IOC Report
Halkbank_Ekstre_20220525_103511_102798 (2).exe

loading gif

Files

File Path
Type
Category
Malicious
Halkbank_Ekstre_20220525_103511_102798 (2).exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\firefox\firefox.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_UNNHQCRYQ1ZFCITV_e531fb32b3144411c4bc2422ecfac52bfde9af_d16772c1_006a1dc6\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4EF.tmp.dmp
Mini DuMP crash report, 15 streams, Fri May 27 15:37:27 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD2D.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFAF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\firefox.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\2d_PCX.ico
MS Windows icon resource - 2 icons, 16x16, 8 bits/pixel, 32x32, 8 bits/pixel
dropped
C:\Users\user\AppData\Roaming\xj1musnl.dy5\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3032001
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Halkbank_Ekstre_20220525_103511_102798 (2).exe
"C:\Users\user\Desktop\Halkbank_Ekstre_20220525_103511_102798 (2).exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
malicious
C:\Users\user\AppData\Roaming\firefox\firefox.exe
"C:\Users\user\AppData\Roaming\firefox\firefox.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 1304
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 1304
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://dsssdsa.fa)Uri
unknown
http://127.0.0.1:HTTP/1.1
unknown
https://sectigo.com/CPS0
unknown
https://rufus.ie
unknown
https://api.ipify.org%appdata
unknown
http://sawebservice.red-gate.com/
unknown
http://www.smartassembly.com/webservices/Reporting/UploadReport2
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
unknown
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
unknown
http://LJWAmo.com
unknown
http://mail.gowiththegecko.com.au
unknown
https://dsssdsa.fa
unknown
http://www.smartassembly.com/webservices/Reporting/
unknown
https://www.gnu.org/licenses/gpl-3.0.htmlF
unknown
https://api.ipify.org%
unknown
http://www.smartassembly.com/webservices/UploadReportLogin/
unknown
http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
unknown
http://71gdspwVDHVhJVZvkZU1.org
unknown
http://crl.microsoft.?t
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.gowiththegecko.com.au
110.173.135.85
malicious

IPs

IP
Domain
Country
Malicious
110.173.135.85
mail.gowiththegecko.com.au
Australia
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
firefox
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
firefox
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
ProgramId
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
FileId
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
LowerCaseLongPath
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
LongPathHash
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
Name
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
Publisher
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
Version
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
BinFileVersion
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
BinaryType
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
ProductName
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
ProductVersion
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
LinkDate
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
BinProductVersion
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
Size
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
Language
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
IsPeFile
\REGISTRY\A\{e1c1a5c5-27c0-c28a-6a29-09e1a337d74a}\Root\InventoryApplicationFile\halkbank_ekstre_|c6dc8986
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3A89000
trusted library allocation
page read and write
malicious
2841000
trusted library allocation
page read and write
malicious
3A89000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3A89000
trusted library allocation
page read and write
malicious
60F0000
trusted library allocation
page read and write
6480000
trusted library allocation
page read and write
5ED9000
trusted library allocation
page read and write
1B7F8F14000
heap
page read and write
6170000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6C4B3F9000
stack
page read and write
1D16F849000
heap
page read and write
1614AFE000
stack
page read and write
6495000
trusted library allocation
page read and write
64A8000
trusted library allocation
page read and write
1B7F8F07000
heap
page read and write
5880000
heap
page execute and read and write
6170000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
D7D000
trusted library allocation
page execute and read and write
1B7F8E2A000
heap
page read and write
6170000
trusted library allocation
page read and write
5990000
trusted library allocation
page execute and read and write
1D16F8B0000
heap
page read and write
60E0000
trusted library allocation
page read and write
1D2B8041000
heap
page read and write
E61000
heap
page read and write
6170000
trusted library allocation
page read and write
B90000
heap
page read and write
D74000
trusted library allocation
page read and write
D40000
heap
page read and write
59ED000
stack
page read and write
1B7FE4F0000
trusted library allocation
page read and write
181E000
stack
page read and write
28EA96B0000
heap
page read and write
CF8F5FC000
stack
page read and write
1D170175000
heap
page read and write
1B7FE320000
trusted library allocation
page read and write
12416C93000
heap
page read and write
1D2B8050000
heap
page read and write
14DC7C26000
heap
page read and write
6C4B2F9000
stack
page read and write
16150FF000
stack
page read and write
6170000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1B7F8EB2000
heap
page read and write
675707E000
stack
page read and write
6171000
trusted library allocation
page read and write
2A81000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
1E38B113000
heap
page read and write
28EA9722000
heap
page read and write
60F0000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
26FBEA42000
heap
page read and write
E15000
heap
page read and write
60F0000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
5A5E000
stack
page read and write
1D170189000
heap
page read and write
6A00000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
4DC5000
trusted library allocation
page read and write
2BC4000
trusted library allocation
page read and write
B8B000
trusted library allocation
page execute and read and write
2B9C6C55000
heap
page read and write
D40000
heap
page read and write
283E000
stack
page read and write
6490000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
2B9C6D08000
heap
page read and write
60E0000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
1D2B8079000
heap
page read and write
1D170171000
heap
page read and write
3899000
trusted library allocation
page read and write
1614D7B000
stack
page read and write
CE0000
heap
page read and write
60F0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
60F1000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
4F64000
trusted library allocation
page read and write
1D170602000
heap
page read and write
12416C88000
heap
page read and write
5260000
trusted library allocation
page read and write
6490000
trusted library allocation
page read and write
1D170191000
heap
page read and write
12416D00000
heap
page read and write
6190000
trusted library allocation
page read and write
3A81000
trusted library allocation
page read and write
6171000
trusted library allocation
page read and write
28EA96F5000
heap
page read and write
E2D000
heap
page read and write
123C000
stack
page read and write
6185000
trusted library allocation
page read and write
14F4000
heap
page read and write
6170000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
1B7F9759000
heap
page read and write
6170000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
4F94000
trusted library allocation
page read and write
1B7FE500000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1614A7B000
stack
page read and write
20835E5B000
heap
page read and write
CF8F9FB000
stack
page read and write
C6C000
heap
page read and write
5F20000
trusted library allocation
page read and write
1C311E48000
heap
page read and write
5EAD000
trusted library allocation
page read and write
1D16F8B3000
heap
page read and write
D84000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
60F0000
trusted library allocation
page read and write
1D16F813000
heap
page read and write
69D0000
trusted library allocation
page read and write
1D170175000
heap
page read and write
B82000
trusted library allocation
page read and write
EBBF67B000
stack
page read and write
2C01000
trusted library allocation
page read and write
6185000
trusted library allocation
page read and write
12416C54000
heap
page read and write
6170000
trusted library allocation
page read and write
D2E000
stack
page read and write
60F0000
trusted library allocation
page read and write
1B7F9704000
heap
page read and write
E82000
heap
page read and write
2A6C000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
1D17017A000
heap
page read and write
59A0000
trusted library allocation
page read and write
2B9C6C5C000
heap
page read and write
1D170186000
heap
page read and write
E77000
heap
page read and write
60F0000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
22ECA966000
heap
page read and write
1D2B8047000
heap
page read and write
6190000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1D16F902000
heap
page read and write
26FBE890000
heap
page read and write
185E000
stack
page read and write
1D170100000
heap
page read and write
6170000
trusted library allocation
page read and write
559C377000
stack
page read and write
5A10000
trusted library allocation
page read and write
26FBF300000
heap
page read and write
6183000
trusted library allocation
page read and write
1D170191000
heap
page read and write
6180000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
1B7F8E66000
heap
page read and write
12416A40000
heap
page read and write
14DC7C02000
heap
page read and write
6180000
trusted library allocation
page read and write
E15000
heap
page read and write
1D170602000
heap
page read and write
F8F000
stack
page read and write
1D1701AC000
heap
page read and write
28EA9732000
heap
page read and write
60F0000
trusted library allocation
page read and write
1B7FE850000
remote allocation
page read and write
61C0000
trusted library allocation
page read and write
6144000
trusted library allocation
page read and write
4D84000
trusted library allocation
page read and write
4F88000
trusted library allocation
page read and write
ECC4FF000
stack
page read and write
6180000
trusted library allocation
page read and write
617C000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
1E38AFF0000
heap
page read and write
1B7FE4CE000
trusted library allocation
page read and write
215F0160000
trusted library allocation
page read and write
2B9C6C3C000
heap
page read and write
5E1C000
stack
page read and write
6180000
trusted library allocation
page read and write
9D5000
heap
page read and write
195F000
stack
page read and write
69D0000
trusted library allocation
page read and write
A5C000
stack
page read and write
6170000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
6185000
trusted library allocation
page read and write
2B3F000
trusted library allocation
page read and write
5C0000
heap
page read and write
60E0000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
1D16F84A000
heap
page read and write
5CDF000
stack
page read and write
6170000
trusted library allocation
page read and write
14E6000
heap
page read and write
F10000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
F82000
unkown
page readonly
61C7000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1D16F8E5000
heap
page read and write
22ECA92E000
heap
page read and write
6170000
trusted library allocation
page read and write
4FA1FFE000
stack
page read and write
6170000
trusted library allocation
page read and write
2BFF000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
64F0000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
133C000
stack
page read and write
6180000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
1B7FE4C0000
trusted library allocation
page read and write
5E5E000
stack
page read and write
59A0000
trusted library allocation
page read and write
208377A0000
trusted library allocation
page read and write
6500000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1D170618000
heap
page read and write
22ECAAC0000
heap
page read and write
1D170175000
heap
page read and write
6180000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1D170167000
heap
page read and write
5CDF000
stack
page read and write
4DC0000
trusted library allocation
page read and write
D84000
trusted library allocation
page read and write
2BDC000
trusted library allocation
page read and write
12416C49000
heap
page read and write
5010000
trusted library allocation
page read and write
20835E59000
heap
page read and write
60F0000
trusted library allocation
page read and write
5021000
trusted library allocation
page read and write
1D170186000
heap
page read and write
20835E3D000
heap
page read and write
5130000
trusted library allocation
page read and write
1B7FE620000
trusted library allocation
page read and write
B76000
trusted library allocation
page execute and read and write
1D16F83C000
heap
page read and write
1D170196000
heap
page read and write
60F0000
trusted library allocation
page read and write
4FA16FB000
stack
page read and write
5E5E000
stack
page read and write
5960000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
950000
remote allocation
page read and write
1D16F6B0000
heap
page read and write
5260000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
1E38B075000
heap
page read and write
656E000
stack
page read and write
16BE000
stack
page read and write
6185000
trusted library allocation
page read and write
1D170182000
heap
page read and write
9D0000
heap
page read and write
950000
remote allocation
page read and write
1C312802000
trusted library allocation
page read and write
BC7000
heap
page read and write
B6F3A7F000
stack
page read and write
6180000
trusted library allocation
page read and write
E61000
heap
page read and write
1E38B05A000
heap
page read and write
59F0000
trusted library allocation
page read and write
4C1E000
stack
page read and write
1E38BA02000
trusted library allocation
page read and write
1D2B806F000
heap
page read and write
6190000
trusted library allocation
page read and write
22ECB8E0000
trusted library allocation
page read and write
7AE000
unkown
page readonly
6185000
trusted library allocation
page read and write
2B9C7490000
trusted library allocation
page read and write
2B9C6C62000
heap
page read and write
1D17019E000
heap
page read and write
1D2B803E000
heap
page read and write
5863000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1C311D30000
heap
page read and write
1B7FE590000
trusted library allocation
page read and write
5F9E000
stack
page read and write
1D16F8EF000
heap
page read and write
4E1E000
stack
page read and write
64D0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
20837802000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
12416C00000
heap
page read and write
69B0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
EBBF77F000
stack
page read and write
1B7F8E5E000
heap
page read and write
6140000
trusted library allocation
page read and write
4F88000
trusted library allocation
page read and write
83B000
stack
page read and write
5EBE000
trusted library allocation
page read and write
26FBEA29000
heap
page read and write
1B7F9602000
heap
page read and write
6140000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
28EA973F000
heap
page read and write
215F0275000
heap
page read and write
6170000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
FD0000
trusted library allocation
page execute and read and write
1D170193000
heap
page read and write
1B7F9713000
heap
page read and write
59B0000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
938000
stack
page read and write
6180000
trusted library allocation
page read and write
60F8000
trusted library allocation
page read and write
1B7FE61D000
heap
page read and write
B6F331C000
stack
page read and write
4F21000
heap
page read and write
5E9F000
trusted library allocation
page read and write
2B9C6C5F000
heap
page read and write
D8D000
trusted library allocation
page execute and read and write
2910000
trusted library allocation
page read and write
1E38B050000
heap
page read and write
1D1701AF000
heap
page read and write
ECBD7B000
stack
page read and write
6756EF7000
stack
page read and write
3A81000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
F26000
heap
page read and write
E77000
heap
page read and write
2BBC000
trusted library allocation
page read and write
5F9E000
stack
page read and write
60F0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
EBBF6FE000
stack
page read and write
5EC3000
trusted library allocation
page read and write
2B8E000
trusted library allocation
page read and write
14DC7BA0000
remote allocation
page read and write
22ECAB30000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
1B7F8EA7000
heap
page read and write
204974E7000
heap
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1B7F8E91000
heap
page read and write
2B42000
trusted library allocation
page read and write
1D2B804F000
heap
page read and write
4D64000
heap
page read and write
6140000
trusted library allocation
page read and write
1D16F6C0000
heap
page read and write
2A56000
trusted library allocation
page read and write
2A6C000
trusted library allocation
page read and write
124169D0000
heap
page read and write
1B7F8E00000
heap
page read and write
1D170193000
heap
page read and write
5010000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
6756DFB000
stack
page read and write
5346000
trusted library allocation
page read and write
8C8CA7F000
stack
page read and write
7E0000
unkown
page read and write
1B7F9E70000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1D2B8A02000
trusted library allocation
page read and write
FAB000
trusted library allocation
page execute and read and write
26FBF313000
heap
page read and write
1D1701A4000
heap
page read and write
5A10000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
1D16F84F000
heap
page read and write
61EE000
stack
page read and write
1B7FA313000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
1D16F871000
heap
page read and write
1B7F8E13000
heap
page read and write
FAB000
trusted library allocation
page execute and read and write
2B9C6C2F000
heap
page read and write
614E000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
E82000
heap
page read and write
1C311F00000
heap
page read and write
1B7FE5D0000
trusted library allocation
page read and write
20835DE0000
remote allocation
page read and write
6140000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
CCE000
stack
page read and write
6170000
trusted library allocation
page read and write
61DE000
stack
page read and write
6A10000
trusted library allocation
page read and write
5E2B000
trusted library allocation
page read and write
1B7FE930000
trusted library allocation
page read and write
CF8F8FE000
stack
page read and write
5010000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
4D20000
heap
page read and write
4D95000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
1D170176000
heap
page read and write
5A10000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
5E1C000
stack
page read and write
1D2B7F00000
heap
page read and write
14DC7C5E000
heap
page read and write
5B8D000
stack
page read and write
5A10000
trusted library allocation
page read and write
5A5E000
stack
page read and write
6180000
trusted library allocation
page read and write
1D2B8023000
heap
page read and write
69B0000
trusted library allocation
page read and write
2B9C6D00000
heap
page read and write
6170000
trusted library allocation
page read and write
6185000
trusted library allocation
page read and write
559C6FF000
unkown
page read and write
6A20000
trusted library allocation
page read and write
5EC9000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
64E0000
trusted library allocation
page read and write
D7D000
trusted library allocation
page execute and read and write
215F0302000
heap
page read and write
B6D000
trusted library allocation
page execute and read and write
60F0000
trusted library allocation
page read and write
22ECA860000
trusted library allocation
page read and write
1D2B807D000
heap
page read and write
28EA9724000
heap
page read and write
1D16F8FC000
heap
page read and write
1D1705C0000
remote allocation
page read and write
6170000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
950000
remote allocation
page read and write
61A0000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
1993000
trusted library allocation
page execute and read and write
5A11000
trusted library allocation
page read and write
4FA1BFF000
stack
page read and write
1D170186000
heap
page read and write
6146000
trusted library allocation
page read and write
1D2B8048000
heap
page read and write
215F0279000
heap
page read and write
6170000
trusted library allocation
page read and write
12416D02000
heap
page read and write
6A00000
trusted library allocation
page read and write
204972A0000
heap
page read and write
22ECA94C000
heap
page read and write
69D0000
trusted library allocation
page read and write
559C17E000
stack
page read and write
60F0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
215F0300000
heap
page read and write
23C54FF000
stack
page read and write
6140000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
26FBEA00000
heap
page read and write
1D17018D000
heap
page read and write
4DC5000
trusted library allocation
page read and write
2A56000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
28EA9728000
heap
page read and write
20835F18000
heap
page read and write
1D16F848000
heap
page read and write
1D17014B000
heap
page read and write
69D0000
trusted library allocation
page read and write
559BD8E000
stack
page read and write
1D170621000
heap
page read and write
C81000
heap
page read and write
6185000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
204973E0000
heap
page read and write
6180000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1614C7C000
stack
page read and write
5260000
trusted library allocation
page read and write
D7D000
trusted library allocation
page execute and read and write
6170000
trusted library allocation
page read and write
5BDE000
stack
page read and write
B6F397A000
stack
page read and write
1B7F8E27000
heap
page read and write
5970000
trusted library allocation
page read and write
B6F3777000
stack
page read and write
5EC1000
trusted library allocation
page read and write
ECC27C000
stack
page read and write
60F0000
trusted library allocation
page read and write
6472000
trusted library allocation
page read and write
69DD000
trusted library allocation
page read and write
14DC7C00000
heap
page read and write
5960000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
1D16F8CA000
heap
page read and write
1614FFF000
stack
page read and write
1C311F13000
heap
page read and write
2A50000
trusted library allocation
page read and write
F9A000
trusted library allocation
page execute and read and write
FD0000
trusted library allocation
page execute and read and write
6150000
trusted library allocation
page read and write
5ECD000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1D16F8D8000
heap
page read and write
5960000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
2B9C6B80000
heap
page read and write
B9B000
heap
page read and write
215F0202000
heap
page read and write
666D000
stack
page read and write
1D17017A000
heap
page read and write
290E000
stack
page read and write
4DC5000
trusted library allocation
page read and write
D9B000
heap
page read and write
6170000
trusted library allocation
page read and write
7AE000
unkown
page readonly
6170000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1D16F853000
heap
page read and write
6170000
trusted library allocation
page read and write
DA4CEFF000
stack
page read and write
6170000
trusted library allocation
page read and write
1C311E55000
heap
page read and write
69D0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
14DC7BA0000
remote allocation
page read and write
6140000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
C0A000
heap
page read and write
69D4000
trusted library allocation
page read and write
1B7FE590000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
1D1701C5000
heap
page read and write
D50000
trusted library allocation
page execute and read and write
5980000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
20835BE0000
heap
page read and write
2A60000
trusted library allocation
page read and write
1D170186000
heap
page read and write
6A10000
trusted library allocation
page read and write
1B7FE708000
heap
page read and write
6170000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
28EA973B000
heap
page read and write
2A70000
heap
page execute and read and write
4DC5000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
1B7FA320000
trusted library allocation
page read and write
6470000
trusted library allocation
page read and write
1D2B8046000
heap
page read and write
1D170188000
heap
page read and write
4848000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
1D170175000
heap
page read and write
6170000
trusted library allocation
page read and write
1D2B8043000
heap
page read and write
3190000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
2A3E000
stack
page read and write
2910000
trusted library allocation
page read and write
10EE000
stack
page read and write
6170000
trusted library allocation
page read and write
1D170187000
heap
page read and write
4D70000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
1D170186000
heap
page read and write
E18907B000
stack
page read and write
B87000
trusted library allocation
page execute and read and write
1D170602000
heap
page read and write
6170000
trusted library allocation
page read and write
1D17018F000
heap
page read and write
1D17061A000
heap
page read and write
6190000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
1B7F8CC0000
heap
page read and write
12417402000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
4F21000
heap
page read and write
4DE0000
trusted library allocation
page read and write
1D2B806B000
heap
page read and write
6140000
trusted library allocation
page read and write
2BD4000
trusted library allocation
page read and write
5B9E000
stack
page read and write
2AAE000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
DA4D079000
stack
page read and write
5F20000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
4DC5000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
D8D000
trusted library allocation
page execute and read and write
1B7FE4C0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
F20000
heap
page read and write
1D170602000
heap
page read and write
1D2B8000000
heap
page read and write
5A9E000
stack
page read and write
69F5000
trusted library allocation
page read and write
1D17018B000
heap
page read and write
60F0000
trusted library allocation
page read and write
E18917B000
stack
page read and write
501D000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
69C0000
unkown
page read and write
2B9C6C13000
heap
page read and write
14DC7BA0000
remote allocation
page read and write
760000
unkown
page readonly
4FA18FC000
stack
page read and write
DA4D0FF000
stack
page read and write
6180000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1D1701A5000
heap
page read and write
6170000
trusted library allocation
page read and write
5E1C000
stack
page read and write
1B7FE800000
trusted library allocation
page read and write
D74000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
1B7F8EB2000
heap
page read and write
20835E00000
heap
page read and write
1D17018B000
heap
page read and write
D60000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1C311E4D000
heap
page read and write
5260000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
1D2B805D000
heap
page read and write
1D16F720000
heap
page read and write
69E0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
28CE000
stack
page read and write
DA4CE7A000
stack
page read and write
6180000
trusted library allocation
page read and write
22ECB6A0000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
2930000
heap
page read and write
1B7FE5E0000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
B57000
stack
page read and write
13D0000
trusted library allocation
page read and write
1D1705C0000
remote allocation
page read and write
5960000
trusted library allocation
page read and write
559C47F000
stack
page read and write
1D1701AF000
heap
page read and write
14DC7C13000
heap
page read and write
60F0000
trusted library allocation
page read and write
14DC7D02000
heap
page read and write
4FA0000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
12416D13000
heap
page read and write
14DC7C29000
heap
page read and write
10EE000
stack
page read and write
60F0000
trusted library allocation
page read and write
B6F407A000
stack
page read and write
5338000
trusted library allocation
page read and write
69B5000
trusted library allocation
page read and write
14DC7C57000
heap
page read and write
6500000
trusted library allocation
page read and write
14DC8602000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
CE0000
heap
page read and write
B5D000
trusted library allocation
page execute and read and write
B53000
trusted library allocation
page execute and read and write
1B7FE4C8000
trusted library allocation
page read and write
1D170193000
heap
page read and write
2BB8000
trusted library allocation
page read and write
1994000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
5E5E000
stack
page read and write
22ECA944000
heap
page read and write
6180000
trusted library allocation
page read and write
1B7F8E63000
heap
page read and write
2BE1000
trusted library allocation
page read and write
199D000
trusted library allocation
page execute and read and write
4F64000
trusted library allocation
page read and write
1D17017E000
heap
page read and write
400000
remote allocation
page execute and read and write
1D16FFC0000
trusted library allocation
page read and write
28CE000
stack
page read and write
1D1701B0000
heap
page read and write
59B0000
trusted library allocation
page read and write
3280000
heap
page execute and read and write
204976E5000
heap
page read and write
64C0000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
4F20000
heap
page read and write
521E000
stack
page read and write
6170000
trusted library allocation
page read and write
1D1705C0000
remote allocation
page read and write
6A20000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
204974E0000
heap
page read and write
5870000
trusted library allocation
page read and write
559C7FF000
stack
page read and write
60F4000
trusted library allocation
page read and write
171E000
stack
page read and write
1D16F8A6000
heap
page read and write
6510000
trusted library allocation
page read and write
26FBE900000
heap
page read and write
59C0000
trusted library allocation
page read and write
5BDE000
stack
page read and write
59B0000
trusted library allocation
page read and write
204974EB000
heap
page read and write
60F0000
trusted library allocation
page read and write
1B7FE6AB000
heap
page read and write
D70000
heap
page read and write
1D170171000
heap
page read and write
6140000
trusted library allocation
page read and write
1D1701B4000
heap
page read and write
1B7FE610000
trusted library allocation
page read and write
26FBF202000
heap
page read and write
2BB4000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
4E70000
heap
page execute and read and write
FE0000
heap
page read and write
1E38B002000
heap
page read and write
69B5000
trusted library allocation
page read and write
BD1000
heap
page read and write
22ECAB40000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1D1701A0000
heap
page read and write
60F0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
609D000
stack
page read and write
6170000
trusted library allocation
page read and write
5021000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
D84000
trusted library allocation
page read and write
24B97E000
stack
page read and write
6190000
trusted library allocation
page read and write
1D17018F000
heap
page read and write
EBBF7FF000
stack
page read and write
C51000
heap
page read and write
6170000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
215F0C02000
trusted library allocation
page read and write
950000
remote allocation
page read and write
14DC7AE0000
heap
page read and write
69D0000
trusted library allocation
page read and write
1D1701B7000
heap
page read and write
ECC47D000
stack
page read and write
1E38AF80000
heap
page read and write
1E38B026000
heap
page read and write
4FA17FD000
stack
page read and write
CF8FE7E000
stack
page read and write
4F85000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
1B7F9600000
heap
page read and write
1D2B8013000
heap
page read and write
61B0000
trusted library allocation
page read and write
1D1701A0000
heap
page read and write
6140000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
60E1000
trusted library allocation
page read and write
5F5E000
stack
page read and write
FD0000
trusted library allocation
page execute and read and write
6170000
trusted library allocation
page read and write
F9A000
trusted library allocation
page execute and read and write
1D17018D000
heap
page read and write
6170000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
E2D000
heap
page read and write
D9B000
heap
page read and write
28EA9720000
heap
page read and write
5960000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
ECC17C000
stack
page read and write
6180000
trusted library allocation
page read and write
5FDE000
stack
page read and write
19C7000
trusted library allocation
page execute and read and write
1B7F8E8B000
heap
page read and write
1D170186000
heap
page read and write
5E9E000
trusted library allocation
page read and write
2A3E000
stack
page read and write
60F0000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
675717F000
stack
page read and write
26FBE8A0000
heap
page read and write
762000
unkown
page readonly
60F0000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
7E0000
heap
page read and write
1D1701B1000
heap
page read and write
6170000
trusted library allocation
page read and write
28EA9740000
heap
page read and write
1B7F8E9C000
heap
page read and write
6170000
trusted library allocation
page read and write
215F00C0000
heap
page read and write
6100000
trusted library allocation
page read and write
19C0000
trusted library allocation
page read and write
20835C50000
heap
page read and write
12416C13000
heap
page read and write
1D2B7F70000
heap
page read and write
5261000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1B7FE3A0000
trusted library allocation
page read and write
28EA9742000
heap
page read and write
14DC7B70000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1D170175000
heap
page read and write
FC0000
heap
page read and write
6140000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
D73000
trusted library allocation
page execute and read and write
26FBEACA000
heap
page read and write
8C8C3AC000
stack
page read and write
545E000
stack
page read and write
69D0000
trusted library allocation
page read and write
1D1701B5000
heap
page read and write
60F0000
trusted library allocation
page read and write
22ECAB59000
heap
page read and write
1D17018B000
heap
page read and write
4D7A000
trusted library allocation
page read and write
60DD000
stack
page read and write
20835E85000
heap
page read and write
1D2B8053000
heap
page read and write
1C311E00000
heap
page read and write
5260000
trusted library allocation
page read and write
28EA9716000
heap
page read and write
6140000
trusted library allocation
page read and write
1D170602000
heap
page read and write
5A00000
trusted library allocation
page read and write
B6F3B7B000
stack
page read and write
E15000
heap
page read and write
1B7FE6FF000
heap
page read and write
60F0000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
1B7F8F02000
heap
page read and write
66AE000
stack
page read and write
6170000
trusted library allocation
page read and write
1D17018D000
heap
page read and write
1B7FE6A4000
heap
page read and write
4F31000
heap
page read and write
1E38B000000
heap
page read and write
5030000
heap
page execute and read and write
60F0000
trusted library allocation
page read and write
1D170194000
heap
page read and write
1D16F829000
heap
page read and write
60F5000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
1B7FE910000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
20835E65000
heap
page read and write
6146000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
22ECB910000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
E61000
heap
page read and write
5F9E000
unkown
page read and write
60F0000
trusted library allocation
page read and write
1D16F8EC000
heap
page read and write
12416C4F000
heap
page read and write
4DA1000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
22ECAB60000
trusted library allocation
page read and write
5F9E000
stack
page read and write
69D0000
trusted library allocation
page read and write
69E8000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
2C4E000
trusted library allocation
page read and write
1D170002000
heap
page read and write
FA7000
trusted library allocation
page execute and read and write
14C0000
heap
page read and write
5960000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
20835E27000
heap
page read and write
6470000
trusted library allocation
page read and write
8C8CAFC000
stack
page read and write
69B0000
unkown
page read and write
1B7F9759000
heap
page read and write
60F0000
trusted library allocation
page read and write
1C311F08000
heap
page read and write
69D0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
5260000
remote allocation
page read and write
1D17018B000
heap
page read and write
60F0000
trusted library allocation
page read and write
1D2B7FA0000
trusted library allocation
page read and write
1E38B03D000
heap
page read and write
32E0000
trusted library allocation
page read and write
26FBEB13000
heap
page read and write
12416C4C000
heap
page read and write
B57000
stack
page read and write
6170000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
6142000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1B7FE850000
remote allocation
page read and write
6170000
trusted library allocation
page read and write
D2D000
stack
page read and write
215F0228000
heap
page read and write
1D170186000
heap
page read and write
1B7FE6E0000
heap
page read and write
6170000
trusted library allocation
page read and write
5F5E000
stack
page read and write
6190000
trusted library allocation
page read and write
2B9C6C88000
heap
page read and write
1D17017D000
heap
page read and write
5040000
trusted library allocation
page read and write
215F0268000
heap
page read and write
20835E2A000
heap
page read and write
5A10000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
1B7FE6E6000
heap
page read and write
60F0000
trusted library allocation
page read and write
3841000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
12416C82000
heap
page read and write
62EE000
stack
page read and write
4DC0000
trusted library allocation
page read and write
60F1000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
20835D70000
trusted library allocation
page read and write
49DE000
stack
page read and write
1D16F87E000
heap
page read and write
5338000
trusted library allocation
page read and write
E25000
heap
page read and write
60F0000
trusted library allocation
page read and write
8C8D07F000
stack
page read and write
4DC0000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
28EA973B000
heap
page read and write
1D16F84D000
heap
page read and write
8C8C7FC000
stack
page read and write
6520000
trusted library allocation
page execute and read and write
69F0000
trusted library allocation
page read and write
12416D08000
heap
page read and write
60E0000
trusted library allocation
page read and write
1D170618000
heap
page read and write
6170000
trusted library allocation
page read and write
F8E000
unkown
page readonly
F82000
unkown
page readonly
1D16F908000
heap
page read and write
1D170621000
heap
page read and write
60F0000
trusted library allocation
page read and write
1B7F8EAE000
heap
page read and write
60F0000
trusted library allocation
page read and write
1B7F8F02000
heap
page read and write
6180000
trusted library allocation
page read and write
22ECA8C0000
heap
page read and write
5D1E000
stack
page read and write
1B7F9702000
heap
page read and write
E52000
heap
page read and write
1D2B805D000
heap
page read and write
28EA9721000
heap
page read and write
6170000
trusted library allocation
page read and write
6479000
trusted library allocation
page read and write
20835E4B000
heap
page read and write
4D87000
trusted library allocation
page read and write
B7A000
trusted library allocation
page execute and read and write
5260000
remote allocation
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
23C507B000
stack
page read and write
6170000
trusted library allocation
page read and write
E21000
heap
page read and write
5F5E000
stack
page read and write
D74000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1D17019E000
heap
page read and write
559C278000
stack
page read and write
22ECA94E000
heap
page read and write
CF8FC7F000
stack
page read and write
59A0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
22ECA94C000
heap
page read and write
1D1701C4000
heap
page read and write
69D0000
trusted library allocation
page read and write
20835E5A000
heap
page read and write
59A0000
trusted library allocation
page read and write
1D170602000
heap
page read and write
1D170194000
heap
page read and write
400000
remote allocation
page execute and read and write
4D82000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
2B9C6C7D000
heap
page read and write
642D000
stack
page read and write
22ECB900000
trusted library allocation
page read and write
1B7F95C0000
trusted library allocation
page read and write
1D170196000
heap
page read and write
60F0000
trusted library allocation
page read and write
4DC5000
trusted library allocation
page read and write
760000
unkown
page readonly
61DE000
stack
page read and write
1D17018C000
heap
page read and write
23C55FE000
stack
page read and write
6142000
trusted library allocation
page read and write
1B7FE702000
heap
page read and write
1D2B8080000
heap
page read and write
6170000
trusted library allocation
page read and write
6185000
trusted library allocation
page read and write
1E38AF90000
heap
page read and write
5870000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
20835E13000
heap
page read and write
8C8CF7D000
stack
page read and write
60F0000
trusted library allocation
page read and write
2C41000
trusted library allocation
page read and write
215F0130000
heap
page read and write
1D2B804C000
heap
page read and write
8C8C97E000
stack
page read and write
5A10000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
20835F13000
heap
page read and write
762000
unkown
page readonly
59A0000
trusted library allocation
page read and write
E19000
heap
page read and write
DCE000
heap
page read and write
69B0000
trusted library allocation
page read and write
1D16F855000
heap
page read and write
20835D50000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
760000
unkown
page readonly
67B0000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
1D170186000
heap
page read and write
950000
remote allocation
page read and write
5840000
trusted library allocation
page read and write
12416C87000
heap
page read and write
618A000
trusted library allocation
page read and write
D73000
trusted library allocation
page execute and read and write
559C677000
stack
page read and write
1B7FE704000
heap
page read and write
4DC0000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
B6F427E000
stack
page read and write
59B0000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
24B77E000
stack
page read and write
6170000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
23C57FC000
stack
page read and write
60E0000
trusted library allocation
page read and write
5E8B000
trusted library allocation
page read and write
CCE000
stack
page read and write
5F20000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6517000
trusted library allocation
page read and write
24B3EE000
stack
page read and write
60F0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1B7F9700000
heap
page read and write
6170000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1D1701C1000
heap
page read and write
1B7F9615000
heap
page read and write
DA4CF7F000
stack
page read and write
4F21000
heap
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
4401000
trusted library allocation
page read and write
1D170114000
heap
page read and write
59A0000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
215F0313000
heap
page read and write
1D2B8086000
heap
page read and write
F8F000
stack
page read and write
6171000
trusted library allocation
page read and write
22ECAB50000
heap
page read and write
5040000
trusted library allocation
page read and write
DCE000
heap
page read and write
2C3D000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
5A9E000
stack
page read and write
1D16F84E000
heap
page read and write
4D8A000
trusted library allocation
page read and write
1D170186000
heap
page read and write
1D170186000
heap
page read and write
6170000
trusted library allocation
page read and write
2B9C6D13000
heap
page read and write
1E38B056000
heap
page read and write
19A0000
trusted library allocation
page read and write
2B92000
trusted library allocation
page read and write
1B7F8E3D000
heap
page read and write
6170000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
2A81000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
1980000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1B7FE5F0000
trusted library allocation
page read and write
26FBF1A0000
trusted library allocation
page read and write
1D2B8030000
heap
page read and write
6170000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
24BA7E000
stack
page read and write
5960000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
60DD000
stack
page read and write
5A16000
trusted library allocation
page read and write
ECC1FF000
stack
page read and write
760000
unkown
page readonly
6170000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
1D1701BC000
heap
page read and write
B57000
stack
page read and write
5A10000
trusted library allocation
page read and write
1D2B806D000
heap
page read and write
D60000
heap
page read and write
1D2B807C000
heap
page read and write
1B7FE647000
heap
page read and write
5F5E000
stack
page read and write
1D1701C4000
heap
page read and write
6180000
trusted library allocation
page read and write
CF8F87E000
stack
page read and write
2A70000
heap
page execute and read and write
6A10000
trusted library allocation
page read and write
1D2B8066000
heap
page read and write
1D17019E000
heap
page read and write
60F1000
trusted library allocation
page read and write
1D2B804A000
heap
page read and write
60F0000
trusted library allocation
page read and write
E21000
heap
page read and write
1C311E52000
heap
page read and write
60F0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1E38B029000
heap
page read and write
E25000
heap
page read and write
2B9C7602000
trusted library allocation
page read and write
1D2B7F10000
heap
page read and write
1B7FE610000
heap
page read and write
5CD0000
trusted library allocation
page execute and read and write
1E38B013000
heap
page read and write
1D170600000
heap
page read and write
6170000
trusted library allocation
page read and write
A5C000
stack
page read and write
4FA1DFF000
stack
page read and write
B72000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1D2B8068000
heap
page read and write
E1D000
heap
page read and write
5020000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
22ECB8F0000
heap
page readonly
19A4000
trusted library allocation
page read and write
E21000
heap
page read and write
6170000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1B7FE662000
heap
page read and write
5210000
trusted library allocation
page read and write
1D16F886000
heap
page read and write
8C8CE7F000
stack
page read and write
1C311E4F000
heap
page read and write
2B9C6C00000
heap
page read and write
6185000
trusted library allocation
page read and write
1B7FE850000
remote allocation
page read and write
3869000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
B6F3DFA000
stack
page read and write
ECC0FE000
stack
page read and write
16D0000
heap
page read and write
69B0000
trusted library section
page read and write
6140000
trusted library allocation
page read and write
28EA96F0000
heap
page read and write
6140000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
20835E02000
heap
page read and write
12416C9F000
heap
page read and write
1C311D90000
heap
page read and write
1B7FE63A000
heap
page read and write
290E000
stack
page read and write
D60000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1B7F9718000
heap
page read and write
F97000
trusted library allocation
page execute and read and write
6140000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
5338000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
2AAE000
trusted library allocation
page read and write
1D2B8052000
heap
page read and write
1D1701CF000
heap
page read and write
5260000
trusted library allocation
page read and write
1D1701C5000
heap
page read and write
D30000
trusted library allocation
page read and write
1D16F916000
heap
page read and write
2930000
heap
page read and write
4FA1EFF000
stack
page read and write
5021000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
1D16F84B000
heap
page read and write
1D1701B1000
heap
page read and write
1D16F800000
heap
page read and write
6CB0000
heap
page read and write
60E0000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
CCE000
stack
page read and write
60F0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
28EA9716000
heap
page read and write
6180000
trusted library allocation
page read and write
2A56000
trusted library allocation
page read and write
14DC7AD0000
heap
page read and write
6140000
trusted library allocation
page read and write
1D1701B6000
heap
page read and write
5A10000
trusted library allocation
page read and write
1614EF7000
stack
page read and write
24B87E000
stack
page read and write
6140000
trusted library allocation
page read and write
1D1701C5000
heap
page read and write
24B2EB000
stack
page read and write
61B0000
trusted library allocation
page read and write
D9B000
heap
page read and write
1D17011D000
heap
page read and write
6170000
trusted library allocation
page read and write
6500000
trusted library allocation
page read and write
31DE000
stack
page read and write
5010000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
1B7F8CB0000
heap
page read and write
60E0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
8C8CC7B000
stack
page read and write
1C311E73000
heap
page read and write
E19000
heap
page read and write
D90000
heap
page read and write
1B7F8EFD000
heap
page read and write
1D1701AA000
heap
page read and write
2A81000
trusted library allocation
page read and write
59A0000
unkown
page read and write
1D170191000
heap
page read and write
26FBEA13000
heap
page read and write
2A50000
trusted library allocation
page read and write
F80000
unkown
page readonly
4E5E000
stack
page read and write
59A0000
trusted library allocation
page read and write
4F94000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
DCE000
heap
page read and write
33FE000
stack
page read and write
675690E000
stack
page read and write
28EA973E000
heap
page read and write
E25000
heap
page read and write
1B7FE600000
heap
page read and write
26FBEAE1000
heap
page read and write
1E38B102000
heap
page read and write
7AE000
unkown
page readonly
7AE000
unkown
page readonly
5D00000
trusted library allocation
page read and write
215F0257000
heap
page read and write
6185000
trusted library allocation
page read and write
2BD6000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
6C4B27E000
stack
page read and write
E77000
heap
page read and write
1B7FE590000
trusted library allocation
page read and write
32D0000
trusted library allocation
page execute and read and write
6180000
trusted library allocation
page read and write
1D16F850000
heap
page read and write
1D2B8045000
heap
page read and write
BD4000
heap
page read and write
1D170175000
heap
page read and write
4DC0000
trusted library allocation
page read and write
2B9C6C5A000
heap
page read and write
6170000
trusted library allocation
page read and write
61C0000
trusted library allocation
page read and write
5260000
remote allocation
page read and write
F97000
trusted library allocation
page execute and read and write
1D16F8C4000
heap
page read and write
1B7FE6A8000
heap
page read and write
204974A0000
heap
page read and write
1D1701A0000
heap
page read and write
28EA9743000
heap
page read and write
23C59FB000
stack
page read and write
B6F387C000
stack
page read and write
D2E000
stack
page read and write
28EA973B000
heap
page read and write
5210000
heap
page read and write
1B7F9718000
heap
page read and write
1B7FE706000
heap
page read and write
59B0000
trusted library allocation
page read and write
1B7FE62B000
heap
page read and write
3A81000
trusted library allocation
page read and write
D2E000
stack
page read and write
5CDF000
stack
page read and write
20835DE0000
remote allocation
page read and write
28CE000
stack
page read and write
559BC8B000
stack
page read and write
DA4D178000
stack
page read and write
1D170602000
heap
page read and write
6170000
trusted library allocation
page read and write
950000
remote allocation
page read and write
4DC0000
trusted library allocation
page read and write
54FE000
stack
page read and write
C80000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
1D1701B4000
heap
page read and write
1B7F8EFD000
heap
page read and write
D40000
heap
page execute and read and write
4DC5000
trusted library allocation
page read and write
60DE000
stack
page read and write
1C311E4A000
heap
page read and write
6185000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
950000
remote allocation
page read and write
20835DA0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
28EA9745000
heap
page read and write
13E0000
heap
page read and write
60F0000
trusted library allocation
page read and write
D90000
heap
page read and write
6170000
trusted library allocation
page read and write
12416C29000
heap
page read and write
28EA9732000
heap
page read and write
60F0000
trusted library allocation
page read and write
14DC7C3D000
heap
page read and write
6170000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
1D17018D000
heap
page read and write
4F94000
trusted library allocation
page read and write
950000
remote allocation
page read and write
1B7FE3B0000
trusted library allocation
page read and write
1C311DC0000
trusted library allocation
page read and write
204976E0000
heap
page read and write
6A20000
trusted library allocation
page read and write
28EA9711000
heap
page read and write
5320000
trusted library allocation
page read and write
F9A000
trusted library allocation
page execute and read and write
6A00000
trusted library allocation
page execute and read and write
D73000
trusted library allocation
page execute and read and write
6140000
trusted library allocation
page read and write
290E000
stack
page read and write
E18927E000
stack
page read and write
69D0000
trusted library allocation
page read and write
1D17018B000
heap
page read and write
E1D000
heap
page read and write
1B7FE4E0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
215F0200000
heap
page read and write
6170000
trusted library allocation
page read and write
22ECA8F0000
heap
page read and write
6185000
trusted library allocation
page read and write
C19000
heap
page read and write
1C311E13000
heap
page read and write
1C311E3C000
heap
page read and write
6140000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
10EE000
stack
page read and write
6185000
trusted library allocation
page read and write
22ECA94C000
heap
page read and write
CE0000
heap
page read and write
CF8FD7F000
stack
page read and write
2BD9000
trusted library allocation
page read and write
D90000
heap
page read and write
1D170154000
heap
page read and write
4DC0000
trusted library allocation
page read and write
609D000
stack
page read and write
1D16F82C000
heap
page read and write
6180000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1D170186000
heap
page read and write
2930000
heap
page read and write
2AAE000
trusted library allocation
page read and write
609D000
stack
page read and write
1D1701B2000
heap
page read and write
22ECAB55000
heap
page read and write
59C0000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
215F00D0000
heap
page read and write
5A00000
trusted library allocation
page read and write
1D17061A000
heap
page read and write
12416C3C000
heap
page read and write
26FBEACC000
heap
page read and write
60F0000
trusted library allocation
page read and write
F80000
unkown
page readonly
2C49000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
5B9E000
stack
page read and write
59C0000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
511E000
stack
page read and write
2BA9000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
32CE000
stack
page read and write
14DC7B40000
heap
page read and write
60F0000
trusted library allocation
page read and write
4C1E000
stack
page read and write
22ECA938000
heap
page read and write
5D1E000
stack
page read and write
5960000
trusted library allocation
page read and write
28EA9721000
heap
page read and write
1614B7E000
stack
page read and write
22ECAB20000
trusted library allocation
page read and write
2B9C6B90000
heap
page read and write
5A10000
trusted library allocation
page read and write
E19000
heap
page read and write
6500000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
1D17018D000
heap
page read and write
4FA12CC000
stack
page read and write
22ECA850000
heap
page read and write
D80000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
4C1E000
stack
page read and write
5960000
trusted library allocation
page read and write
4FA1CFF000
stack
page read and write
23C53FF000
stack
page read and write
60E0000
trusted library allocation
page read and write
6756CFB000
stack
page read and write
FA7000
trusted library allocation
page execute and read and write
6140000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
4F88000
trusted library allocation
page read and write
61A0000
trusted library allocation
page execute and read and write
7F1F0000
trusted library allocation
page execute and read and write
59B0000
trusted library allocation
page read and write
E1D000
heap
page read and write
60F0000
trusted library allocation
page read and write
F8E000
unkown
page readonly
20497400000
heap
page read and write
6480000
trusted library allocation
page read and write
1C311F02000
heap
page read and write
762000
unkown
page readonly
1D2B803A000
heap
page read and write
6140000
trusted library allocation
page read and write
675688C000
stack
page read and write
6A30000
trusted library allocation
page read and write
E2D000
heap
page read and write
6500000
trusted library allocation
page execute and read and write
60E0000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
DA4CFFF000
stack
page read and write
5CD0000
trusted library allocation
page read and write
3401000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6150000
trusted library allocation
page execute and read and write
6170000
trusted library allocation
page read and write
E52000
heap
page read and write
6190000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
20835DE0000
remote allocation
page read and write
D8D000
trusted library allocation
page execute and read and write
1D2B8055000
heap
page read and write
1D170186000
heap
page read and write
2A6C000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
FE0000
heap
page read and write
1B7FE330000
trusted library allocation
page read and write
26FBEA88000
heap
page read and write
1B7FE69F000
heap
page read and write
69F0000
trusted library allocation
page read and write
D40000
heap
page read and write
1B7F8D20000
heap
page read and write
5030000
heap
page execute and read and write
1C311E47000
heap
page read and write
B70000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
4D9C000
trusted library allocation
page read and write
1B7FE4E4000
trusted library allocation
page read and write
1B7F8E68000
heap
page read and write
4F85000
trusted library allocation
page read and write
1D170602000
heap
page read and write
E188C7C000
stack
page read and write
26FBEB02000
heap
page read and write
400000
remote allocation
page execute and read and write
6510000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
1D1701AC000
heap
page read and write
124169E0000
heap
page read and write
1D170189000
heap
page read and write
C0F000
heap
page read and write
E82000
heap
page read and write
5960000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
5FA0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
762000
unkown
page readonly
5220000
remote allocation
page read and write
215F023C000
heap
page read and write
1E38B890000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
67AE000
stack
page read and write
28EA9690000
heap
page read and write
2A40000
trusted library allocation
page read and write
559C579000
stack
page read and write
60F0000
trusted library allocation
page read and write
B85000
trusted library allocation
page execute and read and write
6140000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
675698E000
stack
page read and write
60F1000
trusted library allocation
page read and write
28EA9721000
heap
page read and write
69D0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
4D60000
heap
page read and write
1C311D20000
heap
page read and write
4D8D000
trusted library allocation
page read and write
F97000
trusted library allocation
page execute and read and write
5010000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
1D1701AB000
heap
page read and write
4DC0000
trusted library allocation
page read and write
1C311E70000
heap
page read and write
6170000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
6470000
trusted library allocation
page read and write
1B7FE6F9000
heap
page read and write
F8F000
stack
page read and write
4DC5000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
5D1E000
stack
page read and write
5860000
trusted library allocation
page read and write
4F64000
trusted library allocation
page read and write
1D17018D000
heap
page read and write
1C311E81000
heap
page read and write
2B9C6C2A000
heap
page read and write
8C8CD7C000
stack
page read and write
6170000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
5220000
remote allocation
page read and write
60F0000
trusted library allocation
page read and write
1D2B8102000
heap
page read and write
60F0000
trusted library allocation
page read and write
4FA1AFD000
stack
page read and write
1B7FE4F0000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
5E20000
trusted library allocation
page read and write
CEE000
stack
page read and write
13CE000
stack
page read and write
60F0000
trusted library allocation
page read and write
5A5E000
stack
page read and write
1D2B8029000
heap
page read and write
5A10000
trusted library allocation
page read and write
215F0213000
heap
page read and write
6170000
trusted library allocation
page read and write
1B7FE504000
trusted library allocation
page read and write
20835E49000
heap
page read and write
69C0000
trusted library allocation
page read and write
26FBEABB000
heap
page read and write
FAB000
trusted library allocation
page execute and read and write
6C4B07B000
stack
page read and write
D60000
trusted library allocation
page read and write
CF8FBF7000
stack
page read and write
6170000
trusted library allocation
page read and write
5030000
heap
page execute and read and write
E52000
heap
page read and write
61DE000
stack
page read and write
A5C000
stack
page read and write
6756F7F000
stack
page read and write
12416B40000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
1D17018F000
heap
page read and write
6500000
trusted library allocation
page read and write
2A3E000
stack
page read and write
5B9E000
stack
page read and write
990000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
5A9E000
stack
page read and write
69D0000
trusted library allocation
page read and write
20835F00000
heap
page read and write
5960000
trusted library allocation
page read and write
32F0000
heap
page read and write
5F20000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
6C4B37F000
stack
page read and write
26FBEA70000
heap
page read and write
1C311E8F000
heap
page read and write
6180000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
20835BF0000
heap
page read and write
1D16F8EF000
heap
page read and write
4DC0000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
28EA9727000
heap
page read and write
6140000
trusted library allocation
page read and write
5BDE000
stack
page read and write
20835F02000
heap
page read and write
1B7FE5A0000
trusted library allocation
page read and write
5EA1000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
6500000
trusted library allocation
page read and write
19CB000
trusted library allocation
page execute and read and write
6180000
trusted library allocation
page read and write
1614DFE000
stack
page read and write
1D1701BA000
heap
page read and write
6140000
trusted library allocation
page read and write
6510000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
559BD0E000
stack
page read and write
2B9C6D02000
heap
page read and write
5960000
trusted library allocation
page read and write
1D170196000
heap
page read and write
1B7FA310000
trusted library allocation
page read and write
24B36E000
stack
page read and write
6140000
trusted library allocation
page read and write
60DD000
stack
page read and write
6140000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
2C55000
trusted library allocation
page read and write
28EA9700000
heap
page read and write
19D0000
heap
page read and write
C7A000
heap
page read and write
6180000
trusted library allocation
page read and write
2A70000
heap
page execute and read and write
6170000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
545E000
stack
page read and write
20835E4A000
heap
page read and write
6180000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
E188F7B000
stack
page read and write
14CA000
heap
page read and write
6140000
trusted library allocation
page read and write
7E0000
unkown
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
28EA9560000
heap
page read and write
1D16F8AD000
heap
page read and write
1D170199000
heap
page read and write
60F0000
trusted library allocation
page read and write
28EA9732000
heap
page read and write
5F20000
trusted library allocation
page read and write
FE0000
heap
page read and write
23C56FD000
stack
page read and write
FA7000
trusted library allocation
page execute and read and write
6170000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
CF8FAFB000
stack
page read and write
6170000
trusted library allocation
page read and write
ECC5FD000
stack
page read and write
60E0000
trusted library allocation
page read and write
632E000
stack
page read and write
6170000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
2B9C6BF0000
heap
page read and write
1D16F913000
heap
page read and write
6170000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
545E000
stack
page read and write
1C311E29000
heap
page read and write
22ECB960000
trusted library allocation
page read and write
B54000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
8C8CBFE000
stack
page read and write
1B7FE4E1000
trusted library allocation
page read and write
There are 1723 hidden memdumps, click here to show them.