IOC Report
steg.exe

loading gif

Files

File Path
Type
Category
Malicious
steg.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\WindowsUpdate.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\steg.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\Windows Update.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Windows Update.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_windows update.e_436621b0be9536334964869bf89e95685ea4f5_00000000_15c9a667\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_windows update.e_436621b0be9536334964869bf89e95685ea4f5_00000000_17493f51\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37AF.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3918.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F91.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA157.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\SysInfo.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\pid.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\pidloc.txt
ASCII text, with no line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\steg.exe
"C:\Users\user\Desktop\steg.exe"
malicious
C:\Users\user\AppData\Roaming\Windows Update.exe
"C:\Users\user\AppData\Roaming\Windows Update.exe"
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
"C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
malicious
C:\Users\user\AppData\Roaming\Windows Update.exe
"C:\Users\user\AppData\Roaming\Windows Update.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 2708
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 2676

URLs

Name
IP
Malicious
http://www.fontbureau.com/designersG
unknown
http://www.sajatypeworks.coman
unknown
http://crl.pki.goog/gsr1/gsr1.crl0;
unknown
https://accounts.google.com/servicelogin
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://whatismyipaddress.comx&#q
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.comceta
unknown
http://www.fontbureau.com/designers
unknown
https://my.screenname.aol.com/_cqr/login/login.psp
unknown
http://www.goodfont.co.kr
unknown
https://support.google.com/mail/?p=WantAuthError
unknown
http://pki.goog/repo/certs/gtsr1.der04
unknown
http://slashdot.org/bookmark.pl
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://dyn.com/dns//
unknown
http://crls.pki.goog/gts1c3/QOvJ0N1sT2A.crl0
unknown
http://whatismyipaddress.com/-
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.tiro.com-
unknown
https://signin.ebay.com/ws/ebayisapi.dll
unknown
https://login.yahoo.com/config/login
unknown
http://www.fonts.com
unknown
http://www.linkedin.com/
unknown
http://www.sandoll.co.kr
unknown
http://digg.com
unknown
http://www.urwpp.deDPlease
unknown
http://whatismyipaddress.com/
104.16.155.36
http://www.zhongyicts.com.cn
unknown
http://www.sajatypeworks.come
unknown
http://www.sakkal.com
unknown
https://support.google.com/mail/?p=BadCredentials
unknown
https://whatismyipaddress.com/
104.16.155.36
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://whatismyipaddress.com
unknown
http://www.fontbureau.comF
unknown
http://www.sajatypeworks.comr
unknown
http://dyn.com/dns/
unknown
http://whatismyipaddress.comx&#q
unknown
http://www.reddit.com/login
unknown
http://crl.pki.goog/gtsr1/gtsr1.crl0W
unknown
http://whatismyipaddress.com
unknown
http://www.stumbleupon.com/sign_up.php
unknown
http://pki.goog/gsr1/gsr1.crt02
unknown
https://twitter.com/
unknown
https://pki.goog/repository/0
unknown
http://www.myspace.com
unknown
http://www.carterandcone.coml
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
http://twitter.com/
unknown
http://192.99.212.64/WebPanel/log.php?username=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://pinterest.com/login/
unknown
https://www.amazon.com/ap/signin/190-9059340-4656153
unknown
https://www.noip.com/
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://000001BB00000050.oeaccount
unknown
http://www.fontbureau.como
unknown
http://www.fontbureau.com/designers8
unknown
https://www.google.com/accounts/servicelogin
unknown
https://www.amazon.com/gp/css/homepage.html
unknown
http://pki.goog/repo/certs/gts1c3.der0
unknown
http://whatismyipaddress.comx&#qH
unknown
https://myspace.com
unknown
There are 63 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
whatismyipaddress.com
104.16.155.36
smtp.gmail.com
108.177.127.109
140.244.14.0.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
104.16.155.36
whatismyipaddress.com
United States
108.177.127.109
smtp.gmail.com
United States
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Hidden
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Windows Update_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Windows Update
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
ProgramId
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
FileId
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
LowerCaseLongPath
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
LongPathHash
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
Name
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
Publisher
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
Version
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
BinFileVersion
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
BinaryType
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
ProductName
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
ProductVersion
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
LinkDate
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
BinProductVersion
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
Size
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
Language
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
IsPeFile
\REGISTRY\A\{ddc758c6-e5e2-11b9-2fe1-426e573e75d8}\Root\InventoryApplicationFile\windows update.e|518a9a2a
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C2000
unkown
page readonly
malicious
AC2000
unkown
page readonly
malicious
AC2000
unkown
page readonly
malicious
AC2000
unkown
page readonly
malicious
12000
unkown
page readonly
malicious
12000
unkown
page readonly
malicious
3801000
trusted library allocation
page read and write
malicious
F82000
unkown
page readonly
malicious
12000
unkown
page readonly
malicious
12000
unkown
page readonly
malicious
12000
unkown
page readonly
malicious
AC2000
unkown
page readonly
malicious
F82000
unkown
page readonly
malicious
12000
unkown
page readonly
malicious
5EEC000
trusted library allocation
page read and write
malicious
915000
heap
page read and write
malicious
2B8F000
trusted library allocation
page read and write
malicious
7544000
trusted library allocation
page read and write
malicious
2C2000
unkown
page readonly
malicious
17E4000
heap
page read and write
malicious
AC2000
unkown
page readonly
malicious
13919FD000
stack
page read and write
5BA4000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
2122CA7A000
heap
page read and write
11B3000
heap
page read and write
2122CA56000
heap
page read and write
5B9B000
trusted library allocation
page read and write
9C60E7E000
stack
page read and write
226CB530000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BC6000
trusted library allocation
page read and write
4C30000
trusted library section
page readonly
5B9B000
trusted library allocation
page read and write
21232088000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
8A8000
heap
page read and write
74DE000
stack
page read and write
660000
heap
page read and write
7C60000
trusted library allocation
page read and write
7AE000
stack
page read and write
212320A4000
trusted library allocation
page read and write
5400000
heap
page read and write
5BB5000
trusted library allocation
page read and write
786B000
stack
page read and write
1180000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
2774966F000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
6FD000
heap
page read and write
71B0000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
2C0000
unkown
page readonly
90A000
trusted library allocation
page execute and read and write
234F000
stack
page read and write
12F2000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
7E10000
heap
page execute and read and write
5BB5000
trusted library allocation
page read and write
10000
unkown
page readonly
5BC7000
trusted library allocation
page read and write
6B5E000
stack
page read and write
5BA3000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BA5000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
69BC7E000
stack
page read and write
F7B89FB000
stack
page read and write
5B99000
trusted library allocation
page read and write
212322F6000
heap
page read and write
69BDFF000
stack
page read and write
5B93000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
AC0000
unkown
page readonly
5BB5000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5B84000
trusted library allocation
page read and write
A52000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
19D98C02000
trusted library allocation
page read and write
10000
unkown
page readonly
60DF000
stack
page read and write
F80000
unkown
page readonly
5BC7000
trusted library allocation
page read and write
17AB000
heap
page read and write
4934000
heap
page read and write
55FBAFF000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
F79000
stack
page read and write
65F0000
heap
page read and write
56C0000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
A5B000
trusted library allocation
page execute and read and write
5B9C000
trusted library allocation
page read and write
3370000
trusted library allocation
page execute and read and write
11FF000
heap
page read and write
1340000
heap
page read and write
5BAC000
trusted library allocation
page read and write
655E000
stack
page read and write
212321E0000
remote allocation
page read and write
AC0000
unkown
page readonly
5BAC000
trusted library allocation
page read and write
71AA000
stack
page read and write
5B8D000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
1D5ACC00000
heap
page read and write
4C70000
trusted library allocation
page read and write
264E000
stack
page read and write
5BC7000
trusted library allocation
page read and write
19D98427000
heap
page read and write
4E1E000
stack
page read and write
5B90000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
6DBB000
stack
page read and write
5BB7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
2520000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
5BCF000
trusted library allocation
page read and write
8A0000
heap
page read and write
5BC7000
trusted library allocation
page read and write
27749676000
heap
page read and write
776000
stack
page read and write
26F32B13000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5B86000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
1682000
trusted library allocation
page execute and read and write
4A50000
trusted library allocation
page execute and read and write
5B9B000
trusted library allocation
page read and write
918000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
226CB65E000
heap
page read and write
2B5A000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B40000
trusted library allocation
page read and write
19D981B0000
heap
page read and write
226CB5D0000
trusted library allocation
page read and write
5B8F000
trusted library allocation
page read and write
12BA000
trusted library allocation
page execute and read and write
5BBE000
trusted library allocation
page read and write
27749633000
heap
page read and write
5B9D000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
330E000
stack
page read and write
5B96000
trusted library allocation
page read and write
24CB000
trusted library allocation
page execute and read and write
5B93000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
567E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
F7B86FA000
stack
page read and write
678E000
stack
page read and write
6DF0000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
26F329F0000
remote allocation
page read and write
27749646000
heap
page read and write
809E000
stack
page read and write
17E2000
heap
page read and write
226CB666000
heap
page read and write
26F32980000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
5B86000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
753F000
trusted library allocation
page read and write
33DD000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5FDE000
stack
page read and write
1660000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
12DA000
trusted library allocation
page execute and read and write
2122CB13000
heap
page read and write
5BC7000
trusted library allocation
page read and write
1770000
heap
page read and write
6C5B000
stack
page read and write
77FE000
stack
page read and write
69C0000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
902000
trusted library allocation
page execute and read and write
5BB5000
trusted library allocation
page read and write
4B6E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
48E1000
trusted library allocation
page read and write
5F06000
trusted library allocation
page read and write
9C6092E000
stack
page read and write
27749654000
heap
page read and write
21232080000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
F80000
unkown
page readonly
5BC7000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
46D1000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
7F9E000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
26F32A49000
heap
page read and write
1D5ACC6E000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
2490000
trusted library allocation
page read and write
226CB702000
heap
page read and write
5BBD000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
2122CA70000
heap
page read and write
1D5ACC13000
heap
page read and write
5BBE000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
2122D1F3000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
7B1B000
stack
page read and write
7DB0000
trusted library allocation
page read and write
18936058000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
21231F70000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
2122CB26000
heap
page read and write
5BBD000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
26F32960000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
7C60000
unkown
page read and write
2122D358000
heap
page read and write
70AD000
stack
page read and write
27749645000
heap
page read and write
27749649000
heap
page read and write
3360000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
2122D359000
heap
page read and write
27749680000
heap
page read and write
2123222B000
heap
page read and write
7534000
trusted library allocation
page read and write
6980000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
6B5D000
stack
page read and write
CB7000
heap
page read and write
16C2000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
6F9000
heap
page read and write
1D5ACC3D000
heap
page read and write
5B86000
trusted library allocation
page read and write
2122DB50000
trusted library section
page readonly
5BC7000
trusted library allocation
page read and write
1F0000
remote allocation
page read and write
19D98449000
heap
page read and write
5B8A000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
5D9E000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
168A000
trusted library allocation
page execute and read and write
5BC7000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
F7B90FE000
stack
page read and write
169C000
trusted library allocation
page execute and read and write
674E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
6BFE000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
224E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
81DC000
stack
page read and write
12CA000
trusted library allocation
page execute and read and write
5BB5000
trusted library allocation
page read and write
F7B85F7000
stack
page read and write
68DE000
stack
page read and write
154F000
stack
page read and write
5B96000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
249C000
trusted library allocation
page execute and read and write
7E0000
heap
page read and write
2122C9F0000
trusted library section
page read and write
19D9848C000
heap
page read and write
4D70000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BCB000
trusted library allocation
page read and write
7554000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
5B92000
trusted library allocation
page read and write
6990000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
26F34470000
trusted library allocation
page read and write
2774967F000
heap
page read and write
761E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
2122CA9D000
heap
page read and write
5BC7000
trusted library allocation
page read and write
2122CA8D000
heap
page read and write
69D0000
remote allocation
page read and write
5BBE000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
1391CFD000
stack
page read and write
6F6E000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
1580000
heap
page read and write
5BC7000
trusted library allocation
page read and write
71F000
heap
page read and write
2774966B000
heap
page read and write
5BC7000
trusted library allocation
page read and write
212321D0000
trusted library allocation
page read and write
12C2000
trusted library allocation
page execute and read and write
72D0000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
26F32A00000
heap
page read and write
19D9846F000
heap
page read and write
AC0000
unkown
page readonly
5BB5000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
1727000
heap
page read and write
5BC7000
trusted library allocation
page read and write
16D0000
heap
page read and write
18936002000
heap
page read and write
5BC7000
trusted library allocation
page read and write
21232302000
heap
page read and write
69D0000
remote allocation
page read and write
5B9D000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
19D9844A000
heap
page read and write
5BB5000
trusted library allocation
page read and write
7380000
remote allocation
page read and write
5BB7000
trusted library allocation
page read and write
91A000
trusted library allocation
page execute and read and write
5BC7000
trusted library allocation
page read and write
19D98451000
heap
page read and write
5BC7000
trusted library allocation
page read and write
74BF000
stack
page read and write
5BA3000
trusted library allocation
page read and write
F7B81EB000
stack
page read and write
5BC7000
trusted library allocation
page read and write
9A0000
heap
page read and write
5B9B000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
4B65000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B87000
trusted library allocation
page read and write
23C0000
heap
page execute and read and write
1750000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
BA1BAFF000
stack
page read and write
926000
trusted library allocation
page execute and read and write
5B96000
trusted library allocation
page read and write
21232190000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
212320B0000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
78DE000
stack
page read and write
21232150000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
16A7000
trusted library allocation
page execute and read and write
747D000
stack
page read and write
71D0000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
4C6E000
stack
page read and write
19D98413000
heap
page read and write
1D5AD602000
trusted library allocation
page read and write
2122CABB000
heap
page read and write
5BA4000
trusted library allocation
page read and write
27749686000
heap
page read and write
5B9B000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
2123221D000
heap
page read and write
5B99000
trusted library allocation
page read and write
19D9844B000
heap
page read and write
67DE000
stack
page read and write
5BB9000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
821E000
stack
page read and write
26F32A48000
heap
page read and write
5B84000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
19D98210000
heap
page read and write
8AE000
stack
page read and write
5B96000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B82000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
27749520000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
A57000
trusted library allocation
page execute and read and write
18936013000
heap
page read and write
771C000
stack
page read and write
6E7000
heap
page read and write
7DC0000
unkown
page read and write
6ED000
heap
page read and write
5BC7000
trusted library allocation
page read and write
226CB708000
heap
page read and write
23C4000
heap
page execute and read and write
2122CA77000
heap
page read and write
2122DB40000
trusted library section
page readonly
AC0000
unkown
page readonly
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
11F3000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
27749702000
heap
page read and write
69B9FE000
stack
page read and write
5BDC000
trusted library allocation
page read and write
937000
heap
page read and write
5B9B000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
21232200000
heap
page read and write
714000
heap
page read and write
26F32A58000
heap
page read and write
212322EA000
heap
page read and write
5BCB000
trusted library allocation
page read and write
A60000
heap
page read and write
27749613000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5B84000
trusted library allocation
page read and write
212322FC000
heap
page read and write
AC0000
unkown
page readonly
19D98310000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
D11CBFC000
stack
page read and write
5B9C000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
6EA000
heap
page read and write
5B94000
trusted library allocation
page read and write
19D98400000
heap
page read and write
1290000
trusted library allocation
page read and write
5BBF000
trusted library allocation
page read and write
6AFE000
stack
page read and write
250E000
stack
page read and write
48F0000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
26F32A13000
heap
page read and write
212321E0000
remote allocation
page read and write
212320A1000
trusted library allocation
page read and write
83E000
stack
page read and write
1249000
heap
page read and write
5B9B000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
55FB87E000
stack
page read and write
2123223B000
heap
page read and write
171E000
stack
page read and write
69BD7D000
stack
page read and write
3030000
heap
page execute and read and write
C7F000
stack
page read and write
4C54000
heap
page read and write
21232296000
heap
page read and write
6CF0000
trusted library allocation
page read and write
4E50000
trusted library allocation
page execute and read and write
5BC7000
trusted library allocation
page read and write
153E000
stack
page read and write
5B96000
trusted library allocation
page read and write
2774964F000
heap
page read and write
2492000
trusted library allocation
page execute and read and write
5BB5000
trusted library allocation
page read and write
7A1E000
stack
page read and write
5BBD000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
709000
heap
page read and write
2122CA2A000
heap
page read and write
23A0000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
FA0000
remote allocation
page read and write
5BC7000
trusted library allocation
page read and write
6CBE000
stack
page read and write
5BBE000
trusted library allocation
page read and write
226CB65A000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5B88000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B8F000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
2774966D000
heap
page read and write
55FB5DE000
stack
page read and write
5B9B000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
226CB65D000
heap
page read and write
12F7000
trusted library allocation
page execute and read and write
5BC7000
trusted library allocation
page read and write
691E000
stack
page read and write
19D981A0000
heap
page read and write
F76000
stack
page read and write
2122C870000
heap
page read and write
7D9A000
stack
page read and write
249A000
trusted library allocation
page execute and read and write
113A000
stack
page read and write
5BC7000
trusted library allocation
page read and write
1249000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
2122D302000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
2122DB70000
trusted library section
page readonly
5BC7000
trusted library allocation
page read and write
1D5ACC02000
heap
page read and write
5BB8000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
226CB600000
heap
page read and write
37F4000
trusted library allocation
page read and write
2774962E000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
D11C6FF000
stack
page read and write
5BA1000
trusted library allocation
page read and write
11F3000
heap
page read and write
239E000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
2C0000
unkown
page readonly
F7B8C7F000
stack
page read and write
5BB5000
trusted library allocation
page read and write
11EE000
stack
page read and write
5BBD000
trusted library allocation
page read and write
A4A000
trusted library allocation
page execute and read and write
5BAC000
trusted library allocation
page read and write
277495C0000
trusted library allocation
page read and write
2122CA8B000
heap
page read and write
5BCA000
trusted library allocation
page read and write
16BE000
stack
page read and write
5B9B000
trusted library allocation
page read and write
BA1B2FB000
stack
page read and write
19D9843C000
heap
page read and write
910000
trusted library allocation
page read and write
70EE000
stack
page read and write
139132B000
stack
page read and write
5BA4000
trusted library allocation
page read and write
4F9000
stack
page read and write
5BC7000
trusted library allocation
page read and write
2122D200000
heap
page read and write
27749655000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
688D000
stack
page read and write
1720000
heap
page read and write
6ABE000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
A42000
trusted library allocation
page execute and read and write
5BC5000
trusted library allocation
page read and write
2BC4000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
2774963B000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5B9F000
trusted library allocation
page read and write
9A5000
heap
page read and write
13921FE000
stack
page read and write
5BA3000
trusted library allocation
page read and write
2540000
heap
page execute and read and write
24C2000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
26F32A59000
heap
page read and write
5B9B000
trusted library allocation
page read and write
12D2000
trusted library allocation
page read and write
79DD000
stack
page read and write
26F32B18000
heap
page read and write
5BC5000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
2122DEE0000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
5BBF000
trusted library allocation
page read and write
26F34602000
trusted library allocation
page read and write
26F329F0000
remote allocation
page read and write
12B2000
trusted library allocation
page execute and read and write
212321C0000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
8DC000
heap
page read and write
5B87000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
27749643000
heap
page read and write
5BB5000
trusted library allocation
page read and write
26F32A2A000
heap
page read and write
6AC000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
6A1C000
stack
page read and write
2774A002000
trusted library allocation
page read and write
118A000
heap
page read and write
D11C8FC000
stack
page read and write
139177B000
stack
page read and write
53B0000
trusted library allocation
page read and write
19D9844C000
heap
page read and write
56B0000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
1893603D000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
776E000
stack
page read and write
27749671000
heap
page read and write
5BB5000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
24B2000
trusted library allocation
page execute and read and write
381E000
trusted library allocation
page read and write
196F000
stack
page read and write
FA0000
remote allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
16C7000
trusted library allocation
page execute and read and write
7506000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
1010000
heap
page read and write
4BA0000
trusted library allocation
page execute and read and write
5B9B000
trusted library allocation
page read and write
F7B8CFF000
stack
page read and write
7880000
trusted library allocation
page execute and read and write
5D90000
trusted library allocation
page read and write
18936102000
heap
page read and write
F7B8DFC000
stack
page read and write
5BC5000
trusted library allocation
page read and write
5520000
trusted library allocation
page execute and read and write
2122CAAA000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5B84000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
27749651000
heap
page read and write
27749590000
heap
page read and write
4E90000
heap
page read and write
21231EE0000
trusted library allocation
page read and write
753F000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5B88000
trusted library allocation
page read and write
12D6000
trusted library allocation
page execute and read and write
8EE000
stack
page read and write
58F4000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
248A000
trusted library allocation
page execute and read and write
5BC7000
trusted library allocation
page read and write
212321E0000
remote allocation
page read and write
2122C880000
heap
page read and write
D11C27B000
stack
page read and write
226CB663000
heap
page read and write
226CB661000
heap
page read and write
5B9B000
trusted library allocation
page read and write
1391BFD000
stack
page read and write
5BC7000
trusted library allocation
page read and write
3711000
trusted library allocation
page read and write
1690000
trusted library allocation
page read and write
678000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
C80000
heap
page read and write
5B90000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5404000
heap
page read and write
2B83000
trusted library allocation
page read and write
26F32930000
heap
page read and write
5B99000
trusted library allocation
page read and write
7CFE000
stack
page read and write
2482000
trusted library allocation
page execute and read and write
5BC7000
trusted library allocation
page read and write
13918FE000
stack
page read and write
F7B8AFE000
stack
page read and write
62DE000
stack
page read and write
5B9B000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
1D5AD480000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
6B0E000
stack
page read and write
2122CA00000
heap
page read and write
645000
heap
page read and write
BA1B8F7000
stack
page read and write
27749647000
heap
page read and write
5BBE000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
27749650000
heap
page read and write
D11CAFE000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5BBC000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
4E95000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
2122CA3F000
heap
page read and write
276D000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
120F000
heap
page read and write
7C70000
trusted library allocation
page read and write
69CE000
stack
page read and write
5B9B000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
226CB62C000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
2122CA52000
heap
page read and write
5B9B000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
10000
unkown
page readonly
5BB5000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
133E000
stack
page read and write
4AB0000
trusted library section
page readonly
5BBD000
trusted library allocation
page read and write
2122CA91000
heap
page read and write
5BBE000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
706B000
stack
page read and write
5BB7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
831E000
stack
page read and write
1D5ACC6B000
heap
page read and write
2BAC000
trusted library allocation
page read and write
2122C8E0000
heap
page read and write
5BBE000
trusted library allocation
page read and write
212320C0000
trusted library allocation
page read and write
1550000
heap
page read and write
276A000
trusted library allocation
page read and write
2530000
heap
page read and write
26F328C0000
heap
page read and write
1D5ACD02000
heap
page read and write
5B91000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
226CB675000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
FA0000
remote allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BAD000
trusted library allocation
page read and write
1F0000
remote allocation
page read and write
5BC7000
trusted library allocation
page read and write
18936A02000
trusted library allocation
page read and write
635D000
stack
page read and write
1D5ACC73000
heap
page read and write
5BB5000
trusted library allocation
page read and write
71B000
heap
page read and write
5BB5000
trusted library allocation
page read and write
7380000
remote allocation
page read and write
19D98502000
heap
page read and write
1202000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
16CB000
trusted library allocation
page execute and read and write
5BC7000
trusted library allocation
page read and write
3381000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
5B8E000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
665E000
stack
page read and write
12D0000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
4A6C000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
669E000
stack
page read and write
11F3000
heap
page read and write
1A6F000
stack
page read and write
18935FA0000
remote allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
6A5D000
stack
page read and write
5BCA000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
3824000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
58EC000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
19D98480000
heap
page read and write
7FB00000
trusted library allocation
page execute and read and write
226CB664000
heap
page read and write
63DD000
stack
page read and write
212322FF000
heap
page read and write
12A0000
heap
page read and write
922000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
21232248000
heap
page read and write
2122CA75000
heap
page read and write
6D3D000
stack
page read and write
9C60F7E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
A67000
heap
page read and write
5B9C000
trusted library allocation
page read and write
69D0000
remote allocation
page read and write
74F3000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
7548000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
53A0000
trusted library allocation
page execute and read and write
69BE000
stack
page read and write
5B9B000
trusted library allocation
page read and write
27749652000
heap
page read and write
5BB5000
trusted library allocation
page read and write
712E000
stack
page read and write
4EB0000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
76FE000
stack
page read and write
19D98508000
heap
page read and write
27749666000
heap
page read and write
5B65000
heap
page read and write
611E000
stack
page read and write
1670000
trusted library allocation
page read and write
912000
trusted library allocation
page execute and read and write
5B84000
trusted library allocation
page read and write
212320A0000
trusted library allocation
page read and write
1224000
heap
page read and write
12FB000
trusted library allocation
page execute and read and write
226CB540000
heap
page read and write
5BBD000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5B85000
trusted library allocation
page read and write
5B30000
trusted library allocation
page read and write
26F32A8A000
heap
page read and write
2122DB20000
trusted library section
page readonly
5B96000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
27749669000
heap
page read and write
1D5ACD13000
heap
page read and write
6A0E000
stack
page read and write
5BAD000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
5B88000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
80DE000
stack
page read and write
5B9B000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
26F32A7D000
heap
page read and write
5BC7000
trusted library allocation
page read and write
F7B8BFF000
stack
page read and write
5AF0000
trusted library allocation
page read and write
87E000
stack
page read and write
1D5ACC89000
heap
page read and write
F7B88FE000
stack
page read and write
2122D313000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
1D5ACB70000
heap
page read and write
4930000
heap
page read and write
5BC7000
trusted library allocation
page read and write
2122CB02000
heap
page read and write
5E90000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
4B90000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
3380000
heap
page read and write
9C608AB000
stack
page read and write
226CC002000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
37CA000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
2B8D000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
F7B8B7F000
stack
page read and write
5BB5000
trusted library allocation
page read and write
18935F70000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
4AAC000
stack
page read and write
5B96000
trusted library allocation
page read and write
13920FF000
stack
page read and write
26F32A59000
heap
page read and write
18936029000
heap
page read and write
7070000
trusted library allocation
page read and write
177A000
heap
page read and write
5B9B000
trusted library allocation
page read and write
2122DEC1000
trusted library allocation
page read and write
55FB55B000
stack
page read and write
5B87000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
68CE000
stack
page read and write
5BC7000
trusted library allocation
page read and write
725000
heap
page read and write
6E9E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
2122CAFD000
heap
page read and write
BA1B9FE000
stack
page read and write
56E0000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
26F32B02000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
27749642000
heap
page read and write
75BE000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5B88000
trusted library allocation
page read and write
19D98513000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
621E000
stack
page read and write
36E6000
trusted library allocation
page read and write
760D000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
380C000
trusted library allocation
page read and write
16B2000
trusted library allocation
page execute and read and write
5BB5000
trusted library allocation
page read and write
19D9848E000
heap
page read and write
212320B0000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
27749630000
heap
page read and write
5B00000
trusted library allocation
page read and write
7542000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
1015000
heap
page read and write
125E000
heap
page read and write
53C0000
trusted library allocation
page read and write
5BCB000
trusted library allocation
page read and write
164E000
stack
page read and write
D11C47D000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
722D000
stack
page read and write
586D000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
7BBC000
stack
page read and write
783E000
stack
page read and write
4E70000
trusted library allocation
page read and write
10D0000
heap
page read and write
5BC5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
2122C9E0000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
5B87000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
1208000
heap
page read and write
2991000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
212321E0000
trusted library allocation
page read and write
212322A7000
heap
page read and write
5BC5000
trusted library allocation
page read and write
56F5000
heap
page read and write
5B96000
trusted library allocation
page read and write
7FCE0000
trusted library allocation
page execute and read and write
3F0000
heap
page read and write
5BBE000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
21232299000
heap
page read and write
5B99000
trusted library allocation
page read and write
5B86000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
4C2C000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
37FD000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
48F0000
trusted library allocation
page read and write
F7B8A7F000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
11EE000
heap
page read and write
7DA0000
trusted library allocation
page read and write
19D98500000
heap
page read and write
12A7000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
26F32A68000
heap
page read and write
5BB5000
trusted library allocation
page read and write
69BEFD000
stack
page read and write
5BC7000
trusted library allocation
page read and write
21232263000
heap
page read and write
4381000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
6ED000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B10000
trusted library allocation
page execute and read and write
664E000
stack
page read and write
16AA000
trusted library allocation
page execute and read and write
5B8C000
trusted library allocation
page read and write
726E000
stack
page read and write
5BC7000
trusted library allocation
page read and write
557C000
stack
page read and write
55FBBF7000
stack
page read and write
226CB675000
heap
page read and write
5B9B000
trusted library allocation
page read and write
9C609AE000
stack
page read and write
58F0000
heap
page read and write
5B9B000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
24C7000
trusted library allocation
page execute and read and write
5B9B000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
1391AFF000
stack
page read and write
5BB5000
trusted library allocation
page read and write
18935FA0000
remote allocation
page read and write
5BA3000
trusted library allocation
page read and write
7BFE000
stack
page read and write
301E000
stack
page read and write
746000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
27749653000
heap
page read and write
2122DB30000
trusted library section
page readonly
CB0000
heap
page read and write
6DD0000
trusted library allocation
page execute and read and write
6E12000
trusted library allocation
page read and write
5B87000
trusted library allocation
page read and write
5B8A000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
10000
unkown
page readonly
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
24AA000
trusted library allocation
page execute and read and write
5BA1000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
27749677000
heap
page read and write
2774962F000
heap
page read and write
2122D1F0000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
BA1B3FF000
stack
page read and write
4900000
trusted library allocation
page read and write
2122DB60000
trusted library section
page readonly
5B87000
trusted library allocation
page read and write
226CB613000
heap
page read and write
27749629000
heap
page read and write
29A7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
1692000
trusted library allocation
page execute and read and write
5B8D000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
13913AF000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
12EA000
trusted library allocation
page execute and read and write
7F500000
trusted library allocation
page execute and read and write
69A0000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
7534000
trusted library allocation
page read and write
640000
heap
page read and write
5BC7000
trusted library allocation
page read and write
7F5F000
stack
page read and write
7F690000
trusted library allocation
page execute and read and write
5B9B000
trusted library allocation
page read and write
1740000
heap
page read and write
2122CA13000
heap
page read and write
5B82000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
2122DA40000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
226CB63C000
heap
page read and write
1219000
heap
page read and write
69BA7F000
stack
page read and write
73BE000
stack
page read and write
6150000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
1CA000
stack
page read and write
144E000
stack
page read and write
5BC7000
trusted library allocation
page read and write
913000
heap
page read and write
5B9B000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
757F000
stack
page read and write
18935ED0000
heap
page read and write
2BB6000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
226CB67A000
heap
page read and write
18935FA0000
remote allocation
page read and write
5BC5000
trusted library allocation
page read and write
67A000
stack
page read and write
5B94000
trusted library allocation
page read and write
1391DFF000
stack
page read and write
17E8000
heap
page read and write
670000
heap
page read and write
212322DF000
heap
page read and write
2774964A000
heap
page read and write
6D9E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
11F3000
heap
page read and write
1219000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5680000
trusted library section
page readonly
21232210000
heap
page read and write
703000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5AC0000
trusted library section
page readonly
B7F000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
212322AA000
heap
page read and write
E7A000
stack
page read and write
69BB7E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
1F0000
remote allocation
page read and write
5BB5000
trusted library allocation
page read and write
793E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
7C9D000
stack
page read and write
5B50000
trusted library allocation
page read and write
753D000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
2774967D000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
75DE000
stack
page read and write
5BBC000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
3034000
heap
page execute and read and write
1249000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
382A000
trusted library allocation
page read and write
7390000
heap
page execute and read and write
5B90000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
797E000
stack
page read and write
5BB7000
trusted library allocation
page read and write
27749648000
heap
page read and write
26F328D0000
heap
page read and write
6ED000
heap
page read and write
641E000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
736E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
27749530000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
56F0000
heap
page read and write
5B9B000
trusted library allocation
page read and write
124E000
heap
page read and write
1D5ACBE0000
heap
page read and write
5BC7000
trusted library allocation
page read and write
212321B0000
trusted library allocation
page read and write
F7B8EFC000
stack
page read and write
2774964C000
heap
page read and write
7ABE000
stack
page read and write
2711000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
6ED000
heap
page read and write
5BC7000
trusted library allocation
page read and write
26F32A02000
heap
page read and write
5BBE000
trusted library allocation
page read and write
24A7000
trusted library allocation
page execute and read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
5BBF000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
6F0000
heap
page read and write
4F6000
stack
page read and write
5BB5000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
D11C7FF000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5B92000
trusted library allocation
page read and write
27749641000
heap
page read and write
2123208E000
trusted library allocation
page read and write
21232302000
heap
page read and write
53C0000
trusted library allocation
page read and write
2BB2000
trusted library allocation
page read and write
63DF000
stack
page read and write
1D5ACC5A000
heap
page read and write
1D5ACC76000
heap
page read and write
F7B87FA000
stack
page read and write
1347000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
2122D215000
heap
page read and write
334D000
stack
page read and write
5BC5000
trusted library allocation
page read and write
1585000
heap
page read and write
732F000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
48D0000
trusted library allocation
page execute and read and write
3991000
trusted library allocation
page read and write
14F6000
stack
page read and write
24BA000
trusted library allocation
page execute and read and write
5BB5000
trusted library allocation
page read and write
55FBDFF000
stack
page read and write
1D5ACB80000
heap
page read and write
5BC7000
trusted library allocation
page read and write
770B000
stack
page read and write
55FBA7B000
stack
page read and write
5ABE000
stack
page read and write
5B80000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
212322D8000
heap
page read and write
69BFFD000
stack
page read and write
2122D318000
heap
page read and write
53D0000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page execute and read and write
7A7F000
stack
page read and write
5BCD000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
BA1B7FB000
stack
page read and write
33DA000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
722D000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
765000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
48C0000
trusted library allocation
page read and write
5B86000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
212322F0000
heap
page read and write
5BAC000
trusted library allocation
page read and write
26F32B00000
heap
page read and write
226CB713000
heap
page read and write
2122D202000
heap
page read and write
18935F40000
heap
page read and write
5BBE000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
7559000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
64DE000
stack
page read and write
48E0000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
21232080000
trusted library allocation
page read and write
26F329B0000
trusted library allocation
page read and write
5B60000
heap
page read and write
5BC7000
trusted library allocation
page read and write
18935EE0000
heap
page read and write
5BC5000
trusted library allocation
page read and write
26F32A40000
heap
page read and write
10000
unkown
page readonly
226CB5A0000
heap
page read and write
679E000
stack
page read and write
5B82000
trusted library allocation
page read and write
1391EFE000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5B87000
trusted library allocation
page read and write
92A000
trusted library allocation
page execute and read and write
625D000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
226CB700000
heap
page read and write
5EE0000
trusted library allocation
page read and write
18936000000
heap
page read and write
5BCA000
trusted library allocation
page read and write
172D000
heap
page read and write
5B9B000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
1391FFF000
stack
page read and write
6DF0000
trusted library allocation
page read and write
736E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
2774963E000
heap
page read and write
5BA4000
trusted library allocation
page read and write
212321A0000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
668000
heap
page read and write
5BC7000
trusted library allocation
page read and write
12E2000
trusted library allocation
page execute and read and write
212322F8000
heap
page read and write
5B88000
trusted library allocation
page read and write
26F329F0000
remote allocation
page read and write
26F32B1C000
heap
page read and write
9C60D7F000
stack
page read and write
7E5D000
stack
page read and write
D11C5FF000
stack
page read and write
5B9B000
trusted library allocation
page read and write
16D7000
heap
page read and write
226CB682000
heap
page read and write
2122D318000
heap
page read and write
6880000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
930000
heap
page read and write
BA1B37F000
stack
page read and write
5BC5000
trusted library allocation
page read and write
21231EF0000
trusted library allocation
page read and write
5BCD000
trusted library allocation
page read and write
4C50000
heap
page read and write
76BE000
stack
page read and write
160000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
19D9844E000
heap
page read and write
27749623000
heap
page read and write
5B93000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
D11C9FC000
stack
page read and write
112E000
stack
page read and write
19D98429000
heap
page read and write
11F3000
heap
page read and write
5BC7000
trusted library allocation
page read and write
124E000
heap
page read and write
6E20000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
9C6107F000
stack
page read and write
21231F60000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
4B60000
heap
page read and write
BF0000
heap
page read and write
5BC7000
trusted library allocation
page read and write
226CB629000
heap
page read and write
6ED000
heap
page read and write
16D0000
heap
page execute and read and write
169A000
trusted library allocation
page execute and read and write
5BB5000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
27749600000
heap
page read and write
651F000
stack
page read and write
6FED000
stack
page read and write
5B8D000
trusted library allocation
page read and write
16BA000
trusted library allocation
page execute and read and write
5B8D000
trusted library allocation
page read and write
212320C4000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
7380000
remote allocation
page read and write
5B96000
trusted library allocation
page read and write
2122D300000
heap
page read and write
5BCB000
trusted library allocation
page read and write
116E000
stack
page read and write
1254000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5ECF000
trusted library allocation
page read and write
5BCB000
trusted library allocation
page read and write
24A0000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
7890000
trusted library allocation
page execute and read and write
5BC7000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BAD000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
A3E000
stack
page read and write
5B9C000
trusted library allocation
page read and write
48AE000
stack
page read and write
5B9B000
trusted library allocation
page read and write
5B8E000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
5BAD000
trusted library allocation
page read and write
19D9844F000
heap
page read and write
5BC7000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
1D5ACC29000
heap
page read and write
5BB7000
trusted library allocation
page read and write
26F32A49000
heap
page read and write
2B9C000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
69B87C000
stack
page read and write
21232256000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5B86000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
55FBCFF000
stack
page read and write
7F0000
trusted library allocation
page read and write
749E000
stack
page read and write
5BB5000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
6C3D000
stack
page read and write
69BAFE000
stack
page read and write
5BAC000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
There are 1576 hidden memdumps, click here to show them.