IOC Report
Y4lA02GQNd

loading gif

Files

File Path
Type
Category
Malicious
Y4lA02GQNd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Y4lA02GQNd.exe_60753151586da6ad53e8a6edb12e67833acf0f_38362fb7_138348a5\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\WindowsUpdate.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_y4la02gqnd.exe_178ee3b5024b0b66f123353bb86e09aa51078fc_00000000_199b036f\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3193.tmp.mdmp
Mini DuMP crash report, 14 streams, Tue Mar 22 23:44:28 2022, 0x60521 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E17.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3F41.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREFA8.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF0E2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv748A.tmp
Extensible storage user DataBase, version 0x620, checksum 0xb56e199f, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\holderwb.txt
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\pid.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\pidloc.txt
ASCII text, with no line terminators
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Y4lA02GQNd.exe
"C:\Users\user\Desktop\Y4lA02GQNd.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
"C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 2836
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6224 -s 2816

URLs

Name
IP
Malicious
https://www.google.com/chrome/static/css/main.v2.min.css
unknown
http://www.msn.com
unknown
http://www.urwpp.deo~
unknown
http://www.fontbureau.com/designers
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://contextual.media.net/__media__/js/util/nrrV9140.js
unknown
https://mem.gfx.ms/me/MeControl/10.19168.0/en-US/meCore.min.js
unknown
https://www.google.com/chrome/static/images/download-browser/big_pixel_phone.png
unknown
https://www.google.com/chrome/
unknown
http://images.outbrainimg.com/transform/v3/eyJpdSI6Ijk4OGQ1ZDgwMWE2ODQ2NDNkM2ZkMmYyMGEwOTgwMWQ3MDE2Z
unknown
http://www.jiyu-kobo.co.jp/8
unknown
http://whatismyipaddress.com/-
unknown
http://www.tiro.comslnt~
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.itcfonts.
unknown
http://www.site.com/logs.php
unknown
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://c
unknown
http://whatismyipaddress.com/
104.16.155.36
http://www.zhongyicts.com.cn
unknown
http://www.carterandcone.como.
unknown
https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=
unknown
https://www.google.com/chrome/static/images/fallback/icon-file-download.jpg
unknown
http://www.carterandcone.comY
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC5bdddb231cf54f958a5b6e76e9d8eee
unknown
https://www.google.com/chrome/static/images/download-browser/pixel_phone.png
unknown
https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex
unknown
https://www.google.com/chrome/static/images/homepage/hero-anim-top-right.png
unknown
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;g
unknown
https://pki.goog/repository/0
unknown
https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=1
unknown
https://srtb.msn.com/auction?a=de-ch&b=fa1a6a09db4c4f6fbf480b78c51caf60&c=MSN&d=http%3A%2F%2Fwww.msn
unknown
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736
unknown
http://www.carterandcone.coml
unknown
http://www.msn.com/
unknown
https://www.google.com/chrome/static/images/fallback/google-logo-one-color.jpg
unknown
http://www.carterandcone.comx
unknown
http://www.jiyu-kobo.co.jp/o
unknown
http://www.jiyu-kobo.co.jp/p
unknown
https://www.google.com/chrome/static/images/fallback/icon-help.jpg
unknown
https://cvision.media.net/new/286x175/2/189/134/171/257b11a9-f3a3-4bb3-9298-c791f456f3d0.jpg?v=9
unknown
https://www.google.com/accounts/servicelogin
unknown
http://crl.pki.goog/gsr2/gsr2.crl0?
unknown
http://pki.goog/gsr2/GTSGIAG3.crt0)
unknown
https://www.google.com/chrome/static/images/fallback/icon-fb.jpg
unknown
https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https:/
unknown
http://www.zhongyicts.com.cnue
unknown
http://www.fontbureau.com/designersTTF
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://www.google.com/chrome/static/images/homepage/google-canary.png
unknown
https://play.google.com/intl/en_us/badges/images/generic/de_badge_web_generic.png
unknown
http://www.carterandcone.com)
unknown
https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
unknown
https://www.google.com/chrome/static/js/main.v2.min.js
unknown
https://www.google.com/chrome/static/images/fallback/icon-description-white-blue-bg.jpg
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCfd484f9188564713bbc5d13d862ebbf
unknown
http://www.carterandcone.com.
unknown
http://www.fontbureau.comT.TTF
unknown
http://www.typography.netD
unknown
http://fontfabrik.com
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
unknown
http://www.founder.com.cn/cn/SC
unknown
https://www.google.com/chrome/static/images/fallback/icon-youtube.jpg
unknown
https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B9B620FEE
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
unknown
http://www.founder.cz$i
unknown
http://www.urwpp.delar
unknown
http://www.urwpp.de
unknown
https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gt
unknown
https://www.google.com/chrome/static/js/installer.min.js
unknown
https://www.google.com/chrome/static/images/download-browser/pixel_tablet.png
unknown
https://whatismyipaddress.comx&
unknown
http://whatismyipaddress.com
unknown
http://www.jiyu-kobo.co.jp/jp/
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
unknown
https://www.google.com/chrome/static/images/homepage/google-beta.png
unknown
http://www.msn.com/de-ch/?ocid=iehp
unknown
https://www.google.com/chrome/static/images/icon-file-download.svg
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.zhongyicts.com.cnva
unknown
http://www.monotype.
unknown
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
unknown
https://cvision.media.net/new/286x175/3/248/152/169/520bb037-5f8d-42d6-934b-d6ec4a6832e8.jpg?v=9
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC54c8a2b02c3446f48a60b41e8a5ff47
unknown
http://cookies.onetrust.mgr.consensu.org/onetrust-logo.svg
unknown
https://contextual.media.net/checksync.php
unknown
http://www.fontbureau.comdK
unknown
http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/scripttemplate
unknown
https://www.google.com/chrome/static/images/folder-applications.svg
unknown
http://foo.com/fooT
unknown
http://www.carterandcone.comva
unknown
https://www.google.com/chrome/static/images/fallback/google-chrome-logo.jpg
unknown
http://www.fontbureau.comessed
unknown
http://google.com/chrome
unknown
https://www.google.com/chrome/static/images/chrome-logo.svg
unknown
https://www.google.com/chrome/static/images/homepage/homepage_features.png
unknown
http://www.fontbureau.coml1
unknown
http://www.sajatypeworks.com
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
whatismyipaddress.com
104.16.155.36
4.179.10.0.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
104.16.154.36
unknown
United States
104.16.155.36
whatismyipaddress.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Hidden
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Y4lA02GQNd_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Windows Update
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
ProgramId
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
FileId
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
LowerCaseLongPath
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
LongPathHash
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
Name
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
Publisher
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
Version
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
BinFileVersion
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
BinaryType
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
ProductName
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
ProductVersion
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
LinkDate
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
BinProductVersion
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
Size
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
Language
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
IsPeFile
\REGISTRY\A\{2b971c66-e337-e024-126f-7ebf8e74d70c}\Root\InventoryApplicationFile\y4la02gqnd.exe|6e91ee68
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
001840064172BCE4
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
842000
unkown
page readonly
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
972000
unkown
page readonly
malicious
972000
unkown
page readonly
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3011000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
842000
unkown
page readonly
malicious
4011000
trusted library allocation
page read and write
malicious
3011000
trusted library allocation
page read and write
malicious
972000
unkown
page readonly
malicious
400000
remote allocation
page execute and read and write
malicious
6DCB000
trusted library allocation
page read and write
malicious
4011000
trusted library allocation
page read and write
malicious
C20000
unkown
page read and write
14CF4923000
heap
page read and write
27EF1000000
heap
page read and write
279D000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
279C000
trusted library allocation
page read and write
DEC000
heap
page read and write
505E000
stack
page read and write
6DBA000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
84BB000
stack
page read and write
EAC000
heap
page read and write
21111AF0000
heap
page read and write
5780000
trusted library allocation
page read and write
578D000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
27EF6100000
heap
page read and write
5791000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
14CF4670000
trusted library allocation
page read and write
27EF088B000
heap
page read and write
576B000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
40A7000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
6DAA000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
27E0000
trusted library allocation
page read and write
27EF5E10000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2190000
heap
page read and write
5785000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
14CF4800000
unkown
page read and write
576E000
trusted library allocation
page read and write
2B2E000
stack
page read and write
577E000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
2F3C000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
810F000
stack
page read and write
814E000
stack
page read and write
8F0000
heap
page read and write
19C08DF0000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
5090000
heap
page read and write
7FBD0000
trusted library allocation
page execute and read and write
2BB0000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
61C000
heap
page read and write
6D50000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
579B000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
E3E000
stack
page read and write
27EF083E000
heap
page read and write
27EF18C0000
trusted library section
page readonly
27EF0913000
heap
page read and write
575B000
trusted library allocation
page read and write
6DCE000
trusted library allocation
page read and write
5080000
trusted library allocation
page execute and read and write
27E0000
trusted library allocation
page read and write
14CF4915000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
19C08C80000
heap
page read and write
27E0000
trusted library allocation
page read and write
BFADC7F000
stack
page read and write
576B000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
5630000
heap
page read and write
6F8E000
stack
page read and write
9F2000
unkown
page readonly
5780000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
5765000
trusted library allocation
page read and write
70CE000
stack
page read and write
279D000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
575F000
trusted library allocation
page read and write
678000
heap
page read and write
8360000
trusted library allocation
page read and write
27EF0FD3000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
27EF5DE0000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
19C08B10000
heap
page read and write
5780000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
970000
unkown
page readonly
840000
unkown
page readonly
FC0000
trusted library allocation
page read and write
62235FF000
stack
page read and write
575B000
trusted library allocation
page read and write
7A4E000
stack
page read and write
FD7000
trusted library allocation
page execute and read and write
D86000
stack
page read and write
27E0000
trusted library allocation
page read and write
6DDD000
trusted library allocation
page read and write
576F000
trusted library allocation
page read and write
2AEB000
trusted library allocation
page execute and read and write
576B000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27EF6088000
heap
page read and write
27E9000
trusted library allocation
page read and write
735E000
stack
page read and write
2A50000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
6962000
trusted library allocation
page read and write
21111B00000
heap
page read and write
534000
heap
page read and write
5788000
trusted library allocation
page read and write
820D000
stack
page read and write
7EA0000
heap
page read and write
76CE000
stack
page read and write
27EF60F0000
heap
page read and write
576D000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page execute and read and write
27EF1118000
heap
page read and write
279D000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
5793000
trusted library allocation
page read and write
FA2000
trusted library allocation
page execute and read and write
5780000
trusted library allocation
page read and write
780E000
stack
page read and write
27EF0829000
heap
page read and write
578E000
trusted library allocation
page read and write
FF7000
trusted library allocation
page execute and read and write
3F081DE000
stack
page read and write
5780000
trusted library allocation
page read and write
5799000
trusted library allocation
page read and write
6962000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5753000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27EF0894000
heap
page read and write
27EF1159000
heap
page read and write
5635000
heap
page read and write
6DDD000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
F00000
heap
page read and write
27A4000
trusted library allocation
page read and write
21111C3C000
heap
page read and write
2691000
heap
page read and write
27E0000
trusted library allocation
page read and write
5344000
heap
page read and write
620000
trusted library allocation
page read and write
12CF000
stack
page read and write
18B0A7D000
stack
page read and write
576D000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
EC0000
heap
page read and write
7D20000
trusted library allocation
page execute and read and write
576B000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
19C09C20000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
27EF0813000
heap
page read and write
27EF601D000
heap
page read and write
FC2000
trusted library allocation
page execute and read and write
21A0000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
534000
heap
page read and write
5758000
trusted library allocation
page read and write
2AEB000
trusted library allocation
page execute and read and write
BFADAFE000
stack
page read and write
8A3D000
stack
page read and write
27E0000
trusted library allocation
page read and write
FD5000
heap
page read and write
27EF5F00000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
6D95000
trusted library allocation
page read and write
7BFE000
stack
page read and write
E3E000
stack
page read and write
576D000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
529D000
stack
page read and write
575B000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5759000
trusted library allocation
page read and write
5764000
trusted library allocation
page read and write
534000
heap
page read and write
27EF0800000
heap
page read and write
5783000
trusted library allocation
page read and write
FF2000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
2ADA000
trusted library allocation
page execute and read and write
575B000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
4E0000
heap
page read and write
6D80000
trusted library allocation
page read and write
8280000
trusted library allocation
page read and write
579F000
trusted library allocation
page read and write
576C000
trusted library allocation
page read and write
27EF5F30000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
7FB0000
trusted library allocation
page read and write
8270000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
E55000
heap
page read and write
18B0F7E000
stack
page read and write
BFADCFE000
stack
page read and write
40A7000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
577F000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
19C08E20000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
21111C49000
heap
page read and write
F8F000
heap
page read and write
27EF08A5000
heap
page read and write
577C000
trusted library allocation
page read and write
6DD6000
trusted library allocation
page read and write
720D000
stack
page read and write
27EF0902000
heap
page read and write
CF6000
stack
page read and write
61D000
heap
page read and write
5780000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
27EF6060000
heap
page read and write
279D000
trusted library allocation
page read and write
6DDA000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5765000
trusted library allocation
page read and write
2EC1000
trusted library allocation
page read and write
EA7000
heap
page read and write
2794000
trusted library allocation
page read and write
6DF5000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
578D000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
14CF4813000
unkown
page read and write
7E6A000
stack
page read and write
893E000
stack
page read and write
5788000
trusted library allocation
page read and write
27EF5DEE000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
E50000
heap
page read and write
279D000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
4F8000
heap
page read and write
21BC000
trusted library allocation
page read and write
27EF18E0000
trusted library section
page readonly
575E000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
27EF1900000
trusted library section
page readonly
27E9000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
758D000
stack
page read and write
710D000
stack
page read and write
2BC0000
heap
page execute and read and write
576D000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
575C000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
19C09BA0000
trusted library allocation
page read and write
C20000
unkown
page read and write
18B0E7E000
stack
page read and write
27EF0855000
heap
page read and write
575B000
trusted library allocation
page read and write
7D10000
trusted library allocation
page execute and read and write
8A40000
trusted library allocation
page read and write
5761000
trusted library allocation
page read and write
E9E000
stack
page read and write
5765000
trusted library allocation
page read and write
5783000
trusted library allocation
page read and write
5630000
heap
page read and write
578E000
trusted library allocation
page read and write
50A000
heap
page read and write
5798000
trusted library allocation
page read and write
27EF18D0000
trusted library section
page readonly
2A70000
heap
page execute and read and write
5785000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
2BC0000
heap
page execute and read and write
19C09BB0000
heap
page readonly
8370000
trusted library allocation
page read and write
8298000
trusted library allocation
page read and write
573E000
stack
page read and write
21111C6F000
heap
page read and write
112F000
stack
page read and write
27EF5E10000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
6E8E000
stack
page read and write
279D000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
578D000
trusted library allocation
page read and write
21111C4C000
heap
page read and write
BFAD38B000
stack
page read and write
7D6D000
stack
page read and write
578E000
trusted library allocation
page read and write
8100000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
45E000
stack
page read and write
5785000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
7A4E000
stack
page read and write
21111C52000
heap
page read and write
578E000
trusted library allocation
page read and write
4F0000
heap
page read and write
578F000
trusted library allocation
page read and write
6DD2000
trusted library allocation
page read and write
2A4D000
stack
page read and write
27E0000
trusted library allocation
page read and write
768E000
stack
page read and write
27E9000
trusted library allocation
page read and write
2AC6000
trusted library allocation
page execute and read and write
5774000
trusted library allocation
page read and write
418000
remote allocation
page execute and read and write
5780000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
5793000
trusted library allocation
page read and write
563F000
stack
page read and write
9D000
stack
page read and write
5780000
trusted library allocation
page read and write
19C08E15000
heap
page read and write
576B000
trusted library allocation
page read and write
5778000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
27EF1158000
heap
page read and write
279E000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
790E000
stack
page read and write
575B000
trusted library allocation
page read and write
6DDD000
trusted library allocation
page read and write
21D1000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
6DE1000
trusted library allocation
page read and write
720D000
stack
page read and write
5768000
trusted library allocation
page read and write
5762000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2991000
trusted library allocation
page read and write
5765000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page execute and read and write
BFADBFB000
stack
page read and write
576B000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
970000
unkown
page readonly
5785000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
554C000
stack
page read and write
27E9000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
80D0000
trusted library allocation
page read and write
710D000
stack
page read and write
5797000
trusted library allocation
page read and write
5799000
trusted library allocation
page read and write
279C000
trusted library allocation
page read and write
7E6A000
stack
page read and write
279D000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
68C000
heap
page read and write
576B000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
F8F000
heap
page read and write
5774000
trusted library allocation
page read and write
27EF08FD000
heap
page read and write
27E9000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
535E000
stack
page read and write
D89000
stack
page read and write
3F0857F000
stack
page read and write
27EF60F5000
heap
page read and write
21111D00000
heap
page read and write
575C000
trusted library allocation
page read and write
D3E000
stack
page read and write
577F000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
8220000
trusted library section
page read and write
27E9000
trusted library allocation
page read and write
14CF4802000
unkown
page read and write
5780000
trusted library allocation
page read and write
21111C00000
heap
page read and write
5785000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
6223579000
stack
page read and write
7CFC000
stack
page read and write
5650000
remote allocation
page read and write
575B000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
27EF088F000
heap
page read and write
578E000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
534000
heap
page read and write
579B000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
27A3000
trusted library allocation
page read and write
7D10000
trusted library allocation
page execute and read and write
5799000
trusted library allocation
page read and write
21111C53000
heap
page read and write
8290000
trusted library allocation
page read and write
7E90000
heap
page read and write
D7E000
stack
page read and write
5777000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
5793000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
27EF5CC0000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
576D000
trusted library allocation
page read and write
62234FD000
stack
page read and write
279D000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
E55000
heap
page read and write
27A4000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
7F470000
trusted library allocation
page execute and read and write
8370000
trusted library allocation
page read and write
534000
heap
page read and write
3569000
trusted library allocation
page read and write
27EF6103000
heap
page read and write
578E000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
BFAE3FF000
stack
page read and write
1C0000
remote allocation
page read and write
21D1000
trusted library allocation
page read and write
70CE000
stack
page read and write
5785000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27EF5F40000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
3F0887F000
stack
page read and write
2790000
trusted library allocation
page read and write
FCA000
trusted library allocation
page execute and read and write
27A7000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
D80000
heap
page read and write
85BA000
stack
page read and write
670000
heap
page read and write
575E000
trusted library allocation
page read and write
D89000
stack
page read and write
21CD000
trusted library allocation
page read and write
5765000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
5776000
trusted library allocation
page read and write
7E70000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2AB2000
trusted library allocation
page execute and read and write
5758000
trusted library allocation
page read and write
BFAD9FA000
stack
page read and write
5610000
trusted library allocation
page read and write
50DE000
stack
page read and write
BFADD7F000
stack
page read and write
1000000
heap
page read and write
17E000
stack
page read and write
5780000
trusted library allocation
page read and write
F83000
heap
page read and write
576B000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
27EF5F10000
trusted library allocation
page read and write
578B000
trusted library allocation
page read and write
21111B90000
trusted library allocation
page read and write
19C08E10000
heap
page read and write
2ACA000
trusted library allocation
page execute and read and write
2AE2000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
5761000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
D85000
heap
page read and write
8270000
trusted library section
page read and write
5780000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page execute and read and write
622319F000
stack
page read and write
27E9000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5798000
trusted library allocation
page read and write
6DE5000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
577D000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
5635000
heap
page read and write
575B000
trusted library allocation
page read and write
5765000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
575C000
trusted library allocation
page read and write
5775000
trusted library allocation
page read and write
27EF5EB0000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
27EF0640000
heap
page read and write
578F000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
7FB0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
826B000
stack
page read and write
5220000
trusted library allocation
page read and write
76CE000
stack
page read and write
279D000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
27EF5E04000
trusted library allocation
page read and write
14CF4837000
heap
page read and write
5755000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
5765000
trusted library allocation
page read and write
14CF4A13000
heap
page read and write
5780000
trusted library allocation
page read and write
2CCE000
stack
page read and write
5797000
trusted library allocation
page read and write
BFADE79000
stack
page read and write
5780000
trusted library allocation
page read and write
27EF5F20000
trusted library allocation
page read and write
529D000
stack
page read and write
279D000
trusted library allocation
page read and write
F00000
heap
page read and write
8630000
heap
page execute and read and write
27A4000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
21111D02000
heap
page read and write
279D000
trusted library allocation
page read and write
198000
stack
page read and write
BFAE0FB000
stack
page read and write
575C000
trusted library allocation
page read and write
5793000
trusted library allocation
page read and write
9F2000
unkown
page readonly
279D000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
534000
heap
page read and write
5780000
trusted library allocation
page read and write
544E000
stack
page read and write
5753000
trusted library allocation
page read and write
14CF4900000
trusted library allocation
page read and write
7FC0000
trusted library allocation
page read and write
5774000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
5797000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
21111C86000
heap
page read and write
27A4000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
DB8000
heap
page read and write
7E86000
heap
page read and write
575B000
trusted library allocation
page read and write
790E000
stack
page read and write
535000
heap
page read and write
5763000
trusted library allocation
page read and write
568E000
stack
page read and write
27EF086F000
heap
page read and write
27EF0879000
heap
page read and write
5018000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
735E000
stack
page read and write
577F000
trusted library allocation
page read and write
21111B60000
heap
page read and write
BFAE1FA000
stack
page read and write
5780000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
7B9B000
stack
page read and write
5799000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
54D0000
trusted library allocation
page execute and read and write
27E0000
trusted library allocation
page read and write
14CF4B13000
heap
page read and write
27E9000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
6DCE000
trusted library allocation
page read and write
5650000
remote allocation
page read and write
52B0000
trusted library allocation
page read and write
818D000
stack
page read and write
578E000
trusted library allocation
page read and write
575C000
trusted library allocation
page read and write
21111C67000
heap
page read and write
5780000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
21111C50000
heap
page read and write
578E000
trusted library allocation
page read and write
5754000
trusted library allocation
page read and write
6DD6000
trusted library allocation
page read and write
5799000
trusted library allocation
page read and write
6DC6000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
19C09BD0000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
2AA2000
trusted library allocation
page execute and read and write
18B0BFB000
stack
page read and write
27E9000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
6DE5000
trusted library allocation
page read and write
27EF17E0000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27EF603B000
heap
page read and write
577E000
trusted library allocation
page read and write
2794000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
577F000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
576E000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
684C000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
21BC000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
6DE1000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
7CFC000
stack
page read and write
452000
remote allocation
page execute and read and write
5777000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
5340000
heap
page read and write
576B000
trusted library allocation
page read and write
3F0897E000
stack
page read and write
5774000
trusted library allocation
page read and write
8BF000
stack
page read and write
577C000
trusted library allocation
page read and write
14CF4660000
heap
page read and write
7F70000
remote allocation
page read and write
BFAD7F7000
stack
page read and write
745E000
stack
page read and write
2AC6000
trusted library allocation
page execute and read and write
19C000
stack
page read and write
5780000
trusted library allocation
page read and write
27EF6000000
heap
page read and write
21111C4F000
heap
page read and write
5780000
trusted library allocation
page read and write
FDA000
trusted library allocation
page execute and read and write
5785000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
2B7E000
stack
page read and write
27E9000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
6FCE000
stack
page read and write
EAC000
heap
page read and write
5757000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
FE2000
trusted library allocation
page execute and read and write
5795000
trusted library allocation
page read and write
19C08E19000
heap
page read and write
27EF1102000
heap
page read and write
2F30000
trusted library allocation
page read and write
5768000
trusted library allocation
page read and write
5783000
trusted library allocation
page read and write
579E000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
BFAD8FD000
stack
page read and write
11CF000
stack
page read and write
27E0000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
19C08CCE000
heap
page read and write
575B000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
5774000
trusted library allocation
page read and write
EE0000
heap
page read and write
279D000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
7E90000
heap
page read and write
400000
remote allocation
page execute and read and write
27E9000
trusted library allocation
page read and write
19C08C86000
heap
page read and write
576B000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
534000
heap
page read and write
575C000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
577F000
trusted library allocation
page read and write
84BB000
stack
page read and write
27EF18F0000
trusted library section
page readonly
5791000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
6DE5000
trusted library allocation
page read and write
3F0815E000
stack
page read and write
27EF6402000
heap
page read and write
279D000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
6DCE000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
6E09000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
7EA0000
heap
page read and write
2260000
heap
page read and write
5780000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
2A0E000
stack
page read and write
577C000
trusted library allocation
page read and write
2AE2000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
1C0000
remote allocation
page read and write
9D000
stack
page read and write
279D000
trusted library allocation
page read and write
279C000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
575C000
trusted library allocation
page read and write
21111C67000
heap
page read and write
7D6D000
stack
page read and write
2AA2000
trusted library allocation
page execute and read and write
5799000
trusted library allocation
page read and write
534000
heap
page read and write
577E000
trusted library allocation
page read and write
14CF4902000
trusted library allocation
page read and write
521E000
stack
page read and write
577C000
trusted library allocation
page read and write
27EF0FD0000
trusted library allocation
page read and write
970000
unkown
page readonly
21111C4D000
heap
page read and write
576B000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
BFADEFF000
stack
page read and write
578F000
trusted library allocation
page read and write
8220000
trusted library section
page read and write
535000
heap
page read and write
19C08DE0000
trusted library allocation
page read and write
CFA000
stack
page read and write
27E0000
trusted library allocation
page read and write
18B0D7E000
stack
page read and write
576D000
trusted library allocation
page read and write
780E000
stack
page read and write
5766000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
545E000
stack
page read and write
535000
heap
page read and write
5799000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
18B0F79000
stack
page read and write
575A000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5799000
trusted library allocation
page read and write
2ACA000
trusted library allocation
page execute and read and write
27EF1002000
heap
page read and write
5780000
trusted library allocation
page read and write
FD5000
heap
page read and write
EA0000
heap
page read and write
5780000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5776000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2B2E000
stack
page read and write
577E000
trusted library allocation
page read and write
5799000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
576E000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
27EF602B000
heap
page read and write
51B0000
trusted library allocation
page execute and read and write
5755000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
800E000
unkown
page read and write
576B000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
21111D08000
heap
page read and write
3F084FB000
stack
page read and write
6DC2000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
FC9000
heap
page read and write
7F470000
trusted library allocation
page execute and read and write
279D000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
82A0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
5763000
trusted library allocation
page read and write
27EF0FE0000
trusted library allocation
page read and write
11CF000
stack
page read and write
5766000
trusted library allocation
page read and write
51AE000
stack
page read and write
5780000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
2BC4000
heap
page execute and read and write
2BC4000
heap
page execute and read and write
27EF0FF0000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
5777000
trusted library allocation
page read and write
14CF4B00000
heap
page read and write
279D000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
3F080DC000
stack
page read and write
27E0000
trusted library allocation
page read and write
8630000
heap
page execute and read and write
27E0000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
27EF60FD000
heap
page read and write
279D000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
768E000
stack
page read and write
5765000
trusted library allocation
page read and write
21C9000
trusted library allocation
page read and write
5799000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
19C09BC0000
trusted library allocation
page read and write
575F000
trusted library allocation
page read and write
2AD2000
trusted library allocation
page execute and read and write
FCC000
trusted library allocation
page execute and read and write
77CD000
stack
page read and write
279D000
trusted library allocation
page read and write
2ADA000
trusted library allocation
page execute and read and write
5774000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27EF05E0000
heap
page read and write
5795000
trusted library allocation
page read and write
21111D13000
heap
page read and write
279D000
trusted library allocation
page read and write
EC7000
heap
page read and write
5755000
trusted library allocation
page read and write
5793000
trusted library allocation
page read and write
12CF000
stack
page read and write
2AC2000
trusted library allocation
page read and write
7E86000
heap
page read and write
27E9000
trusted library allocation
page read and write
27EF5F40000
remote allocation
page read and write
576B000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
27EF0740000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
19C08B20000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
579B000
trusted library allocation
page read and write
554C000
stack
page read and write
61D000
heap
page read and write
5752000
trusted library allocation
page read and write
8C2000
unkown
page readonly
27E9000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
684C000
trusted library allocation
page read and write
5764000
trusted library allocation
page read and write
21BD000
trusted library allocation
page read and write
27EF1118000
heap
page read and write
5765000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
534000
heap
page read and write
6DA1000
trusted library allocation
page read and write
900000
heap
page read and write
5776000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
90D000
heap
page read and write
578E000
trusted library allocation
page read and write
5762000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
575F000
trusted library allocation
page read and write
579A000
trusted library allocation
page read and write
5798000
trusted library allocation
page read and write
579B000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
5344000
heap
page read and write
610000
heap
page read and write
D86000
stack
page read and write
27E0000
trusted library allocation
page read and write
579B000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
2AB2000
trusted library allocation
page execute and read and write
578E000
trusted library allocation
page read and write
E50000
heap
page read and write
5780000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
535000
heap
page read and write
21CD000
trusted library allocation
page read and write
5759000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
5018000
trusted library allocation
page read and write
21112602000
trusted library allocation
page read and write
27EF6048000
heap
page read and write
578E000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
794E000
stack
page read and write
F8F000
heap
page read and write
5782000
trusted library allocation
page read and write
575C000
trusted library allocation
page read and write
553E000
stack
page read and write
279D000
trusted library allocation
page read and write
5775000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
6DC6000
trusted library allocation
page read and write
27EF5F40000
remote allocation
page read and write
577D000
trusted library allocation
page read and write
6DF5000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
8210000
trusted library allocation
page read and write
ED7000
heap
page read and write
5765000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
21BC000
trusted library allocation
page read and write
418000
remote allocation
page execute and read and write
30000
heap
page read and write
27E9000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
577F000
trusted library allocation
page read and write
279C000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
8230000
trusted library allocation
page read and write
14CF4A02000
heap
page read and write
279D000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
57E000
stack
page read and write
21BC000
trusted library allocation
page read and write
6DBC000
trusted library allocation
page read and write
FAA000
trusted library allocation
page execute and read and write
279D000
trusted library allocation
page read and write
6F8E000
stack
page read and write
19C08E00000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
2CCE000
stack
page read and write
7A9D000
stack
page read and write
14CF4828000
heap
page read and write
575B000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
19C08CCE000
heap
page read and write
575F000
trusted library allocation
page read and write
27EF0FB1000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
5780000
trusted library allocation
page read and write
5774000
trusted library allocation
page read and write
EC0000
heap
page read and write
5780000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
2A0B000
trusted library allocation
page read and write
2794000
trusted library allocation
page read and write
27EF0857000
heap
page read and write
27E0000
trusted library allocation
page read and write
27EF1C60000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
5550000
trusted library section
page readonly
27E0000
trusted library allocation
page read and write
8280000
trusted library allocation
page read and write
21CC000
trusted library allocation
page read and write
F0A000
heap
page read and write
5795000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
85BA000
stack
page read and write
9C0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
BFADF7F000
stack
page read and write
6D70000
trusted library allocation
page read and write
27EF0750000
trusted library section
page read and write
5763000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
27EF1910000
trusted library section
page readonly
80E0000
trusted library allocation
page read and write
21BC000
trusted library allocation
page read and write
C8A000
stack
page read and write
EE0000
heap
page read and write
622347F000
stack
page read and write
5780000
trusted library allocation
page read and write
534000
heap
page read and write
1C0000
remote allocation
page read and write
534000
heap
page read and write
27EF60A8000
heap
page read and write
27E9000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
27EA000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
90C000
heap
page read and write
30000
heap
page read and write
576B000
trusted library allocation
page read and write
534000
heap
page read and write
27E9000
trusted library allocation
page read and write
4AE000
stack
page read and write
5785000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
21C5000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
EA0000
heap
page read and write
6DDA000
trusted library allocation
page read and write
5230000
trusted library allocation
page execute and read and write
575F000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
530000
heap
page read and write
5780000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
9F2000
unkown
page readonly
21C4000
trusted library allocation
page read and write
6D57000
trusted library allocation
page read and write
C8A000
stack
page read and write
5780000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
ED0000
heap
page read and write
7F70000
remote allocation
page read and write
883B000
stack
page read and write
279D000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
3F0867B000
stack
page read and write
5780000
trusted library allocation
page read and write
FEA000
trusted library allocation
page execute and read and write
5791000
trusted library allocation
page read and write
EA7000
heap
page read and write
279D000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
19C09960000
trusted library allocation
page read and write
19C08CCE000
heap
page read and write
27E0000
trusted library allocation
page read and write
7910000
remote allocation
page read and write
5795000
trusted library allocation
page read and write
460000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27EF0874000
heap
page read and write
83BE000
stack
page read and write
27E0000
trusted library allocation
page read and write
DB0000
heap
page read and write
579B000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
577F000
trusted library allocation
page read and write
826B000
stack
page read and write
5788000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
27EF5CD0000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
575C000
trusted library allocation
page read and write
19C08CC6000
heap
page read and write
5780000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
7A9D000
stack
page read and write
3F08777000
stack
page read and write
6DB1000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
7BE000
stack
page read and write
7FB0000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
578F000
stack
page read and write
6DDA000
trusted library allocation
page read and write
5550000
trusted library section
page readonly
27E9000
trusted library allocation
page read and write
5340000
heap
page read and write
578F000
trusted library allocation
page read and write
51DE000
stack
page read and write
577F000
trusted library allocation
page read and write
122E000
stack
page read and write
5740000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
578C000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
576C000
trusted library allocation
page read and write
6E8E000
stack
page read and write
27E9000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2AD2000
trusted library allocation
page execute and read and write
7E70000
heap
page read and write
27E0000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
21111C7C000
heap
page read and write
575E000
trusted library allocation
page read and write
5797000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
21111C13000
heap
page read and write
27EF6406000
heap
page read and write
FD2000
trusted library allocation
page read and write
6DD6000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
82A0000
trusted library allocation
page read and write
5765000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
622311D000
stack
page read and write
19C08D80000
heap
page read and write
5793000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
5776000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
8360000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
D90000
heap
page read and write
ED7000
heap
page read and write
27EF5E24000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
61D000
heap
page read and write
8C2000
unkown
page readonly
6FCE000
stack
page read and write
5780000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
873D000
stack
page read and write
1C0000
remote allocation
page read and write
7910000
remote allocation
page read and write
27E0000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page execute and read and write
578E000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
21111C48000
heap
page read and write
82B0000
trusted library allocation
page read and write
27EF1301000
trusted library allocation
page read and write
51AE000
stack
page read and write
6DD2000
trusted library allocation
page read and write
7FC0000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
50A1000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
575F000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
279C000
trusted library allocation
page read and write
279C000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2690000
heap
page read and write
27EF1113000
heap
page read and write
27E9000
trusted library allocation
page read and write
2794000
trusted library allocation
page read and write
579B000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
5795000
trusted library allocation
page read and write
5761000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
83BE000
stack
page read and write
5766000
trusted library allocation
page read and write
80F0000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
14CF480D000
unkown
page read and write
6223679000
stack
page read and write
7BFE000
stack
page read and write
6DE1000
trusted library allocation
page read and write
27EF5EF0000
trusted library allocation
page read and write
BFADFFF000
stack
page read and write
5650000
remote allocation
page read and write
5777000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
2B7D000
stack
page read and write
578E000
trusted library allocation
page read and write
14CF4837000
heap
page read and write
5755000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
EC7000
heap
page read and write
EAB000
heap
page read and write
575F000
trusted library allocation
page read and write
578D000
trusted library allocation
page read and write
21111C29000
heap
page read and write
5780000
trusted library allocation
page read and write
5CE000
stack
page read and write
279D000
trusted library allocation
page read and write
544E000
stack
page read and write
576B000
trusted library allocation
page read and write
279C000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
27EF089F000
heap
page read and write
279D000
trusted library allocation
page read and write
27EF60A6000
heap
page read and write
903000
heap
page read and write
575C000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2AC2000
trusted library allocation
page read and write
27EF5DE8000
trusted library allocation
page read and write
575F000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
535000
heap
page read and write
27E9000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
576C000
trusted library allocation
page read and write
5776000
trusted library allocation
page read and write
27EF6400000
heap
page read and write
794E000
stack
page read and write
2791000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
7E70000
heap
page read and write
52B0000
trusted library allocation
page read and write
577F000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
7B9B000
stack
page read and write
27E0000
trusted library allocation
page read and write
81CE000
stack
page read and write
27E9000
trusted library allocation
page read and write
19C08C50000
heap
page read and write
5752000
trusted library allocation
page read and write
575C000
trusted library allocation
page read and write
FB0000
heap
page read and write
577E000
trusted library allocation
page read and write
ED0000
heap
page read and write
578E000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27EF088D000
heap
page read and write
51B0000
trusted library allocation
page execute and read and write
6940000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
21111C4B000
heap
page read and write
27EF05D0000
heap
page read and write
27E9000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
5230000
trusted library allocation
page execute and read and write
577E000
trusted library allocation
page read and write
2B7D000
stack
page read and write
86F000
stack
page read and write
578E000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
7D20000
trusted library allocation
page execute and read and write
575C000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27EF5E01000
trusted library allocation
page read and write
8270000
trusted library section
page read and write
7E99000
heap
page read and write
2AC0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
2F48000
trusted library allocation
page read and write
14CF46D0000
heap
page read and write
5785000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
E9E000
stack
page read and write
5780000
trusted library allocation
page read and write
14CF4B02000
heap
page read and write
27EF1100000
heap
page read and write
575C000
trusted library allocation
page read and write
27EF08AE000
heap
page read and write
27EF5F40000
remote allocation
page read and write
5799000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
7E99000
heap
page read and write
575B000
trusted library allocation
page read and write
579D000
trusted library allocation
page read and write
840000
unkown
page readonly
27E9000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
27EF5E00000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
573E000
stack
page read and write
27E0000
trusted library allocation
page read and write
1020000
heap
page read and write
6D51000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5797000
trusted library allocation
page read and write
576E000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
95B000
stack
page read and write
5780000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
577F000
trusted library allocation
page read and write
27EF1015000
heap
page read and write
5780000
trusted library allocation
page read and write
27EA000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
FFB000
trusted library allocation
page execute and read and write
578F000
trusted library allocation
page read and write
575F000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
622309B000
stack
page read and write
5799000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27EF5E20000
trusted library allocation
page read and write
5757000
trusted library allocation
page read and write
279D000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
531E000
stack
page read and write
5780000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
758D000
stack
page read and write
5780000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
575C000
trusted library allocation
page read and write
2691000
heap
page read and write
745E000
stack
page read and write
534000
heap
page read and write
5780000
trusted library allocation
page read and write
577F000
trusted library allocation
page read and write
96F000
stack
page read and write
27EF6012000
heap
page read and write
3EC1000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
7910000
remote allocation
page read and write
5752000
trusted library allocation
page read and write
21111C91000
heap
page read and write
6DEB000
trusted library allocation
page read and write
77CD000
stack
page read and write
577E000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
27EF5DE0000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
There are 1526 hidden memdumps, click here to show them.