IOC Report

loading gif

Files

File Path
Type
Category
Malicious
Divit-RekutPO260122.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Divit-RekutPO260122.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\sjndll.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\sjndll.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
data
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Divit-RekutPO260122.exe
"C:\Users\user\Desktop\Divit-RekutPO260122.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Users\user\Desktop\Divit-RekutPO260122.exe
C:\Users\user\Desktop\Divit-RekutPO260122.exe
malicious
C:\Users\user\Desktop\Divit-RekutPO260122.exe
C:\Users\user\Desktop\Divit-RekutPO260122.exe
malicious
C:\Users\user\Desktop\Divit-RekutPO260122.exe
C:\Users\user\Desktop\Divit-RekutPO260122.exe
malicious
C:\Users\user\AppData\Local\sjndll.exe
"C:\Users\user\AppData\Local\sjndll.exe"
malicious
C:\Users\user\AppData\Local\sjndll.exe
"C:\Users\user\AppData\Local\sjndll.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C timeout 19
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 19
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C timeout 19
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 19
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C timeout 19
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 19
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
malicious
renareport.duckdns.org
malicious
https://github.com/mgravell/protobuf-net
unknown
https://cdn.discordapp.com/attachments/935829381669081140/935832049175101510/pl33.png%Thwmyhrwxha.Cz
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://cdn.discordapp.com
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://cdn.discordapp.com/attachments/935829381669081140/935832049175101510/pl33.png
162.159.130.233
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
renareport.duckdns.org
192.145.124.8
malicious
cdn.discordapp.com
162.159.130.233

IPs

IP
Domain
Country
Malicious
192.145.124.8
renareport.duckdns.org
Romania
malicious
162.159.130.233
cdn.discordapp.com
United States
192.168.2.1
unknown
unknown
162.159.129.233
unknown
United States
162.159.134.233
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Divit-RekutPO260122_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
sjndll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\sjndll_RASMANCS
FileDirectory
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4289000
trusted library allocation
page read and write
malicious
27FB000
trusted library allocation
page read and write
malicious
6060000
trusted library section
page read and write
malicious
2B57000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3E95000
trusted library allocation
page read and write
malicious
2C2B000
trusted library allocation
page read and write
malicious
4E20000
trusted library section
page read and write
malicious
32CF000
trusted library allocation
page read and write
malicious
272F000
trusted library allocation
page read and write
malicious
3FF9000
trusted library allocation
page read and write
malicious
3DF6000
trusted library allocation
page read and write
malicious
66F0000
trusted library section
page read and write
malicious
36E9000
trusted library allocation
page read and write
malicious
6010000
trusted library section
page read and write
malicious
3B19000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2FB1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
339B000
trusted library allocation
page read and write
malicious
670A000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
4BC0000
heap
page read and write
26C0000
trusted library allocation
page read and write
5D0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
66F6000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
E12000
heap
page read and write
66DC000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
21F73400000
unkown
page read and write
36E1000
trusted library allocation
page read and write
2B5E0967000
heap
page read and write
FD4000
heap
page read and write
66C1000
trusted library allocation
page read and write
EE7000
heap
page read and write
6796000
trusted library allocation
page read and write
9C2000
unkown
page readonly
4080000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
9CE000
stack
page read and write
3109000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
2C124602000
heap
page read and write
15A0000
heap
page read and write
66DC000
trusted library allocation
page read and write
32C5000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
E79000
heap
page read and write
4051000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
6106000
trusted library allocation
page read and write
2B793400000
unkown
page read and write
6795000
trusted library allocation
page read and write
21C5BBBC000
unkown
page read and write
2B46000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
2C12462D000
heap
page read and write
66F0000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
59EE000
stack
page read and write
EC7000
heap
page read and write
4D10000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
F40000
heap
page read and write
6010000
trusted library allocation
page read and write
ECF000
heap
page read and write
6100000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
12EE000
stack
page read and write
2DC7000
heap
page read and write
2B5E0800000
heap
page read and write
67D0000
trusted library allocation
page read and write
1170000
heap
page read and write
670A000
trusted library allocation
page read and write
FD4000
heap
page read and write
21C5B4F6000
unkown
page read and write
21C5B453000
unkown
page read and write
60E0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
FD4000
heap
page read and write
66DD000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
21C5B1C0000
heap
page read and write
5120000
remote allocation
page read and write
E6A000
heap
page read and write
9D0000
trusted library allocation
page read and write
580000
remote allocation
page read and write
9ED000
trusted library allocation
page execute and read and write
66DC000
trusted library allocation
page read and write
21C5B4C3000
unkown
page read and write
592D000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
6070000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
32B7000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page execute and read and write
8E1000
heap
page read and write
66F0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
270E000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
FD4000
heap
page read and write
21C5BB5F000
unkown
page read and write
4D10000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
21C5BB64000
unkown
page read and write
5D6E000
stack
page read and write
67C0000
trusted library allocation
page read and write
5E6D000
stack
page read and write
5CD0000
trusted library allocation
page read and write
9C2000
unkown
page readonly
66DC000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
6804000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
EE7000
heap
page read and write
2C124617000
heap
page read and write
3D2000
unkown
page readonly
66DC000
trusted library allocation
page read and write
21F73452000
unkown
page read and write
9C2000
unkown
page readonly
6800000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
21F73464000
unkown
page read and write
2940000
trusted library allocation
page read and write
A61E4F7000
stack
page read and write
1162000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
2B281736000
heap
page read and write
1410000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
FD4000
heap
page read and write
C4E000
stack
page read and write
115D000
trusted library allocation
page execute and read and write
ECF000
heap
page read and write
4D10000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
272846A0000
heap
page read and write
670A000
trusted library allocation
page read and write
60B5000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
EE2000
heap
page read and write
3D0E000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
1306000
trusted library allocation
page execute and read and write
2C1245A8000
heap
page read and write
2B93000
trusted library allocation
page read and write
1A2000
unkown
page readonly
862000
unkown
page readonly
601D000
stack
page read and write
6790000
trusted library allocation
page read and write
FD4000
heap
page read and write
692E000
stack
page read and write
2B793502000
unkown
page read and write
FD4000
heap
page read and write
A61E3FB000
stack
page read and write
5D14000
trusted library allocation
page read and write
FD4000
heap
page read and write
7DC000
stack
page read and write
60F0000
trusted library allocation
page read and write
A2193F8000
stack
page read and write
5400000
trusted library allocation
page read and write
66F5000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
630D000
stack
page read and write
5370000
trusted library allocation
page read and write
FD5000
heap
page read and write
66F0000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
5FA0000
trusted library allocation
page read and write
4C8E000
stack
page read and write
16A0000
remote allocation
page read and write
21C5BB90000
unkown
page read and write
5370000
trusted library allocation
page read and write
21C5C002000
unkown
page read and write
4CCE000
stack
page read and write
66DD000
trusted library allocation
page read and write
D6F000
stack
page read and write
6085000
trusted library allocation
page read and write
FD4000
heap
page read and write
2B281720000
heap
page read and write
670A000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1A2000
unkown
page readonly
EDF000
heap
page read and write
27284902000
unkown
page read and write
6016000
trusted library allocation
page read and write
2717000
trusted library allocation
page read and write
FD4000
heap
page read and write
60E0000
trusted library allocation
page read and write
FD4000
heap
page read and write
ED8000
heap
page read and write
21F73424000
unkown
page read and write
21C5BB97000
unkown
page read and write
DD4000
heap
page read and write
66DD000
trusted library allocation
page read and write
E63000
heap
page read and write
2B00000
heap
page read and write
5CE0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
FD4000
heap
page read and write
2C124699000
heap
page read and write
61D1000
heap
page read and write
60E0000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
2B281740000
heap
page read and write
2B5E0920000
heap
page read and write
2B793508000
unkown
page read and write
53B0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
980000
heap
page read and write
5CD0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
14F4000
trusted library allocation
page read and write
FD4000
heap
page read and write
66DC000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
2B79346A000
unkown
page read and write
1A2000
unkown
page readonly
60F0000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
E7F000
heap
page read and write
528F000
stack
page read and write
66DD000
trusted library allocation
page read and write
E69000
heap
page read and write
A98000
heap
page read and write
53B0000
trusted library allocation
page read and write
530A000
trusted library allocation
page read and write
21C5B470000
unkown
page read and write
4D15000
trusted library allocation
page read and write
5120000
remote allocation
page read and write
66DC000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
2C124602000
heap
page read and write
FD4000
heap
page read and write
27284849000
unkown
page read and write
5570000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
FD4000
heap
page read and write
1540000
trusted library allocation
page read and write
FD4000
heap
page read and write
8B0000
heap
page read and write
60B5000
trusted library allocation
page read and write
5CD5000
trusted library allocation
page read and write
6795000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
FD4000
heap
page read and write
12F0000
trusted library allocation
page read and write
60E0000
trusted library allocation
page execute and read and write
3418000
trusted library allocation
page read and write
EE2000
heap
page read and write
15B0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
A0F000
stack
page read and write
2C12469B000
heap
page read and write
6797000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
2F85000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
6110000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
670A000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
9C0000
unkown
page readonly
6130000
trusted library allocation
page read and write
DEE87FE000
stack
page read and write
FD4000
heap
page read and write
6124000
trusted library allocation
page read and write
CAE000
stack
page read and write
130A000
trusted library allocation
page execute and read and write
E1F000
heap
page read and write
2C124590000
remote allocation
page read and write
21C5B4A5000
unkown
page read and write
5400000
trusted library allocation
page read and write
E72000
heap
page read and write
66DD000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
2B9E000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
6A2E000
stack
page read and write
E4F000
heap
page read and write
66F0000
trusted library allocation
page read and write
EC9000
heap
page read and write
5910000
trusted library allocation
page read and write
3394000
trusted library allocation
page read and write
A2B000
trusted library allocation
page execute and read and write
4D15000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
5288000
trusted library allocation
page read and write
9C2000
unkown
page readonly
FF0000
trusted library allocation
page read and write
DBE000
stack
page read and write
1312000
trusted library allocation
page read and write
60E5000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
53DE000
stack
page read and write
6100000
trusted library allocation
page read and write
A219278000
stack
page read and write
66DD000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
DD4000
heap
page read and write
6790000
trusted library allocation
page read and write
F70000
heap
page read and write
66DD000
trusted library allocation
page read and write
4C10000
remote allocation
page read and write
60B7000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
E540679000
stack
page read and write
670A000
trusted library allocation
page read and write
60C0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
4EAE000
stack
page read and write
5CD0000
trusted library allocation
page read and write
5CDE000
stack
page read and write
1317000
trusted library allocation
page execute and read and write
9C0000
unkown
page readonly
66DC000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
EC9000
heap
page read and write
2B281500000
heap
page read and write
66DD000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
F4DB77F000
stack
page read and write
2B5E096E000
heap
page read and write
67D0000
trusted library allocation
page read and write
FD0000
heap
page read and write
FD4000
heap
page read and write
66DC000
trusted library allocation
page read and write
5F30000
trusted library section
page read and write
66DD000
trusted library allocation
page read and write
487E000
stack
page read and write
67F0000
trusted library allocation
page read and write
E45517F000
stack
page read and write
339E000
trusted library allocation
page read and write
E8D000
heap
page read and write
2C1245E0000
heap
page read and write
66DD000
trusted library allocation
page read and write
66FA000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
21F73500000
unkown
page read and write
FD4000
heap
page read and write
67C0000
trusted library allocation
page read and write
4EC000
stack
page read and write
FD5000
heap
page read and write
6680000
trusted library allocation
page read and write
FD4000
heap
page read and write
5CD0000
trusted library allocation
page read and write
FD4000
heap
page read and write
2B2819F0000
heap
page read and write
27284847000
unkown
page read and write
4D10000
trusted library allocation
page read and write
1620000
heap
page read and write
66DC000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
A2192FE000
stack
page read and write
5CC0000
trusted library allocation
page execute and read and write
21C5BB9E000
unkown
page read and write
5CD0000
trusted library allocation
page read and write
46E8000
trusted library allocation
page read and write
7DEB97B000
stack
page read and write
5D00000
trusted library allocation
page read and write
CF7000
stack
page read and write
DFF000
stack
page read and write
F20000
unkown
page readonly
FD4000
heap
page read and write
2B5E0951000
heap
page read and write
21C5BB95000
unkown
page read and write
DA0000
remote allocation
page read and write
4D10000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
21C5BB9F000
unkown
page read and write
6020000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
4281000
trusted library allocation
page read and write
9CE000
stack
page read and write
FD4000
heap
page read and write
1A2000
unkown
page readonly
67C0000
trusted library allocation
page read and write
21C5B513000
unkown
page read and write
58E000
stack
page read and write
E90000
heap
page read and write
6570000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
E7C000
heap
page read and write
2DA0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
2C124626000
heap
page read and write
FD4000
heap
page read and write
5400000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
66BC000
trusted library allocation
page read and write
21C5C002000
unkown
page read and write
5400000
trusted library allocation
page read and write
FD4000
heap
page read and write
4C30000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
AE0000
heap
page read and write
AC0000
trusted library allocation
page read and write
9C0000
unkown
page readonly
66DC000
trusted library allocation
page read and write
F4DB57E000
stack
page read and write
67D1000
trusted library allocation
page read and write
F3D000
trusted library allocation
page execute and read and write
6060000
trusted library allocation
page read and write
E71000
heap
page read and write
2C124530000
heap
page read and write
53CE000
stack
page read and write
66DD000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
4D0E000
stack
page read and write
66DD000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page execute and read and write
2B281726000
heap
page read and write
66DC000
trusted library allocation
page read and write
EDF000
heap
page read and write
5370000
trusted library allocation
page read and write
DA0000
remote allocation
page read and write
FD4000
heap
page read and write
670A000
trusted library allocation
page read and write
2728486E000
unkown
page read and write
DD4000
heap
page read and write
5CE8000
trusted library allocation
page read and write
EEE000
heap
page read and write
67D0000
trusted library allocation
page read and write
21C5B44B000
unkown
page read and write
58FE000
stack
page read and write
5CD0000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
440000
heap
page read and write
3281000
trusted library allocation
page read and write
61D1000
heap
page read and write
2F90000
trusted library allocation
page read and write
FCE000
stack
page read and write
21C5B413000
unkown
page read and write
EB7000
heap
page read and write
2B5E096E000
heap
page read and write
66DC000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
6DED000
stack
page read and write
4D10000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
E51000
heap
page read and write
21C5C002000
unkown
page read and write
2728484E000
unkown
page read and write
21F73481000
unkown
page read and write
4D16000
trusted library allocation
page read and write
5571000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
2B79344B000
unkown
page read and write
F4DB47C000
stack
page read and write
5CE0000
trusted library allocation
page read and write
2C1245A0000
heap
page read and write
67C0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
21C5BB9D000
unkown
page read and write
60B5000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
27284800000
unkown
page read and write
66DC000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
3D0000
unkown
page readonly
652F000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
60B6000
trusted library allocation
page read and write
4FDE000
stack
page read and write
FD5000
heap
page read and write
5370000
trusted library allocation
page read and write
6080000
trusted library section
page read and write
6A6E000
stack
page read and write
66DC000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
6F2E000
stack
page read and write
5010000
heap
page execute and read and write
151A000
trusted library allocation
page execute and read and write
FF0000
trusted library allocation
page read and write
FD4000
heap
page read and write
4CAE000
stack
page read and write
5920000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
42E9000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
2B28173B000
heap
page read and write
5EEE000
stack
page read and write
5CD8000
trusted library allocation
page read and write
1742000
heap
page read and write
66DC000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
FD4000
heap
page read and write
13B0000
heap
page read and write
27284710000
heap
page read and write
67B0000
trusted library allocation
page execute and read and write
66DD000
trusted library allocation
page read and write
531C000
trusted library allocation
page read and write
5315000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
7DEB67B000
stack
page read and write
2DAA000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
1A2000
unkown
page readonly
60F0000
trusted library allocation
page read and write
FD4000
heap
page read and write
3D0000
unkown
page readonly
66F6000
trusted library allocation
page read and write
114D000
trusted library allocation
page execute and read and write
6080000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
32C9000
trusted library allocation
page read and write
ED8000
heap
page read and write
670A000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
79D000
stack
page read and write
53B1000
trusted library allocation
page read and write
21C5B9F0000
remote allocation
page read and write
670A000
trusted library allocation
page read and write
430000
unkown
page readonly
5910000
trusted library section
page read and write
5C2E000
stack
page read and write
16A0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
2C124649000
heap
page read and write
66DD000
trusted library allocation
page read and write
21C5BB9B000
unkown
page read and write
5CD0000
trusted library allocation
page read and write
FD4000
heap
page read and write
670A000
trusted library allocation
page read and write
21F7345F000
unkown
page read and write
21C5BBAE000
unkown
page read and write
60E0000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
ECF000
heap
page read and write
FD4000
heap
page read and write
66DC000
trusted library allocation
page read and write
21C5C002000
unkown
page read and write
5D00000
trusted library allocation
page read and write
2728484B000
unkown
page read and write
5CE0000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
FD4000
heap
page read and write
670A000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
12F7000
stack
page read and write
63C0000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
E98000
heap
page read and write
4D10000
trusted library allocation
page read and write
2C124520000
heap
page read and write
2B5E0805000
heap
page read and write
2B5E097D000
heap
page read and write
6016000
trusted library allocation
page read and write
16CA000
heap
page read and write
5CB0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
21C5B40B000
unkown
page read and write
670A000
trusted library allocation
page read and write
EB5000
heap
page read and write
6015000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
145E000
stack
page read and write
2DC0000
heap
page read and write
5CE0000
trusted library allocation
page read and write
FD4000
heap
page read and write
54DF000
stack
page read and write
8B0000
heap
page read and write
FD4000
heap
page read and write
3D0000
unkown
page readonly
670A000
trusted library allocation
page read and write
61D1000
heap
page read and write
9F0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
EBA000
heap
page read and write
5120000
trusted library allocation
page read and write
21C5BB97000
unkown
page read and write
FD5000
heap
page read and write
21F73475000
unkown
page read and write
66DD000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
21C5BB9F000
unkown
page read and write
DA0000
remote allocation
page read and write
2C124631000
heap
page read and write
ED8000
heap
page read and write
DA0000
remote allocation
page read and write
2B5E0940000
heap
page read and write
2BFA000
trusted library allocation
page read and write
21C5B400000
unkown
page read and write
21C5BB97000
unkown
page read and write
61D0000
heap
page read and write
5900000
trusted library allocation
page read and write
FD4000
heap
page read and write
DEE86FB000
stack
page read and write
5570000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
5D02000
trusted library allocation
page read and write
E4548CB000
stack
page read and write
66DD000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
3D0000
unkown
page readonly
63C0000
trusted library allocation
page read and write
FD4000
heap
page read and write
2B09000
heap
page read and write
60E0000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
2725000
trusted library allocation
page read and write
3D2000
unkown
page readonly
66DD000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
21C5B9F0000
remote allocation
page read and write
5B2E000
stack
page read and write
9F0000
heap
page read and write
7B0000
remote allocation
page read and write
670A000
trusted library allocation
page read and write
FD4000
heap
page read and write
5920000
trusted library allocation
page read and write
21C5B48A000
unkown
page read and write
2B79342A000
unkown
page read and write
27284813000
unkown
page read and write
161E000
stack
page read and write
1512000
trusted library allocation
page read and write
2F8F000
trusted library allocation
page read and write
FD4000
heap
page read and write
5CE0000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
21C5BBAF000
unkown
page read and write
4E20000
trusted library allocation
page read and write
21C5BB9E000
unkown
page read and write
5CE0000
trusted library allocation
page read and write
FD4000
heap
page read and write
27284879000
unkown
page read and write
6010000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
E69000
heap
page read and write
FD5000
heap
page read and write
1130000
trusted library allocation
page read and write
6086000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
862000
unkown
page readonly
A218DFE000
stack
page read and write
6120000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
21C5B3F0000
unkown
page read and write
61FD000
heap
page read and write
4D10000
trusted library allocation
page read and write
14BF000
stack
page read and write
66DD000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
2C12469B000
heap
page read and write
1522000
trusted library allocation
page read and write
14E5000
heap
page read and write
63D0000
heap
page execute and read and write
15A9000
heap
page read and write
5CF0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
E44000
heap
page read and write
60A0000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
21C5BB6A000
unkown
page read and write
53B0000
trusted library allocation
page read and write
FD4000
heap
page read and write
2F6E000
stack
page read and write
66DC000
trusted library allocation
page read and write
63BE000
stack
page read and write
2C124525000
heap
page read and write
66DC000
trusted library allocation
page read and write
2C124E61000
heap
page read and write
66F0000
trusted library allocation
page read and write
1AD0000
heap
page read and write
2C124E62000
heap
page read and write
6016000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
E63000
heap
page read and write
FD4000
heap
page read and write
3D2000
unkown
page readonly
2728488D000
unkown
page read and write
66DC000
trusted library allocation
page read and write
FDF000
stack
page read and write
67C0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
E84000
heap
page read and write
66DC000
trusted library allocation
page read and write
E1D000
heap
page read and write
67E0000
trusted library allocation
page read and write
3D0000
unkown
page readonly
60F0000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
FD4000
heap
page read and write
670A000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
E7E000
heap
page read and write
6010000
trusted library allocation
page read and write
540E000
stack
page read and write
66DC000
trusted library allocation
page read and write
FD4000
heap
page read and write
FF1000
heap
page read and write
EE0000
heap
page read and write
5D10000
trusted library allocation
page read and write
158E000
stack
page read and write
E454DFB000
stack
page read and write
66DC000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
9C0000
unkown
page readonly
67E0000
trusted library allocation
page read and write
3B79000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
6560000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
FD4000
heap
page read and write
66F0000
trusted library allocation
page read and write
FD4000
heap
page read and write
6550000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
1143000
trusted library allocation
page execute and read and write
A27000
trusted library allocation
page execute and read and write
1A0000
unkown
page readonly
21C5BB97000
unkown
page read and write
21F7343C000
unkown
page read and write
61D1000
heap
page read and write
6010000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
FD4000
heap
page read and write
4D15000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
21C5B44F000
unkown
page read and write
66DC000
trusted library allocation
page read and write
1144000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
14FD000
trusted library allocation
page execute and read and write
67E0000
trusted library allocation
page read and write
E52000
heap
page read and write
5570000
trusted library allocation
page read and write
16FF000
heap
page read and write
FD4000
heap
page read and write
66DD000
trusted library allocation
page read and write
292B000
trusted library allocation
page execute and read and write
60E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
DEE847A000
stack
page read and write
2B281740000
heap
page read and write
890000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
E92000
heap
page read and write
67D0000
trusted library allocation
page read and write
FD4000
heap
page read and write
66F0000
trusted library allocation
page read and write
2C1243B0000
heap
page read and write
5CF0000
trusted library allocation
page read and write
16A0000
remote allocation
page read and write
5CD0000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
8B0000
heap
page read and write
67C0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
2B79348B000
unkown
page read and write
2C124605000
heap
page read and write
DEE85FB000
stack
page read and write
66DD000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
14F3000
trusted library allocation
page execute and read and write
66F0000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
2922000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
31E6000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
60FE000
trusted library allocation
page read and write
61D1000
heap
page read and write
422000
remote allocation
page execute and read and write
2C1245D4000
heap
page read and write
2B793453000
unkown
page read and write
5FB0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
FD4000
heap
page read and write
5CF0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
A35000
heap
page read and write
2B28172F000
heap
page read and write
5DAD000
stack
page read and write
4D16000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
21C5BB8D000
unkown
page read and write
21C5BB61000
unkown
page read and write
66DC000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
A02000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
61FC000
heap
page read and write
62BE000
stack
page read and write
FD4000
heap
page read and write
2C12462F000
heap
page read and write
FF1000
heap
page read and write
1660000
heap
page execute and read and write
F4DB7FE000
stack
page read and write
DEE877E000
stack
page read and write
A06000
trusted library allocation
page execute and read and write
4D16000
trusted library allocation
page read and write
2C12463A000
heap
page read and write
21C5BB17000
unkown
page read and write
2C124699000
heap
page read and write
5400000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
E79000
heap
page read and write
EB5000
heap
page read and write
66DD000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
2C1245F0000
heap
page read and write
6550000
trusted library allocation
page read and write
27284885000
unkown
page read and write
E54057F000
stack
page read and write
27284853000
unkown
page read and write
66DC000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
F34000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
21C5BB71000
unkown
page read and write
21C5BBAF000
unkown
page read and write
21C5BB99000
unkown
page read and write
68EF000
stack
page read and write
21C5BB6E000
unkown
page read and write
E93000
heap
page read and write
2DA5000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
21C5BBC5000
unkown
page read and write
670A000
trusted library allocation
page read and write
A21977F000
stack
page read and write
E93000
heap
page read and write
67C0000
trusted library allocation
page execute and read and write
5D10000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
EB8000
heap
page read and write
FD4000
heap
page read and write
DB0000
heap
page read and write
FD4000
heap
page read and write
21C5BB9F000
unkown
page read and write
5CE0000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
55F0000
heap
page read and write
4ED0000
heap
page read and write
DEE867C000
stack
page read and write
EEE000
heap
page read and write
1590000
trusted library allocation
page execute and read and write
5A8F000
stack
page read and write
66B0000
trusted library allocation
page read and write
21F73508000
unkown
page read and write
21F73C02000
unkown
page read and write
E73000
heap
page read and write
DA0000
remote allocation
page read and write
66B6000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
FD4000
heap
page read and write
550E000
stack
page read and write
FF0000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
131B000
trusted library allocation
page execute and read and write
DA0000
remote allocation
page read and write
66DC000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
21C5BB99000
unkown
page read and write
670A000
trusted library allocation
page read and write
9C2000
unkown
page readonly
66DC000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
21C5B4AB000
unkown
page read and write
2B793500000
unkown
page read and write
60F0000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
2B5E0A40000
heap
page read and write
66DD000
trusted library allocation
page read and write
7DEBBFF000
stack
page read and write
9C2000
unkown
page readonly
67D0000
trusted library allocation
page read and write
272846B0000
heap
page read and write
2B28174A000
heap
page read and write
53D0000
trusted library allocation
page read and write
A90000
heap
page read and write
860000
unkown
page readonly
E79000
heap
page read and write
87E000
stack
page read and write
6790000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
60CD000
stack
page read and write
6060000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
1776000
heap
page read and write
67E0000
trusted library allocation
page read and write
21C5BB9F000
unkown
page read and write
670A000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
21C5BB1F000
unkown
page read and write
FD4000
heap
page read and write
2B793448000
unkown
page read and write
FD4000
heap
page read and write
66DC000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
FD4000
heap
page read and write
1020000
heap
page read and write
670A000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
9C0000
unkown
page readonly
5CF0000
trusted library allocation
page read and write
2B793C02000
unkown
page read and write
21F73240000
heap
page read and write
5307000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6010000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
2927000
trusted library allocation
page execute and read and write
4D15000
trusted library allocation
page read and write
A7E000
stack
page read and write
601A000
trusted library allocation
page read and write
2B281660000
heap
page read and write
6740000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66AF000
stack
page read and write
5CEE000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
5EAF000
stack
page read and write
96C000
heap
page read and write
21F73477000
unkown
page read and write
6010000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
5B90000
trusted library section
page read and write
FF0000
trusted library allocation
page read and write
61D1000
heap
page read and write
21F732A0000
heap
page read and write
1516000
trusted library allocation
page execute and read and write
2C12463A000
heap
page read and write
6100000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
88E000
stack
page read and write
7DEB77E000
stack
page read and write
C7A000
stack
page read and write
670A000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
21C5B455000
unkown
page read and write
E71000
heap
page read and write
66F6000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
21C5BB74000
unkown
page read and write
66DC000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
6016000
trusted library allocation
page read and write
2ADE000
stack
page read and write
67D0000
trusted library allocation
page read and write
E79000
heap
page read and write
4D10000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
FD4000
heap
page read and write
6550000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
447E000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
A61E2FE000
stack
page read and write
1380000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
6804000
trusted library allocation
page read and write
3FB1000
trusted library allocation
page read and write
21C5C002000
unkown
page read and write
4D10000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
A2196F7000
stack
page read and write
21C5B4E5000
unkown
page read and write
2B281748000
heap
page read and write
6010000
trusted library allocation
page read and write
26D0000
heap
page read and write
1010000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
21C5BB61000
unkown
page read and write
265E000
stack
page read and write
670A000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
7DEB87B000
stack
page read and write
66DD000
trusted library allocation
page read and write
5180000
heap
page read and write
66DC000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
FD4000
heap
page read and write
21C5B220000
heap
page read and write
149E000
stack
page read and write
5CE0000
trusted library allocation
page read and write
539E000
stack
page read and write
4D10000
trusted library allocation
page read and write
21C5B4BD000
unkown
page read and write
5E1F000
stack
page read and write
15D0000
heap
page read and write
5CE0000
trusted library allocation
page read and write
E454F77000
stack
page read and write
66DD000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
9C2000
unkown
page readonly
6015000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
21C5BB8F000
unkown
page read and write
557D000
trusted library allocation
page read and write
E8D000
heap
page read and write
6800000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
FD4000
heap
page read and write
66DD000
trusted library allocation
page read and write
21C5BB9B000
unkown
page read and write
8BA000
heap
page read and write
6010000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
5BDE000
stack
page read and write
67A0000
trusted library allocation
page read and write
2728483C000
unkown
page read and write
9C2000
unkown
page readonly
4D10000
trusted library allocation
page read and write
9C0000
unkown
page readonly
FF0000
heap
page read and write
67D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
2A90000
heap
page execute and read and write
922000
heap
page read and write
E5404FE000
stack
page read and write
EB7000
heap
page read and write
1000000
heap
page read and write
C10000
heap
page read and write
DEF000
stack
page read and write
2B793413000
unkown
page read and write
67E0000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
E8D000
heap
page read and write
298E000
stack
page read and write
E92000
heap
page read and write
5CE1000
trusted library allocation
page read and write
7DEB6FE000
stack
page read and write
FD5000
heap
page read and write
6080000
trusted library allocation
page read and write
1ABF000
stack
page read and write
60F0000
trusted library allocation
page read and write
5423000
heap
page read and write
60E0000
trusted library allocation
page read and write
21C5BB49000
unkown
page read and write
2B7933A0000
unkown
page read and write
ABE000
stack
page read and write
21F7345C000
unkown
page read and write
5570000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
21C5B4F9000
unkown
page read and write
60F0000
trusted library allocation
page read and write
21C5BB9F000
unkown
page read and write
93F000
heap
page read and write
6550000
trusted library allocation
page read and write
67DE000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
580000
remote allocation
page read and write
1020000
trusted library allocation
page read and write
5D14000
trusted library allocation
page read and write
21C5B4D1000
unkown
page read and write
66DD000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
F22000
unkown
page readonly
66F6000
trusted library allocation
page read and write
FD4000
heap
page read and write
5926000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
21C5B459000
unkown
page read and write
66DD000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
FD4000
heap
page read and write
21C5B4DE000
unkown
page read and write
6550000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
12AF000
stack
page read and write
6140000
trusted library allocation
page read and write
6560000
trusted library allocation
page execute and read and write
2B5E0956000
heap
page read and write
5CD0000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
DD4000
heap
page read and write
4D10000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
A61E07C000
stack
page read and write
670A000
trusted library allocation
page read and write
9C0000
unkown
page readonly
21F73502000
unkown
page read and write
21C5BB67000
unkown
page read and write
2C12463A000
heap
page read and write
5CF0000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
116A000
trusted library allocation
page execute and read and write
605E000
stack
page read and write
FD4000
heap
page read and write
67C0000
trusted library allocation
page read and write
2B5E096E000
heap
page read and write
FF1000
heap
page read and write
FD4000
heap
page read and write
21C5BB7A000
unkown
page read and write
EC9000
heap
page read and write
5420000
heap
page read and write
1150000
trusted library allocation
page read and write
61D1000
heap
page read and write
61D1000
heap
page read and write
E54047A000
stack
page read and write
5920000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
2B5E0976000
heap
page read and write
2B5E097E000
heap
page read and write
27285002000
unkown
page read and write
6550000
trusted library allocation
page read and write
588F000
stack
page read and write
588E000
unkown
page read and write
2660000
trusted library allocation
page execute and read and write
66DD000
trusted library allocation
page read and write
60F8000
trusted library allocation
page read and write
2B793310000
heap
page read and write
2B281640000
heap
page read and write
2DB0000
trusted library allocation
page read and write
7B0000
remote allocation
page read and write
66F0000
trusted library allocation
page read and write
2B793513000
unkown
page read and write
5AAE000
trusted library allocation
page read and write
38DE000
trusted library allocation
page read and write
27284E70000
unkown
page read and write
5920000
trusted library allocation
page read and write
61D1000
heap
page read and write
21C5C002000
unkown
page read and write
66DD000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
564F000
stack
page read and write
E84000
heap
page read and write
21C5BB61000
unkown
page read and write
529E000
stack
page read and write
FD4000
heap
page read and write
5310000
trusted library allocation
page read and write
4D15000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
A61E5FF000
stack
page read and write
66DC000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
1AD7000
heap
page read and write
66DD000
trusted library allocation
page read and write
E4549CE000
stack
page read and write
66DD000
trusted library allocation
page read and write
2B79343C000
unkown
page read and write
5920000
trusted library allocation
page read and write
E67000
heap
page read and write
E69000
heap
page read and write
2C124590000
remote allocation
page read and write
E7C000
heap
page read and write
E45507F000
stack
page read and write
6015000
trusted library allocation
page read and write
2C124617000
heap
page read and write
60E0000
trusted library allocation
page read and write
66C5000
trusted library allocation
page read and write
FD4000
heap
page read and write
2B793370000
heap
page read and write
67D0000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
60F1000
trusted library allocation
page read and write
2C1245F0000
heap
page read and write
6100000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
EA3000
heap
page read and write
21C5BB9B000
unkown
page read and write
6080000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
66F6000
trusted library allocation
page read and write
6087000
trusted library allocation
page read and write
2C124699000
heap
page read and write
E7F000
stack
page read and write
580000
remote allocation
page read and write
541E000
stack
page read and write
C0E000
stack
page read and write
5370000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
7F8E0000
trusted library allocation
page execute and read and write
67E0000
trusted library allocation
page read and write
DD4000
heap
page read and write
7B0000
remote allocation
page read and write
67D0000
trusted library allocation
page read and write
7DEBCFF000
stack
page read and write
FF0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
21C5B49E000
unkown
page read and write
651E000
stack
page read and write
6620000
trusted library section
page read and write
980000
trusted library allocation
page read and write
2B5E0977000
heap
page read and write
14F0000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
730000
heap
page read and write
1520000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
2C124631000
heap
page read and write
60E0000
trusted library allocation
page read and write
FD4000
heap
page read and write
A2195FF000
stack
page read and write
66DD000
trusted library allocation
page read and write
FD4000
heap
page read and write
21C5BB8D000
unkown
page read and write
A61E17E000
stack
page read and write
5CF000
stack
page read and write
7DEBAF7000
stack
page read and write
DA0000
remote allocation
page read and write
670A000
trusted library allocation
page read and write
21C5C063000
unkown
page read and write
5370000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
A10000
heap
page read and write
F20000
trusted library allocation
page read and write
13A0000
trusted library allocation
page execute and read and write
4D10000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
2C124E61000
heap
page read and write
FD4000
heap
page read and write
21C5B44A000
unkown
page read and write
6690000
trusted library allocation
page read and write
2B3D000
trusted library allocation
page read and write
5D20000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
67C8000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
152B000
trusted library allocation
page execute and read and write
525E000
stack
page read and write
6F40000
trusted library allocation
page read and write
6088000
trusted library allocation
page read and write
176F000
heap
page read and write
66DC000
trusted library allocation
page read and write
5CF6000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
4AC000
stack
page read and write
21C5BB6F000
unkown
page read and write
6020000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
919000
heap
page read and write
60F0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
58BD000
stack
page read and write
9C0000
unkown
page readonly
52F0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
A22000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
21C5B1B0000
heap
page read and write
4E20000
trusted library allocation
page read and write
1A0000
unkown
page readonly
4D15000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
55EE000
stack
page read and write
2728486A000
unkown
page read and write
21C5B516000
unkown
page read and write
67F0000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
E71000
heap
page read and write
670A000
trusted library allocation
page read and write
6520000
trusted library allocation
page read and write
480000
heap
page read and write
67C0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
E75000
heap
page read and write
2DD0000
trusted library allocation
page read and write
E79000
heap
page read and write
5920000
trusted library allocation
page read and write
6110000
trusted library allocation
page read and write
FD4000
heap
page read and write
21C5BB74000
unkown
page read and write
66F5000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
4860000
heap
page read and write
60F0000
trusted library allocation
page read and write
E45494E000
stack
page read and write
4D10000
trusted library allocation
page read and write
3D2000
unkown
page readonly
E454E7E000
stack
page read and write
5AEE000
stack
page read and write
61D1000
heap
page read and write
5FA0000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
5F6B000
stack
page read and write
67F0000
trusted library allocation
page read and write
2B79344E000
unkown
page read and write
56AD000
stack
page read and write
301B000
trusted library allocation
page read and write
4D16000
trusted library allocation
page read and write
21C5BB68000
unkown
page read and write
4D10000
trusted library allocation
page read and write
5C6E000
stack
page read and write
DEE84FE000
stack
page read and write
5570000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
21C5BB5D000
unkown
page read and write
4D17000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
9C0000
unkown
page readonly
2C124631000
heap
page read and write
66DC000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
6060000
trusted library section
page read and write
60F0000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
DD0000
heap
page read and write
C3C000
stack
page read and write
91D000
stack
page read and write
5CE0000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
960000
heap
page read and write
6810000
trusted library allocation
page read and write
515E000
stack
page read and write
27284900000
unkown
page read and write
E87000
heap
page read and write
4D10000
trusted library allocation
page read and write
2C1245DF000
heap
page read and write
430000
unkown
page readonly
66F0000
trusted library allocation
page read and write
DE0000
heap
page read and write
EE0000
heap
page read and write
4D10000
trusted library allocation
page read and write
21C5BB97000
unkown
page read and write
6B6E000
stack
page read and write
6010000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
1A0000
unkown
page readonly
641D000
stack
page read and write
53D0000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
DA0000
remote allocation
page read and write
67E0000
trusted library allocation
page read and write
27284908000
unkown
page read and write
5E7000
stack
page read and write
670A000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
4880000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
60D0000
trusted library allocation
page execute and read and write
640D000
stack
page read and write
67C0000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
9E3000
trusted library allocation
page execute and read and write
57EE000
stack
page read and write
21C5BB9F000
unkown
page read and write
670A000
trusted library allocation
page read and write
E66000
heap
page read and write
67C0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
6016000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
FE0000
heap
page read and write
66DC000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
F4DB6FF000
stack
page read and write
5020000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
FD4000
heap
page read and write
66DC000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
517E000
stack
page read and write
1527000
trusted library allocation
page execute and read and write
9C2000
unkown
page readonly
2D9E000
stack
page read and write
11AE000
stack
page read and write
66DD000
trusted library allocation
page read and write
21F73459000
unkown
page read and write
61D1000
heap
page read and write
FD5000
heap
page read and write
5D20000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
27284913000
unkown
page read and write
61D1000
heap
page read and write
53C0000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
511E000
stack
page read and write
DAE000
stack
page read and write
670A000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
644D000
stack
page read and write
5400000
trusted library allocation
page read and write
67E6000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
EF6000
heap
page read and write
5120000
remote allocation
page read and write
EE0000
heap
page read and write
A2194F7000
stack
page read and write
32AE000
trusted library allocation
page read and write
432000
unkown
page readonly
16C0000
heap
page read and write
5C60000
trusted library section
page read and write
21C5BBC5000
unkown
page read and write
2B5E0966000
heap
page read and write
66DD000
trusted library allocation
page read and write
2728487B000
unkown
page read and write
97F000
heap
page read and write
66DD000
trusted library allocation
page read and write
21F73513000
unkown
page read and write
FD4000
heap
page read and write
14E0000
heap
page read and write
2D5E000
stack
page read and write
E71000
heap
page read and write
5CD0000
trusted library allocation
page read and write
FD4000
heap
page read and write
67A0000
trusted library allocation
page read and write
3D2000
unkown
page readonly
60F0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
4D16000
trusted library allocation
page read and write
9C2000
unkown
page readonly
66DC000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
6124000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
DD4000
heap
page read and write
4C10000
remote allocation
page read and write
2F80000
trusted library allocation
page read and write
18BE000
stack
page read and write
67EE000
stack
page read and write
66DC000
trusted library allocation
page read and write
21C5BB9D000
unkown
page read and write
6080000
trusted library allocation
page read and write
EE4000
heap
page read and write
2B5E07F0000
heap
page read and write
66DC000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
973000
heap
page read and write
6550000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
FD5000
heap
page read and write
4D1A000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
26D9000
heap
page read and write
E77000
heap
page read and write
FD4000
heap
page read and write
5A90000
trusted library allocation
page read and write
4D17000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
27284829000
unkown
page read and write
59AE000
stack
page read and write
5370000
trusted library allocation
page read and write
3CA6000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
66F7000
trusted library allocation
page read and write
FD4000
heap
page read and write
670A000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
A218D7B000
stack
page read and write
21C5BB68000
unkown
page read and write
21F73475000
unkown
page read and write
67D0000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
6740000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
9C0000
unkown
page readonly
53F0000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
FD4000
heap
page read and write
FDC000
stack
page read and write
66DC000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
83D000
stack
page read and write
6F30000
trusted library allocation
page read and write
6E2E000
stack
page read and write
16F1000
heap
page read and write
6010000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
21C5B44E000
unkown
page read and write
5CF0000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
6110000
trusted library allocation
page read and write
21C5BB9F000
unkown
page read and write
4D10000
trusted library allocation
page read and write
501E000
stack
page read and write
66DD000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
53A0000
heap
page execute and read and write
60B0000
trusted library allocation
page read and write
F22000
unkown
page readonly
16A0000
remote allocation
page read and write
E66000
heap
page read and write
66DC000
trusted library allocation
page read and write
D2E000
stack
page read and write
66DC000
trusted library allocation
page read and write
21C5BB4F000
unkown
page read and write
FD4000
heap
page read and write
66DC000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
E7F000
heap
page read and write
EB7000
heap
page read and write
2F80000
trusted library allocation
page read and write
2C124E60000
heap
page read and write
3FB9000
trusted library allocation
page read and write
67C5000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
2C1245E4000
heap
page read and write
5CE0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
57AE000
stack
page read and write
66DD000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
67D8000
trusted library allocation
page read and write
E454CFB000
stack
page read and write
FF1000
heap
page read and write
5400000
trusted library allocation
page read and write
137E000
stack
page read and write
66DC000
trusted library allocation
page read and write
58EE000
stack
page read and write
2A8E000
stack
page read and write
21C5BA02000
unkown
page read and write
FD4000
heap
page read and write
21C5BBCB000
unkown
page read and write
A61E6FF000
stack
page read and write
66DC000
trusted library allocation
page read and write
F8E000
stack
page read and write
21C5BB4B000
unkown
page read and write
65AE000
stack
page read and write
2B79348D000
unkown
page read and write
67F0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
E79000
heap
page read and write
5400000
trusted library allocation
page read and write
66F5000
trusted library allocation
page read and write
2B793481000
unkown
page read and write
4D16000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
26BE000
stack
page read and write
21C5B458000
unkown
page read and write
5CE0000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
2FA0000
heap
page execute and read and write
60F0000
trusted library allocation
page read and write
12FD000
trusted library allocation
page execute and read and write
6740000
trusted library section
page read and write
1A0000
unkown
page readonly
5CF0000
trusted library allocation
page read and write
61D1000
heap
page read and write
6017000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
EC0000
heap
page read and write
21C5B502000
unkown
page read and write
5CD0000
trusted library allocation
page read and write
A0A000
trusted library allocation
page execute and read and write
4ED000
stack
page read and write
5CD0000
trusted library allocation
page read and write
4C40000
heap
page execute and read and write
9EC000
stack
page read and write
E1A000
heap
page read and write
A21907E000
stack
page read and write
67C0000
trusted library allocation
page read and write
66B1000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
1690000
trusted library allocation
page read and write
CB0000
heap
page read and write
990000
trusted library allocation
page read and write
2C1245E4000
heap
page read and write
598E000
stack
page read and write
19BE000
stack
page read and write
1000000
trusted library allocation
page read and write
D75000
stack
page read and write
139C000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
FD4000
heap
page read and write
66DD000
trusted library allocation
page read and write
6CED000
stack
page read and write
422000
remote allocation
page execute and read and write
66DC000
trusted library allocation
page read and write
2C124590000
remote allocation
page read and write
2C12469B000
heap
page read and write
5400000
trusted library allocation
page read and write
F20000
unkown
page readonly
21C5B4AF000
unkown
page read and write
E5406FF000
stack
page read and write
5410000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
5380000
trusted library allocation
page execute and read and write
EE7000
heap
page read and write
2C12462D000
heap
page read and write
5CD0000
trusted library allocation
page read and write
554E000
stack
page read and write
6080000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
61CD000
stack
page read and write
F4DB5FF000
stack
page read and write
DEE857E000
stack
page read and write
670A000
trusted library allocation
page read and write
E71000
heap
page read and write
66DD000
trusted library allocation
page read and write
21F733A0000
unkown
page read and write
FD4000
heap
page read and write
4E20000
trusted library allocation
page read and write
860000
unkown
page readonly
66DD000
trusted library allocation
page read and write
8E4000
heap
page read and write
21C5B43C000
unkown
page read and write
53C0000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1510000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
61D1000
heap
page read and write
6700000
trusted library allocation
page read and write
A17000
heap
page read and write
FD4000
heap
page read and write
67D0000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
2670000
heap
page execute and read and write
139F000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
DE8000
heap
page read and write
6110000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
A61E0FE000
stack
page read and write
53F0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
F4DB4FE000
stack
page read and write
FD4000
heap
page read and write
66DC000
trusted library allocation
page read and write
FD4000
heap
page read and write
21C5C000000
unkown
page read and write
27E5000
trusted library allocation
page read and write
55AE000
stack
page read and write
6550000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
6112000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
21C5B4E8000
unkown
page read and write
A30000
heap
page read and write
2C124632000
heap
page read and write
5CB0000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
2C124699000
heap
page read and write
6795000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
E79000
heap
page read and write
6080000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
67F2000
trusted library allocation
page read and write
2B2819F5000
heap
page read and write
4E20000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
1A0000
unkown
page readonly
21C5B4F7000
unkown
page read and write
5D1E000
stack
page read and write
DD4000
heap
page read and write
60C0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
61D1000
heap
page read and write
60C0000
trusted library allocation
page read and write
21F73230000
heap
page read and write
60F0000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
21C5BB9F000
unkown
page read and write
7DEB9FF000
stack
page read and write
3B11000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
540A000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
E10000
heap
page read and write
400000
remote allocation
page execute and read and write
E86000
heap
page read and write
670A000
trusted library allocation
page read and write
1166000
trusted library allocation
page execute and read and write
E3E000
stack
page read and write
4C10000
remote allocation
page read and write
FF0000
trusted library allocation
page read and write
EB5000
heap
page read and write
2C12463A000
heap
page read and write
3385000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
21C5B9F0000
remote allocation
page read and write
E9A000
heap
page read and write
66DC000
trusted library allocation
page read and write
F33000
trusted library allocation
page execute and read and write
2BCC000
trusted library allocation
page read and write
6110000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
2C12469B000
heap
page read and write
6790000
trusted library allocation
page read and write
58A0000
heap
page read and write
21C5B44C000
unkown
page read and write
3749000
trusted library allocation
page read and write
21C5BB95000
unkown
page read and write
FD4000
heap
page read and write
6020000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
21C5B449000
unkown
page read and write
66DC000
trusted library allocation
page read and write
FD4000
heap
page read and write
E5405FF000
stack
page read and write
FD4000
heap
page read and write
16FC000
heap
page read and write
5CEC000
trusted library allocation
page read and write
1177000
heap
page read and write
5CE0000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
3876000
trusted library allocation
page read and write
21F73413000
unkown
page read and write
66DC000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
1782000
heap
page read and write
5D00000
trusted library allocation
page read and write
FD4000
heap
page read and write
D9E000
stack
page read and write
A00000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
5304000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
E52000
heap
page read and write
DD4000
heap
page read and write
670A000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
FD5000
heap
page read and write
6080000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
53B0000
trusted library allocation
page read and write
2C1244F0000
heap
page read and write
60F0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
5AAA000
trusted library allocation
page read and write
21C5BB15000
unkown
page read and write
2B793300000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
670A000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
21C5B508000
unkown
page read and write
4416000
trusted library allocation
page read and write
5410000
trusted library allocation
page execute and read and write
FD5000
heap
page read and write
EE2000
heap
page read and write
5F90000
trusted library allocation
page read and write
5FEE000
stack
page read and write
FD4000
heap
page read and write
5914000
trusted library allocation
page read and write
61D1000
heap
page read and write
21C5BB79000
unkown
page read and write
FD4000
heap
page read and write
66DC000
trusted library allocation
page read and write
21C5B4E7000
unkown
page read and write
2C124608000
heap
page read and write
6068000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
654C000
stack
page read and write
4D10000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
60FC000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
21C5BBD8000
unkown
page read and write
9E4000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
AE8000
heap
page read and write
670A000
trusted library allocation
page read and write
21C5BB9F000
unkown
page read and write
66DC000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
52FB000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
66DD000
trusted library allocation
page read and write
670A000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
EE4000
heap
page read and write
670A000
trusted library allocation
page read and write
21C5B429000
unkown
page read and write
5CE0000
trusted library allocation
page read and write
EE4000
heap
page read and write
FD4000
heap
page read and write
6790000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
FD4000
heap
page read and write
21C5BB00000
unkown
page read and write
26E1000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
67DC000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
432000
unkown
page readonly
6010000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
52CE000
stack
page read and write
FD4000
heap
page read and write
66DC000
trusted library allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
2B95000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
There are 1974 hidden memdumps, click here to show them.