IOC Report
Statement of Account PDF.bat.exe

loading gif

Files

File Path
Type
Category
Malicious
Statement of Account PDF.bat.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp690.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\gDdsxauPhk.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_BjTxJte.exe_f5c09dd75b90d612af8c658c8837992c387ee89_843aacda_4690c535-c6af-41e6-8128-f3000ded106c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_BjTxJte.exe_f5c09dd75b90d612af8c658c8837992c387ee89_843aacda_f7977af1-9a55-4b84-b1d5-dbe8f1aea04e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_gDdsxauPhk.exe_e2c8de6e9dfbc3bf198524a8a8bae3ea56c2edb2_cb724c00_6c828731-bc0c-4d10-93b3-5ed4934f0644\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER123.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER211D.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 08:33:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2312.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2351.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4195.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 08:33:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4281.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER42A1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFDF5.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 08:33:04 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BjTxJte.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Statement of Account PDF.bat.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\gDdsxauPhk.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_22v4wkjd.x43.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bw4kxm1v.dz4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fvzfr0w2.3zk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gof1kgrj.hnd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hpi3oywo.nkt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hv0x0w2p.gdl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_netipabd.v3k.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rqliqtw1.olg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp216B.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp44D2.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp6598.tmp
XML 1.0 document, ASCII text
modified
C:\Users\user\AppData\Roaming\gDdsxauPhk.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Statement of Account PDF.bat.exe
"C:\Users\user\Desktop\Statement of Account PDF.bat.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Statement of Account PDF.bat.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gDdsxauPhk.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gDdsxauPhk" /XML "C:\Users\user\AppData\Local\Temp\tmp690.tmp"
malicious
C:\Users\user\Desktop\Statement of Account PDF.bat.exe
"C:\Users\user\Desktop\Statement of Account PDF.bat.exe"
malicious
C:\Users\user\AppData\Roaming\gDdsxauPhk.exe
C:\Users\user\AppData\Roaming\gDdsxauPhk.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gDdsxauPhk" /XML "C:\Users\user\AppData\Local\Temp\tmp216B.tmp"
malicious
C:\Users\user\AppData\Roaming\gDdsxauPhk.exe
"C:\Users\user\AppData\Roaming\gDdsxauPhk.exe"
malicious
C:\Users\user\AppData\Roaming\gDdsxauPhk.exe
"C:\Users\user\AppData\Roaming\gDdsxauPhk.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gDdsxauPhk" /XML "C:\Users\user\AppData\Local\Temp\tmp44D2.tmp"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gDdsxauPhk" /XML "C:\Users\user\AppData\Local\Temp\tmp6598.tmp"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7440 -s 1816
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8032 -s 1828
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7400 -s 1788
There are 15 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.ascendercorp.com/typedesigners.htmlqX
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://api.ipify.org/t
unknown
http://www.carterandcone.coml
unknown
http://r3.i.lencr.org/0
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://api.ipify.org
unknown
http://www.founder.com.cn/cn
unknown
http://mail.fascia-arch.com
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://r3.o.lencr.org0
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.fascia-arch.com
50.87.195.61
malicious
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
50.87.195.61
mail.fascia-arch.com
United States
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Statement of Account PDF_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
BjTxJte
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gDdsxauPhk_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018800ED3BEEF14
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 37 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3081000
trusted library allocation
page read and write
malicious
4337000
trusted library allocation
page read and write
malicious
294B000
trusted library allocation
page read and write
malicious
4928000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
30D3000
trusted library allocation
page read and write
malicious
4798000
trusted library allocation
page read and write
malicious
3949000
trusted library allocation
page read and write
malicious
3541000
trusted library allocation
page read and write
malicious
30CB000
trusted library allocation
page read and write
malicious
2FAB000
trusted library allocation
page read and write
malicious
356C000
trusted library allocation
page read and write
malicious
3574000
trusted library allocation
page read and write
malicious
7600000
trusted library section
page read and write
malicious
27D0000
trusted library allocation
page read and write
1276000
trusted library allocation
page execute and read and write
29E0000
trusted library allocation
page read and write
675E000
stack
page read and write
86F000
heap
page read and write
2C57000
trusted library allocation
page read and write
74D8000
trusted library allocation
page read and write
E55C000
stack
page read and write
27FD000
trusted library allocation
page read and write
68D7000
trusted library allocation
page read and write
3277000
trusted library allocation
page read and write
62DE000
stack
page read and write
7648000
trusted library allocation
page read and write
12F0000
heap
page read and write
E82000
trusted library allocation
page read and write
2A30000
heap
page execute and read and write
8C8C000
heap
page read and write
6930000
trusted library allocation
page read and write
73C6000
trusted library allocation
page read and write
5BC0000
heap
page read and write
43E000
unkown
page read and write
2932000
trusted library allocation
page read and write
6F0F000
trusted library allocation
page read and write
12CE000
stack
page read and write
27D4000
trusted library allocation
page read and write
2FEE000
trusted library allocation
page read and write
4437000
trusted library allocation
page read and write
576E000
stack
page read and write
6A00000
trusted library allocation
page read and write
400A000
trusted library allocation
page read and write
75A9000
trusted library allocation
page read and write
A60B000
stack
page read and write
561F000
trusted library allocation
page read and write
22AD000
stack
page read and write
59AE000
stack
page read and write
23F0000
trusted library allocation
page execute and read and write
4C60000
heap
page read and write
50B0000
trusted library allocation
page read and write
AD8000
heap
page read and write
C62000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
75DD000
trusted library allocation
page read and write
2E04000
heap
page read and write
75FA000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
3094000
trusted library allocation
page read and write
4989000
trusted library allocation
page read and write
2CD5000
trusted library allocation
page read and write
70BD000
stack
page read and write
52AE000
stack
page read and write
BEE000
stack
page read and write
2A10000
trusted library allocation
page read and write
67E0000
heap
page read and write
2E30000
trusted library allocation
page read and write
7956000
trusted library allocation
page read and write
6B26000
trusted library allocation
page read and write
6DAC000
stack
page read and write
2BBE000
trusted library allocation
page read and write
3A49000
trusted library allocation
page read and write
15A2000
trusted library allocation
page read and write
730E000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
77D4000
trusted library allocation
page read and write
799E000
trusted library allocation
page read and write
5A07000
trusted library allocation
page read and write
3476000
trusted library allocation
page read and write
14CC000
stack
page read and write
505B000
stack
page read and write
7640000
trusted library allocation
page execute and read and write
5C7F000
stack
page read and write
5440000
heap
page execute and read and write
AF0000
heap
page read and write
75E9000
trusted library allocation
page read and write
7333000
trusted library allocation
page read and write
75BB000
trusted library allocation
page read and write
74A0000
trusted library allocation
page execute and read and write
4FE0000
trusted library allocation
page read and write
69A4000
heap
page read and write
76D2000
heap
page read and write
5EA000
stack
page read and write
C7D000
trusted library allocation
page execute and read and write
65A0000
trusted library allocation
page read and write
7390000
trusted library allocation
page execute and read and write
2AB6000
trusted library allocation
page read and write
6540000
trusted library allocation
page read and write
5120000
heap
page read and write
E57E000
stack
page read and write
796E000
trusted library allocation
page read and write
4ED9000
trusted library allocation
page read and write
30C7000
trusted library allocation
page read and write
1438000
heap
page read and write
5110000
trusted library allocation
page read and write
55EE000
stack
page read and write
406A000
trusted library allocation
page read and write
EB1E000
stack
page read and write
6729000
heap
page read and write
124D000
trusted library allocation
page execute and read and write
6F3E000
stack
page read and write
2DEF000
unkown
page read and write
27D6000
trusted library allocation
page read and write
53EE000
stack
page read and write
990000
heap
page read and write
78BA000
trusted library allocation
page read and write
D90000
heap
page read and write
59F0000
trusted library allocation
page read and write
CE6000
heap
page read and write
19E4000
trusted library allocation
page read and write
6F5E000
trusted library allocation
page read and write
160D000
stack
page read and write
1B6D000
trusted library allocation
page read and write
352F000
trusted library allocation
page read and write
9591000
heap
page read and write
5480000
heap
page read and write
713F000
trusted library allocation
page read and write
4D90000
heap
page read and write
3C29000
trusted library allocation
page read and write
31EC000
trusted library allocation
page read and write
2321000
trusted library allocation
page read and write
1620000
heap
page read and write
4E10000
trusted library allocation
page read and write
8C84000
heap
page read and write
2D87000
trusted library allocation
page read and write
6F85000
trusted library allocation
page read and write
C1F000
heap
page read and write
761D000
trusted library allocation
page read and write
790000
trusted library allocation
page read and write
3BD9000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
459D000
trusted library allocation
page read and write
3C09000
trusted library allocation
page read and write
6ED2000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
649E000
stack
page read and write
6AC0000
trusted library allocation
page read and write
6D80000
heap
page read and write
2770000
heap
page read and write
2D97000
trusted library allocation
page read and write
1446000
heap
page read and write
13C7000
heap
page read and write
2340000
trusted library allocation
page read and write
C08000
heap
page read and write
25CE000
stack
page read and write
8C7E000
heap
page read and write
BA0000
heap
page read and write
FF0000
trusted library allocation
page read and write
1077000
heap
page read and write
1315000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
7224000
heap
page read and write
E37D000
stack
page read and write
6E3E000
stack
page read and write
741D000
stack
page read and write
E6DE000
stack
page read and write
276E000
stack
page read and write
7085000
trusted library allocation
page read and write
E3D000
trusted library allocation
page execute and read and write
31D6000
trusted library allocation
page read and write
70CB000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
14DB000
trusted library allocation
page read and write
8C5A000
heap
page read and write
711A000
trusted library allocation
page read and write
EC0000
heap
page read and write
1270000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page execute and read and write
7A0000
trusted library allocation
page read and write
26D5000
trusted library allocation
page read and write
3075000
trusted library allocation
page read and write
E7D000
trusted library allocation
page execute and read and write
5E5E000
stack
page read and write
111A000
stack
page read and write
73F3000
heap
page read and write
2A3E000
trusted library allocation
page read and write
E01C000
stack
page read and write
7DE4000
heap
page read and write
3424000
trusted library allocation
page read and write
2C53000
trusted library allocation
page read and write
5BB0000
heap
page read and write
7506000
trusted library allocation
page read and write
307D000
trusted library allocation
page read and write
2BCF000
stack
page read and write
6BDE000
stack
page read and write
7630000
trusted library allocation
page read and write
321E000
trusted library allocation
page read and write
303E000
stack
page read and write
39A9000
trusted library allocation
page read and write
B78000
heap
page read and write
75FE000
stack
page read and write
650000
heap
page read and write
51CC000
stack
page read and write
7210000
heap
page read and write
30EB000
trusted library allocation
page read and write
6B7E000
stack
page read and write
70C5000
trusted library allocation
page read and write
6276000
heap
page read and write
7BA000
trusted library allocation
page execute and read and write
2901000
trusted library allocation
page read and write
1075000
heap
page read and write
7191000
trusted library allocation
page read and write
44BD000
trusted library allocation
page read and write
27FD000
stack
page read and write
1230000
trusted library allocation
page read and write
7796000
trusted library allocation
page read and write
751E000
stack
page read and write
1287000
trusted library allocation
page execute and read and write
52EE000
stack
page read and write
6751000
heap
page read and write
34AC000
stack
page read and write
4FAE000
stack
page read and write
3BE9000
trusted library allocation
page read and write
2326000
trusted library allocation
page read and write
7512000
trusted library allocation
page read and write
545E000
stack
page read and write
7497000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
5930000
heap
page read and write
7667000
trusted library allocation
page read and write
F10000
heap
page read and write
76A0000
trusted library allocation
page execute and read and write
6C1C000
stack
page read and write
56DF000
stack
page read and write
6960000
trusted library allocation
page read and write
70FB000
trusted library allocation
page read and write
724A000
trusted library allocation
page read and write
417A000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
799B000
trusted library allocation
page read and write
272E000
stack
page read and write
6EF7000
trusted library allocation
page read and write
7587000
trusted library allocation
page read and write
6C2C000
stack
page read and write
2E70000
trusted library allocation
page read and write
7311000
trusted library allocation
page read and write
54E0000
heap
page read and write
3531000
trusted library allocation
page read and write
32A2000
trusted library allocation
page read and write
2947000
trusted library allocation
page read and write
7314000
trusted library allocation
page read and write
7336000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
704D000
stack
page read and write
2D62000
trusted library allocation
page read and write
15C0000
heap
page read and write
73AC000
trusted library allocation
page read and write
2C5E000
stack
page read and write
7B6000
trusted library allocation
page execute and read and write
4BF0000
heap
page execute and read and write
586E000
stack
page read and write
4059000
trusted library allocation
page read and write
2390000
trusted library allocation
page read and write
30ED000
trusted library allocation
page read and write
75E9000
trusted library allocation
page read and write
65A6000
trusted library allocation
page read and write
6910000
heap
page read and write
300B000
heap
page read and write
794E000
trusted library allocation
page read and write
1B66000
trusted library allocation
page read and write
EB20000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
7583000
trusted library allocation
page read and write
794B000
trusted library allocation
page read and write
8CA2000
heap
page read and write
1670000
heap
page read and write
758C000
trusted library allocation
page read and write
5E0000
heap
page read and write
306D000
trusted library allocation
page read and write
6557000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
A4CE000
stack
page read and write
AF8B000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
7075000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
1584000
trusted library allocation
page read and write
7005000
trusted library allocation
page read and write
AEE000
stack
page read and write
61A0000
heap
page read and write
D7E000
stack
page read and write
2680000
heap
page read and write
FE7000
trusted library allocation
page execute and read and write
3FBD000
trusted library allocation
page read and write
580000
unkown
page readonly
958D000
stack
page read and write
C90000
trusted library allocation
page read and write
E87000
trusted library allocation
page execute and read and write
7628000
trusted library allocation
page read and write
1B4B000
trusted library allocation
page read and write
E57000
trusted library allocation
page execute and read and write
15B2000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
19F0000
heap
page read and write
22D0000
heap
page read and write
253E000
stack
page read and write
302B000
trusted library allocation
page read and write
A0F0000
heap
page read and write
5FC0000
trusted library allocation
page read and write
6F1C000
trusted library allocation
page read and write
6B40000
trusted library allocation
page execute and read and write
7080000
heap
page read and write
F10000
trusted library allocation
page execute and read and write
50BE000
stack
page read and write
6CD0000
trusted library allocation
page read and write
3244000
trusted library allocation
page read and write
15F0000
heap
page execute and read and write
687C000
heap
page read and write
54FD000
stack
page read and write
159D000
trusted library allocation
page execute and read and write
733C000
trusted library allocation
page read and write
73E2000
heap
page read and write
6EFD000
trusted library allocation
page read and write
5DF000
stack
page read and write
76E000
stack
page read and write
7936000
trusted library allocation
page read and write
3071000
trusted library allocation
page read and write
4EF0000
heap
page execute and read and write
78AB000
trusted library allocation
page read and write
566C000
stack
page read and write
3F61000
trusted library allocation
page read and write
6F34000
trusted library allocation
page read and write
A722000
heap
page read and write
E70000
trusted library allocation
page read and write
73B8000
heap
page read and write
75AC000
trusted library allocation
page read and write
6293000
heap
page read and write
29CD000
trusted library allocation
page read and write
4C50000
heap
page read and write
B3A000
stack
page read and write
3260000
heap
page read and write
FD2000
trusted library allocation
page read and write
6C20000
trusted library allocation
page execute and read and write
1121000
heap
page read and write
7AD000
trusted library allocation
page execute and read and write
7661000
trusted library allocation
page read and write
1180000
heap
page read and write
1111000
heap
page read and write
6936000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
7585000
trusted library allocation
page read and write
E24000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
134E000
stack
page read and write
7159000
trusted library allocation
page read and write
3390000
heap
page read and write
2A00000
trusted library allocation
page read and write
D21000
heap
page read and write
34A1000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
7288000
heap
page read and write
78F4000
trusted library allocation
page read and write
6F7C000
trusted library allocation
page read and write
2E4E000
stack
page read and write
7355000
trusted library allocation
page read and write
7508000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
59FD000
trusted library allocation
page read and write
6F47000
trusted library allocation
page read and write
6F30000
trusted library allocation
page execute and read and write
353D000
trusted library allocation
page read and write
738A000
trusted library allocation
page read and write
7642000
trusted library allocation
page read and write
532E000
stack
page read and write
138C000
stack
page read and write
3135000
trusted library allocation
page read and write
3A29000
trusted library allocation
page read and write
6860000
heap
page read and write
7502000
trusted library allocation
page read and write
4F20000
heap
page read and write
5170000
trusted library allocation
page read and write
68D5000
trusted library allocation
page read and write
7891000
trusted library allocation
page read and write
1127000
heap
page read and write
14FD000
trusted library allocation
page read and write
71FF000
trusted library allocation
page read and write
5A14000
heap
page read and write
74C3000
trusted library allocation
page read and write
27F0000
heap
page execute and read and write
4751000
trusted library allocation
page read and write
78CD000
trusted library allocation
page read and write
6E8F000
trusted library allocation
page read and write
2D48000
trusted library allocation
page read and write
758F000
trusted library allocation
page read and write
54F0000
heap
page read and write
301B000
trusted library allocation
page read and write
9B1D000
stack
page read and write
6CAC000
stack
page read and write
621C000
stack
page read and write
781D000
trusted library allocation
page read and write
3B98000
trusted library allocation
page read and write
3AA9000
trusted library allocation
page read and write
654D000
trusted library allocation
page read and write
2A34000
trusted library allocation
page read and write
68F0000
trusted library allocation
page execute and read and write
1000000
trusted library allocation
page read and write
768D000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
2D9C000
stack
page read and write
6E8B000
trusted library allocation
page read and write
4D6E000
stack
page read and write
800000
heap
page read and write
78EE000
stack
page read and write
484B000
trusted library allocation
page read and write
7589000
trusted library allocation
page read and write
72CE000
stack
page read and write
6EB5000
trusted library allocation
page read and write
45C7000
trusted library allocation
page read and write
71A2000
trusted library allocation
page read and write
6F49000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
408A000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
507D000
trusted library allocation
page read and write
29A6000
trusted library allocation
page read and write
2E72000
trusted library allocation
page read and write
717C000
trusted library allocation
page read and write
AAE000
stack
page read and write
46BB000
trusted library allocation
page read and write
55DF000
stack
page read and write
77AB000
trusted library allocation
page read and write
7E1A000
heap
page read and write
F57000
heap
page read and write
5160000
trusted library allocation
page read and write
968000
stack
page read and write
7706000
heap
page read and write
2990000
trusted library allocation
page read and write
3000000
heap
page read and write
E42000
trusted library allocation
page read and write
5949000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
71FC000
trusted library allocation
page read and write
9C0000
heap
page read and write
5560000
heap
page read and write
6E9D000
trusted library allocation
page read and write
2F5E000
stack
page read and write
73F0000
trusted library section
page read and write
71A6000
trusted library allocation
page read and write
713D000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
5596000
trusted library allocation
page read and write
AF9000
stack
page read and write
675D000
heap
page read and write
2430000
heap
page read and write
7373000
trusted library allocation
page read and write
A6E000
stack
page read and write
1048000
heap
page read and write
5F9E000
stack
page read and write
6C21000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
3067000
trusted library allocation
page read and write
2979000
trusted library allocation
page read and write
E82000
trusted library allocation
page read and write
5640000
heap
page read and write
68A2000
heap
page read and write
E5B000
trusted library allocation
page execute and read and write
6D30000
trusted library allocation
page execute and read and write
A90000
trusted library allocation
page read and write
70C3000
trusted library allocation
page read and write
E86000
trusted library allocation
page execute and read and write
4A39000
stack
page read and write
709F000
trusted library allocation
page read and write
4A9D000
stack
page read and write
B9F000
heap
page read and write
507B000
stack
page read and write
757C000
trusted library allocation
page read and write
413E000
trusted library allocation
page read and write
506E000
trusted library allocation
page read and write
2CC8000
trusted library allocation
page read and write
1010000
heap
page execute and read and write
406E000
trusted library allocation
page read and write
13DC000
stack
page read and write
105E000
stack
page read and write
C88000
heap
page read and write
1132000
heap
page read and write
784D000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
44F1000
trusted library allocation
page read and write
5730000
heap
page execute and read and write
3C49000
trusted library allocation
page read and write
7276000
trusted library allocation
page read and write
721F000
trusted library allocation
page read and write
1040000
heap
page read and write
7F0A0000
trusted library allocation
page execute and read and write
749A000
heap
page read and write
6F81000
trusted library allocation
page read and write
1517000
heap
page read and write
7694000
trusted library allocation
page read and write
4031000
trusted library allocation
page read and write
8E7000
heap
page read and write
6F54000
trusted library allocation
page read and write
6E00000
heap
page read and write
302F000
stack
page read and write
1BC7000
heap
page read and write
6707000
heap
page read and write
6F16000
trusted library allocation
page read and write
6F51000
trusted library allocation
page read and write
2B4A000
trusted library allocation
page read and write
708E000
stack
page read and write
71BB000
trusted library allocation
page read and write
6930000
heap
page read and write
78E2000
trusted library allocation
page read and write
8090000
heap
page read and write
E380000
heap
page read and write
415E000
trusted library allocation
page read and write
72B1000
trusted library allocation
page read and write
4EAE000
stack
page read and write
2C15000
trusted library allocation
page read and write
E8B000
trusted library allocation
page execute and read and write
CDA000
heap
page read and write
72BD000
stack
page read and write
3031000
trusted library allocation
page read and write
7E0E000
heap
page read and write
735D000
trusted library allocation
page read and write
715E000
stack
page read and write
3411000
trusted library allocation
page read and write
56E0000
heap
page read and write
771C000
heap
page read and write
34CD000
trusted library allocation
page read and write
766B000
trusted library allocation
page read and write
4F15000
heap
page read and write
2F00000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
1070000
heap
page read and write
413A000
trusted library allocation
page read and write
7655000
trusted library allocation
page read and write
F28000
heap
page read and write
AA6000
trusted library allocation
page read and write
5D1F000
stack
page read and write
71A8000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
6EFA000
trusted library allocation
page read and write
498D000
trusted library allocation
page read and write
10A7000
heap
page read and write
11CD000
stack
page read and write
29BA000
trusted library allocation
page read and write
6BDE000
stack
page read and write
6F94000
trusted library allocation
page read and write
7805000
trusted library allocation
page read and write
1004000
trusted library allocation
page read and write
55C0000
heap
page read and write
5600000
trusted library allocation
page execute and read and write
6A10000
trusted library allocation
page execute and read and write
1243000
trusted library allocation
page execute and read and write
415A000
trusted library allocation
page read and write
68E7000
trusted library allocation
page read and write
77CC000
trusted library allocation
page read and write
2370000
trusted library allocation
page read and write
841000
heap
page read and write
BF0000
heap
page read and write
3340000
trusted library allocation
page read and write
652E000
stack
page read and write
7C8C000
stack
page read and write
6A7D000
stack
page read and write
7317000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
6942000
heap
page read and write
3969000
trusted library allocation
page read and write
4908000
trusted library allocation
page read and write
C7C000
heap
page read and write
74BA000
trusted library allocation
page read and write
716B000
trusted library allocation
page read and write
9C5000
heap
page read and write
279E000
trusted library allocation
page read and write
CF7000
stack
page read and write
2265000
trusted library allocation
page read and write
717E000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
6A0F000
trusted library allocation
page read and write
2A05000
trusted library allocation
page read and write
A00000
heap
page read and write
4D0A000
stack
page read and write
7621000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
1B80000
trusted library allocation
page read and write
72D2000
trusted library allocation
page read and write
6267000
heap
page read and write
E64000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
6F4F000
trusted library allocation
page read and write
1250000
heap
page read and write
74AE000
trusted library allocation
page read and write
2C46000
trusted library allocation
page read and write
2D10000
heap
page read and write
16A000
stack
page read and write
6BEC000
stack
page read and write
938E000
stack
page read and write
7370000
trusted library allocation
page read and write
293E000
stack
page read and write
59E0000
heap
page execute and read and write
E7DE000
stack
page read and write
39C9000
trusted library allocation
page read and write
15A000
stack
page read and write
52FC000
stack
page read and write
587E000
stack
page read and write
6E96000
trusted library allocation
page read and write
67EE000
heap
page read and write
80A000
heap
page read and write
2E14000
trusted library allocation
page read and write
A4E000
stack
page read and write
11D0000
heap
page read and write
50B0000
heap
page read and write
5054000
trusted library allocation
page read and write
797E000
trusted library allocation
page read and write
12F7000
heap
page read and write
CB0000
heap
page read and write
C20000
heap
page read and write
3E4C000
trusted library allocation
page read and write
232D000
trusted library allocation
page read and write
719E000
stack
page read and write
765D000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
25A6000
trusted library allocation
page read and write
66BB000
trusted library allocation
page read and write
77ED000
trusted library allocation
page read and write
706F000
trusted library allocation
page read and write
6547000
trusted library allocation
page read and write
6762000
heap
page read and write
74C6000
trusted library allocation
page read and write
2DE9000
trusted library allocation
page read and write
52AE000
stack
page read and write
C53000
trusted library allocation
page read and write
685D000
stack
page read and write
DDE000
stack
page read and write
7352000
trusted library allocation
page read and write
5C90000
heap
page read and write
55E0000
heap
page read and write
11D000
stack
page read and write
4EC0000
heap
page read and write
27C2000
trusted library allocation
page read and write
512E000
stack
page read and write
8F7000
stack
page read and write
787E000
trusted library allocation
page read and write
705C000
trusted library allocation
page read and write
1647000
heap
page read and write
29E6000
trusted library allocation
page read and write
68ED000
heap
page read and write
753F000
trusted library allocation
page read and write
D82000
heap
page read and write
1010000
trusted library allocation
page execute and read and write
6EC9000
trusted library allocation
page read and write
3201000
trusted library allocation
page read and write
937000
stack
page read and write
FE5000
trusted library allocation
page execute and read and write
2C96000
trusted library allocation
page read and write
9ADC000
stack
page read and write
5123000
heap
page read and write
7690000
heap
page read and write
4F00000
trusted library allocation
page read and write
1255000
heap
page read and write
6B30000
trusted library allocation
page read and write
7645000
trusted library allocation
page read and write
6F1F000
trusted library allocation
page read and write
DFE000
stack
page read and write
514D000
trusted library allocation
page read and write
32C6000
trusted library allocation
page read and write
A936000
trusted library allocation
page read and write
5489000
heap
page read and write
FBD000
trusted library allocation
page execute and read and write
80A0000
heap
page read and write
63E9000
trusted library allocation
page read and write
2CB2000
trusted library allocation
page read and write
552E000
stack
page read and write
7059000
trusted library allocation
page read and write
74DB000
trusted library allocation
page read and write
C96000
trusted library allocation
page execute and read and write
41BB000
trusted library allocation
page read and write
2D9F000
trusted library allocation
page read and write
703E000
stack
page read and write
549E000
heap
page read and write
6900000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
6242000
heap
page read and write
5100000
trusted library section
page readonly
5FA0000
heap
page read and write
2A42000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
8CEF000
heap
page read and write
91A000
stack
page read and write
4D90000
trusted library allocation
page read and write
128B000
trusted library allocation
page execute and read and write
C73000
trusted library allocation
page execute and read and write
15B5000
trusted library allocation
page execute and read and write
2F72000
trusted library allocation
page read and write
6EF4000
trusted library allocation
page read and write
29BE000
trusted library allocation
page read and write
8376000
trusted library allocation
page read and write
1C0000
heap
page read and write
990000
heap
page read and write
7649000
trusted library allocation
page read and write
29AE000
trusted library allocation
page read and write
32E6000
trusted library allocation
page read and write
794000
trusted library allocation
page read and write
6EDE000
trusted library allocation
page read and write
5FA0000
heap
page read and write
2E2C000
stack
page read and write
769C000
heap
page read and write
3A41000
trusted library allocation
page read and write
5C1C000
stack
page read and write
71CE000
stack
page read and write
950000
heap
page read and write
78C3000
trusted library allocation
page read and write
7529000
trusted library allocation
page read and write
7514000
trusted library allocation
page read and write
596E000
stack
page read and write
70B7000
trusted library allocation
page read and write
7B11000
heap
page read and write
5591000
trusted library allocation
page read and write
793000
trusted library allocation
page execute and read and write
73DE000
stack
page read and write
6DDC000
stack
page read and write
577E000
stack
page read and write
6F58000
trusted library allocation
page read and write
10B4000
heap
page read and write
4F10000
heap
page read and write
7930000
trusted library allocation
page read and write
735A000
trusted library allocation
page read and write
795B000
trusted library allocation
page read and write
762B000
trusted library allocation
page read and write
C2A000
heap
page read and write
74F6000
trusted library allocation
page read and write
6900000
heap
page read and write
57A000
stack
page read and write
3361000
trusted library allocation
page read and write
7604000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
6279000
heap
page read and write
6EC6000
trusted library allocation
page read and write
9C0000
heap
page read and write
3901000
trusted library allocation
page read and write
2C9F000
stack
page read and write
3136000
trusted library allocation
page read and write
7587000
trusted library allocation
page read and write
7C60000
heap
page read and write
16A7000
heap
page read and write
6BBD000
stack
page read and write
411A000
trusted library allocation
page read and write
5F5E000
stack
page read and write
7920000
heap
page read and write
169A000
heap
page read and write
780B000
trusted library allocation
page read and write
75EC000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
E4A000
trusted library allocation
page execute and read and write
A74E000
stack
page read and write
700E000
trusted library allocation
page read and write
79D000
trusted library allocation
page execute and read and write
659D000
stack
page read and write
15E0000
trusted library allocation
page read and write
74F4000
trusted library allocation
page read and write
16DE000
heap
page read and write
755B000
trusted library allocation
page read and write
6249000
heap
page read and write
1BC0000
heap
page read and write
2CF8000
trusted library allocation
page read and write
C6A000
trusted library allocation
page execute and read and write
14E2000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
54A0000
heap
page read and write
2CEA000
stack
page read and write
7817000
trusted library allocation
page read and write
15A6000
trusted library allocation
page execute and read and write
14F6000
trusted library allocation
page read and write
71B0000
heap
page read and write
5A10000
heap
page read and write
50FE000
stack
page read and write
7620000
trusted library section
page read and write
16A4000
heap
page read and write
6ED9000
trusted library allocation
page read and write
6EF1000
trusted library allocation
page read and write
7811000
trusted library allocation
page read and write
3B09000
trusted library allocation
page read and write
6C00000
trusted library allocation
page execute and read and write
2A5C000
trusted library allocation
page read and write
53D000
stack
page read and write
5071000
trusted library allocation
page read and write
77AE000
trusted library allocation
page read and write
1640000
heap
page read and write
980000
heap
page read and write
6F71000
trusted library allocation
page read and write
ED0000
heap
page read and write
3989000
trusted library allocation
page read and write
83A0000
heap
page read and write
71DE000
trusted library allocation
page read and write
4758000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
763A000
trusted library allocation
page read and write
7393000
trusted library allocation
page read and write
6C4B000
stack
page read and write
559D000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
1948000
trusted library allocation
page read and write
48E8000
trusted library allocation
page read and write
ABE000
heap
page read and write
75E5000
trusted library allocation
page read and write
74FE000
stack
page read and write
29BE000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
10C4000
heap
page read and write
2B2A000
trusted library allocation
page read and write
E75E000
stack
page read and write
1B3C000
stack
page read and write
7308000
trusted library allocation
page read and write
106A000
heap
page read and write
13C0000
heap
page read and write
7C7000
trusted library allocation
page execute and read and write
7850000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page execute and read and write
3027000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
5D00000
heap
page read and write
A70C000
stack
page read and write
7176000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
231E000
trusted library allocation
page read and write
5620000
trusted library allocation
page execute and read and write
2C5B000
trusted library allocation
page read and write
5076000
trusted library allocation
page read and write
6D32000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
72D5000
trusted library allocation
page read and write
A84E000
stack
page read and write
59C9000
trusted library allocation
page read and write
2541000
trusted library allocation
page read and write
73B4000
heap
page read and write
1417000
heap
page read and write
5A00000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
137C000
stack
page read and write
557B000
trusted library allocation
page read and write
7278000
trusted library allocation
page read and write
836000
heap
page read and write
F8E000
stack
page read and write
5110000
heap
page execute and read and write
1244000
trusted library allocation
page read and write
71B0000
trusted library allocation
page execute and read and write
2D9E000
stack
page read and write
6C70000
trusted library allocation
page read and write
6E89000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
2E3A000
trusted library allocation
page read and write
148A000
heap
page read and write
639E000
stack
page read and write
60E000
stack
page read and write
4C65000
heap
page read and write
71E7000
trusted library allocation
page read and write
720D000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
75E4000
trusted library allocation
page read and write
C66000
trusted library allocation
page execute and read and write
3210000
trusted library allocation
page read and write
7168000
trusted library allocation
page read and write
1678000
heap
page read and write
C43000
trusted library allocation
page execute and read and write
7958000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
3A49000
trusted library allocation
page read and write
72AF000
stack
page read and write
47CE000
trusted library allocation
page read and write
5F90000
heap
page read and write
27E0000
trusted library allocation
page read and write
E69E000
stack
page read and write
D4B000
heap
page read and write
6B1D000
stack
page read and write
6AAE000
stack
page read and write
EA1E000
stack
page read and write
4F40000
heap
page read and write
8C95000
heap
page read and write
AA0000
trusted library allocation
page read and write
3023000
trusted library allocation
page read and write
3FCA000
trusted library allocation
page read and write
761A000
trusted library allocation
page read and write
6C6E000
stack
page read and write
E59D000
stack
page read and write
7B0000
trusted library allocation
page read and write
83E000
unkown
page read and write
6777000
heap
page read and write
F20000
heap
page read and write
6C6B000
heap
page read and write
7391000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
73A3000
trusted library allocation
page read and write
CB8000
heap
page read and write
6CE0000
trusted library allocation
page execute and read and write
7220000
heap
page read and write
55B0000
heap
page read and write
66C6000
heap
page read and write
77C3000
trusted library allocation
page read and write
7070000
trusted library allocation
page execute and read and write
70EA000
trusted library allocation
page read and write
7C50000
heap
page read and write
72DE000
trusted library allocation
page read and write
2B1F000
trusted library allocation
page read and write
4E00000
heap
page read and write
2FA7000
trusted library allocation
page read and write
761F000
trusted library allocation
page read and write
73B7000
trusted library allocation
page read and write
7082000
trusted library allocation
page read and write
E63000
trusted library allocation
page execute and read and write
2E38000
trusted library allocation
page read and write
6251000
heap
page read and write
E4E000
stack
page read and write
7056000
trusted library allocation
page read and write
3335000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
434C000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
74FC000
trusted library allocation
page read and write
27B1000
trusted library allocation
page read and write
6E00000
heap
page read and write
124C000
unkown
page read and write
C44000
trusted library allocation
page read and write
7238000
trusted library allocation
page read and write
5BAE000
stack
page read and write
464D000
trusted library allocation
page read and write
1540000
heap
page read and write
E3BE000
stack
page read and write
4990000
trusted library allocation
page execute and read and write
71F9000
trusted library allocation
page read and write
2CAD000
stack
page read and write
4DF0000
heap
page read and write
357F000
trusted library allocation
page read and write
29B6000
trusted library allocation
page read and write
3AC9000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
67BB000
stack
page read and write
9C5D000
stack
page read and write
7500000
trusted library allocation
page read and write
75E7000
trusted library allocation
page read and write
667D000
stack
page read and write
9B0000
heap
page read and write
12FC000
stack
page read and write
4FB4000
heap
page read and write
77EA000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page execute and read and write
E89C000
stack
page read and write
5C1D000
stack
page read and write
7190000
trusted library allocation
page read and write
6E79000
trusted library allocation
page read and write
3527000
trusted library allocation
page read and write
756C000
trusted library allocation
page read and write
788E000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
2E44000
trusted library allocation
page read and write
78B6000
trusted library allocation
page read and write
734D000
trusted library allocation
page read and write
59B0000
heap
page read and write
58AD000
stack
page read and write
409A000
trusted library allocation
page read and write
7291000
trusted library allocation
page read and write
53AE000
stack
page read and write
70CE000
stack
page read and write
4980000
trusted library allocation
page read and write
5A20000
heap
page read and write
74DE000
trusted library allocation
page read and write
25BD000
trusted library allocation
page read and write
BFE000
stack
page read and write
4A14000
trusted library section
page readonly
68DD000
trusted library allocation
page read and write
51BE000
stack
page read and write
7689000
trusted library allocation
page read and write
789D000
trusted library allocation
page read and write
BAE000
unkown
page read and write
7165000
trusted library allocation
page read and write
346E000
stack
page read and write
6F19000
trusted library allocation
page read and write
78FA000
trusted library allocation
page read and write
4BEE000
stack
page read and write
2943000
trusted library allocation
page read and write
FCD000
trusted library allocation
page execute and read and write
70B1000
trusted library allocation
page read and write
9D60000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
30EC000
trusted library allocation
page read and write
2E00000
heap
page read and write
5470000
heap
page read and write
14EE000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
2D05000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
2B74000
trusted library allocation
page read and write
7252000
heap
page read and write
8C99000
heap
page read and write
521D000
stack
page read and write
6757000
heap
page read and write
15BB000
trusted library allocation
page execute and read and write
7517000
heap
page read and write
73C3000
trusted library allocation
page read and write
2420000
heap
page read and write
ACE8000
heap
page read and write
55D0000
heap
page read and write
6F65000
trusted library allocation
page read and write
7174000
trusted library allocation
page read and write
23D0000
heap
page read and write
780000
trusted library allocation
page read and write
290C000
trusted library allocation
page read and write
2CA8000
trusted library allocation
page read and write
14F9000
stack
page read and write
E6D000
trusted library allocation
page execute and read and write
5582000
trusted library allocation
page read and write
3B49000
trusted library allocation
page read and write
6259000
heap
page read and write
29BA000
trusted library allocation
page read and write
128B000
stack
page read and write
676E000
heap
page read and write
7380000
trusted library section
page read and write
731A000
trusted library allocation
page read and write
844000
heap
page read and write
707F000
trusted library allocation
page read and write
1282000
trusted library allocation
page read and write
27A2000
trusted library allocation
page read and write
7097000
trusted library allocation
page read and write
669C000
heap
page read and write
72F1000
trusted library allocation
page read and write
2BDB000
trusted library allocation
page read and write
1394000
trusted library allocation
page read and write
279B000
trusted library allocation
page read and write
7F1B0000
trusted library allocation
page execute and read and write
15A0000
trusted library allocation
page read and write
23D3000
heap
page read and write
7520000
heap
page read and write
1640000
trusted library allocation
page execute and read and write
5B60000
heap
page read and write
C80000
trusted library allocation
page read and write
2E50000
heap
page read and write
2260000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
69AE000
stack
page read and write
50F0000
heap
page read and write
2E44000
trusted library allocation
page read and write
7040000
trusted library allocation
page execute and read and write
27DB000
trusted library allocation
page read and write
7485000
trusted library allocation
page read and write
14AB000
heap
page read and write
4A0C000
stack
page read and write
7664000
trusted library allocation
page read and write
27BD000
trusted library allocation
page read and write
6B4C000
stack
page read and write
8D06000
heap
page read and write
D8D000
heap
page read and write
6ECF000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
4E6E000
stack
page read and write
7A3000
trusted library allocation
page read and write
7E02000
heap
page read and write
7330000
trusted library allocation
page read and write
735E000
stack
page read and write
15B0000
trusted library allocation
page read and write
533D000
stack
page read and write
293F000
trusted library allocation
page read and write
6EB0000
heap
page read and write
2941000
trusted library allocation
page read and write
2A72000
trusted library allocation
page read and write
707B000
trusted library allocation
page read and write
3541000
trusted library allocation
page read and write
750E000
stack
page read and write
23E0000
heap
page read and write
3941000
trusted library allocation
page read and write
61F1000
heap
page read and write
E73000
trusted library allocation
page read and write
7617000
trusted library allocation
page read and write
70B9000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
1B61000
trusted library allocation
page read and write
718F000
stack
page read and write
10C9000
heap
page read and write
BEE000
stack
page read and write
126D000
trusted library allocation
page execute and read and write
5FB7000
trusted library allocation
page read and write
71E4000
trusted library allocation
page read and write
7358000
trusted library allocation
page read and write
765E000
trusted library allocation
page read and write
66BE000
stack
page read and write
342C000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
93CE000
stack
page read and write
978E000
stack
page read and write
51FC000
stack
page read and write
C92000
trusted library allocation
page read and write
786C000
trusted library allocation
page read and write
72E1000
trusted library allocation
page read and write
633E000
stack
page read and write
724C000
trusted library allocation
page read and write
72D8000
trusted library allocation
page read and write
5F5E000
stack
page read and write
3479000
trusted library allocation
page read and write
3BD1000
trusted library allocation
page read and write
40DA000
trusted library allocation
page read and write
70B3000
trusted library allocation
page read and write
750E000
trusted library allocation
page read and write
3227000
trusted library allocation
page read and write
6F62000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
B15000
heap
page read and write
19E0000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
77E6000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
940000
heap
page read and write
E60000
trusted library allocation
page read and write
2CD4000
trusted library allocation
page read and write
3AE9000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2BC0000
trusted library allocation
page read and write
153E000
stack
page read and write
12EE000
stack
page read and write
6F67000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
73BB000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
767F000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
55FC000
stack
page read and write
8CB5000
heap
page read and write
7518000
trusted library allocation
page read and write
B76000
heap
page read and write
B380000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
693D000
stack
page read and write
EA0000
trusted library allocation
page execute and read and write
7386000
trusted library allocation
page read and write
4F20000
heap
page execute and read and write
70D7000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
107E000
heap
page read and write
12A0000
trusted library allocation
page read and write
5BF7000
heap
page read and write
70BF000
trusted library allocation
page read and write
4E00000
trusted library allocation
page execute and read and write
7690000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
5150000
trusted library allocation
page execute and read and write
FA0000
trusted library allocation
page read and write
70BD000
trusted library allocation
page read and write
790C000
trusted library allocation
page read and write
127A000
trusted library allocation
page execute and read and write
5D8E000
stack
page read and write
E7F0000
trusted library allocation
page read and write
55B0000
heap
page read and write
6AC7000
trusted library allocation
page read and write
6A3F000
stack
page read and write
1B52000
trusted library allocation
page read and write
781A000
trusted library allocation
page read and write
B10000
heap
page read and write
3A6B000
trusted library allocation
page read and write
763D000
trusted library allocation
page read and write
29B2000
trusted library allocation
page read and write
3A19000
trusted library allocation
page read and write
4F1D000
trusted library allocation
page read and write
C74000
trusted library allocation
page read and write
71CD000
trusted library allocation
page read and write
E52000
trusted library allocation
page read and write
1006000
trusted library allocation
page read and write
6E9F000
trusted library allocation
page read and write
BDB000
stack
page read and write
980000
heap
page read and write
302F000
trusted library allocation
page read and write
5460000
heap
page execute and read and write
40AA000
trusted library allocation
page read and write
EB0000
heap
page read and write
2830000
heap
page execute and read and write
6A4B000
trusted library allocation
page read and write
F95000
heap
page read and write
455E000
trusted library allocation
page read and write
76FE000
stack
page read and write
279F000
stack
page read and write
75A4000
trusted library allocation
page read and write
6A2B000
stack
page read and write
642E000
stack
page read and write
5F8F000
stack
page read and write
2FA3000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
61CB000
heap
page read and write
264C000
stack
page read and write
7976000
trusted library allocation
page read and write
714B000
trusted library allocation
page read and write
419E000
trusted library allocation
page read and write
2C4F000
trusted library allocation
page read and write
10CB000
heap
page read and write
73BD000
stack
page read and write
731F000
trusted library allocation
page read and write
70C9000
trusted library allocation
page read and write
C2E000
stack
page read and write
727B000
trusted library allocation
page read and write
73A0000
heap
page read and write
2DF0000
heap
page read and write
7820000
trusted library allocation
page read and write
766E000
trusted library allocation
page read and write
3F37000
trusted library allocation
page read and write
4C40000
heap
page read and write
1258000
heap
page read and write
1443000
heap
page read and write
EEE000
stack
page read and write
126F000
stack
page read and write
2D73000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
6288000
heap
page read and write
AB0000
heap
page read and write
6ED6000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
8CD2000
heap
page read and write
A5CE000
stack
page read and write
E8DE000
stack
page read and write
2C8A000
trusted library allocation
page read and write
7F760000
trusted library allocation
page execute and read and write
32E4000
trusted library allocation
page read and write
75E1000
trusted library allocation
page read and write
7808000
trusted library allocation
page read and write
738E000
trusted library allocation
page read and write
2B54000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
FE2000
trusted library allocation
page read and write
837E000
trusted library allocation
page read and write
73CF000
trusted library allocation
page read and write
2E57000
trusted library allocation
page read and write
33EC000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
AF0000
heap
page read and write
7099000
trusted library allocation
page read and write
278E000
stack
page read and write
6910000
trusted library allocation
page execute and read and write
620C000
heap
page read and write
31C0000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
2CC7000
trusted library allocation
page read and write
758F000
trusted library allocation
page read and write
7899000
trusted library allocation
page read and write
6E9A000
trusted library allocation
page read and write
EF0000
heap
page read and write
6969000
trusted library allocation
page read and write
5F0000
heap
page read and write
6D4D000
stack
page read and write
CA0000
heap
page read and write
750C000
trusted library allocation
page read and write
260B000
stack
page read and write
6680000
heap
page read and write
72C8000
trusted library allocation
page read and write
733E000
stack
page read and write
6F76000
trusted library allocation
page read and write
FB3000
trusted library allocation
page execute and read and write
B5F000
stack
page read and write
7FB10000
trusted library allocation
page execute and read and write
509E000
stack
page read and write
9FF000
stack
page read and write
8700000
trusted library allocation
page read and write
77A8000
trusted library allocation
page read and write
FDF000
stack
page read and write
B60000
heap
page read and write
5334000
trusted library section
page readonly
5050000
trusted library allocation
page read and write
7269000
trusted library allocation
page read and write
41FE000
trusted library allocation
page read and write
5100000
trusted library allocation
page execute and read and write
E9DE000
stack
page read and write
3133000
trusted library allocation
page read and write
730B000
trusted library allocation
page read and write
133B000
stack
page read and write
3A09000
trusted library allocation
page read and write
5498000
heap
page read and write
BB0000
heap
page read and write
3F89000
trusted library allocation
page read and write
83A000
stack
page read and write
2F20000
heap
page execute and read and write
5470000
heap
page read and write
A0ED000
stack
page read and write
6ED0000
trusted library allocation
page execute and read and write
E8A000
trusted library allocation
page execute and read and write
3294000
trusted library allocation
page read and write
712D000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
7802000
trusted library allocation
page read and write
404A000
trusted library allocation
page read and write
27BB000
stack
page read and write
3B89000
trusted library allocation
page read and write
2DA0000
heap
page execute and read and write
15C5000
heap
page read and write
1272000
trusted library allocation
page read and write
50A0000
heap
page read and write
7000000
trusted library allocation
page read and write
724F000
trusted library allocation
page read and write
7490000
heap
page read and write
6FF0000
trusted library allocation
page execute and read and write
73CB000
trusted library allocation
page read and write
71E2000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
F45000
trusted library allocation
page execute and read and write
2580000
trusted library allocation
page read and write
72CE000
trusted library allocation
page read and write
753C000
trusted library allocation
page read and write
554E000
stack
page read and write
68BF000
stack
page read and write
8C50000
heap
page read and write
2350000
heap
page execute and read and write
C70000
trusted library allocation
page read and write
E97000
trusted library allocation
page execute and read and write
1B4E000
trusted library allocation
page read and write
AB0000
heap
page read and write
402A000
trusted library allocation
page read and write
15B7000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page execute and read and write
ABA000
heap
page read and write
5940000
trusted library allocation
page read and write
FEB000
trusted library allocation
page execute and read and write
80E000
heap
page read and write
59E000
stack
page read and write
29E4000
trusted library allocation
page read and write
720A000
trusted library allocation
page read and write
531E000
stack
page read and write
2400000
trusted library allocation
page read and write
77C6000
trusted library allocation
page read and write
99DB000
stack
page read and write
6E0C000
heap
page read and write
30E4000
trusted library allocation
page read and write
56F0000
heap
page read and write
6AC5000
trusted library allocation
page read and write
463E000
trusted library allocation
page read and write
8C78000
heap
page read and write
5140000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
6920000
heap
page read and write
32C0000
trusted library allocation
page read and write
4D80000
heap
page read and write
3929000
trusted library allocation
page read and write
709C000
trusted library allocation
page read and write
7894000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
7CB000
trusted library allocation
page execute and read and write
2AB7000
trusted library allocation
page read and write
E80000
heap
page read and write
2D60000
heap
page read and write
66A0000
trusted library allocation
page execute and read and write
283E000
stack
page read and write
7111000
trusted library allocation
page read and write
3040000
heap
page read and write
1400000
trusted library allocation
page execute and read and write
4D85000
trusted library allocation
page read and write
7274000
trusted library allocation
page read and write
5C80000
heap
page read and write
690C000
heap
page read and write
E1BD000
stack
page read and write
34C5000
trusted library allocation
page read and write
CE4000
heap
page read and write
7675000
trusted library allocation
page read and write
74FA000
trusted library allocation
page read and write
1328000
heap
page read and write
EA0000
trusted library allocation
page read and write
4FB0000
heap
page read and write
2B78000
trusted library allocation
page read and write
39E9000
trusted library allocation
page read and write
E2D000
trusted library allocation
page execute and read and write
4ED0000
trusted library allocation
page execute and read and write
1285000
trusted library allocation
page execute and read and write
6271000
heap
page read and write
A2EE000
stack
page read and write
7D90000
heap
page read and write
7142000
trusted library allocation
page read and write
7623000
trusted library allocation
page read and write
692D000
stack
page read and write
6D8E000
heap
page read and write
FB0000
trusted library allocation
page read and write
AB0000
heap
page read and write
9CA000
heap
page read and write
4C3E000
stack
page read and write
70CF000
trusted library allocation
page read and write
78C7000
trusted library allocation
page read and write
C4D000
trusted library allocation
page execute and read and write
ABD000
stack
page read and write
6E42000
heap
page read and write
4EF0000
trusted library allocation
page read and write
113F000
heap
page read and write
ED5000
heap
page read and write
3B6B000
trusted library allocation
page read and write
780E000
trusted library allocation
page read and write
29C1000
trusted library allocation
page read and write
76A8000
heap
page read and write
40FA000
trusted library allocation
page read and write
7CE0000
trusted library allocation
page read and write
5000000
trusted library section
page readonly
7399000
trusted library allocation
page read and write
7071000
trusted library allocation
page read and write
6E80000
trusted library allocation
page execute and read and write
AD7000
heap
page read and write
55A2000
trusted library allocation
page read and write
77C9000
trusted library allocation
page read and write
76EF000
heap
page read and write
9D0000
heap
page read and write
49A0000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
667E000
stack
page read and write
10F8000
stack
page read and write
72CC000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
2E68000
trusted library allocation
page read and write
269E000
stack
page read and write
7DD8000
heap
page read and write
E9B000
trusted library allocation
page execute and read and write
6CFE000
stack
page read and write
657E000
stack
page read and write
FB4000
trusted library allocation
page read and write
8379000
trusted library allocation
page read and write
722C000
heap
page read and write
4C0C000
stack
page read and write
2FE9000
trusted library allocation
page read and write
3BA9000
trusted library allocation
page read and write
168F000
heap
page read and write
72D0000
trusted library allocation
page execute and read and write
6A30000
trusted library allocation
page execute and read and write
7C2000
trusted library allocation
page read and write
6DFE000
stack
page read and write
7400000
trusted library allocation
page execute and read and write
419A000
trusted library allocation
page read and write
757A000
trusted library allocation
page read and write
70FE000
trusted library allocation
page read and write
14F1000
trusted library allocation
page read and write
7B97000
heap
page read and write
673F000
heap
page read and write
7425000
heap
page read and write
3A69000
trusted library allocation
page read and write
4A10000
trusted library section
page readonly
356A000
trusted library allocation
page read and write
7948000
trusted library allocation
page read and write
455A000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
74B4000
trusted library allocation
page read and write
2650000
trusted library allocation
page execute and read and write
1410000
heap
page read and write
7862000
trusted library allocation
page read and write
7236000
trusted library allocation
page read and write
70D1000
trusted library allocation
page read and write
D6C000
heap
page read and write
F42000
trusted library allocation
page read and write
158D000
trusted library allocation
page execute and read and write
324E000
stack
page read and write
1B5E000
trusted library allocation
page read and write
65C0000
trusted library allocation
page execute and read and write
2BD1000
trusted library allocation
page read and write
739E000
stack
page read and write
15AA000
trusted library allocation
page execute and read and write
718E000
stack
page read and write
2989000
stack
page read and write
29BD000
trusted library allocation
page read and write
759A000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
7569000
trusted library allocation
page read and write
E92000
trusted library allocation
page read and write
7645000
trusted library allocation
page read and write
543D000
stack
page read and write
75BF000
trusted library allocation
page read and write
1AFE000
stack
page read and write
7110000
heap
page read and write
3079000
trusted library allocation
page read and write
75C3000
trusted library allocation
page read and write
6940000
heap
page read and write
1124000
heap
page read and write
78F7000
trusted library allocation
page read and write
193E000
stack
page read and write
75E3000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
F90000
heap
page read and write
D57000
heap
page read and write
870F000
trusted library allocation
page read and write
8CDA000
heap
page read and write
6C60000
heap
page read and write
685C000
stack
page read and write
53DE000
stack
page read and write
65B000
heap
page read and write
1709000
heap
page read and write
4519000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
8CE8000
heap
page read and write
2D50000
heap
page read and write
50A5000
heap
page read and write
73BC000
heap
page read and write
E33000
trusted library allocation
page read and write
AF5000
heap
page read and write
764C000
trusted library allocation
page read and write
76AC000
heap
page read and write
A07000
heap
page read and write
1098000
heap
page read and write
C00000
heap
page read and write
FDA000
trusted library allocation
page execute and read and write
2A41000
trusted library allocation
page read and write
301F000
trusted library allocation
page read and write
1320000
heap
page read and write
6DF0000
heap
page read and write
25BA000
trusted library allocation
page read and write
7148000
trusted library allocation
page read and write
1B40000
trusted library allocation
page read and write
A8C000
stack
page read and write
2C5F000
trusted library allocation
page read and write
2365000
trusted library allocation
page read and write
F4B000
trusted library allocation
page execute and read and write
77F0000
trusted library allocation
page read and write
AF3000
heap
page read and write
3FEA000
trusted library allocation
page read and write
6ADE000
stack
page read and write
5149000
trusted library allocation
page read and write
988E000
stack
page read and write
163E000
stack
page read and write
AA4000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
2A4C000
trusted library allocation
page read and write
41B0000
trusted library allocation
page read and write
FE0000
trusted library allocation
page execute and read and write
4F43000
heap
page read and write
4D0000
unkown
page readonly
9D0000
heap
page read and write
C00000
trusted library allocation
page read and write
749D000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
E65E000
stack
page read and write
55F0000
trusted library allocation
page read and write
5013000
heap
page read and write
33D4000
trusted library allocation
page read and write
72F6000
trusted library allocation
page read and write
27B6000
trusted library allocation
page read and write
8CB0000
heap
page read and write
AD0000
heap
page read and write
723F000
trusted library allocation
page read and write
78A1000
trusted library allocation
page read and write
6F31000
trusted library allocation
page read and write
791E000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
2DDF000
stack
page read and write
60FD000
stack
page read and write
14D0000
trusted library allocation
page read and write
29C6000
trusted library allocation
page read and write
E46000
trusted library allocation
page execute and read and write
7826000
trusted library allocation
page read and write
73A8000
trusted library allocation
page read and write
2DAE000
unkown
page read and write
73DE000
stack
page read and write
6E93000
trusted library allocation
page read and write
E0E000
stack
page read and write
696F000
heap
page read and write
6EA0000
heap
page read and write
63DE000
stack
page read and write
2D5F000
unkown
page read and write
5010000
heap
page read and write
669B000
stack
page read and write
98F000
unkown
page read and write
7050000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
AE5000
heap
page read and write
297D000
trusted library allocation
page read and write
27D0000
trusted library allocation
page read and write
E23000
trusted library allocation
page execute and read and write
27F6000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
75DA000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
10B8000
heap
page read and write
29F0000
trusted library allocation
page read and write
828000
heap
page read and write
3A89000
trusted library allocation
page read and write
56FC000
stack
page read and write
7339000
trusted library allocation
page read and write
6545000
trusted library allocation
page read and write
75CB000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
8D01000
heap
page read and write
767E000
trusted library allocation
page read and write
2840000
heap
page read and write
E7E000
stack
page read and write
78D0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
783B000
trusted library allocation
page read and write
1510000
heap
page read and write
40BA000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
5D0A000
heap
page read and write
6B20000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
3BC9000
trusted library allocation
page read and write
1D0000
heap
page read and write
749A000
trusted library allocation
page read and write
4F6C000
stack
page read and write
50BC000
stack
page read and write
6ECC000
trusted library allocation
page read and write
71A0000
trusted library allocation
page execute and read and write
7384000
trusted library allocation
page read and write
40C1000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
C70000
heap
page read and write
7090000
heap
page read and write
EF9000
stack
page read and write
1300000
trusted library allocation
page execute and read and write
7044000
trusted library allocation
page read and write
45C1000
trusted library allocation
page read and write
FD6000
trusted library allocation
page execute and read and write
4E80000
trusted library allocation
page read and write
2300000
trusted library allocation
page read and write
2C18000
trusted library allocation
page read and write
27EE000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
70D5000
trusted library allocation
page read and write
72DB000
trusted library allocation
page read and write
47E000
unkown
page read and write
665E000
stack
page read and write
8C57000
heap
page read and write
7B2000
trusted library allocation
page read and write
2A8B000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
5330000
trusted library section
page readonly
7814000
trusted library allocation
page read and write
4D2000
unkown
page readonly
14DE000
trusted library allocation
page read and write
7207000
trusted library allocation
page read and write
6F45000
trusted library allocation
page read and write
541E000
stack
page read and write
860000
heap
page read and write
75F3000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
8C5F000
heap
page read and write
74B8000
trusted library allocation
page read and write
75B5000
trusted library allocation
page read and write
E79C000
stack
page read and write
1290000
trusted library allocation
page read and write
505E000
stack
page read and write
7F0000
trusted library allocation
page execute and read and write
77D1000
trusted library allocation
page read and write
2E50000
heap
page read and write
6AD7000
trusted library allocation
page read and write
4639000
stack
page read and write
288C000
stack
page read and write
7677000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
5E1E000
stack
page read and write
AF0000
heap
page read and write
7077000
trusted library allocation
page read and write
424C000
trusted library allocation
page read and write
3549000
trusted library allocation
page read and write
54EE000
stack
page read and write
E17D000
stack
page read and write
AC17000
trusted library allocation
page read and write
7823000
trusted library allocation
page read and write
C8D000
trusted library allocation
page execute and read and write
34E0000
heap
page read and write
2B22000
trusted library allocation
page read and write
30DE000
trusted library allocation
page read and write
C5D000
trusted library allocation
page execute and read and write
68D0000
trusted library allocation
page read and write
D2A000
stack
page read and write
7DAB000
heap
page read and write
7979000
trusted library allocation
page read and write
1078000
heap
page read and write
4033000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
74B2000
trusted library allocation
page read and write
5005000
trusted library section
page readonly
2ADB000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
9D5E000
stack
page read and write
7580000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
6EA2000
trusted library allocation
page read and write
72BA000
trusted library allocation
page read and write
64E000
stack
page read and write
4544000
trusted library allocation
page read and write
9C1F000
stack
page read and write
72D0000
trusted library allocation
page read and write
6D00000
trusted library allocation
page execute and read and write
73D5000
trusted library allocation
page read and write
69EF000
stack
page read and write
C9A000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
55B4000
heap
page read and write
1E0000
heap
page read and write
E2BE000
stack
page read and write
7625000
trusted library allocation
page read and write
34F1000
trusted library allocation
page read and write
623F000
heap
page read and write
4EE0000
trusted library allocation
page execute and read and write
1D0000
heap
page read and write
A3EE000
stack
page read and write
2810000
trusted library allocation
page read and write
7625000
trusted library allocation
page read and write
694D000
heap
page read and write
480000
heap
page read and write
2E19000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
6950000
trusted library allocation
page execute and read and write
739D000
trusted library allocation
page read and write
F50000
heap
page read and write
F47000
trusted library allocation
page execute and read and write
5340000
heap
page read and write
CA7000
heap
page read and write
67BE000
stack
page read and write
3048000
heap
page read and write
5645000
heap
page read and write
6F9E000
stack
page read and write
6CBF000
stack
page read and write
2F92000
trusted library allocation
page read and write
27AE000
trusted library allocation
page read and write
7829000
trusted library allocation
page read and write
5E8E000
stack
page read and write
870000
heap
page read and write
7682000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
3B29000
trusted library allocation
page read and write
72E4000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
A386000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
764B000
trusted library allocation
page read and write
760C000
trusted library allocation
page read and write
4F7000
stack
page read and write
120E000
stack
page read and write
2660000
trusted library allocation
page read and write
6232000
heap
page read and write
75A2000
trusted library allocation
page read and write
86A000
stack
page read and write
4DF0000
heap
page read and write
3FF8000
trusted library allocation
page read and write
6F13000
trusted library allocation
page read and write
6ACD000
trusted library allocation
page read and write
7628000
trusted library allocation
page read and write
6E72000
trusted library allocation
page read and write
C37000
heap
page read and write
68BA000
heap
page read and write
4F19000
trusted library allocation
page read and write
DE0000
heap
page read and write
1583000
trusted library allocation
page execute and read and write
3568000
trusted library allocation
page read and write
6F8A000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
660000
heap
page read and write
7933000
trusted library allocation
page read and write
There are 1739 hidden memdumps, click here to show them.