IOC Report
Packing List PDF.bat.exe

loading gif

Files

File Path
Type
Category
Malicious
Packing List PDF.bat.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp233A.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\CmxzrHBB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BjTxJte.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CmxzrHBB.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Packing List PDF.bat.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0jozgeta.reu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_22httbnf.pkg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5hfyyymw.pbd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bac5m1nc.zmb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_guyixdtw.vmk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kf4unmsc.ttx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pizsrtqd.gsy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_usyqsftg.jic.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5CD8.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp7AA1.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp9D6B.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\CmxzrHBB.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 11:45:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 11:45:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 11:45:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 11:45:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 11:45:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 95
ASCII text, with very long lines (777)
downloaded
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Packing List PDF.bat.exe
"C:\Users\user\Desktop\Packing List PDF.bat.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Packing List PDF.bat.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CmxzrHBB.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CmxzrHBB" /XML "C:\Users\user\AppData\Local\Temp\tmp233A.tmp"
malicious
C:\Users\user\Desktop\Packing List PDF.bat.exe
"C:\Users\user\Desktop\Packing List PDF.bat.exe"
malicious
C:\Users\user\AppData\Roaming\CmxzrHBB.exe
C:\Users\user\AppData\Roaming\CmxzrHBB.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CmxzrHBB" /XML "C:\Users\user\AppData\Local\Temp\tmp5CD8.tmp"
malicious
C:\Users\user\AppData\Roaming\CmxzrHBB.exe
"C:\Users\user\AppData\Roaming\CmxzrHBB.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CmxzrHBB" /XML "C:\Users\user\AppData\Local\Temp\tmp7AA1.tmp"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CmxzrHBB" /XML "C:\Users\user\AppData\Local\Temp\tmp9D6B.tmp"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1992 --field-trial-handle=1960,i,13115366367868831849,127431275682310398,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
https://www.google.com/async/ddljson?async=ntp:2
142.250.217.228
https://api.ipify.org
unknown
https://www.google.com/async/newtab_promos
142.250.217.228
http://mail.fascia-arch.com
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.217.228
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.217.228
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRmgZjcGM3DrrEGIjDy4V0_H3Yjc85slo8hhBKKQ10ZDiDsFUznR22jXujdUr7c3uzDt_B_DWQMzTa2E2wyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.217.228
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRmgZjcGM3DrrEGIjCh-Z92sb0-vV99vzjR5lAr82DSiquRDqbOuOzSa8pK8DSxKaDTVvY45j6P2ULr1Z8yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.217.228
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.fascia-arch.com
50.87.195.61
malicious
api.ipify.org
172.67.74.152
www.google.com
142.250.217.228

IPs

IP
Domain
Country
Malicious
50.87.195.61
mail.fascia-arch.com
United States
malicious
239.255.255.250
unknown
Reserved
142.250.217.228
www.google.com
United States
172.67.74.152
api.ipify.org
United States
192.168.2.5
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Packing List PDF_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
BjTxJte
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CmxzrHBB_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
FileDirectory
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
33DF000
trusted library allocation
page read and write
malicious
4BBE000
trusted library allocation
page read and write
malicious
52F0000
trusted library section
page read and write
malicious
2FFC000
trusted library allocation
page read and write
malicious
37A9000
trusted library allocation
page read and write
malicious
3391000
trusted library allocation
page read and write
malicious
47BF000
trusted library allocation
page read and write
malicious
3101000
trusted library allocation
page read and write
malicious
2EAC000
trusted library allocation
page read and write
malicious
433000
remote allocation
page execute and read and write
malicious
44FB000
trusted library allocation
page read and write
malicious
2FD1000
trusted library allocation
page read and write
malicious
2E81000
trusted library allocation
page read and write
malicious
312C000
trusted library allocation
page read and write
malicious
43B1000
trusted library allocation
page read and write
74CD000
trusted library allocation
page read and write
13F7000
heap
page read and write
2DC1000
trusted library allocation
page read and write
7214000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
7517000
trusted library allocation
page read and write
15D1000
heap
page read and write
465F000
trusted library allocation
page read and write
2EDC000
stack
page read and write
78C4000
trusted library allocation
page read and write
132D000
trusted library allocation
page execute and read and write
6A18000
heap
page read and write
2F0F000
unkown
page read and write
56D0000
heap
page read and write
1397000
trusted library allocation
page execute and read and write
2F4D000
trusted library allocation
page read and write
775E000
stack
page read and write
ECA000
heap
page read and write
5A23000
trusted library section
page readonly
4EB0000
trusted library allocation
page execute and read and write
68D0000
heap
page read and write
2FBF000
trusted library allocation
page read and write
79B6000
trusted library allocation
page read and write
7965000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
D7DD000
stack
page read and write
7390000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
7564000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
74BE000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
2C6D000
trusted library allocation
page execute and read and write
14FE000
stack
page read and write
EC9000
stack
page read and write
1464000
heap
page read and write
756B000
trusted library allocation
page read and write
3E9F000
trusted library allocation
page read and write
7578000
trusted library allocation
page read and write
74B4000
trusted library allocation
page read and write
72C8000
trusted library allocation
page read and write
72C4000
trusted library allocation
page read and write
799E000
stack
page read and write
757D000
trusted library allocation
page read and write
6D1F000
stack
page read and write
427000
remote allocation
page execute and read and write
75D2000
trusted library allocation
page read and write
722A000
trusted library allocation
page read and write
5909000
trusted library allocation
page read and write
75BD000
trusted library allocation
page read and write
CE2000
trusted library allocation
page read and write
4EBE000
trusted library allocation
page read and write
92EE000
stack
page read and write
2EBA000
trusted library allocation
page read and write
2DEE000
stack
page read and write
77ED000
trusted library allocation
page read and write
2C8B000
trusted library allocation
page execute and read and write
DEE000
stack
page read and write
74B5000
trusted library allocation
page read and write
53DC000
stack
page read and write
CC7D000
stack
page read and write
CCBE000
stack
page read and write
7513000
trusted library allocation
page read and write
752C000
trusted library allocation
page read and write
C60000
heap
page read and write
7721000
trusted library allocation
page read and write
40AC000
trusted library allocation
page read and write
7603000
trusted library allocation
page read and write
644E000
stack
page read and write
2FE2000
trusted library allocation
page read and write
428000
remote allocation
page execute and read and write
7794000
trusted library allocation
page read and write
1363000
trusted library allocation
page execute and read and write
1503000
trusted library allocation
page execute and read and write
13D5000
heap
page read and write
776D000
trusted library allocation
page read and write
75B4000
trusted library allocation
page read and write
762E000
stack
page read and write
94E000
stack
page read and write
75B8000
trusted library allocation
page read and write
78AB000
trusted library allocation
page read and write
590000
heap
page read and write
1320000
trusted library allocation
page read and write
2EC2000
trusted library allocation
page read and write
5DE000
unkown
page read and write
D7A000
stack
page read and write
75B1000
trusted library allocation
page read and write
2D70000
trusted library allocation
page execute and read and write
2F65000
trusted library allocation
page read and write
2C53000
trusted library allocation
page execute and read and write
57F0000
heap
page read and write
791C000
trusted library allocation
page read and write
51AD000
stack
page read and write
725A000
trusted library allocation
page read and write
7803000
trusted library allocation
page read and write
1114000
heap
page read and write
5AEE000
stack
page read and write
2F46000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
2FDC000
stack
page read and write
69D0000
heap
page read and write
7880000
trusted library allocation
page read and write
1220000
heap
page read and write
2A30000
trusted library allocation
page read and write
6E5E000
stack
page read and write
7856000
trusted library allocation
page read and write
74FC000
trusted library allocation
page read and write
4341000
trusted library allocation
page read and write
4ED2000
trusted library allocation
page read and write
174B000
trusted library allocation
page execute and read and write
FB0000
trusted library allocation
page read and write
75BE000
stack
page read and write
1443000
heap
page read and write
5CF1000
trusted library allocation
page read and write
47FE000
stack
page read and write
7437000
trusted library allocation
page read and write
2EAA000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
77E5000
trusted library allocation
page read and write
7704000
trusted library allocation
page read and write
76E7000
trusted library allocation
page read and write
554C000
stack
page read and write
2F36000
trusted library allocation
page read and write
5350000
heap
page execute and read and write
791F000
trusted library allocation
page read and write
134B000
trusted library allocation
page execute and read and write
137E000
heap
page read and write
52A000
stack
page read and write
785D000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
7720000
heap
page read and write
1040000
heap
page read and write
68D0000
heap
page read and write
5370000
heap
page read and write
779F000
trusted library allocation
page read and write
136E000
stack
page read and write
2F70000
trusted library allocation
page read and write
7673000
trusted library allocation
page read and write
3C0000
unkown
page readonly
2DE6000
trusted library allocation
page read and write
78B5000
trusted library allocation
page read and write
5452000
trusted library allocation
page read and write
72AA000
trusted library allocation
page read and write
77D4000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
116D000
heap
page read and write
75C3000
trusted library allocation
page read and write
7269000
trusted library allocation
page read and write
78FD000
trusted library allocation
page read and write
4ED0000
heap
page read and write
FC0000
heap
page read and write
7838000
trusted library allocation
page read and write
7833000
trusted library allocation
page read and write
6B0E000
stack
page read and write
7552000
trusted library allocation
page read and write
5ABD000
trusted library allocation
page read and write
61BD000
stack
page read and write
7688000
trusted library allocation
page read and write
2A29000
trusted library allocation
page read and write
431000
remote allocation
page execute and read and write
2CE9000
trusted library allocation
page read and write
764A000
trusted library allocation
page read and write
7422000
trusted library allocation
page read and write
6CE2000
heap
page read and write
2EB4000
trusted library allocation
page read and write
77CC000
trusted library allocation
page read and write
3296000
trusted library allocation
page read and write
1397000
heap
page read and write
5690000
heap
page read and write
13F4000
heap
page read and write
5970000
heap
page read and write
C39000
stack
page read and write
7666000
trusted library allocation
page read and write
6EF7000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
2F66000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
73AA000
trusted library allocation
page read and write
2F85000
trusted library allocation
page read and write
7633000
trusted library allocation
page read and write
8BBE000
stack
page read and write
1522000
trusted library allocation
page read and write
636D000
stack
page read and write
150D000
trusted library allocation
page execute and read and write
698E000
stack
page read and write
1345000
trusted library allocation
page execute and read and write
71CE000
stack
page read and write
9C46000
heap
page read and write
8A7E000
stack
page read and write
4CE2000
trusted library allocation
page read and write
327B000
trusted library allocation
page read and write
777C000
trusted library allocation
page read and write
72CD000
trusted library allocation
page read and write
762C000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
5743000
heap
page read and write
756E000
trusted library allocation
page read and write
792A000
trusted library allocation
page read and write
D12D000
stack
page read and write
5450000
heap
page read and write
2C5D000
trusted library allocation
page execute and read and write
2C72000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
73AC000
trusted library allocation
page read and write
6A05000
heap
page read and write
4F80000
trusted library allocation
page read and write
2A50000
heap
page execute and read and write
75A2000
trusted library allocation
page read and write
59D0000
trusted library allocation
page execute and read and write
790F000
trusted library allocation
page read and write
77D9000
trusted library allocation
page read and write
75A2000
trusted library allocation
page read and write
2F9F000
stack
page read and write
98C7000
trusted library allocation
page read and write
75A8000
trusted library allocation
page read and write
31E2000
trusted library allocation
page read and write
1266000
heap
page read and write
78F1000
trusted library allocation
page read and write
CC7000
heap
page read and write
73F6000
trusted library allocation
page read and write
5455000
trusted library allocation
page read and write
74D7000
trusted library allocation
page read and write
7721000
trusted library allocation
page read and write
2F81000
trusted library allocation
page read and write
5145000
trusted library allocation
page read and write
686E000
stack
page read and write
63BF000
stack
page read and write
CE7D000
stack
page read and write
7707000
trusted library allocation
page read and write
94CD000
stack
page read and write
7F1B0000
trusted library allocation
page execute and read and write
416000
remote allocation
page execute and read and write
2FCD000
trusted library allocation
page read and write
3C2000
unkown
page readonly
1370000
trusted library allocation
page read and write
57DE000
stack
page read and write
716B000
heap
page read and write
314E000
stack
page read and write
75AE000
trusted library allocation
page read and write
77F3000
trusted library allocation
page read and write
776C000
trusted library allocation
page read and write
1245000
heap
page read and write
730E000
trusted library allocation
page read and write
78A000
stack
page read and write
CE6000
trusted library allocation
page execute and read and write
74F1000
trusted library allocation
page read and write
7806000
trusted library allocation
page read and write
590E000
stack
page read and write
2C7A000
trusted library allocation
page execute and read and write
2790000
heap
page read and write
313B000
trusted library allocation
page read and write
69CC000
stack
page read and write
744F000
trusted library allocation
page read and write
938B000
stack
page read and write
F35000
heap
page read and write
1330000
trusted library allocation
page read and write
56C0000
heap
page read and write
75FE000
trusted library allocation
page read and write
5740000
heap
page read and write
28D1000
trusted library allocation
page read and write
7793000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
13B0000
heap
page read and write
75A5000
trusted library allocation
page read and write
7504000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
784C000
trusted library allocation
page read and write
E47000
heap
page read and write
1187000
heap
page read and write
145B000
heap
page read and write
5A99000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
740A000
trusted library allocation
page read and write
33D4000
trusted library allocation
page read and write
EA8000
heap
page read and write
55DE000
stack
page read and write
2F10000
heap
page read and write
5C5C000
stack
page read and write
4141000
trusted library allocation
page read and write
7342000
trusted library allocation
page read and write
6C00000
heap
page read and write
2FF8000
trusted library allocation
page read and write
A34000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
5E0000
heap
page read and write
4010000
trusted library allocation
page read and write
A33000
trusted library allocation
page execute and read and write
6228000
heap
page read and write
95CE000
stack
page read and write
75CD000
trusted library allocation
page read and write
1272000
heap
page read and write
7772000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
4E9F000
trusted library allocation
page read and write
6C54000
heap
page read and write
3270000
trusted library allocation
page read and write
6C9D000
trusted library allocation
page read and write
4B5C000
stack
page read and write
29D000
stack
page read and write
75E0000
trusted library allocation
page read and write
6E85000
trusted library allocation
page read and write
3FA9000
trusted library allocation
page read and write
73D7000
trusted library allocation
page read and write
98D5000
trusted library allocation
page read and write
1504000
trusted library allocation
page read and write
3188000
trusted library allocation
page read and write
74C4000
trusted library allocation
page read and write
15DC000
stack
page read and write
2ACB000
trusted library allocation
page read and write
75FA000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
742B000
trusted library allocation
page read and write
73B0000
heap
page read and write
599E000
stack
page read and write
78BF000
trusted library allocation
page read and write
2C40000
heap
page read and write
7278000
trusted library allocation
page read and write
760D000
trusted library allocation
page read and write
760E000
trusted library allocation
page read and write
5A8C000
stack
page read and write
137D000
trusted library allocation
page execute and read and write
753B000
trusted library allocation
page read and write
590000
heap
page read and write
4DA8000
trusted library allocation
page read and write
51F0000
heap
page read and write
275E000
trusted library allocation
page read and write
108B000
stack
page read and write
73B0000
trusted library allocation
page read and write
748D000
trusted library allocation
page read and write
32CB000
trusted library allocation
page read and write
76FA000
trusted library allocation
page read and write
75A5000
trusted library allocation
page read and write
7852000
trusted library allocation
page read and write
7948000
trusted library allocation
page read and write
44B8000
trusted library allocation
page read and write
4DBB000
trusted library allocation
page read and write
750C000
trusted library allocation
page read and write
2761000
trusted library allocation
page read and write
167B000
stack
page read and write
7586000
trusted library allocation
page read and write
1400000
heap
page read and write
D79C000
stack
page read and write
75AB000
trusted library allocation
page read and write
2C87000
trusted library allocation
page execute and read and write
9C61000
heap
page read and write
755A000
trusted library allocation
page read and write
C66000
heap
page read and write
9ED000
stack
page read and write
7100000
trusted library allocation
page read and write
591B000
stack
page read and write
773F000
trusted library allocation
page read and write
75D9000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
790B000
trusted library allocation
page read and write
7776000
trusted library allocation
page read and write
74E9000
trusted library allocation
page read and write
273E000
stack
page read and write
7232000
trusted library allocation
page read and write
56A5000
trusted library allocation
page read and write
2F2E000
trusted library allocation
page read and write
7503000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
68AE000
stack
page read and write
7647000
trusted library allocation
page read and write
7802000
trusted library allocation
page read and write
73B4000
trusted library allocation
page read and write
5200000
heap
page read and write
7861000
trusted library allocation
page read and write
1804000
trusted library allocation
page read and write
74E4000
trusted library allocation
page read and write
6651000
heap
page read and write
58CC000
stack
page read and write
90FE000
stack
page read and write
7914000
trusted library allocation
page read and write
716C000
stack
page read and write
783E000
stack
page read and write
7560000
trusted library allocation
page read and write
550E000
trusted library allocation
page read and write
CF6D000
stack
page read and write
580000
heap
page read and write
68E6000
trusted library allocation
page read and write
754E000
trusted library allocation
page read and write
72D4000
trusted library allocation
page read and write
79B1000
trusted library allocation
page read and write
5522000
trusted library allocation
page read and write
7340000
heap
page read and write
781B000
trusted library allocation
page read and write
5560000
heap
page read and write
72EA000
trusted library allocation
page read and write
6D7C000
stack
page read and write
1392000
trusted library allocation
page read and write
7681000
trusted library allocation
page read and write
12FD000
trusted library allocation
page execute and read and write
13A0000
heap
page read and write
1513000
trusted library allocation
page read and write
52A000
stack
page read and write
1350000
heap
page read and write
7478000
trusted library allocation
page read and write
6A33000
heap
page read and write
7531000
trusted library allocation
page read and write
42D000
remote allocation
page execute and read and write
E40000
heap
page read and write
7570000
trusted library allocation
page read and write
82E000
stack
page read and write
6D10000
trusted library allocation
page execute and read and write
7538000
trusted library allocation
page read and write
6D3F000
stack
page read and write
6C8E000
stack
page read and write
2F20000
trusted library allocation
page read and write
79B4000
trusted library allocation
page read and write
13B2000
heap
page read and write
4F10000
heap
page execute and read and write
785E000
stack
page read and write
F9E000
stack
page read and write
430000
remote allocation
page execute and read and write
337F000
trusted library allocation
page read and write
795E000
trusted library allocation
page read and write
1336000
trusted library allocation
page execute and read and write
7912000
trusted library allocation
page read and write
4EE0000
trusted library section
page read and write
7609000
trusted library allocation
page read and write
7654000
trusted library allocation
page read and write
620000
heap
page read and write
B62000
trusted library allocation
page read and write
41C000
remote allocation
page execute and read and write
768E000
trusted library allocation
page read and write
300E000
trusted library allocation
page read and write
2E31000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
91AC000
stack
page read and write
429000
remote allocation
page execute and read and write
7829000
trusted library allocation
page read and write
6D90000
trusted library allocation
page execute and read and write
8F7000
stack
page read and write
6E9E000
stack
page read and write
7884000
trusted library allocation
page read and write
77FC000
trusted library allocation
page read and write
7223000
trusted library allocation
page read and write
6B2E000
stack
page read and write
7867000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
FD0000
heap
page read and write
72BB000
trusted library allocation
page read and write
736B000
heap
page read and write
74F4000
trusted library allocation
page read and write
6642000
heap
page read and write
27A1000
trusted library allocation
page read and write
7919000
trusted library allocation
page read and write
B4E000
stack
page read and write
1270000
heap
page read and write
6880000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
CBD000
trusted library allocation
page execute and read and write
63C000
heap
page read and write
DD0000
heap
page read and write
74D0000
heap
page read and write
10B0000
trusted library allocation
page read and write
6450000
heap
page read and write
78D9000
trusted library allocation
page read and write
78CF000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page execute and read and write
5150000
trusted library allocation
page execute and read and write
71C0000
heap
page read and write
2BA0000
trusted library allocation
page read and write
77EE000
trusted library allocation
page read and write
2FD6000
trusted library allocation
page execute and read and write
913E000
stack
page read and write
2A61000
trusted library allocation
page read and write
75A7000
trusted library allocation
page read and write
B77000
trusted library allocation
page execute and read and write
30B1000
trusted library allocation
page read and write
2A2C000
trusted library allocation
page read and write
4CE5000
trusted library allocation
page read and write
767E000
trusted library allocation
page read and write
6B4E000
stack
page read and write
706B000
stack
page read and write
7644000
trusted library allocation
page read and write
32CD000
trusted library allocation
page read and write
8CBE000
stack
page read and write
5221000
heap
page read and write
794D000
trusted library allocation
page read and write
6E00000
trusted library allocation
page execute and read and write
77B1000
trusted library allocation
page read and write
74A4000
trusted library allocation
page read and write
7848000
trusted library allocation
page read and write
8DFE000
heap
page read and write
CD3000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
2DA000
stack
page read and write
77B6000
trusted library allocation
page read and write
736E000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
726F000
trusted library allocation
page read and write
75C8000
trusted library allocation
page read and write
50E5000
heap
page read and write
7735000
trusted library allocation
page read and write
5570000
heap
page read and write
48E000
unkown
page readonly
773B000
trusted library allocation
page read and write
9BD000
stack
page read and write
788D000
trusted library allocation
page read and write
5380000
heap
page read and write
1530000
heap
page read and write
7510000
trusted library allocation
page execute and read and write
58E4000
trusted library section
page readonly
2F41000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
276D000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
76D2000
trusted library allocation
page read and write
4B37000
trusted library allocation
page read and write
73E6000
trusted library allocation
page read and write
2F46000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
5A0D000
trusted library allocation
page read and write
12C5000
heap
page read and write
2E66000
trusted library allocation
page read and write
83B6000
trusted library allocation
page read and write
1690000
trusted library allocation
page read and write
634A000
heap
page read and write
7822000
trusted library allocation
page read and write
7899000
trusted library allocation
page read and write
731E000
trusted library allocation
page read and write
7875000
trusted library allocation
page read and write
741E000
trusted library allocation
page read and write
799C000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
8DE0000
heap
page read and write
1740000
trusted library allocation
page read and write
42F000
remote allocation
page execute and read and write
7870000
trusted library allocation
page read and write
2CD3000
trusted library allocation
page read and write
7239000
trusted library allocation
page read and write
5504000
heap
page read and write
139B000
trusted library allocation
page execute and read and write
131A000
trusted library allocation
page execute and read and write
78FC000
trusted library allocation
page read and write
8CE0000
heap
page read and write
7395000
trusted library allocation
page read and write
7418000
trusted library allocation
page read and write
766E000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
3150000
trusted library allocation
page execute and read and write
75EC000
trusted library allocation
page read and write
75DB000
trusted library allocation
page read and write
15A0000
trusted library allocation
page execute and read and write
6E7F000
stack
page read and write
786F000
trusted library allocation
page read and write
5A1D000
stack
page read and write
7525000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
76BA000
trusted library allocation
page read and write
4FB3000
heap
page read and write
CB0000
heap
page read and write
5A40000
heap
page read and write
56A0000
heap
page execute and read and write
6E80000
trusted library allocation
page read and write
1817000
heap
page read and write
74EE000
trusted library allocation
page read and write
755E000
stack
page read and write
5460000
heap
page read and write
59E9000
trusted library allocation
page read and write
7522000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
7658000
trusted library allocation
page read and write
729F000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
1803000
trusted library allocation
page execute and read and write
EBF000
heap
page read and write
3128000
trusted library allocation
page read and write
3E0000
heap
page read and write
BAE000
heap
page read and write
6D80000
trusted library allocation
page read and write
7653000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
1120000
heap
page read and write
69E0000
trusted library allocation
page execute and read and write
759B000
trusted library allocation
page read and write
CF5000
heap
page read and write
314E000
trusted library allocation
page read and write
3014000
trusted library allocation
page read and write
51D0000
heap
page execute and read and write
54BC000
stack
page read and write
2CA0000
trusted library allocation
page read and write
B72000
trusted library allocation
page read and write
2FA0000
heap
page read and write
6A4E000
stack
page read and write
ED6000
heap
page read and write
7308000
trusted library allocation
page read and write
74DC000
trusted library allocation
page read and write
E90000
heap
page read and write
75E5000
trusted library allocation
page read and write
30E7000
trusted library allocation
page read and write
76C1000
trusted library allocation
page read and write
51BB000
stack
page read and write
6F9E000
stack
page read and write
738B000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
6D7E000
stack
page read and write
798E000
trusted library allocation
page read and write
2F9C000
stack
page read and write
78C7000
trusted library allocation
page read and write
51AE000
stack
page read and write
2DF0000
heap
page read and write
133A000
trusted library allocation
page execute and read and write
7551000
trusted library allocation
page read and write
73CE000
trusted library allocation
page read and write
4E70000
heap
page read and write
56D5000
heap
page read and write
49A7000
trusted library allocation
page read and write
2FC1000
trusted library allocation
page read and write
7761000
trusted library allocation
page read and write
777F000
trusted library allocation
page read and write
76F5000
trusted library allocation
page read and write
56D0000
heap
page execute and read and write
7680000
trusted library allocation
page read and write
6FF0000
heap
page read and write
2E20000
heap
page execute and read and write
54D0000
trusted library allocation
page execute and read and write
732C000
trusted library allocation
page read and write
78B1000
trusted library allocation
page read and write
12CC000
unkown
page read and write
7766000
trusted library allocation
page read and write
7150000
heap
page read and write
5500000
heap
page read and write
E20000
trusted library allocation
page read and write
7683000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
137A000
heap
page read and write
12DC000
stack
page read and write
771C000
trusted library allocation
page read and write
1770000
trusted library allocation
page execute and read and write
5680000
heap
page execute and read and write
1589000
heap
page read and write
5BE0000
heap
page read and write
6FAC000
stack
page read and write
74C0000
trusted library allocation
page execute and read and write
74E1000
trusted library allocation
page read and write
791A000
trusted library allocation
page read and write
7330000
trusted library allocation
page execute and read and write
7636000
trusted library allocation
page read and write
74EB000
trusted library allocation
page read and write
414000
remote allocation
page execute and read and write
423000
remote allocation
page execute and read and write
3D0000
heap
page read and write
55E0000
heap
page read and write
4CE8000
trusted library allocation
page read and write
7506000
trusted library allocation
page read and write
7957000
trusted library allocation
page read and write
77BE000
stack
page read and write
754F000
trusted library allocation
page read and write
6D4F000
stack
page read and write
1240000
heap
page read and write
779A000
trusted library allocation
page read and write
76EE000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
7718000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
2EC4000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
4BAF000
trusted library allocation
page read and write
4D60000
heap
page read and write
5580000
heap
page execute and read and write
75D6000
trusted library allocation
page read and write
7EFC000
stack
page read and write
6EF0000
trusted library allocation
page read and write
F77000
stack
page read and write
2DBE000
trusted library allocation
page read and write
77C7000
trusted library allocation
page read and write
7FA90000
trusted library allocation
page execute and read and write
73A4000
trusted library allocation
page read and write
83BF000
trusted library allocation
page read and write
5DE000
stack
page read and write
173E000
stack
page read and write
FBA000
stack
page read and write
419000
remote allocation
page execute and read and write
68EE000
stack
page read and write
CC4000
heap
page read and write
6CEE000
stack
page read and write
763F000
trusted library allocation
page read and write
778B000
trusted library allocation
page read and write
56B0000
trusted library allocation
page execute and read and write
7902000
trusted library allocation
page read and write
7A7E000
stack
page read and write
7316000
heap
page read and write
7612000
trusted library allocation
page read and write
2A13000
trusted library allocation
page read and write
D42E000
stack
page read and write
4AA4000
trusted library allocation
page read and write
59F0000
trusted library allocation
page execute and read and write
5480000
heap
page read and write
68CD000
stack
page read and write
5A6E000
trusted library allocation
page read and write
786C000
trusted library allocation
page read and write
B23E000
stack
page read and write
4EE0000
trusted library allocation
page read and write
749B000
trusted library allocation
page read and write
52FE000
stack
page read and write
12F0000
heap
page read and write
1387000
heap
page read and write
7492000
trusted library allocation
page read and write
BE8000
stack
page read and write
4D00000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
7697000
trusted library allocation
page read and write
7618000
trusted library allocation
page read and write
1322000
trusted library allocation
page read and write
C4E000
stack
page read and write
7453000
trusted library allocation
page read and write
74C8000
trusted library allocation
page read and write
1240000
heap
page read and write
DA0000
heap
page execute and read and write
1742000
trusted library allocation
page read and write
1747000
trusted library allocation
page execute and read and write
17BE000
stack
page read and write
768E000
stack
page read and write
50CE000
stack
page read and write
75B6000
trusted library allocation
page read and write
E7A000
stack
page read and write
1406000
heap
page read and write
7609000
trusted library allocation
page read and write
789A000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
7531000
trusted library allocation
page read and write
5511000
trusted library allocation
page read and write
748B000
trusted library allocation
page read and write
74C3000
trusted library allocation
page read and write
6DAE000
stack
page read and write
6B8E000
stack
page read and write
CC0000
heap
page read and write
78D9000
trusted library allocation
page read and write
158D000
heap
page read and write
3FB1000
trusted library allocation
page read and write
2FF0000
heap
page read and write
5E9E000
stack
page read and write
D32E000
stack
page read and write
662E000
stack
page read and write
B13E000
stack
page read and write
A3D000
trusted library allocation
page execute and read and write
1312000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
76E7000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
725E000
stack
page read and write
756F000
trusted library allocation
page read and write
9BC0000
heap
page read and write
1450000
heap
page read and write
782C000
trusted library allocation
page read and write
77A7000
trusted library allocation
page read and write
72CE000
stack
page read and write
7336000
trusted library allocation
page read and write
557C000
stack
page read and write
7842000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
13D7000
heap
page read and write
74BB000
trusted library allocation
page read and write
74FA000
trusted library allocation
page read and write
7876000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
763C000
trusted library allocation
page read and write
1794000
trusted library allocation
page read and write
52DC000
stack
page read and write
6C80000
heap
page read and write
75B3000
trusted library allocation
page read and write
75AC000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
5670000
heap
page read and write
78DE000
trusted library allocation
page read and write
A0E000
stack
page read and write
38E000
unkown
page read and write
14C0000
heap
page read and write
54C0000
trusted library allocation
page execute and read and write
73E2000
trusted library allocation
page read and write
BC7000
heap
page read and write
34DA000
trusted library allocation
page read and write
7842000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
13F0000
heap
page read and write
5CFD000
trusted library allocation
page read and write
75B8000
trusted library allocation
page read and write
74C9000
trusted library allocation
page read and write
74B9000
trusted library allocation
page read and write
6D90000
trusted library allocation
page execute and read and write
7469000
trusted library allocation
page read and write
10D4000
trusted library allocation
page read and write
7595000
trusted library allocation
page read and write
110A000
heap
page read and write
71C9000
trusted library allocation
page read and write
61C0000
heap
page read and write
159E000
heap
page read and write
7F9E0000
trusted library allocation
page execute and read and write
2A6C000
trusted library allocation
page read and write
5B70000
heap
page read and write
77F8000
trusted library allocation
page read and write
2FD2000
trusted library allocation
page read and write
7548000
trusted library allocation
page read and write
148F000
stack
page read and write
EA0000
heap
page read and write
77BB000
trusted library allocation
page read and write
4C17000
trusted library allocation
page read and write
77D4000
trusted library allocation
page read and write
5A07000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
2C76000
trusted library allocation
page execute and read and write
725E000
trusted library allocation
page read and write
76DB000
trusted library allocation
page read and write
5502000
trusted library allocation
page read and write
7266000
trusted library allocation
page read and write
76EF000
trusted library allocation
page read and write
753B000
trusted library allocation
page read and write
2CBC000
trusted library allocation
page read and write
4B32000
trusted library allocation
page read and write
7263000
trusted library allocation
page read and write
749F000
trusted library allocation
page read and write
54B0000
heap
page read and write
3026000
trusted library allocation
page read and write
5B89000
trusted library allocation
page read and write
132B000
trusted library allocation
page execute and read and write
98F0000
trusted library allocation
page execute and read and write
41B000
remote allocation
page execute and read and write
78FA000
trusted library allocation
page read and write
2F50000
heap
page execute and read and write
2ED0000
heap
page read and write
5720000
trusted library allocation
page read and write
1760000
trusted library allocation
page read and write
FC7000
stack
page read and write
7859000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
76D6000
trusted library allocation
page read and write
775C000
trusted library allocation
page read and write
144E000
stack
page read and write
11AC000
heap
page read and write
1230000
heap
page read and write
BE6000
heap
page read and write
41E000
remote allocation
page execute and read and write
327E000
trusted library allocation
page read and write
31B6000
trusted library allocation
page read and write
D130000
heap
page read and write
7F0000
heap
page read and write
78A2000
trusted library allocation
page read and write
6C97000
trusted library allocation
page read and write
2E7E000
stack
page read and write
793E000
trusted library allocation
page read and write
73C8000
trusted library allocation
page read and write
42C000
remote allocation
page execute and read and write
7558000
trusted library allocation
page read and write
722E000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
7880000
trusted library allocation
page read and write
4CC2000
trusted library allocation
page read and write
7414000
trusted library allocation
page read and write
6887000
trusted library allocation
page read and write
7712000
trusted library allocation
page read and write
4369000
trusted library allocation
page read and write
7350000
heap
page read and write
2F90000
trusted library allocation
page read and write
6FBC000
stack
page read and write
78C4000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
76F1000
trusted library allocation
page read and write
1578000
heap
page read and write
765F000
trusted library allocation
page read and write
10D3000
trusted library allocation
page execute and read and write
312A000
trusted library allocation
page read and write
13CA000
heap
page read and write
7535000
trusted library allocation
page read and write
687F000
stack
page read and write
56CB000
stack
page read and write
1500000
heap
page read and write
6744000
heap
page read and write
2C50000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
7839000
trusted library allocation
page read and write
789D000
trusted library allocation
page read and write
2766000
trusted library allocation
page read and write
8F1E000
stack
page read and write
54AF000
trusted library allocation
page read and write
10E8000
heap
page read and write
DFF000
stack
page read and write
12F8000
stack
page read and write
45E2000
trusted library allocation
page read and write
4E91000
trusted library allocation
page read and write
75B1000
trusted library allocation
page read and write
7649000
trusted library allocation
page read and write
135D000
stack
page read and write
7937000
trusted library allocation
page read and write
10F9000
stack
page read and write
14F0000
trusted library allocation
page read and write
10E0000
heap
page read and write
7623000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
5160000
trusted library allocation
page execute and read and write
752A000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
7150000
heap
page read and write
D9F000
stack
page read and write
54B3000
heap
page read and write
5BD0000
heap
page read and write
74AE000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
3F81000
trusted library allocation
page read and write
72E2000
trusted library allocation
page read and write
10FF000
heap
page read and write
66FC000
heap
page read and write
4E4C000
stack
page read and write
1238000
heap
page read and write
12C0000
heap
page read and write
56C0000
heap
page read and write
78A1000
trusted library allocation
page read and write
72D0000
heap
page read and write
73C4000
trusted library allocation
page read and write
4778000
trusted library allocation
page read and write
7786000
trusted library allocation
page read and write
9990000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
7641000
trusted library allocation
page read and write
759D000
trusted library allocation
page read and write
493C000
stack
page read and write
7757000
trusted library allocation
page read and write
9E70000
trusted library section
page read and write
72AD000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
E0B000
trusted library allocation
page execute and read and write
13C0000
heap
page read and write
C82000
heap
page read and write
10D0000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
75B1000
trusted library allocation
page read and write
698E000
stack
page read and write
1347000
trusted library allocation
page execute and read and write
2C70000
trusted library allocation
page read and write
6647000
heap
page read and write
791E000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
539E000
stack
page read and write
CB4000
trusted library allocation
page read and write
130D000
trusted library allocation
page execute and read and write
4E60000
heap
page read and write
7561000
trusted library allocation
page read and write
9BA000
heap
page read and write
7976000
trusted library allocation
page read and write
7403000
trusted library allocation
page read and write
69EE000
stack
page read and write
1320000
trusted library allocation
page read and write
74E9000
trusted library allocation
page read and write
3030000
heap
page read and write
6E87000
trusted library allocation
page read and write
8540000
trusted library allocation
page execute and read and write
74D2000
trusted library allocation
page read and write
757F000
trusted library allocation
page read and write
DC9000
stack
page read and write
1310000
heap
page read and write
56A8000
trusted library allocation
page read and write
75DA000
trusted library allocation
page read and write
750E000
stack
page read and write
7219000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
CEA000
trusted library allocation
page execute and read and write
4ED000
stack
page read and write
745E000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
3004000
trusted library allocation
page read and write
1370000
trusted library allocation
page execute and read and write
A40000
heap
page read and write
76CC000
trusted library allocation
page read and write
73FA000
trusted library allocation
page read and write
787A000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
17FE000
stack
page read and write
2E00000
trusted library allocation
page read and write
6E8D000
trusted library allocation
page read and write
5910000
heap
page read and write
7731000
trusted library allocation
page read and write
673E000
stack
page read and write
77C2000
trusted library allocation
page read and write
923E000
stack
page read and write
7906000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
7CFC000
stack
page read and write
74D0000
trusted library allocation
page read and write
7513000
trusted library allocation
page read and write
687E000
stack
page read and write
6E97000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
7441000
trusted library allocation
page read and write
74AE000
trusted library allocation
page read and write
74E7000
trusted library allocation
page read and write
2E6D000
stack
page read and write
75FE000
trusted library allocation
page read and write
771D000
trusted library allocation
page read and write
744B000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
7852000
trusted library allocation
page read and write
74EE000
trusted library allocation
page read and write
74A8000
trusted library allocation
page read and write
152C000
heap
page read and write
755C000
trusted library allocation
page read and write
7894000
trusted library allocation
page read and write
729C000
trusted library allocation
page read and write
1045000
heap
page read and write
76C8000
trusted library allocation
page read and write
7485000
trusted library allocation
page read and write
C0E000
stack
page read and write
E80000
trusted library allocation
page read and write
7581000
trusted library allocation
page read and write
71B0000
trusted library allocation
page execute and read and write
CD0000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
7577000
trusted library allocation
page read and write
1245000
heap
page read and write
7430000
trusted library allocation
page read and write
52E5000
trusted library section
page readonly
4EC0000
trusted library allocation
page execute and read and write
7627000
trusted library allocation
page read and write
313E000
stack
page read and write
7621000
trusted library allocation
page read and write
5CFF000
trusted library allocation
page read and write
589E000
stack
page read and write
304E000
stack
page read and write
2DE4000
trusted library allocation
page read and write
4A69000
trusted library allocation
page read and write
783D000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
753F000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
7568000
trusted library allocation
page read and write
2DB5000
trusted library allocation
page read and write
772E000
stack
page read and write
3A69000
trusted library allocation
page read and write
7B00000
heap
page read and write
1780000
trusted library allocation
page read and write
B7B000
trusted library allocation
page execute and read and write
739A000
trusted library allocation
page read and write
2F3E000
trusted library allocation
page read and write
74AF000
stack
page read and write
73A6000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page execute and read and write
418000
remote allocation
page execute and read and write
1342000
trusted library allocation
page read and write
7555000
trusted library allocation
page read and write
761C000
trusted library allocation
page read and write
75D3000
trusted library allocation
page read and write
E02000
trusted library allocation
page read and write
6480000
heap
page read and write
123E000
heap
page read and write
7598000
trusted library allocation
page read and write
C60000
heap
page read and write
77CC000
trusted library allocation
page read and write
759E000
trusted library allocation
page read and write
75D9000
trusted library allocation
page read and write
415000
remote allocation
page execute and read and write
726C000
trusted library allocation
page read and write
9FA000
stack
page read and write
2EDE000
stack
page read and write
59AD000
trusted library allocation
page read and write
41D000
remote allocation
page execute and read and write
78F8000
trusted library allocation
page read and write
7788000
trusted library allocation
page read and write
5F0000
heap
page read and write
4ECD000
trusted library allocation
page read and write
2FA0000
heap
page execute and read and write
7527000
trusted library allocation
page read and write
B66000
trusted library allocation
page execute and read and write
7458000
trusted library allocation
page read and write
42E000
remote allocation
page execute and read and write
75E4000
trusted library allocation
page read and write
7387000
trusted library allocation
page read and write
D50E000
stack
page read and write
54FE000
trusted library allocation
page read and write
5B2E000
stack
page read and write
5391000
heap
page read and write
3000000
trusted library allocation
page read and write
750E000
trusted library allocation
page read and write
300F000
stack
page read and write
77D0000
trusted library allocation
page read and write
5590000
heap
page read and write
57E0000
heap
page read and write
311A000
trusted library allocation
page read and write
562E000
stack
page read and write
7923000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
2B68000
trusted library allocation
page read and write
7573000
trusted library allocation
page read and write
6C2E000
stack
page read and write
D8DE000
stack
page read and write
7583000
trusted library allocation
page read and write
9D8D000
trusted library allocation
page read and write
2CEE000
stack
page read and write
4457000
trusted library allocation
page read and write
1332000
trusted library allocation
page read and write
1380000
heap
page read and write
4EF0000
trusted library allocation
page execute and read and write
13B0000
trusted library allocation
page read and write
7473000
trusted library allocation
page read and write
76B7000
trusted library allocation
page read and write
8B7E000
stack
page read and write
7999000
trusted library allocation
page read and write
4E50000
trusted library section
page readonly
59C0000
trusted library allocation
page execute and read and write
46DB000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page execute and read and write
15C0000
heap
page execute and read and write
3E31000
trusted library allocation
page read and write
98DD000
trusted library allocation
page read and write
5A30000
heap
page read and write
73B9000
trusted library allocation
page read and write
73EF000
trusted library allocation
page read and write
74F5000
trusted library allocation
page read and write
5820000
heap
page read and write
761C000
trusted library allocation
page read and write
7B10000
heap
page read and write
75AA000
trusted library allocation
page read and write
3144000
trusted library allocation
page read and write
4F70000
trusted library allocation
page execute and read and write
74D7000
trusted library allocation
page read and write
78EC000
trusted library allocation
page read and write
6B2E000
heap
page read and write
739E000
stack
page read and write
4F50000
heap
page read and write
D65E000
stack
page read and write
FC7000
heap
page read and write
1395000
trusted library allocation
page execute and read and write
D4CF000
stack
page read and write
782E000
trusted library allocation
page read and write
72BF000
trusted library allocation
page read and write
1357000
heap
page read and write
767B000
trusted library allocation
page read and write
40B1000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
2E88000
trusted library allocation
page read and write
507E000
stack
page read and write
764D000
trusted library allocation
page read and write
5A0E000
stack
page read and write
74B9000
trusted library allocation
page read and write
2A36000
trusted library allocation
page read and write
109F000
stack
page read and write
1240000
heap
page read and write
7992000
trusted library allocation
page read and write
781B000
trusted library allocation
page read and write
648A000
heap
page read and write
2CF6000
trusted library allocation
page read and write
7703000
trusted library allocation
page read and write
163E000
stack
page read and write
7519000
trusted library allocation
page read and write
1246000
heap
page read and write
78B6000
trusted library allocation
page read and write
B5D000
trusted library allocation
page execute and read and write
7866000
trusted library allocation
page read and write
76F7000
trusted library allocation
page read and write
119F000
heap
page read and write
69D0000
trusted library allocation
page read and write
1630000
heap
page read and write
153A000
heap
page read and write
942E000
stack
page read and write
54AD000
trusted library allocation
page read and write
677E000
stack
page read and write
7566000
trusted library allocation
page read and write
772B000
trusted library allocation
page read and write
6AE8000
heap
page read and write
6C37000
trusted library allocation
page read and write
2FE7000
trusted library allocation
page execute and read and write
2B10000
trusted library allocation
page read and write
4D30000
trusted library allocation
page execute and read and write
B60000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
F55000
heap
page read and write
75B4000
trusted library allocation
page read and write
30EF000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
75BB000
trusted library allocation
page read and write
306D000
trusted library allocation
page read and write
749E000
stack
page read and write
7359000
trusted library allocation
page read and write
7854000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
8D1E000
trusted library allocation
page read and write
4ADE000
trusted library allocation
page read and write
916E000
stack
page read and write
75EF000
stack
page read and write
75E9000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
E70000
trusted library allocation
page execute and read and write
77D0000
trusted library allocation
page execute and read and write
1680000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2FCD000
trusted library allocation
page execute and read and write
10C0000
trusted library allocation
page read and write
77E5000
trusted library allocation
page read and write
8D19000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
7563000
trusted library allocation
page read and write
77E9000
trusted library allocation
page read and write
2A2C000
stack
page read and write
980000
heap
page read and write
743C000
trusted library allocation
page read and write
7637000
trusted library allocation
page read and write
2F3E000
trusted library allocation
page read and write
7586000
trusted library allocation
page read and write
553E000
stack
page read and write
2E6F000
trusted library allocation
page read and write
1624000
trusted library allocation
page read and write
7915000
trusted library allocation
page read and write
7618000
trusted library allocation
page read and write
3CF000
unkown
page read and write
77A2000
trusted library allocation
page read and write
76FD000
trusted library allocation
page read and write
13A4000
heap
page read and write
69F0000
heap
page read and write
77A3000
trusted library allocation
page read and write
7592000
trusted library allocation
page read and write
780D000
trusted library allocation
page read and write
1490000
heap
page read and write
76F1000
trusted library allocation
page read and write
2FDA000
trusted library allocation
page execute and read and write
74FF000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page execute and read and write
75D7000
trusted library allocation
page read and write
59EC000
stack
page read and write
1327000
trusted library allocation
page execute and read and write
7568000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
616C000
stack
page read and write
970F000
stack
page read and write
778A000
trusted library allocation
page read and write
1316000
trusted library allocation
page execute and read and write
7861000
trusted library allocation
page read and write
12F4000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
780C000
trusted library allocation
page read and write
42B000
remote allocation
page execute and read and write
1117000
heap
page read and write
A2C0000
trusted library allocation
page read and write
78E4000
trusted library allocation
page read and write
5440000
heap
page read and write
68E0000
trusted library allocation
page read and write
CF0000
heap
page read and write
4E38000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
7738000
trusted library allocation
page read and write
59A1000
trusted library allocation
page read and write
78BA000
trusted library allocation
page read and write
6E95000
trusted library allocation
page read and write
658D000
stack
page read and write
5A3E000
stack
page read and write
7390000
trusted library allocation
page read and write
13C8000
heap
page read and write
2F10000
trusted library allocation
page read and write
7614000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
6FD2000
trusted library allocation
page read and write
622D000
heap
page read and write
131B000
stack
page read and write
2EA8000
trusted library allocation
page read and write
7811000
trusted library allocation
page read and write
75DE000
trusted library allocation
page read and write
735C000
trusted library allocation
page read and write
7596000
trusted library allocation
page read and write
2E20000
trusted library allocation
page execute and read and write
77AD000
trusted library allocation
page read and write
14AE000
stack
page read and write
79AE000
trusted library allocation
page read and write
2DB2000
trusted library allocation
page read and write
6C7D000
stack
page read and write
6D00000
trusted library allocation
page read and write
1537000
heap
page read and write
48BC000
trusted library allocation
page read and write
7633000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
58E0000
trusted library section
page readonly
2F2F000
trusted library allocation
page read and write
775E000
trusted library allocation
page read and write
86F000
stack
page read and write
1790000
trusted library allocation
page read and write
77DE000
trusted library allocation
page read and write
293E000
stack
page read and write
646D000
stack
page read and write
72D9000
trusted library allocation
page read and write
280B000
trusted library allocation
page read and write
4F62000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
54F0000
trusted library allocation
page execute and read and write
2D90000
trusted library allocation
page read and write
B6A000
trusted library allocation
page execute and read and write
2EE0000
heap
page read and write
74FA000
trusted library allocation
page read and write
102E000
stack
page read and write
78F3000
trusted library allocation
page read and write
54FB000
trusted library allocation
page read and write
783D000
trusted library allocation
page read and write
76A5000
trusted library allocation
page read and write
AF7000
stack
page read and write
773A000
trusted library allocation
page read and write
56A2000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
1447000
heap
page read and write
E30000
trusted library allocation
page execute and read and write
306F000
trusted library allocation
page read and write
5440000
heap
page read and write
75DD000
trusted library allocation
page read and write
7325000
trusted library allocation
page read and write
F20000
heap
page read and write
6C4E000
stack
page read and write
71A0000
trusted library allocation
page read and write
9B0000
heap
page read and write
7699000
trusted library allocation
page read and write
6DA0000
heap
page read and write
70FC000
stack
page read and write
76AA000
trusted library allocation
page read and write
789E000
stack
page read and write
2F8A000
trusted library allocation
page read and write
7798000
trusted library allocation
page read and write
3134000
trusted library allocation
page read and write
1637000
heap
page read and write
5AB0000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
D80000
heap
page read and write
2EBE000
stack
page read and write
668E000
stack
page read and write
76E3000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page execute and read and write
425000
remote allocation
page execute and read and write
1216000
heap
page read and write
768B000
trusted library allocation
page read and write
7582000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
6CF0000
heap
page read and write
1526000
trusted library allocation
page execute and read and write
2F34000
trusted library allocation
page read and write
792F000
trusted library allocation
page read and write
7725000
trusted library allocation
page read and write
1508000
trusted library allocation
page read and write
90F000
unkown
page read and write
6D4D000
stack
page read and write
77E1000
trusted library allocation
page read and write
6CA7000
trusted library allocation
page read and write
4FB0000
heap
page read and write
774C000
trusted library allocation
page read and write
72A5000
trusted library allocation
page read and write
7ABE000
stack
page read and write
15B0000
trusted library allocation
page read and write
551D000
trusted library allocation
page read and write
136D000
trusted library allocation
page execute and read and write
6C86000
heap
page read and write
767C000
trusted library allocation
page read and write
2E7F000
unkown
page read and write
55E4000
heap
page read and write
73BE000
trusted library allocation
page read and write
1386000
trusted library allocation
page execute and read and write
6DF0000
trusted library allocation
page read and write
7575000
trusted library allocation
page read and write
73D2000
trusted library allocation
page read and write
7582000
trusted library allocation
page read and write
790F000
trusted library allocation
page read and write
76D7000
trusted library allocation
page read and write
3E59000
trusted library allocation
page read and write
2F52000
trusted library allocation
page read and write
2F8E000
stack
page read and write
C90000
heap
page read and write
777A000
trusted library allocation
page read and write
75AD000
trusted library allocation
page read and write
7140000
trusted library allocation
page execute and read and write
6D5E000
stack
page read and write
6C40000
heap
page read and write
7DFC000
stack
page read and write
2F5E000
stack
page read and write
7331000
trusted library allocation
page read and write
152A000
trusted library allocation
page execute and read and write
E40000
heap
page read and write
7573000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
7718000
trusted library allocation
page read and write
893E000
stack
page read and write
75EF000
trusted library allocation
page read and write
788F000
trusted library allocation
page read and write
52DD000
stack
page read and write
130B000
stack
page read and write
541E000
stack
page read and write
338D000
trusted library allocation
page read and write
779D000
trusted library allocation
page read and write
7811000
trusted library allocation
page read and write
8E1E000
stack
page read and write
704E000
stack
page read and write
2F90000
heap
page execute and read and write
7340000
heap
page read and write
7748000
trusted library allocation
page read and write
7808000
trusted library allocation
page read and write
5830000
heap
page execute and read and write
51ED000
stack
page read and write
C10000
heap
page read and write
9B6D000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
128E000
stack
page read and write
4D20000
trusted library allocation
page read and write
F6C000
heap
page read and write
5A4C000
stack
page read and write
340000
heap
page read and write
300D000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
76AF000
trusted library allocation
page read and write
798B000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
6DEC000
stack
page read and write
7527000
trusted library allocation
page read and write
4F65000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
7567000
trusted library allocation
page read and write
579C000
stack
page read and write
1380000
trusted library allocation
page read and write
3170000
heap
page read and write
2D4E000
stack
page read and write
33DD000
trusted library allocation
page read and write
77A9000
trusted library allocation
page read and write
77FD000
trusted library allocation
page read and write
12F2000
heap
page read and write
13E2000
heap
page read and write
4FA0000
trusted library allocation
page read and write
3376000
trusted library allocation
page read and write
4197000
trusted library allocation
page read and write
F2A000
heap
page read and write
403000
remote allocation
page execute and read and write
78A6000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
771E000
stack
page read and write
33E7000
trusted library allocation
page read and write
10F9000
stack
page read and write
2F64000
trusted library allocation
page read and write
769B000
trusted library allocation
page read and write
6BCC000
stack
page read and write
952E000
stack
page read and write
CB3000
trusted library allocation
page execute and read and write
D55E000
stack
page read and write
4149000
trusted library allocation
page read and write
78AC000
trusted library allocation
page read and write
72F5000
trusted library allocation
page read and write
797E000
stack
page read and write
7752000
trusted library allocation
page read and write
8EFD000
stack
page read and write
6C96000
trusted library allocation
page read and write
78A7000
trusted library allocation
page read and write
314C000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
7546000
trusted library allocation
page read and write
7445000
trusted library allocation
page read and write
40D9000
trusted library allocation
page read and write
7464000
trusted library allocation
page read and write
331C000
stack
page read and write
7545000
trusted library allocation
page read and write
8A3E000
stack
page read and write
5565000
heap
page read and write
747E000
trusted library allocation
page read and write
75E1000
trusted library allocation
page read and write
6C95000
trusted library allocation
page read and write
2FFA000
trusted library allocation
page read and write
93EE000
stack
page read and write
3A61000
trusted library allocation
page read and write
1810000
heap
page read and write
6F9E000
stack
page read and write
2F00000
trusted library allocation
page execute and read and write
4F2E000
stack
page read and write
2772000
trusted library allocation
page read and write
77B6000
trusted library allocation
page read and write
4D5F000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
FE0000
heap
page read and write
1090000
trusted library allocation
page read and write
72E8000
heap
page read and write
73A0000
trusted library allocation
page execute and read and write
7590000
trusted library allocation
page read and write
76D2000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
7347000
trusted library allocation
page read and write
7272000
trusted library allocation
page read and write
74D2000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
729E000
stack
page read and write
2F70000
heap
page read and write
2C63000
trusted library allocation
page read and write
74E2000
trusted library allocation
page read and write
120E000
stack
page read and write
5A60000
heap
page read and write
74F7000
trusted library allocation
page read and write
789D000
trusted library allocation
page read and write
784E000
trusted library allocation
page read and write
797A000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
5625000
trusted library allocation
page read and write
D28B000
stack
page read and write
77C0000
trusted library allocation
page read and write
793E000
stack
page read and write
6B8C000
stack
page read and write
52AC000
stack
page read and write
7330000
heap
page read and write
7588000
trusted library allocation
page read and write
69FE000
stack
page read and write
7744000
trusted library allocation
page read and write
3FB9000
trusted library allocation
page read and write
746D000
trusted library allocation
page read and write
1405000
heap
page read and write
1796000
trusted library allocation
page read and write
2940000
heap
page read and write
6EDE000
stack
page read and write
3341000
trusted library allocation
page read and write
E85000
trusted library allocation
page read and write
3291000
trusted library allocation
page read and write
7943000
trusted library allocation
page read and write
2D50000
heap
page read and write
51C0000
heap
page read and write
4F68000
trusted library allocation
page read and write
1387000
heap
page read and write
A389000
trusted library allocation
page read and write
37A1000
trusted library allocation
page read and write
2C3C000
stack
page read and write
7677000
trusted library allocation
page read and write
759B000
trusted library allocation
page read and write
7316000
trusted library allocation
page read and write
DE0000
heap
page read and write
2EDA000
heap
page read and write
14DC000
unkown
page read and write
5A50000
heap
page read and write
4CD0000
heap
page read and write
770C000
trusted library allocation
page read and write
750B000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page execute and read and write
1325000
trusted library allocation
page execute and read and write
98F000
stack
page read and write
56B0000
heap
page read and write
D70000
heap
page read and write
960E000
stack
page read and write
7020000
heap
page read and write
98D0000
trusted library allocation
page read and write
325C000
stack
page read and write
755C000
trusted library allocation
page read and write
129E000
stack
page read and write
8F00000
heap
page read and write
624D000
stack
page read and write
298E000
stack
page read and write
7605000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
4A2E000
trusted library allocation
page read and write
32B4000
trusted library allocation
page read and write
948C000
stack
page read and write
758C000
trusted library allocation
page read and write
2DAE000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
D07E000
stack
page read and write
7771000
trusted library allocation
page read and write
7536000
trusted library allocation
page read and write
6FFC000
stack
page read and write
3005000
trusted library allocation
page read and write
7427000
trusted library allocation
page read and write
8CDD000
stack
page read and write
77F2000
trusted library allocation
page read and write
7824000
trusted library allocation
page read and write
148E000
heap
page read and write
D60E000
stack
page read and write
2B5E000
stack
page read and write
6E80000
trusted library allocation
page read and write
3244000
trusted library allocation
page read and write
7312000
trusted library allocation
page read and write
733B000
trusted library allocation
page read and write
75CD000
trusted library allocation
page read and write
7BBE000
stack
page read and write
78ED000
trusted library allocation
page read and write
2F2B000
trusted library allocation
page read and write
77BB000
trusted library allocation
page read and write
1382000
trusted library allocation
page read and write
1350000
heap
page read and write
7430000
heap
page read and write
3020000
trusted library allocation
page read and write
7549000
trusted library allocation
page read and write
7897000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
59AF000
trusted library allocation
page read and write
75BA000
trusted library allocation
page read and write
7713000
trusted library allocation
page read and write
83BA000
trusted library allocation
page read and write
75AF000
trusted library allocation
page read and write
652D000
stack
page read and write
7509000
trusted library allocation
page read and write
7517000
trusted library allocation
page read and write
3006000
trusted library allocation
page read and write
7243000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
7917000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
76CB000
trusted library allocation
page read and write
7501000
trusted library allocation
page read and write
2F41000
trusted library allocation
page read and write
52E0000
trusted library section
page readonly
173E000
stack
page read and write
7883000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
663E000
stack
page read and write
9C4C000
heap
page read and write
7592000
trusted library allocation
page read and write
7257000
trusted library allocation
page read and write
328E000
trusted library allocation
page read and write
D17F000
stack
page read and write
781F000
trusted library allocation
page read and write
DA0000
heap
page read and write
77F9000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
AEA000
stack
page read and write
725D000
trusted library allocation
page read and write
72F1000
trusted library allocation
page read and write
7E0000
heap
page read and write
1250000
heap
page read and write
2A36000
trusted library allocation
page read and write
76FF000
trusted library allocation
page read and write
6AFE000
stack
page read and write
13EA000
heap
page read and write
786A000
trusted library allocation
page read and write
740E000
stack
page read and write
2FE0000
trusted library allocation
page read and write
CF2D000
stack
page read and write
4F00000
trusted library allocation
page read and write
72A2000
trusted library allocation
page read and write
751B000
trusted library allocation
page read and write
6F3C000
stack
page read and write
740F000
trusted library allocation
page read and write
7835000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
720F000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
75E7000
trusted library allocation
page read and write
14B0000
heap
page read and write
5516000
trusted library allocation
page read and write
2F1B000
stack
page read and write
7598000
trusted library allocation
page read and write
17A0000
heap
page read and write
30AF000
stack
page read and write
3260000
trusted library allocation
page read and write
7961000
trusted library allocation
page read and write
73EA000
trusted library allocation
page read and write
727B000
trusted library allocation
page read and write
160C000
stack
page read and write
74CD000
trusted library allocation
page read and write
163E000
unkown
page read and write
54A1000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
92AC000
stack
page read and write
7952000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
774D000
trusted library allocation
page read and write
723D000
trusted library allocation
page read and write
77B1000
trusted library allocation
page read and write
4D3F000
trusted library allocation
page read and write
7726000
trusted library allocation
page read and write
4EE5000
trusted library allocation
page read and write
44DE000
trusted library allocation
page read and write
906E000
stack
page read and write
5A45000
heap
page read and write
B53000
trusted library allocation
page read and write
7996000
trusted library allocation
page read and write
7785000
trusted library allocation
page read and write
770D000
trusted library allocation
page read and write
543D000
stack
page read and write
30FD000
trusted library allocation
page read and write
69F9000
heap
page read and write
7275000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
366A000
trusted library allocation
page read and write
3001000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
13A8000
heap
page read and write
78D5000
trusted library allocation
page read and write
957C000
trusted library allocation
page read and write
73DD000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
E90000
heap
page read and write
7849000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
6D06000
trusted library allocation
page read and write
C5E000
heap
page read and write
6690000
heap
page read and write
A3C0000
trusted library allocation
page read and write
5454000
heap
page read and write
6340000
heap
page read and write
405E000
trusted library allocation
page read and write
2C54000
trusted library allocation
page read and write
74BE000
stack
page read and write
17A7000
heap
page read and write
180D000
trusted library allocation
page execute and read and write
50E0000
heap
page read and write
4D63000
heap
page read and write
1370000
heap
page read and write
319E000
trusted library allocation
page read and write
77C7000
trusted library allocation
page read and write
5A05000
trusted library allocation
page read and write
CAE000
unkown
page read and write
64CE000
stack
page read and write
5990000
trusted library allocation
page read and write
104C000
unkown
page read and write
1390000
trusted library allocation
page read and write
3FED000
trusted library allocation
page read and write
74BE000
trusted library allocation
page read and write
6B20000
heap
page read and write
73FE000
trusted library allocation
page read and write
76BF000
trusted library allocation
page read and write
78CB000
trusted library allocation
page read and write
4758000
trusted library allocation
page read and write
1380000
heap
page read and write
1364000
trusted library allocation
page read and write
714E000
stack
page read and write
424000
remote allocation
page execute and read and write
4C90000
trusted library allocation
page read and write
78EF000
trusted library allocation
page read and write
62A000
heap
page read and write
123E000
stack
page read and write
417000
remote allocation
page execute and read and write
A20000
trusted library allocation
page read and write
76B3000
trusted library allocation
page read and write
C5A000
heap
page read and write
70FE000
stack
page read and write
32C0000
trusted library allocation
page read and write
5A20000
trusted library section
page readonly
78F7000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
E6E000
stack
page read and write
149E000
stack
page read and write
BA0000
heap
page read and write
54F0000
trusted library allocation
page read and write
6630000
heap
page read and write
2E7D000
trusted library allocation
page read and write
74DC000
trusted library allocation
page read and write
77AA000
trusted library allocation
page read and write
7192000
heap
page read and write
566E000
stack
page read and write
56E0000
trusted library allocation
page read and write
2E3C000
trusted library allocation
page read and write
404000
remote allocation
page execute and read and write
10DD000
trusted library allocation
page execute and read and write
1230000
heap
page read and write
CDD000
trusted library allocation
page execute and read and write
2F70000
trusted library allocation
page read and write
688E000
stack
page read and write
2DC6000
trusted library allocation
page read and write
7816000
trusted library allocation
page read and write
D69B000
stack
page read and write
4A4C000
trusted library allocation
page read and write
4EC6000
trusted library allocation
page read and write
41A000
remote allocation
page execute and read and write
2A34000
trusted library allocation
page read and write
5710000
trusted library allocation
page execute and read and write
2F40000
trusted library allocation
page read and write
100E000
stack
page read and write
5980000
heap
page read and write
7639000
trusted library allocation
page read and write
4C2B000
trusted library allocation
page read and write
7248000
trusted library allocation
page read and write
12C3000
heap
page read and write
7507000
trusted library allocation
page read and write
787A000
trusted library allocation
page read and write
E2C000
stack
page read and write
6C0A000
heap
page read and write
788A000
trusted library allocation
page read and write
738C000
heap
page read and write
7933000
trusted library allocation
page read and write
161C000
stack
page read and write
151D000
trusted library allocation
page execute and read and write
33EE000
trusted library allocation
page read and write
78E8000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
33DB000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
6EE0000
heap
page read and write
7657000
trusted library allocation
page read and write
138A000
trusted library allocation
page execute and read and write
751E000
trusted library allocation
page read and write
76BE000
stack
page read and write
2F20000
trusted library allocation
page read and write
5920000
heap
page read and write
7888000
trusted library allocation
page read and write
7254000
trusted library allocation
page read and write
329D000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
626C000
stack
page read and write
2C40000
trusted library allocation
page read and write
4565000
trusted library allocation
page read and write
5460000
trusted library allocation
page execute and read and write
50D0000
trusted library allocation
page execute and read and write
D38C000
stack
page read and write
2A40000
trusted library allocation
page read and write
2DAB000
trusted library allocation
page read and write
6C4E000
stack
page read and write
1210000
heap
page read and write
782A000
trusted library allocation
page read and write
143F000
heap
page read and write
436C000
trusted library allocation
page read and write
7659000
trusted library allocation
page read and write
757E000
trusted library allocation
page read and write
74EE000
stack
page read and write
5914000
heap
page read and write
2E05000
trusted library allocation
page read and write
72DD000
trusted library allocation
page read and write
12F3000
trusted library allocation
page execute and read and write
E60000
trusted library allocation
page read and write
E07000
trusted library allocation
page execute and read and write
78BC000
trusted library allocation
page read and write
A45000
heap
page read and write
76AD000
trusted library allocation
page read and write
2E3E000
unkown
page read and write
CE80000
heap
page read and write
1800000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
F50000
heap
page read and write
2FB7000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
7200000
trusted library allocation
page read and write
54A0000
trusted library allocation
page execute and read and write
13F6000
heap
page read and write
77D9000
trusted library allocation
page read and write
68F0000
trusted library allocation
page execute and read and write
77E9000
trusted library allocation
page read and write
75E7000
trusted library allocation
page read and write
720A000
trusted library allocation
page read and write
74FF000
trusted library allocation
page read and write
7776000
trusted library allocation
page read and write
759B000
trusted library allocation
page read and write
778F000
trusted library allocation
page read and write
4120000
trusted library allocation
page read and write
7586000
trusted library allocation
page read and write
677E000
stack
page read and write
B33F000
stack
page read and write
4BCF000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
50AC000
stack
page read and write
1452000
heap
page read and write
2C82000
trusted library allocation
page read and write
76E9000
trusted library allocation
page read and write
721F000
trusted library allocation
page read and write
D3CE000
stack
page read and write
2FFE000
trusted library allocation
page read and write
6460000
heap
page read and write
735F000
stack
page read and write
6F00000
trusted library allocation
page execute and read and write
7685000
trusted library allocation
page read and write
7815000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
121F000
stack
page read and write
7766000
trusted library allocation
page read and write
CC0000
heap
page read and write
77F0000
trusted library allocation
page execute and read and write
3330000
heap
page execute and read and write
6C0F000
stack
page read and write
7250000
trusted library allocation
page read and write
There are 1867 hidden memdumps, click here to show them.