute and read and write
5CFE000
stack
page read and write
2A20000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
7B7A000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
67A5000
heap
page read and write
823000
trusted library allocation
page read and write
4818000
trusted library allocation
page read and write
789000
stack
page read and write
876E000
stack
page read and write
4481000
trusted library allocation
page read and write
2B5B000
trusted library allocation
page execute and read and write
71D5000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
1113000
heap
page read and write
6EC5000
trusted library allocation
page read and write
4EB4000
trusted library allocation
page read and write
96CB000
trusted library allocation
page read and write
6EEF000
trusted library allocation
page read and write
6E70000
trusted library allocation
page execute and read and write
1060000
heap
page read and write
6D1E000
stack
page read and write
5460000
heap
page read and write
6F3B000
trusted library allocation
page read and write
29FA000
trusted library allocation
page read and write
723B000
trusted library allocation
page read and write
5276000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7ACA000
trusted library allocation
page read and write
C0E000
stack
page read and write
D1FD000
stack
page read and write
5010000
trusted library allocation
page read and write
4F00000
heap
page read and write
1410000
trusted library allocation
page read and write
28BF000
unkown
page read and write
4D20000
trusted library allocation
page read and write
1020000
heap
page execute and read and write
D43D000
stack
page read and write
7A5E000
trusted library allocation
page read and write
24D2000
trusted library allocation
page read and write
A27000
heap
page read and write
2830000
heap
page read and write
14FE000
stack
page read and write
DB8E000
stack
page read and write
54A0000
trusted library allocation
page read and write
718C000
trusted library allocation
page read and write
284E000
stack
page read and write
6647000
trusted library allocation
page read and write
8180000
heap
page read and write
FB7000
heap
page read and write
E60000
trusted library allocation
page read and write
ED3000
heap
page read and write
574F000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
422B000
trusted library allocation
page read and write
793B000
trusted library allocation
page read and write
1C9C000
stack
page read and write
D63E000
stack
page read and write
70EC000
trusted library allocation
page read and write
349F000
unkown
page read and write
78DA000
trusted library allocation
page read and write
2A78000
trusted library allocation
page read and write
7287000
trusted library allocation
page read and write
2AEE000
trusted library allocation
page read and write
7B88000
trusted library allocation
page read and write
82D000
trusted library allocation
page execute and read and write
63EE000
stack
page read and write
2AD7000
trusted library allocation
page read and write
2A72000
trusted library allocation
page read and write
7B64000
trusted library allocation
page read and write
7B3A000
trusted library allocation
page read and write
D73E000
stack
page read and write
4A8F000
trusted library allocation
page read and write
3598000
trusted library allocation
page read and write
669E000
stack
page read and write
343E000
unkown
page read and write
D1AD000
stack
page read and write
2A26000
trusted library allocation
page read and write
5830000
heap
page read and write
6635000
trusted library allocation
page read and write
2D75000
trusted library allocation
page read and write
287E000
unkown
page read and write
679D000
stack
page read and write
6F20000
heap
page read and write
2A30000
trusted library allocation
page read and write
5280000
trusted library allocation
page execute and read and write
13A0000
heap
page read and write
2648000
trusted library allocation
page read and write
2AF4000
trusted library allocation
page read and write
There are 1832 hidden memdumps, click here to show them.