IOC Report
TGQfHfehsY

loading gif

Files

File Path
Type
Category
Malicious
TGQfHfehsY.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\pjavpo.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\6kvziwv34i
data
dropped
C:\Users\user\AppData\Local\Temp\bhv8D09.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x08024e91, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\brtwja
data
dropped
C:\Users\user\AppData\Local\Temp\holderwb.txt
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\pid.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\pidloc.txt
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TGQfHfehsY.exe
"C:\Users\user\Desktop\TGQfHfehsY.exe"
malicious
C:\Users\user\AppData\Local\Temp\pjavpo.exe
C:\Users\user\AppData\Local\Temp\pjavpo.exe C:\Users\user\AppData\Local\Temp\brtwja
malicious
C:\Users\user\AppData\Local\Temp\pjavpo.exe
C:\Users\user\AppData\Local\Temp\pjavpo.exe C:\Users\user\AppData\Local\Temp\brtwja
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
malicious

URLs

Name
IP
Malicious
https://www.google.com/chrome/static/css/main.v2.min.css
unknown
https://www.msn.com//searchp/LinkId=255141
unknown
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwj8k7G9rJDsAhWNTxUIHZZGDCQQ
unknown
https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B83C84637
unknown
http://www.msn.com
unknown
http://www.fontbureau.com/designers
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://contextual.media.net/__media__/js/util/nrrV9140.js
unknown
https://mem.gfx.ms/me/MeControl/10.19168.0/en-US/meCore.min.js
unknown
https://www.google.com/chrome/static/images/download-browser/big_pixel_phone.png
unknown
http://images.outbrainimg.com/transform/v3/eyJpdSI6Ijk4OGQ1ZDgwMWE2ODQ2NDNkM2ZkMmYyMGEwOTgwMWQ3MDE2Z
unknown
https://s.yimg.com/lo/api/res/1.2/BXjlWewXmZ47HeV5NPvUYA--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
unknown
https://www.google.com/intl/en_uk/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrows
unknown
http://whatismyipaddress.com/-
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.site.com/logs.php
unknown
http://whatismyipaddress.com/
104.16.155.36
http://www.zhongyicts.com.cn
unknown
http://www.carterandcone.commg
unknown
https://logincdn.msauth.net/16.000/Converged_v21033_-0mnSwu67knBd7qR7YN9GQ2.css
unknown
https://www.google.com/complete/search?q&cp=0&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authuser=0&ps
unknown
https://logincdn.msauth.net/16.000.28666.10/content/images/microsoft_logo_ee5c8d9fb6248c938fd0dc1937
unknown
https://logincdn.msauth.net/16.000.28666.10/content/images/ellipsis_white_5ac590ee72bfe06a7cecfd75b5
unknown
https://www.google.com/complete/search?q&cp=0&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authuser=0&pq
unknown
https://www.google.com/search?source=hp&ei=djJ0X6TKCL6IjLsPqriogAY&q=chrome&oq=chrome&gs_lcp=CgZwc3k
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC5bdddb231cf54f958a5b6e76e9d8eee
unknown
https://logincdn.msauth.net/16.000.28666.10/content/images/ellipsis_grey_2b5d393db04a5e6e1f739cb266e
unknown
https://cvision.media.net/new/300x300/2/41/100/83/b5cbfa68-1c93-41c9-8797-4f9b532bc0b6.jpg?v=9
unknown
https://www.google.com/chrome/static/images/download-browser/pixel_phone.png
unknown
https://www.google.com/chrome/static/images/homepage/hero-anim-top-right.png
unknown
https://pki.goog/repository/0
unknown
https://www.msn.com/
unknown
https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=1
unknown
https://www.google.com/xjs/_/js/k=xjs.s.en_GB.u8fwEfmm86E.O/ck=xjs.s.hyRG9kR79v8.L.I11.O/m=IvlUe
unknown
https://www.google.com/favicon.ico
unknown
http://www.carterandcone.coml
unknown
http://www.msn.com/
unknown
http://www.founder.com.cn/cn/rL
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://www.google.com/chrome/static/images/fallback/google-logo-one-color.jpg
unknown
https://172.217.23.78/
unknown
https://www.google.com/images/nav_logo299.png
unknown
https://www.google.com/chrome/static/images/fallback/icon-help.jpg
unknown
https://www.google.com/complete/search?q=c&cp=1&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authuser=0&
unknown
https://www.google.com/accounts/servicelogin
unknown
https://consent.google.com/set?pc=s&uxe=4421591
unknown
http://images.outbrainimg.com/transform/v3/eyJpdSI6ImYxODk5OTBhOWZjYjFmZjNjNmMxNDhmYjkzM2M3NzY1Mzk3Z
unknown
https://www.google.com/images/hpp/Chrome_Owned_96x96.png
unknown
http://crl.pki.goog/gsr2/gsr2.crl0?
unknown
http://pki.goog/gsr2/GTSGIAG3.crt0)
unknown
https://googleads.g.doubleclick.net/adsid/google/ui?gadsid=AORoGNQP1yCl9r5iywZTFTjpazv-DURVxDidzMfrF
unknown
https://googleads.g.doubleclick.net/adsid/google/ui?gadsid=AORoGNSrZsXAj6n_sYvivJecwrpYgMhb9ihVGAlz2
unknown
https://www.google.com/chrome/static/images/fallback/icon-fb.jpg
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.9Ky5Gf3gP0o.O/m=gapi_iframes
unknown
https://adservice.google.com/adsid/google/si?gadsid=AORoGNSvKHbjRugN8Bruw1IrFif72u8bwsJvZ4BRSrMAhil_
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://ogs.google.com/widget/callout?prid=19020392&pgid=19020380&puid=93eb0881ae9ec1db&origin=https
unknown
https://www.google.com/complete/search?q=chrome&cp=6&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authus
unknown
https://www.google.com/images/phd/px.gif
unknown
https://www.google.com/chrome/static/images/homepage/google-canary.png
unknown
https://adservice.google.co.uk/adsid/google/ui?gadsid=AORoGNQXg7AHkvg6J6S0TqGFa_0HynGV3_XxYfs4fLINJG
unknown
https://play.google.com/intl/en_us/badges/images/generic/de_badge_web_generic.png
unknown
https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
unknown
https://www.google.com/chrome/static/js/main.v2.min.js
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCfd484f9188564713bbc5d13d862ebbf
unknown
https://cvision.media.net/new/100x75/2/89/162/29/8ee7a9a3-dec9-4d15-94e1-5c73b17d2de1.jpg?v=9
unknown
http://www.typography.netD
unknown
https://whatismyipaddress.comx&Qqt
unknown
http://fontfabrik.com
unknown
https://googleads.g.doubleclick.net/adsid/google/si?gadsid=AORoGNTXuGHPo1zFjYPXt7mTG-4GALGGk8bjqjvBm
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
unknown
https://www.google.com/intl/en_uk/chrome/
unknown
https://www.google.com/chrome/static/images/fallback/icon-youtube.jpg
unknown
https://googleads.g.doubleclick.net/adsid/google/si?gadsid=AORoGNQXwBwQrE_SUsnWzwpadcOOdc8yOg6JxthQN
unknown
https://www.google.com/intl/en_uk/chrome/application/x-msdownloadC:
unknown
http://www.sakkal.comuv
unknown
http://images.outbrainimg.com/transform/v3/eyJpdSI6IjJkYTFhZDAwNDEyNzQ2M2E3MGUyMWVkZmIxNmUyZjQ2MjBkM
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.de
unknown
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=4510094
unknown
https://www.google.com/chrome/static/js/installer.min.js
unknown
https://www.google.com/search
unknown
https://www.google.com/chrome/static/images/download-browser/pixel_tablet.png
unknown
http://whatismyipaddress.com
unknown
https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en_5QoHC_ilFOmb96M0pIeJ
unknown
https://www.google.com/images/icons/material/system/1x/email_grey600_24dp.png
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
unknown
https://www.google.com/chrome/static/images/homepage/google-beta.png
unknown
http://www.msn.com/de-ch/?ocid=iehp
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.fontbureau.com91S
unknown
http://www.founder.com.cn/cn
unknown
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
unknown
https://logincdn.msauth.net/16.000/content/js/OldConvergedLogin_PCore_xqcDwEKeDux9oCNjuqEZ-A2.js
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC54c8a2b02c3446f48a60b41e8a5ff47
unknown
http://cookies.onetrust.mgr.consensu.org/onetrust-logo.svg
unknown
https://www.msn.com/http://www.google.com/ms-appx-web://microsoft.microsoftedge/ms-appx-web://micros
unknown
http://support.google.com/accounts/answer/151657
unknown
https://logincdn.msauth.net/16.000.28230.00/images/microsoft_logo.svg?x=ee5c8d9fb6248c938fd0dc19370e
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ftp.manchutimefashion.com
66.70.204.222
malicious
whatismyipaddress.com
104.16.155.36
63.155.11.0.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
66.70.204.222
ftp.manchutimefashion.com
Canada
malicious
104.16.154.36
unknown
United States
104.16.155.36
whatismyipaddress.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Hidden
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4A22000
trusted library allocation
page execute and read and write
malicious
20E0000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3801000
trusted library allocation
page read and write
malicious
414000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2801000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4990000
trusted library section
page read and write
malicious
4908000
trusted library allocation
page read and write
malicious
414000
remote allocation
page execute and read and write
malicious
4F9E000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
233DE88A000
unkown
page read and write
92009FE000
stack
page read and write
9EB000
heap
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
27E6000
trusted library allocation
page read and write
1FDABD60000
heap
page read and write
27CD5B40000
unkown
page read and write
5F8000
heap
page read and write
4F9E000
trusted library allocation
page read and write
6203BFD000
stack
page read and write
76C0000
trusted library allocation
page read and write
1A2DF000
trusted library allocation
page read and write
1C5F9A02000
unkown
page read and write
2172000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
604000
heap
page read and write
1FDABCB5000
heap
page read and write
1E246E02000
unkown
page read and write
220C000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
452000
remote allocation
page execute and read and write
4F8E000
trusted library allocation
page read and write
2090E43B000
unkown
page read and write
686000
heap
page read and write
4F7B000
trusted library allocation
page read and write
2090E432000
unkown
page read and write
4DCC000
stack
page read and write
4E55000
heap
page read and write
4FBD000
trusted library allocation
page read and write
1E24BE00000
trusted library allocation
page read and write
1E24BD05000
unkown
page read and write
9E0000
heap
page read and write
4F8B000
trusted library allocation
page read and write
27CD6583000
unkown
page read and write
2215000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
27E2000
trusted library allocation
page read and write
1E24BBE0000
trusted library allocation
page read and write
544000
heap
page read and write
233E0270000
trusted library allocation
page read and write
62039FE000
stack
page read and write
1A2DB000
trusted library allocation
page read and write
7E90000
heap
page read and write
1A146000
trusted library allocation
page read and write
27CD59D0000
heap
page read and write
4F83000
trusted library allocation
page read and write
B71C7F9000
stack
page read and write
4FBF000
trusted library allocation
page read and write
545000
heap
page read and write
4F9E000
trusted library allocation
page read and write
66FE000
trusted library allocation
page read and write
1E246600000
unkown
page read and write
605000
heap
page read and write
4F9E000
trusted library allocation
page read and write
401000
unkown
page execute read
B71C3FA000
stack
page read and write
4FBF000
trusted library allocation
page read and write
400000
unkown
page readonly
2215000
trusted library allocation
page read and write
6DDE000
stack
page read and write
544000
heap
page read and write
2215000
trusted library allocation
page read and write
2090E400000
unkown
page read and write
27CD6A62000
unkown
page read and write
27CD65A1000
unkown
page read and write
4FBF000
trusted library allocation
page read and write
1C5F9960000
heap
page read and write
1C0000
remote allocation
page read and write
1FA22DB0000
remote allocation
page read and write
2090E457000
unkown
page read and write
220D000
trusted library allocation
page read and write
4FC8000
trusted library allocation
page read and write
1A146000
trusted library allocation
page read and write
27E8000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
221A000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
CE445FB000
stack
page read and write
4FAE000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
7170000
remote allocation
page read and write
4DE0000
trusted library allocation
page read and write
9D000
stack
page read and write
4F83000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
30000
heap
page read and write
27E5000
trusted library allocation
page read and write
4FC1000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
27CD5C29000
unkown
page read and write
4FBD000
trusted library allocation
page read and write
21B0000
heap
page read and write
400000
remote allocation
page execute and read and write
26E0000
heap
page read and write
1E246678000
unkown
page read and write
1C0000
remote allocation
page read and write
1E247A33000
trusted library allocation
page read and write
1A2DF000
trusted library allocation
page read and write
76C0000
unkown
page read and write
4FBE000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
1CDE1713000
unkown
page read and write
2460C28C000
unkown
page read and write
1FA22CE0000
heap
page read and write
4F9E000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
4C0F000
stack
page read and write
4FBD000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
233DE859000
unkown
page read and write
4F8B000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
1CDE1650000
unkown
page read and write
629000
heap
page read and write
2214000
trusted library allocation
page read and write
6CBD000
stack
page read and write
CE447FF000
stack
page read and write
22F0000
trusted library allocation
page read and write
4FC6000
trusted library allocation
page read and write
7E87000
heap
page read and write
7CE000
stack
page read and write
27E8000
trusted library allocation
page read and write
1FDABD4F000
heap
page read and write
27CD658A000
unkown
page read and write
1A030000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
545000
heap
page read and write
27E6000
trusted library allocation
page read and write
1A2DB000
trusted library allocation
page read and write
26909C00000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
41D000
unkown
page write copy
B37000
heap
page read and write
4F82000
trusted library allocation
page read and write
9D000
stack
page read and write
6713000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
16A57702000
unkown
page read and write
27E1000
trusted library allocation
page read and write
1E246DF0000
trusted library section
page readonly
7EB0000
heap
page read and write
1E24BF40000
remote allocation
page read and write
1FA22F02000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
27CD5C53000
unkown
page read and write
4F7C000
trusted library allocation
page read and write
28D3000
trusted library allocation
page read and write
27CD65A0000
unkown
page read and write
6F2E000
stack
page read and write
1C0000
remote allocation
page read and write
4F95000
trusted library allocation
page read and write
4FC8000
trusted library allocation
page read and write
279F000
stack
page read and write
4F90000
trusted library allocation
page read and write
233DE869000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
2156000
trusted library allocation
page execute and read and write
4F9E000
trusted library allocation
page read and write
27E1000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
233E02B0000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
27CD6A02000
unkown
page read and write
2460C200000
unkown
page read and write
1E24BCED000
unkown
page read and write
27CD65A1000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
B1E00F8000
stack
page read and write
B3D000
heap
page read and write
B71C87E000
stack
page read and write
4F82000
trusted library allocation
page read and write
1A2DB000
trusted library allocation
page read and write
1A2DF000
trusted library allocation
page read and write
7EA0000
heap
page read and write
233DE82A000
unkown
page read and write
1E2466A2000
unkown
page read and write
1A2DF000
trusted library allocation
page read and write
B1A000
trusted library allocation
page execute and read and write
1E24BC40000
unkown
page read and write
1CDE164B000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
4F95000
trusted library allocation
page read and write
2090E310000
heap
page read and write
4FBD000
trusted library allocation
page read and write
1FDABD61000
heap
page read and write
B30000
heap
page read and write
4FA5000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
530000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
1CDE163C000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
1E247A30000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
26E1000
heap
page read and write
2460C1A0000
unkown
page read and write
2460C24F000
unkown
page read and write
60F000
heap
page read and write
4F9E000
trusted library allocation
page read and write
27CD5CD6000
unkown
page read and write
7EAA000
heap
page read and write
27CD5CA7000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
5E5000
heap
page read and write
19A000
stack
page read and write
693E000
stack
page read and write
2215000
trusted library allocation
page read and write
1C5F9B02000
unkown
page read and write
4FC9000
trusted library allocation
page read and write
26E1000
heap
page read and write
1A2DB000
trusted library allocation
page read and write
27E6000
trusted library allocation
page read and write
4FBE000
trusted library allocation
page read and write
27E1000
trusted library allocation
page read and write
16A5768A000
unkown
page read and write
2090E413000
unkown
page read and write
2215000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
7D7E000
stack
page read and write
4F87000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
555000
heap
page read and write
4F82000
trusted library allocation
page read and write
6DB6F7D000
stack
page read and write
27CD5C56000
unkown
page read and write
2460C030000
heap
page read and write
4FA5000
trusted library allocation
page read and write
27CD65D3000
unkown
page read and write
221C000
trusted library allocation
page read and write
9200AFB000
stack
page read and write
27CD658F000
unkown
page read and write
4F76000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
CE446F7000
stack
page read and write
58E000
stack
page read and write
4FBF000
trusted library allocation
page read and write
4F83000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
4F9E000
trusted library allocation
page read and write
550000
heap
page read and write
26909C53000
unkown
page read and write
27E7000
trusted library allocation
page read and write
614000
heap
page read and write
1FA22DB0000
remote allocation
page read and write
7D40000
trusted library allocation
page read and write
1A030000
trusted library allocation
page read and write
1E246693000
unkown
page read and write
27CD65A1000
unkown
page read and write
1E24BF40000
remote allocation
page read and write
1E246700000
unkown
page read and write
1A030000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
221C000
trusted library allocation
page read and write
27E7000
trusted library allocation
page read and write
2090E44E000
unkown
page read and write
62038FF000
stack
page read and write
27CD6587000
unkown
page read and write
1A146000
trusted library allocation
page read and write
29B9000
trusted library allocation
page read and write
233DE813000
unkown
page read and write
27CD6587000
unkown
page read and write
4F77000
trusted library allocation
page read and write
544000
heap
page read and write
5F8000
heap
page read and write
1E24BCFD000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
7E82AFD000
stack
page read and write
27CD5C4B000
unkown
page read and write
16A5764A000
unkown
page read and write
16A57670000
unkown
page read and write
1E24BE0E000
trusted library allocation
page read and write
1E247A40000
trusted library allocation
page read and write
27CD6589000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
420000
unkown
page readonly
6748000
trusted library allocation
page read and write
29B2000
trusted library allocation
page read and write
2215000
trusted library allocation
page read and write
233DE780000
unkown
page read and write
4F8B000
trusted library allocation
page read and write
7A5AFE000
stack
page read and write
72FE000
stack
page read and write
221A000
trusted library allocation
page read and write
530000
heap
page read and write
1DE29DD000
stack
page read and write
1E246DB0000
trusted library section
page readonly
221A000
trusted library allocation
page read and write
5AF000
heap
page read and write
4FBF000
trusted library allocation
page read and write
28DE000
trusted library allocation
page read and write
4FC5000
trusted library allocation
page read and write
6DB6AFE000
stack
page read and write
27CD5CA0000
unkown
page read and write
1FDABD4F000
heap
page read and write
26909D13000
unkown
page read and write
1A2DF000
trusted library allocation
page read and write
26909AF0000
heap
page read and write
2350000
heap
page read and write
4FBD000
trusted library allocation
page read and write
401000
unkown
page execute read
4F9E000
trusted library allocation
page read and write
299F000
stack
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
1E24BBF0000
trusted library allocation
page read and write
2150000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
1E246F13000
unkown
page read and write
41D000
unkown
page read and write
1E24BC4D000
unkown
page read and write
4F83000
trusted library allocation
page read and write
199000
stack
page read and write
4FA5000
trusted library allocation
page read and write
544000
heap
page read and write
1E24BC87000
unkown
page read and write
2260000
heap
page read and write
27CD65C3000
unkown
page read and write
1CDE1679000
unkown
page read and write
2090E47E000
unkown
page read and write
26909A80000
heap
page read and write
400000
remote allocation
page execute and read and write
90E000
stack
page read and write
C7497FF000
stack
page read and write
27CD6402000
unkown
page read and write
77FC000
stack
page read and write
6C0000
heap
page read and write
27CD5CC4000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
221C000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
1E2466B1000
unkown
page read and write
60D000
heap
page read and write
400000
unkown
page readonly
544000
heap
page read and write
A53000
heap
page read and write
4F7F000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
4F83000
trusted library allocation
page read and write
66EF000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
2215000
trusted library allocation
page read and write
4F83000
trusted library allocation
page read and write
4FAE000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
1E246658000
unkown
page read and write
1C0000
remote allocation
page read and write
690000
heap
page read and write
400000
remote allocation
page execute and read and write
233DE7D0000
remote allocation
page read and write
2460C313000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
1A030000
trusted library allocation
page read and write
26909D00000
unkown
page read and write
4F7C000
trusted library allocation
page read and write
233DE913000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
27CD65C5000
unkown
page read and write
221A000
trusted library allocation
page read and write
B3D000
heap
page read and write
4F9E000
trusted library allocation
page read and write
7AA0000
trusted library section
page read and write
4FA5000
trusted library allocation
page read and write
C749879000
stack
page read and write
6DB6BFE000
stack
page read and write
26909C5D000
unkown
page read and write
71AE000
stack
page read and write
2090E45F000
unkown
page read and write
544000
heap
page read and write
4F85000
trusted library allocation
page read and write
233DE858000
unkown
page read and write
B1E047E000
stack
page read and write
4FC5000
trusted library allocation
page read and write
220C000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
1E24663E000
unkown
page read and write
B1E0578000
stack
page read and write
1E24BE24000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
2090E466000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
2337000
heap
page read and write
4FBD000
trusted library allocation
page read and write
2090E47A000
unkown
page read and write
27E8000
trusted library allocation
page read and write
27CD6588000
unkown
page read and write
2090E45A000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
27CD6510000
unkown
page read and write
24B7000
heap
page read and write
1C0000
remote allocation
page read and write
401000
unkown
page execute read
4FBD000
trusted library allocation
page read and write
699000
heap
page read and write
4FA5000
trusted library allocation
page read and write
27CD5C82000
unkown
page read and write
233DE7A0000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
1FDABD36000
heap
page read and write
1C5F9A5A000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
27CD654F000
unkown
page read and write
C74997C000
stack
page read and write
4F9E000
trusted library allocation
page read and write
1C5F9A00000
unkown
page read and write
1E246F00000
unkown
page read and write
27E1000
trusted library allocation
page read and write
243F000
stack
page read and write
1E246440000
heap
page read and write
4F9E000
trusted library allocation
page read and write
1E24BE24000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
2460C24C000
unkown
page read and write
1FDABD46000
heap
page read and write
17E000
stack
page read and write
2460C229000
unkown
page read and write
4FC6000
trusted library allocation
page read and write
1E24668E000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
1A030000
trusted library allocation
page read and write
1C5F99F0000
unkown
page read and write
2460C276000
unkown
page read and write
570000
heap
page read and write
2152000
trusted library allocation
page read and write
920097B000
stack
page read and write
76D0000
trusted library allocation
page read and write
1A146000
trusted library allocation
page read and write
16A57DA0000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
1DE295E000
stack
page read and write
1E246673000
unkown
page read and write
28D2000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F8A000
trusted library allocation
page read and write
233DE802000
unkown
page read and write
65E000
stack
page read and write
4FBD000
trusted library allocation
page read and write
545000
heap
page read and write
418000
unkown
page readonly
4F9E000
trusted library allocation
page read and write
4F96000
trusted library allocation
page read and write
233DE849000
unkown
page read and write
4F8B000
trusted library allocation
page read and write
401000
unkown
page execute read
4F9E000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
1E24BCA9000
unkown
page read and write
4F7D000
trusted library allocation
page read and write
85F000
stack
page read and write
221A000
trusted library allocation
page read and write
418000
unkown
page readonly
4F9E000
trusted library allocation
page read and write
4E3C000
stack
page read and write
1DE307F000
stack
page read and write
233DE6E0000
heap
page read and write
605000
heap
page read and write
1E247101000
trusted library allocation
page read and write
27CD65B0000
unkown
page read and write
27CD63A0000
remote allocation
page read and write
26909C3C000
unkown
page read and write
4F8B000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
233DE7D0000
remote allocation
page read and write
2310000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
2090E2B0000
heap
page read and write
27CD659F000
unkown
page read and write
1C0000
remote allocation
page read and write
4F9E000
trusted library allocation
page read and write
2090E502000
unkown
page read and write
4F8D000
trusted library allocation
page read and write
CE441BF000
stack
page read and write
221A000
trusted library allocation
page read and write
27CD6589000
unkown
page read and write
401000
unkown
page execute read
1E2475F0000
trusted library allocation
page read and write
7E82DFF000
stack
page read and write
1FDABD2B000
heap
page read and write
9EC000
heap
page read and write
216A000
trusted library allocation
page execute and read and write
4F8B000
trusted library allocation
page read and write
4FC6000
trusted library allocation
page read and write
221C000
trusted library allocation
page read and write
1CDE1654000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
4F83000
trusted library allocation
page read and write
1CDE168A000
unkown
page read and write
520000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
27E6000
trusted library allocation
page read and write
545000
heap
page read and write
B1E05FF000
unkown
page read and write
7FE50000
trusted library allocation
page execute and read and write
1C0000
remote allocation
page read and write
702F000
stack
page read and write
2090E460000
unkown
page read and write
7E829FE000
stack
page read and write
1E24BBE0000
trusted library allocation
page read and write
1A146000
trusted library allocation
page read and write
233DE902000
unkown
page read and write
1E24BD00000
unkown
page read and write
66A000
heap
page read and write
1C5F9B13000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
1E24BE21000
trusted library allocation
page read and write
1E24BC61000
unkown
page read and write
7E7D000
stack
page read and write
4F9E000
trusted library allocation
page read and write
4C60000
heap
page read and write
27CD6A02000
unkown
page read and write
4FBE000
trusted library allocation
page read and write
7E830FF000
stack
page read and write
27CD658E000
unkown
page read and write
1A030000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
27CD6A43000
unkown
page read and write
1E246629000
unkown
page read and write
4F8D000
trusted library allocation
page read and write
5A0000
heap
page read and write
B71BB9B000
stack
page read and write
4F9E000
trusted library allocation
page read and write
27CD65B0000
unkown
page read and write
4FBD000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
420000
unkown
page readonly
1E24BBF0000
trusted library allocation
page read and write
4FAE000
trusted library allocation
page read and write
1A1C0000
trusted library allocation
page read and write
6203AFC000
stack
page read and write
2090E469000
unkown
page read and write
1E246691000
unkown
page read and write
1E24BC89000
unkown
page read and write
27CD659D000
unkown
page read and write
27CD65A1000
unkown
page read and write
27CD6588000
unkown
page read and write
2214000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
1E24BC2F000
unkown
page read and write
9B000
stack
page read and write
27CD5A40000
heap
page read and write
4FC7000
trusted library allocation
page read and write
21E0000
heap
page read and write
4F87000
trusted library allocation
page read and write
27CD5CBE000
unkown
page read and write
27E8000
trusted library allocation
page read and write
B12000
trusted library allocation
page execute and read and write
1A2DF000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
621000
heap
page read and write
4F86000
trusted library allocation
page read and write
5E4000
heap
page read and write
418000
unkown
page readonly
4F80000
trusted library allocation
page read and write
2219000
trusted library allocation
page read and write
233DE848000
unkown
page read and write
A50000
heap
page read and write
27CD65C0000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
27CD6593000
unkown
page read and write
4F96000
trusted library allocation
page read and write
95F000
stack
page read and write
1C0000
remote allocation
page read and write
4F8B000
trusted library allocation
page read and write
2090E474000
unkown
page read and write
26909BF0000
unkown
page read and write
4F74000
trusted library allocation
page read and write
1A2DB000
trusted library allocation
page read and write
1CDE1647000
unkown
page read and write
16A5764B000
unkown
page read and write
1A146000
trusted library allocation
page read and write
27CD6593000
unkown
page read and write
1FDABC10000
heap
page read and write
7C00000
trusted library allocation
page read and write
4F84000
trusted library allocation
page read and write
4FBF000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
1E24BA40000
trusted library allocation
page read and write
2190000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
2311000
trusted library allocation
page read and write
7BF0000
trusted library section
page read and write
28D3000
trusted library allocation
page read and write
4FA3000
trusted library allocation
page read and write
27CD6591000
unkown
page read and write
7E82BFE000
stack
page read and write
2221000
trusted library allocation
page read and write
544000
heap
page read and write
29C9000
trusted library allocation
page read and write
27CD5D08000
unkown
page read and write
4F8C000
trusted library allocation
page read and write
217B000
trusted library allocation
page execute and read and write
16A5764E000
unkown
page read and write
4FBD000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page read and write
27E7000
trusted library allocation
page read and write
2177000
trusted library allocation
page execute and read and write
4FBD000
trusted library allocation
page read and write
1E24BC14000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
2220000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
7E82CFF000
stack
page read and write
4B0E000
stack
page read and write
27CD659F000
unkown
page read and write
1A2DF000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
4AA2000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
27CD5CF3000
unkown
page read and write
544000
heap
page read and write
1E24BBF0000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
1E24BF10000
trusted library allocation
page read and write
27CD6B02000
unkown
page read and write
72AF000
stack
page read and write
1E24BF40000
remote allocation
page read and write
4F9E000
trusted library allocation
page read and write
1E24BCE2000
unkown
page read and write
4FBD000
trusted library allocation
page read and write
16A57500000
heap
page read and write
4F96000
trusted library allocation
page read and write
1C5FA402000
unkown
page read and write
221C000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
1C5F9A23000
unkown
page read and write
434000
unkown
page read and write
B1E0377000
stack
page read and write
30000
heap
page read and write
4F9F000
trusted library allocation
page read and write
2215000
trusted library allocation
page read and write
16A5764F000
unkown
page read and write
1C0000
remote allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
26909C5D000
unkown
page read and write
4FC2000
trusted library allocation
page read and write
27CD65C0000
unkown
page read and write
6CF0000
trusted library allocation
page read and write
2162000
trusted library allocation
page execute and read and write
4F7F000
trusted library allocation
page read and write
2215000
trusted library allocation
page read and write
2214000
trusted library allocation
page read and write
16A5763C000
unkown
page read and write
2090E440000
unkown
page read and write
27CD6587000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
1E24BC00000
unkown
page read and write
1FA23802000
unkown
page read and write
2090E483000
unkown
page read and write
5F8000
heap
page read and write
2090EC02000
unkown
page read and write
2215000
trusted library allocation
page read and write
1CDE167F000
unkown
page read and write
2090E43D000
unkown
page read and write
4F9F000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
6AF000
heap
page read and write
CE444FB000
stack
page read and write
61D000
heap
page read and write
B3D000
heap
page read and write
1CDE1600000
unkown
page read and write
2460C300000
unkown
page read and write
1FA22DB0000
remote allocation
page read and write
838D5EB000
stack
page read and write
27E6000
trusted library allocation
page read and write
544000
heap
page read and write
221C000
trusted library allocation
page read and write
76FD000
stack
page read and write
4FA5000
trusted library allocation
page read and write
6717000
trusted library allocation
page read and write
2460C26F000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
7170000
remote allocation
page read and write
4F9E000
trusted library allocation
page read and write
1FDABD20000
heap
page read and write
2460C22C000
unkown
page read and write
7170000
remote allocation
page read and write
222A000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
2460C308000
unkown
page read and write
220D000
trusted library allocation
page read and write
1C5F9A62000
unkown
page read and write
2231000
trusted library allocation
page read and write
B71C4FB000
stack
page read and write
26909C81000
unkown
page read and write
4F8B000
trusted library allocation
page read and write
78C000
stack
page read and write
4F9E000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
27CD5D02000
unkown
page read and write
B71C6FF000
stack
page read and write
26909C49000
unkown
page read and write
676F000
trusted library allocation
page read and write
27E8000
trusted library allocation
page read and write
26909A90000
heap
page read and write
AD0000
heap
page read and write
544000
heap
page read and write
1E246713000
unkown
page read and write
55E000
stack
page read and write
4FA5000
trusted library allocation
page read and write
1C5F99C0000
heap
page read and write
221D000
trusted library allocation
page read and write
59E000
stack
page read and write
1E246F59000
unkown
page read and write
544000
heap
page read and write
4FA5000
trusted library allocation
page read and write
1DE2F77000
stack
page read and write
220D000
trusted library allocation
page read and write
4F7C000
trusted library allocation
page read and write
400000
unkown
page readonly
1E246702000
unkown
page read and write
4F95000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
27CD6587000
unkown
page read and write
1FDABD31000
heap
page read and write
1E24BD02000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
409000
unkown
page read and write
B3D000
heap
page read and write
4F9E000
trusted library allocation
page read and write
C74967A000
stack
page read and write
7A518B000
stack
page read and write
2090E467000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
27CD65C5000
unkown
page read and write
4F74000
trusted library allocation
page read and write
1A030000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
1E246613000
unkown
page read and write
4FB5000
trusted library allocation
page read and write
68FF000
stack
page read and write
27CD6A02000
unkown
page read and write
660000
heap
page read and write
B03000
trusted library allocation
page read and write
4FBE000
trusted library allocation
page read and write
7A55FC000
stack
page read and write
437000
unkown
page readonly
27CD65A1000
unkown
page read and write
16A57651000
unkown
page read and write
1A146000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
1FDABD66000
heap
page read and write
B71C9FA000
stack
page read and write
60E000
stack
page read and write
41D000
unkown
page write copy
1C0000
remote allocation
page read and write
500000
trusted library allocation
page read and write
2460C040000
heap
page read and write
2214000
trusted library allocation
page read and write
6DB65BB000
stack
page read and write
4F9E000
trusted library allocation
page read and write
1FDABC30000
heap
page read and write
4F85000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1C0000
remote allocation
page read and write
4F86000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
16A57708000
unkown
page read and write
4FC1000
trusted library allocation
page read and write
9B000
stack
page read and write
2210000
trusted library allocation
page read and write
2215000
trusted library allocation
page read and write
2460C258000
unkown
page read and write
AF0000
trusted library section
page read and write
4F9E000
trusted library allocation
page read and write
9200DFF000
stack
page read and write
27CD659E000
unkown
page read and write
2330000
heap
page read and write
2460C257000
unkown
page read and write
92005BE000
stack
page read and write
28E3000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
1A030000
trusted library allocation
page read and write
7A58FD000
stack
page read and write
1E24BEF0000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
221A000
trusted library allocation
page read and write
2215000
trusted library allocation
page read and write
16A57713000
unkown
page read and write
716E000
stack
page read and write
220D000
trusted library allocation
page read and write
4F8A000
trusted library allocation
page read and write
233DE7D0000
remote allocation
page read and write
4F8D000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
1CDE1702000
unkown
page read and write
27CD65A6000
unkown
page read and write
26909C24000
unkown
page read and write
73FF000
stack
page read and write
4F9E000
trusted library allocation
page read and write
4E50000
heap
page read and write
4F8B000
trusted library allocation
page read and write
2090E459000
unkown
page read and write
4F8B000
trusted library allocation
page read and write
2460C259000
unkown
page read and write
4F8A000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
B71CBFF000
stack
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
2460C0A0000
heap
page read and write
2460C247000
unkown
page read and write
16A574A0000
heap
page read and write
4F9E000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
7C10000
trusted library allocation
page read and write
401000
unkown
page execute read
1E24BCFB000
unkown
page read and write
2090E445000
unkown
page read and write
530000
trusted library allocation
page read and write
7A54FE000
stack
page read and write
6CE0000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
9EE000
heap
page read and write
4F7B000
trusted library allocation
page read and write
27CD5C70000
unkown
page read and write
1E24BCDC000
unkown
page read and write
400000
remote allocation
page execute and read and write
1E246DD0000
trusted library section
page readonly
60E0000
trusted library allocation
page read and write
2215000
trusted library allocation
page read and write
598000
heap
page read and write
2240000
heap
page execute and read and write
2460C213000
unkown
page read and write
4F9F000
trusted library allocation
page read and write
27CD6569000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
57E000
stack
page read and write
220C000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
407000
unkown
page readonly
6D20000
trusted library allocation
page read and write
400000
unkown
page readonly
27E9000
trusted library allocation
page read and write
221A000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
1FA22D80000
unkown
page read and write
CE440BB000
stack
page read and write
4F7D000
trusted library allocation
page read and write
706E000
stack
page read and write
838DAFE000
stack
page read and write
7C00000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
A0F000
stack
page read and write
1E246697000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
221A000
trusted library allocation
page read and write
9EC000
heap
page read and write
4FBF000
trusted library allocation
page read and write
1E24BEB0000
trusted library allocation
page read and write
4F88000
trusted library allocation
page read and write
1A2DF000
trusted library allocation
page read and write
221D000
trusted library allocation
page read and write
27E1000
trusted library allocation
page read and write
1DE2CFB000
stack
page read and write
1FDABD42000
heap
page read and write
4F9E000
trusted library allocation
page read and write
838DCFE000
stack
page read and write
24B0000
heap
page read and write
1E24BC22000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
2460C281000
unkown
page read and write
27E7000
trusted library allocation
page read and write
7E826FB000
stack
page read and write
671B000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4F88000
trusted library allocation
page read and write
8D0000
trusted library allocation
page execute and read and write
B1E0277000
stack
page read and write
4F80000
trusted library allocation
page read and write
198000
stack
page read and write
4F9E000
trusted library allocation
page read and write
6202000
trusted library allocation
page read and write
540000
heap
page read and write
219E000
stack
page read and write
2170000
trusted library allocation
page read and write
1E24BCF9000
unkown
page read and write
602000
heap
page read and write
418000
unkown
page readonly
27CD6565000
unkown
page read and write
30000
heap
page read and write
578000
heap
page read and write
9EE000
heap
page read and write
4F86000
trusted library allocation
page read and write
6DB6D7E000
stack
page read and write
4FBD000
trusted library allocation
page read and write
1CDE1490000
heap
page read and write
27CD6500000
unkown
page read and write
4F80000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4FAC000
trusted library allocation
page read and write
233DE6F0000
heap
page read and write
30000
heap
page read and write
233DE859000
unkown
page read and write
4FBF000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
2090EBB0000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
27CD5C00000
unkown
page read and write
B00000
trusted library allocation
page read and write
C7496FF000
stack
page read and write
4FBD000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
2090E458000
unkown
page read and write
4F74000
trusted library allocation
page read and write
437000
unkown
page readonly
B71BFF7000
stack
page read and write
9EC000
heap
page read and write
4FC6000
trusted library allocation
page read and write
1CDE1DA0000
unkown
page read and write
27CD65D1000
unkown
page read and write
1C0000
remote allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
6726000
trusted library allocation
page read and write
6DB6A7F000
stack
page read and write
7CE000
stack
page read and write
930000
heap
page read and write
221A000
trusted library allocation
page read and write
2215000
trusted library allocation
page read and write
224B000
heap
page execute and read and write
27CD6597000
unkown
page read and write
4E40000
trusted library allocation
page execute and read and write
4F8D000
trusted library allocation
page read and write
27CD5CDE000
unkown
page read and write
4C10000
trusted library allocation
page read and write
1A1C0000
trusted library allocation
page read and write
41D000
unkown
page write copy
4FBD000
trusted library allocation
page read and write
2090E461000
unkown
page read and write
1E24BAD0000
trusted library allocation
page read and write
27CD63B0000
unkown
page read and write
4F7F000
trusted library allocation
page read and write
400000
unkown
page readonly
27CD6593000
unkown
page read and write
4F8B000
trusted library allocation
page read and write
27E3000
trusted library allocation
page read and write
1CDE1E02000
unkown
page read and write
1E2463E0000
heap
page read and write
26909C70000
unkown
page read and write
6A7D000
stack
page read and write
8CF000
stack
page read and write
2090E2A0000
heap
page read and write
27E1000
trusted library allocation
page read and write
2090E463000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
221D000
trusted library allocation
page read and write
27CD5CEA000
unkown
page read and write
2090E429000
unkown
page read and write
27CD5C4E000
unkown
page read and write
B71C1FB000
stack
page read and write
28D3000
trusted library allocation
page read and write
27CD659D000
unkown
page read and write
4FBD000
trusted library allocation
page read and write
2090E479000
unkown
page read and write
6A3F000
stack
page read and write
4F9E000
trusted library allocation
page read and write
1C5F9A29000
unkown
page read and write
B3D000
heap
page read and write
B71C8FE000
stack
page read and write
4FA5000
trusted library allocation
page read and write
420000
unkown
page readonly
26909C76000
unkown
page read and write
233E0402000
unkown
page read and write
233DE840000
unkown
page read and write
1E246E00000
unkown
page read and write
27CD6B00000
unkown
page read and write
61E0000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
1E24BE08000
trusted library allocation
page read and write
682000
heap
page read and write
4F9E000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
27E9000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
27CD5D16000
unkown
page read and write
4C64000
heap
page read and write
27CD659F000
unkown
page read and write
2215000
trusted library allocation
page read and write
1FA22D50000
heap
page read and write
4FA5000
trusted library allocation
page read and write
289F000
stack
page read and write
B1DFBFC000
stack
page read and write
2090E447000
unkown
page read and write
233DE750000
heap
page read and write
920087E000
stack
page read and write
4F85000
trusted library allocation
page read and write
6CA000
heap
page read and write
27E3000
trusted library allocation
page read and write
27CD6A02000
unkown
page read and write
B71C0FD000
stack
page read and write
7E82EFF000
stack
page read and write
2215000
trusted library allocation
page read and write
1FDABD47000
heap
page read and write
1E24BF00000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
27CD659D000
unkown
page read and write
7E828FD000
stack
page read and write
16A5767F000
unkown
page read and write
4F78000
trusted library allocation
page read and write
544000
heap
page read and write
B1DFE7E000
stack
page read and write
545000
heap
page read and write
1C5F9A70000
unkown
page read and write
27CD6A62000
unkown
page read and write
6DB697E000
stack
page read and write
1E24BCF3000
unkown
page read and write
1E24BF20000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
1E246F02000
unkown
page read and write
1E246DC0000
trusted library section
page readonly
1FDABD66000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2460C246000
unkown
page read and write
1C5F9A78000
unkown
page read and write
2460C24B000
unkown
page read and write
6BBE000
stack
page read and write
7A56FB000
stack
page read and write
6D10000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
420000
unkown
page readonly
8BF000
stack
page read and write
16A5764C000
unkown
page read and write
1C0000
remote allocation
page read and write
26909C13000
unkown
page read and write
1A2DB000
trusted library allocation
page read and write
1C5F9950000
heap
page read and write
4FA5000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
1FA22E56000
unkown
page read and write
4FA0000
trusted library allocation
page read and write
27CD63A0000
remote allocation
page read and write
620347B000
stack
page read and write
4F83000
trusted library allocation
page read and write
1E246540000
unkown
page read and write
2090E477000
unkown
page read and write
6203DFC000
stack
page read and write
29C1000
trusted library allocation
page read and write
52E000
stack
page read and write
CE448FF000
stack
page read and write
4FA0000
trusted library allocation
page read and write
1E24BE00000
trusted library allocation
page read and write
401000
unkown
page execute read
67D000
stack
page read and write
409000
unkown
page write copy
220D000
stack
page read and write
CE4413F000
stack
page read and write
19C000
stack
page read and write
4F9E000
trusted library allocation
page read and write
48FE000
stack
page read and write
27CD6A00000
unkown
page read and write
16A57490000
heap
page read and write
1A146000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
61E000
heap
page read and write
4F9E000
trusted library allocation
page read and write
1E2463D0000
heap
page read and write
4FA5000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
544000
heap
page read and write
4F96000
trusted library allocation
page read and write
1E2466A4000
unkown
page read and write
1A2DB000
trusted library allocation
page read and write
27CD5C6E000
unkown
page read and write
1FDABCB0000
heap
page read and write
1A1C0000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
27CD5C27000
unkown
page read and write
7C18000
trusted library allocation
page read and write
221C000
trusted library allocation
page read and write
4FC6000
trusted library allocation
page read and write
B71C2FF000
stack
page read and write
16A57E02000
unkown
page read and write
1A146000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
6722000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
16A57629000
unkown
page read and write
2690A402000
unkown
page read and write
1E24BA50000
trusted library allocation
page read and write
2090E45C000
unkown
page read and write
28E3000
trusted library allocation
page read and write
41D000
unkown
page write copy
2090E464000
unkown
page read and write
4F87000
trusted library allocation
page read and write
16A57602000
unkown
page read and write
27CD5C13000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
1CDE1684000
unkown
page read and write
4F7F000
trusted library allocation
page read and write
233DE800000
unkown
page read and write
4FC5000
trusted library allocation
page read and write
1CDE14A0000
heap
page read and write
16A57600000
unkown
page read and write
4FBD000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
698000
heap
page read and write
4F9E000
trusted library allocation
page read and write
4F5E000
stack
page read and write
27CD6585000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
1CDE1500000
heap
page read and write
4FA5000
trusted library allocation
page read and write
1FDABD44000
heap
page read and write
7A57F7000
stack
page read and write
27E8000
trusted library allocation
page read and write
1E24667C000
unkown
page read and write
1FA22E29000
unkown
page read and write
221C000
trusted library allocation
page read and write
220C000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
2215000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
2290000
heap
page read and write
27E8000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
4FA5000
trusted library allocation
page read and write
1A1C0000
trusted library allocation
page read and write
21BE000
stack
page read and write
2214000
trusted library allocation
page read and write
407000
unkown
page readonly
1C0000
remote allocation
page read and write
4F9E000
trusted library allocation
page read and write
1A1C0000
trusted library allocation
page read and write
5AC000
heap
page read and write
4F96000
trusted library allocation
page read and write
1FDABD4F000
heap
page read and write
27CD5C3C000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
4F8C000
trusted library allocation
page read and write
27CD6587000
unkown
page read and write
7E822FB000
stack
page read and write
27CD659F000
unkown
page read and write
7A547E000
stack
page read and write
1E24BC54000
unkown
page read and write
1C5F9A40000
unkown
page read and write
7410000
trusted library allocation
page execute and read and write
4FBD000
trusted library allocation
page read and write
221A000
trusted library allocation
page read and write
1A2DB000
trusted library allocation
page read and write
1CDE164F000
unkown
page read and write
2090E442000
unkown
page read and write
4F8A000
trusted library allocation
page read and write
1FA22CF0000
heap
page read and write
42C000
unkown
page read and write
B71C57F000
stack
page read and write
2090E462000
unkown
page read and write
401000
unkown
page execute read
420000
unkown
page readonly
1E246DA0000
trusted library section
page readonly
1A1C0000
trusted library allocation
page read and write
2460C24D000
unkown
page read and write
4F82000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
3919000
trusted library allocation
page read and write
9ED000
heap
page read and write
4F7E000
trusted library allocation
page read and write
220D000
trusted library allocation
page read and write
41D000
unkown
page write copy
196000
stack
page read and write
4FA5000
trusted library allocation
page read and write
4F96000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
590000
heap
page read and write
2300000
trusted library allocation
page execute and read and write
4F9E000
trusted library allocation
page read and write
27CD5CAF000
unkown
page read and write
400000
remote allocation
page execute and read and write
B1E017E000
stack
page read and write
1E24BD02000
unkown
page read and write
1E24BE20000
trusted library allocation
page read and write
9D000
stack
page read and write
27CD659F000
unkown
page read and write
B71C5FE000
stack
page read and write
4FA5000
trusted library allocation
page read and write
9200CFE000
stack
page read and write
4C10000
trusted library allocation
page read and write
418000
remote allocation
page execute and read and write
9EE000
heap
page read and write
2258000
trusted library allocation
page read and write
26909D02000
unkown
page read and write
7800000
trusted library allocation
page read and write
220C000
trusted library allocation
page read and write
27CD6A02000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
920053B000
stack
page read and write
4FA5000
trusted library allocation
page read and write
838D8FE000
stack
page read and write
4FB5000
trusted library allocation
page read and write
4C40000
trusted library section
page readonly
620367C000
stack
page read and write
2090E47B000
unkown
page read and write
2090E441000
unkown
page read and write
1A1C0000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
4F7B000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
1C5F9A13000
unkown
page read and write
B1DFEFD000
stack
page read and write
1DE317F000
stack
page read and write
1CDE1708000
unkown
page read and write
2214000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
2215000
trusted library allocation
page read and write
1A2DF000
trusted library allocation
page read and write
1E246550000
trusted library section
page read and write
6DB6CFD000
stack
page read and write
4FA5000
trusted library allocation
page read and write
2215000
trusted library allocation
page read and write
400000
unkown
page readonly
4FA5000
trusted library allocation
page read and write
233DE849000
unkown
page read and write
222A000
trusted library allocation
page read and write
27CD6597000
unkown
page read and write
1FA22E13000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
A5D000
heap
page read and write
420000
unkown
page readonly
27CD5C88000
unkown
page read and write
2460C23C000
unkown
page read and write
1C0000
remote allocation
page read and write
69E000
heap
page read and write
4F83000
trusted library allocation
page read and write
1A030000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
400000
unkown
page readonly
26909C4E000
unkown
page read and write
4F8D000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
1E246F18000
unkown
page read and write
64E000
stack
page read and write
27E8000
trusted library allocation
page read and write
27CD6597000
unkown
page read and write
2160000
trusted library allocation
page read and write
550000
heap
page read and write
1CDE1613000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
16A57649000
unkown
page read and write
1A1C0000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
28E5000
trusted library allocation
page read and write
6BE000
stack
page read and write
1DE2E7B000
stack
page read and write
27CD65A1000
unkown
page read and write
2214000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
30000
heap
page read and write
4FC8000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
27CD659D000
unkown
page read and write
1E246E15000
unkown
page read and write
27CD5CB1000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
220D000
trusted library allocation
page read and write
1FA22E02000
unkown
page read and write
6DB6E7D000
stack
page read and write
4F8A000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
27CD65C1000
unkown
page read and write
4F7E000
trusted library allocation
page read and write
221A000
trusted library allocation
page read and write
23E0000
heap
page read and write
B71C67F000
stack
page read and write
27E8000
trusted library allocation
page read and write
1A2DB000
trusted library allocation
page read and write
27CD5D13000
unkown
page read and write
1FDABD64000
heap
page read and write
9EE000
heap
page read and write
21F0000
trusted library allocation
page read and write
4F95000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
4F8B000
trusted library allocation
page read and write
1E24BAC0000
trusted library allocation
page read and write
221C000
trusted library allocation
page read and write
26909D08000
unkown
page read and write
4FA5000
trusted library allocation
page read and write
510000
trusted library allocation
page read and write
27CD659F000
unkown
page read and write
1CDE1700000
unkown
page read and write
4F7E000
trusted library allocation
page read and write
4F88000
trusted library allocation
page read and write
4FC6000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
7E82FFE000
stack
page read and write
1FA22E00000
unkown
page read and write
27CD65C5000
unkown
page read and write
418000
remote allocation
page execute and read and write
4F9E000
trusted library allocation
page read and write
1E246F18000
unkown
page read and write
221A000
trusted library allocation
page read and write
1CDE1670000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
4F96000
trusted library allocation
page read and write
27E1000
trusted library allocation
page read and write
2460C255000
unkown
page read and write
19C000
stack
page read and write
1E24BCA6000
unkown
page read and write
1E247A11000
trusted library allocation
page read and write
560000
trusted library section
page read and write
222A000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
699000
heap
page read and write
4F83000
trusted library allocation
page read and write
2090E45E000
unkown
page read and write
6D00000
trusted library allocation
page read and write
2090E475000
unkown
page read and write
C74977F000
stack
page read and write
40B000
unkown
page read and write
27CD6513000
unkown
page read and write
1FDABD36000
heap
page read and write
4FA5000
trusted library allocation
page read and write
C7498FE000
stack
page read and write
2231000
trusted library allocation
page read and write
4F8C000
trusted library allocation
page read and write
233DE918000
unkown
page read and write
6203CFE000
stack
page read and write
2460C302000
unkown
page read and write
27CD65B2000
unkown
page read and write
672C000
trusted library allocation
page read and write
27CD6A02000
unkown
page read and write
16A57613000
unkown
page read and write
1E246F59000
unkown
page read and write
1CDE1629000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
27CD658B000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
8CF000
stack
page read and write
4F96000
trusted library allocation
page read and write
27CD65C1000
unkown
page read and write
B20000
trusted library allocation
page read and write
27CD59E0000
heap
page read and write
1C0000
remote allocation
page read and write
233DE900000
unkown
page read and write
4F8D000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
2460C252000
unkown
page read and write
16A57700000
unkown
page read and write
4F9F000
trusted library allocation
page read and write
A5D000
heap
page read and write
4FBD000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
27E1000
trusted library allocation
page read and write
62037FF000
stack
page read and write
1DE28DB000
stack
page read and write
7C20000
trusted library allocation
page read and write
1E246DE0000
trusted library section
page readonly
9200BF7000
stack
page read and write
4FBF000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
1FA22E41000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
2090E444000
unkown
page read and write
6B7D000
stack
page read and write
27CD63A0000
remote allocation
page read and write
414000
remote allocation
page execute and read and write
4F9E000
trusted library allocation
page read and write
400000
unkown
page readonly
2460C250000
unkown
page read and write
418000
unkown
page readonly
1C0000
remote allocation
page read and write
2090E446000
unkown
page read and write
838DBFE000
stack
page read and write
418000
unkown
page readonly
4F7E000
trusted library allocation
page read and write
7A59FF000
stack
page read and write
608000
heap
page read and write
1DE2D7E000
stack
page read and write
7E827FE000
stack
page read and write
27CD6572000
unkown
page read and write
4FBE000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
2490000
trusted library allocation
page execute and read and write
4F8B000
trusted library allocation
page read and write
28E5000
trusted library allocation
page read and write
27CD6587000
unkown
page read and write
4A20000
trusted library allocation
page execute and read and write
4F9E000
trusted library allocation
page read and write
216C000
trusted library allocation
page execute and read and write
27CD659F000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
27E3000
trusted library allocation
page read and write
222A000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
B22000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
2460CA02000
unkown
page read and write
4F8D000
trusted library allocation
page read and write
4F98000
trusted library allocation
page read and write
838D87E000
stack
page read and write
2215000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
1A1C0000
trusted library allocation
page read and write
215A000
trusted library allocation
page execute and read and write
4FA5000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
26909C4C000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
1FDABAE0000
heap
page read and write
67FE000
stack
page read and write
27E9000
trusted library allocation
page read and write
There are 1471 hidden memdumps, click here to show them.