IOC Report
fleW7NKwt9.exe

loading gif

Files

File Path
Type
Category
Malicious
fleW7NKwt9.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fleW7NKwt9.exe_22b6db12ffaf2d73473ec2207b1b61d0d71c9b_42e88d20_19a524b4\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fleW7NKwt9.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER19F7.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1B31.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFD4.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Jun 26 16:36:34 2022, 0x1205a4 type
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\fleW7NKwt9.exe
"C:\Users\user\Desktop\fleW7NKwt9.exe"
malicious
C:\Users\user\Desktop\fleW7NKwt9.exe
C:\Users\user\Desktop\fleW7NKwt9.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1528

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
132.226.8.169
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://api.telegram.org/bot
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://checkip.dyndns.org
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://checkip.dyndns.org4
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
http://checkip.dyndns.org/q
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://checkip.dyndns.com
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
checkip.dyndns.com
132.226.8.169
malicious
checkip.dyndns.org
unknown
malicious

IPs

IP
Domain
Country
Malicious
132.226.8.169
checkip.dyndns.com
United States
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fleW7NKwt9_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
ProgramId
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
FileId
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
LowerCaseLongPath
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
LongPathHash
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
Name
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
Publisher
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
Version
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
BinFileVersion
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
BinaryType
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
ProductName
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
ProductVersion
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
LinkDate
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
BinProductVersion
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
Size
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
Language
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
IsPeFile
\REGISTRY\A\{cf31a1b0-8150-3cfa-89f7-ac200f3746d3}\Root\InventoryApplicationFile\flew7nkwt9.exe|57b5df95
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
001840064172BCE4
There are 29 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
36B5000
trusted library allocation
page read and write
malicious
2451000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
24FF000
trusted library allocation
page read and write
malicious
4DAB000
trusted library allocation
page read and write
8C9000
heap
page read and write
891000
heap
page read and write
4FA0000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
CD4000
heap
page read and write
3B69000
trusted library allocation
page read and write
3B47000
trusted library allocation
page read and write
2960000
heap
page read and write
4DD4000
trusted library allocation
page read and write
650000
unkown
page readonly
24FD000
trusted library allocation
page read and write
CD4000
heap
page read and write
1D590E67000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
5B1E000
stack
page read and write
4DCE000
trusted library allocation
page read and write
4DBE000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
6D98000
trusted library allocation
page read and write
27283723000
heap
page read and write
4DCC000
trusted library allocation
page read and write
D0000
unkown
page readonly
89F000
heap
page read and write
1BC1EF00000
trusted library allocation
page read and write
4DC5000
trusted library allocation
page read and write
1D20BE50000
heap
page read and write
70A000
unkown
page readonly
27283667000
heap
page read and write
4DBD000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
904000
heap
page read and write
4930000
trusted library allocation
page read and write
4DAF000
trusted library allocation
page read and write
221E3C83000
heap
page read and write
4DCE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
E4E000
stack
page read and write
1B0000
heap
page read and write
4DB2000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
ECF000
heap
page read and write
4DA4000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
650000
unkown
page readonly
4DAB000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
70A000
unkown
page readonly
4C40000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
AF7000
stack
page read and write
4DCE000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DB2000
trusted library allocation
page read and write
CE845FF000
stack
page read and write
27283902000
heap
page read and write
5ADF000
stack
page read and write
1BC1ED1F000
heap
page read and write
4DAB000
trusted library allocation
page read and write
16E22A02000
heap
page read and write
ED1000
heap
page read and write
4DCE000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
990677F000
stack
page read and write
4C10000
trusted library section
page readonly
4DB3000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
79C000
stack
page read and write
4DB2000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
221E3D13000
heap
page read and write
4DB3000
trusted library allocation
page read and write
4DD6000
trusted library allocation
page read and write
16E22A3C000
heap
page read and write
4DA3000
trusted library allocation
page read and write
5130000
heap
page execute and read and write
844E000
stack
page read and write
4DAB000
trusted library allocation
page read and write
A5A000
trusted library allocation
page execute and read and write
1D590E62000
heap
page read and write
4DAB000
trusted library allocation
page read and write
27283600000
unkown
page read and write
25257847000
heap
page read and write
4C40000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
5D5E000
stack
page read and write
2960000
heap
page read and write
70A000
unkown
page readonly
7B0000
remote allocation
page read and write
2525785E000
heap
page read and write
650000
unkown
page readonly
27283700000
trusted library allocation
page read and write
3459000
trusted library allocation
page read and write
652000
unkown
page readonly
889000
heap
page read and write
4C40000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4EC0000
heap
page read and write
49E0000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
1BC1EEE0000
trusted library allocation
page read and write
888000
heap
page read and write
4DB1000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
E5A000
heap
page read and write
4DCE000
trusted library allocation
page read and write
27283715000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DBA000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DCA000
trusted library allocation
page read and write
4B90000
trusted library allocation
page read and write
1D590E00000
heap
page read and write
1BC1FC30000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
70A000
unkown
page readonly
6C40000
trusted library allocation
page read and write
4DA4000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4EC1000
heap
page read and write
4DCC000
trusted library allocation
page read and write
16E22970000
trusted library allocation
page read and write
6D35000
trusted library allocation
page read and write
888000
heap
page read and write
CC6000
trusted library allocation
page execute and read and write
2340000
heap
page execute and read and write
89F000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
4DBD000
trusted library allocation
page read and write
650000
unkown
page readonly
4D92000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
18A000
unkown
page readonly
4DCC000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
1D20BE13000
heap
page read and write
3F24AFE000
stack
page read and write
4DCC000
trusted library allocation
page read and write
104F000
stack
page read and write
4DCC000
trusted library allocation
page read and write
4DD3000
trusted library allocation
page read and write
4DC5000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
16E23202000
trusted library allocation
page read and write
4DA4000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
6D95000
trusted library allocation
page read and write
4DBF000
trusted library allocation
page read and write
2525787A000
heap
page read and write
6E80000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
884000
heap
page read and write
4DCE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
16E22810000
heap
page read and write
6D40000
trusted library allocation
page read and write
121E000
stack
page read and write
4D94000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
E50000
heap
page read and write
4DAB000
trusted library allocation
page read and write
3F9B07B000
stack
page read and write
4DAB000
trusted library allocation
page read and write
252577B0000
trusted library allocation
page read and write
4C70000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
6B3D000
stack
page read and write
8A5000
heap
page read and write
884000
heap
page read and write
4C40000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
4DDD000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
510D000
stack
page read and write
25257813000
heap
page read and write
7B0000
remote allocation
page read and write
4DCC000
trusted library allocation
page read and write
650000
unkown
page readonly
4D92000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
5D9E000
stack
page read and write
4DB3000
trusted library allocation
page read and write
CCA000
trusted library allocation
page execute and read and write
16E22B13000
heap
page read and write
6596179000
stack
page read and write
2B41000
trusted library allocation
page read and write
4DBA000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
1BC1EE50000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
4DBC000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
54AE000
stack
page read and write
4D92000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAF000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
3B47000
trusted library allocation
page read and write
2300000
trusted library allocation
page read and write
89D000
heap
page read and write
4DA9000
trusted library allocation
page read and write
E5A000
heap
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAF000
trusted library allocation
page read and write
ED7000
heap
page read and write
2317000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
89F000
heap
page read and write
4DB3000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
CD0000
heap
page read and write
4DCC000
trusted library allocation
page read and write
1BC1F9F0000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
1220000
heap
page read and write
CE843F7000
stack
page read and write
50A0000
trusted library allocation
page read and write
27283802000
heap
page read and write
4D92000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DC9000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
4DAD000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
221E3B50000
heap
page read and write
C90000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
25258202000
trusted library allocation
page read and write
4DA3000
trusted library allocation
page read and write
22B0000
heap
page read and write
4D93000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4EB4000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
16E22B00000
heap
page read and write
4DCC000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
4DAF000
trusted library allocation
page read and write
232C000
trusted library allocation
page read and write
ED6000
heap
page read and write
4DCC000
trusted library allocation
page read and write
4D93000
trusted library allocation
page read and write
65E2000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
DEB000
trusted library allocation
page execute and read and write
4DD4000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4DAC000
trusted library allocation
page read and write
4D9B000
trusted library allocation
page read and write
CD5000
heap
page read and write
4C40000
trusted library allocation
page read and write
CCA000
trusted library allocation
page execute and read and write
4DBD000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
70A000
unkown
page readonly
4990000
trusted library allocation
page read and write
1D590F08000
heap
page read and write
2728360D000
unkown
page read and write
4DCE000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
25257913000
heap
page read and write
4DB1000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
45EC000
stack
page read and write
4FD0000
heap
page read and write
CB0000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4D9B000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
1BC1ED1D000
heap
page read and write
8C5000
heap
page read and write
5110000
trusted library allocation
page read and write
DDF000
stack
page read and write
4DCE000
trusted library allocation
page read and write
1BC1EDD0000
heap
page read and write
AAC000
heap
page read and write
4FD0000
heap
page read and write
4C30000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAC000
trusted library allocation
page read and write
854E000
stack
page read and write
4DAB000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
1BC1EEF9000
heap
page read and write
4970000
trusted library allocation
page read and write
27283913000
heap
page read and write
8AF000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DC9000
trusted library allocation
page read and write
4DBC000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
4DCB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
293E000
stack
page read and write
4BF0000
heap
page read and write
D2000
unkown
page readonly
3F24C7C000
stack
page read and write
4DCE000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
221E3BF0000
trusted library allocation
page read and write
1D20C802000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
25257720000
heap
page read and write
CE842FB000
stack
page read and write
4DCC000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4DA3000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
5080000
heap
page read and write
4DCC000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
CD0000
heap
page read and write
E84000
heap
page read and write
16E22870000
heap
page read and write
4DCE000
trusted library allocation
page read and write
89F000
heap
page read and write
CE8407E000
stack
page read and write
4D93000
trusted library allocation
page read and write
4D93000
trusted library allocation
page read and write
16E22A13000
heap
page read and write
3F24FF7000
stack
page read and write
890000
heap
page read and write
1BC1ECD0000
heap
page read and write
9B883AF000
stack
page read and write
4D9A000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
70A000
unkown
page readonly
50B0000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
CE83DAE000
stack
page read and write
4DCE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
272834B0000
trusted library allocation
page read and write
4C00000
heap
page execute and read and write
DEB000
trusted library allocation
page execute and read and write
16E22A00000
heap
page read and write
4DAB000
trusted library allocation
page read and write
5E9E000
stack
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4D9B000
trusted library allocation
page read and write
6E84000
trusted library allocation
page read and write
8AA000
heap
page read and write
6D79000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DA4000
trusted library allocation
page read and write
536E000
stack
page read and write
4DCE000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
CD4000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
4DB4000
trusted library allocation
page read and write
4960000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DD7000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
6DCE000
stack
page read and write
4D9A000
trusted library allocation
page read and write
A34000
trusted library allocation
page read and write
4DC5000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
650000
unkown
page readonly
5BE000
stack
page read and write
8220000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
25257859000
heap
page read and write
2B30000
heap
page execute and read and write
1D590F13000
heap
page read and write
9B88BFD000
stack
page read and write
6F80000
trusted library allocation
page read and write
E4E000
stack
page read and write
4DC0000
trusted library allocation
page read and write
88C000
heap
page read and write
50A0000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
99068FE000
stack
page read and write
4DCE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
65960FE000
stack
page read and write
4D92000
trusted library allocation
page read and write
2525785C000
heap
page read and write
4DB3000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
3F251FF000
stack
page read and write
4DAB000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
892000
heap
page read and write
D2000
unkown
page readonly
5EDE000
stack
page read and write
4DB1000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
7B0000
remote allocation
page read and write
4DCC000
trusted library allocation
page read and write
7F0000
heap
page read and write
CD5000
heap
page read and write
50B0000
trusted library allocation
page read and write
5C5E000
stack
page read and write
50B0000
trusted library allocation
page read and write
1BC1EEF5000
heap
page read and write
4990000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
6C90000
trusted library section
page read and write
4D9B000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
121E000
stack
page read and write
4C75000
heap
page read and write
4DB3000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
4C41000
trusted library allocation
page read and write
5C1E000
stack
page read and write
887000
heap
page read and write
22A0000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
730000
unkown
page read and write
49B0000
trusted library allocation
page read and write
5C5E000
stack
page read and write
6D60000
trusted library allocation
page read and write
4DAC000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
895000
heap
page read and write
221E3C29000
heap
page read and write
9B889F7000
stack
page read and write
230B000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DB2000
trusted library allocation
page read and write
16E22A75000
heap
page read and write
4C45000
trusted library allocation
page read and write
730000
unkown
page read and write
221E3BC0000
heap
page read and write
4DCC000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
6595FFA000
stack
page read and write
3B69000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4DA4000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
E50000
heap
page read and write
5110000
trusted library allocation
page read and write
4DBE000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
8FB000
heap
page read and write
4DCC000
trusted library allocation
page read and write
1D20BE63000
heap
page read and write
1BC1ECD8000
heap
page read and write
5130000
heap
page execute and read and write
4DD4000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
510D000
stack
page read and write
4DAB000
trusted library allocation
page read and write
6E88000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
1D20BF08000
heap
page read and write
4D93000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
4458000
trusted library allocation
page read and write
CE8417B000
stack
page read and write
CE83D2B000
stack
page read and write
2525786F000
heap
page read and write
27283602000
unkown
page read and write
4D93000
trusted library allocation
page read and write
27283667000
heap
page read and write
4DC4000
trusted library allocation
page read and write
221E3C8D000
heap
page read and write
4DCE000
trusted library allocation
page read and write
104F000
stack
page read and write
64C0000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
C0E000
stack
page read and write
6B20000
trusted library allocation
page read and write
6AAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCA000
trusted library allocation
page read and write
1D20BE75000
heap
page read and write
4DCC000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
121E000
stack
page read and write
4DCC000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
16E22A28000
heap
page read and write
4EB4000
trusted library allocation
page read and write
6EB1000
trusted library allocation
page read and write
3B47000
trusted library allocation
page read and write
4D93000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
5D5E000
stack
page read and write
4D9B000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
293E000
stack
page read and write
1D590C40000
heap
page read and write
CB0000
trusted library allocation
page read and write
4DBC000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
A43000
trusted library allocation
page read and write
221E3D00000
heap
page read and write
4DD4000
trusted library allocation
page read and write
A33000
trusted library allocation
page execute and read and write
E84000
heap
page read and write
1D590E63000
heap
page read and write
652000
unkown
page readonly
3F24A7B000
stack
page read and write
422000
remote allocation
page execute and read and write
4DCC000
trusted library allocation
page read and write
4DEE000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
2728363A000
heap
page read and write
50B0000
trusted library allocation
page read and write
652000
unkown
page readonly
2BE7000
trusted library allocation
page read and write
2525782E000
heap
page read and write
4C40000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
6595E7B000
stack
page read and write
6596079000
stack
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
88E000
heap
page read and write
4DB7000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5FDE000
stack
page read and write
4DC4000
trusted library allocation
page read and write
A67000
trusted library allocation
page execute and read and write
6AA0000
trusted library section
page read and write
4DAE000
trusted library allocation
page read and write
16E22B25000
heap
page read and write
4EB4000
trusted library allocation
page read and write
4DAF000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
1220000
heap
page read and write
4DCC000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
1D590E29000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
25257710000
heap
page read and write
8A2000
heap
page read and write
546E000
stack
page read and write
5C5E000
stack
page read and write
A56000
trusted library allocation
page execute and read and write
4DB7000
trusted library allocation
page read and write
DE7000
trusted library allocation
page execute and read and write
4DD4000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
27283613000
unkown
page read and write
884000
heap
page read and write
4F70000
trusted library allocation
page read and write
16E22B02000
heap
page read and write
4DD4000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
5D9E000
stack
page read and write
4DCE000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
6595EFE000
stack
page read and write
E50000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
8230000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
4D92000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
3F250FF000
stack
page read and write
272834A0000
heap
page read and write
C4D000
stack
page read and write
4C40000
trusted library allocation
page read and write
2304000
trusted library allocation
page read and write
C0E000
stack
page read and write
50A0000
trusted library allocation
page read and write
4DBC000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
1BC1FC90000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
6D7D000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
1D20BE3C000
heap
page read and write
4DAB000
trusted library allocation
page read and write
EE1000
heap
page read and write
5D5E000
stack
page read and write
4DCE000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
AA0000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
4940000
heap
page read and write
4DAB000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
536E000
stack
page read and write
6C40000
trusted library allocation
page read and write
4D9B000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
650000
unkown
page readonly
4DAB000
trusted library allocation
page read and write
4DCA000
trusted library allocation
page read and write
1D590E81000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
DE2000
trusted library allocation
page read and write
CAD000
trusted library allocation
page execute and read and write
221E3D02000
heap
page read and write
4DAB000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
C4D000
stack
page read and write
6AA0000
trusted library allocation
page read and write
46FEA7B000
stack
page read and write
5C1E000
stack
page read and write
4DCC000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
CD4000
heap
page read and write
4DB3000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
2B30000
heap
page execute and read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
7F0000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
221E3C3C000
heap
page read and write
4DB2000
trusted library allocation
page read and write
2940000
trusted library allocation
page execute and read and write
4DCE000
trusted library allocation
page read and write
2B16000
trusted library allocation
page read and write
546E000
stack
page read and write
6D40000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DA3000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
AF7000
stack
page read and write
4DBD000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
244E000
stack
page read and write
4D9A000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
2B0E000
stack
page read and write
4DCC000
trusted library allocation
page read and write
DDF000
stack
page read and write
4DCE000
trusted library allocation
page read and write
5B1E000
stack
page read and write
4DA4000
trusted library allocation
page read and write
898000
heap
page read and write
4DD0000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
5B1E000
stack
page read and write
50B0000
trusted library allocation
page read and write
3451000
trusted library allocation
page read and write
4DB7000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
221E3C13000
heap
page read and write
4DCE000
trusted library allocation
page read and write
9B8867E000
stack
page read and write
4DD0000
trusted library allocation
page read and write
1BC1EE60000
trusted library allocation
page read and write
88E000
heap
page read and write
532E000
stack
page read and write
898000
heap
page read and write
6D40000
trusted library allocation
page read and write
4DA6000
trusted library allocation
page read and write
49E0000
trusted library allocation
page execute and read and write
2B20000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
8C5000
heap
page read and write
4DCE000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
2331000
trusted library allocation
page read and write
25257886000
heap
page read and write
6D50000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
CC6000
trusted library allocation
page execute and read and write
4D90000
trusted library allocation
page read and write
2B16000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
5FDE000
stack
page read and write
400000
remote allocation
page execute and read and write
4DCD000
trusted library allocation
page read and write
1D20BF02000
heap
page read and write
CA3000
trusted library allocation
page execute and read and write
4DCE000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
25257900000
heap
page read and write
6C40000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
1BC1FC20000
heap
page readonly
4DBF000
trusted library allocation
page read and write
898000
heap
page read and write
43B000
stack
page read and write
4DC4000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
1BC1FC40000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DC9000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DBC000
trusted library allocation
page read and write
4D93000
trusted library allocation
page read and write
9B8877C000
stack
page read and write
5ADF000
stack
page read and write
4DD0000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page execute and read and write
6C3E000
stack
page read and write
6595F7F000
stack
page read and write
46FEB77000
stack
page read and write
4DCC000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
4D93000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
4D7D000
stack
page read and write
4DD4000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1D20BE81000
heap
page read and write
4DCB000
trusted library allocation
page read and write
4DC9000
trusted library allocation
page read and write
5FE000
stack
page read and write
4DAB000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
A62000
trusted library allocation
page read and write
CAD000
trusted library allocation
page execute and read and write
1BC1ECE1000
heap
page read and write
4DCB000
trusted library allocation
page read and write
1D20BD40000
heap
page read and write
49E0000
trusted library allocation
page read and write
5E9E000
stack
page read and write
7B0000
remote allocation
page read and write
4DAB000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
4DA3000
trusted library allocation
page read and write
9B887FF000
stack
page read and write
5130000
heap
page execute and read and write
221E3C49000
heap
page read and write
4DBD000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
54AE000
stack
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAF000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
46FED7F000
stack
page read and write
6D50000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4965000
trusted library allocation
page read and write
25257908000
heap
page read and write
50B0000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
4DC4000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
221E4602000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
A4D000
trusted library allocation
page execute and read and write
4D9A000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
89F000
heap
page read and write
4DC9000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DBD000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
16E22A51000
heap
page read and write
221E3B60000
heap
page read and write
4DB4000
trusted library allocation
page read and write
650000
unkown
page readonly
650000
unkown
page readonly
5110000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
652000
unkown
page readonly
4DB1000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
1D20BCD0000
heap
page read and write
400000
remote allocation
page execute and read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DC4000
trusted library allocation
page read and write
50B6000
trusted library allocation
page read and write
2525785A000
heap
page read and write
A6B000
trusted library allocation
page execute and read and write
4D94000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
89F000
heap
page read and write
4D9A000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
CC6000
trusted library allocation
page execute and read and write
4D92000
trusted library allocation
page read and write
1D20BE2A000
heap
page read and write
4C40000
trusted library allocation
page read and write
546E000
stack
page read and write
652000
unkown
page readonly
4DCE000
trusted library allocation
page read and write
4D9B000
trusted library allocation
page read and write
7B0000
remote allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DC4000
trusted library allocation
page read and write
2B0E000
stack
page read and write
4DCE000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
221E3C6C000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
A1F000
stack
page read and write
4DCE000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
8A5000
heap
page read and write
4DCE000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
8AE000
heap
page read and write
532E000
stack
page read and write
6D50000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
CE841FF000
stack
page read and write
49E0000
trusted library allocation
page read and write
730000
heap
page read and write
25257858000
heap
page read and write
4D9A000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
8FC000
heap
page read and write
1D590BD0000
heap
page read and write
4C40000
trusted library allocation
page read and write
5ADF000
stack
page read and write
4990000
trusted library allocation
page read and write
27283622000
unkown
page read and write
899000
heap
page read and write
4DBE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
1BC1EEF0000
heap
page read and write
1BC1ED15000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
99069FE000
stack
page read and write
4D92000
trusted library allocation
page read and write
89B000
heap
page read and write
6D40000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
6D8E000
stack
page read and write
4DC9000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
898000
heap
page read and write
652000
unkown
page readonly
25257780000
heap
page read and write
4DAB000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
70A000
unkown
page readonly
90D000
heap
page read and write
1BC1EDF0000
heap
page read and write
CA4000
trusted library allocation
page read and write
5E9E000
stack
page read and write
4DCE000
trusted library allocation
page read and write
892000
heap
page read and write
CD4000
heap
page read and write
4DA3000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
DE2000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
652000
unkown
page readonly
6E80000
trusted library allocation
page read and write
1D20BCE0000
heap
page read and write
3F9B37B000
stack
page read and write
CA4000
trusted library allocation
page read and write
493E000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4EC0000
heap
page read and write
88E000
heap
page read and write
4DCB000
trusted library allocation
page read and write
4D93000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
CE844FE000
stack
page read and write
4DAB000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
25257800000
heap
page read and write
27283800000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DBF000
trusted library allocation
page read and write
4D95000
trusted library allocation
page read and write
88C000
heap
page read and write
221E3C2C000
heap
page read and write
6D80000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4DA3000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
1BC1ED1D000
heap
page read and write
5080000
heap
page read and write
4DB1000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
ED6000
heap
page read and write
70A000
unkown
page readonly
CD0000
heap
page read and write
652000
unkown
page readonly
4DCE000
trusted library allocation
page read and write
27283702000
trusted library allocation
page read and write
46FEC7E000
stack
page read and write
4B80000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
CD4000
heap
page read and write
1BC1EB80000
heap
page read and write
400000
remote allocation
page execute and read and write
4C40000
trusted library allocation
page read and write
1D591602000
trusted library allocation
page read and write
DEB000
trusted library allocation
page execute and read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
70A000
unkown
page readonly
1BC1ED1D000
heap
page read and write
4DAE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
1D590E5D000
heap
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
70A000
unkown
page readonly
2B0E000
stack
page read and write
A3D000
trusted library allocation
page execute and read and write
6D9C000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6D40000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
1D590E76000
heap
page read and write
8240000
trusted library allocation
page execute and read and write
79C000
stack
page read and write
4D9A000
trusted library allocation
page read and write
2960000
heap
page read and write
CB0000
trusted library allocation
page read and write
88C000
heap
page read and write
4DCC000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
5D9E000
stack
page read and write
4DB1000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
4DC5000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
88E000
heap
page read and write
600000
heap
page read and write
4DB1000
trusted library allocation
page read and write
4D93000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
231D000
trusted library allocation
page read and write
8A1000
heap
page read and write
9B888FB000
stack
page read and write
422000
remote allocation
page execute and read and write
2940000
trusted library allocation
page execute and read and write
50B0000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
6D93000
trusted library allocation
page read and write
221E3C56000
heap
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
CA4000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
652000
unkown
page readonly
400000
remote allocation
page execute and read and write
4DF1000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
46FE87E000
stack
page read and write
1BC1EB90000
trusted library allocation
page read and write
221E3C4E000
heap
page read and write
1D590E3C000
heap
page read and write
54B0000
remote allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
85E000
heap
page read and write
4DAB000
trusted library allocation
page read and write
1D20BE4D000
heap
page read and write
1D20BD70000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
8D5000
heap
page read and write
4AB3000
heap
page read and write
422000
remote allocation
page execute and read and write
4DD0000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
85C000
heap
page read and write
4D94000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DBA000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4DBF000
trusted library allocation
page read and write
2525783C000
heap
page read and write
6D40000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DC5000
trusted library allocation
page read and write
898000
heap
page read and write
4DCA000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
4DBC000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
1D590F02000
heap
page read and write
635000
heap
page read and write
25257860000
heap
page read and write
46FE54B000
stack
page read and write
4DCC000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4DA4000
trusted library allocation
page read and write
27283813000
heap
page read and write
49A0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
4FD0000
heap
page read and write
1D20BF00000
heap
page read and write
4C50000
trusted library allocation
page read and write
5FDE000
stack
page read and write
4DCC000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
6D7B000
trusted library allocation
page read and write
510D000
stack
page read and write
CD5000
heap
page read and write
CA3000
trusted library allocation
page execute and read and write
4DAB000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DBD000
trusted library allocation
page read and write
4DCA000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
652000
unkown
page readonly
4DAF000
trusted library allocation
page read and write
2B30000
heap
page execute and read and write
4D93000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
9B88AFF000
stack
page read and write
4DCE000
trusted library allocation
page read and write
8B2000
heap
page read and write
1BC1ED3B000
heap
page read and write
4DCC000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
6D97000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
1D20BE00000
heap
page read and write
3F24EFD000
stack
page read and write
89E000
heap
page read and write
4DA3000
trusted library allocation
page read and write
4F80000
trusted library section
page read and write
4D9A000
trusted library allocation
page read and write
4AB0000
heap
page read and write
C0E000
stack
page read and write
4DD4000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
4DAC000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
104F000
stack
page read and write
4BEC000
stack
page read and write
70A000
unkown
page readonly
4C20000
trusted library allocation
page read and write
4DA4000
trusted library allocation
page read and write
A52000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
DE2000
trusted library allocation
page read and write
884000
heap
page read and write
4DD4000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
834E000
stack
page read and write
25257852000
heap
page read and write
4DC5000
trusted library allocation
page read and write
A90000
trusted library allocation
page execute and read and write
894000
heap
page read and write
49A1000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
DDF000
stack
page read and write
4AA0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
221E3C50000
heap
page read and write
6EA0000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
3F24D7B000
stack
page read and write
8AD000
heap
page read and write
6D40000
trusted library allocation
page read and write
1D590F00000
heap
page read and write
70A000
unkown
page readonly
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
4DBE000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4DB2000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
1BC1ED39000
heap
page read and write
4EC1000
heap
page read and write
25257824000
heap
page read and write
4DD4000
trusted library allocation
page read and write
652000
unkown
page readonly
4D94000
trusted library allocation
page read and write
4DEE000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DC9000
trusted library allocation
page read and write
1D20BE52000
heap
page read and write
8A5000
heap
page read and write
2B16000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
C4D000
stack
page read and write
6D40000
trusted library allocation
page read and write
54B0000
remote allocation
page read and write
4DD4000
trusted library allocation
page read and write
221E3C00000
heap
page read and write
4DD0000
trusted library allocation
page read and write
1BC1EEC0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4C50000
trusted library section
page read and write
4DBB000
trusted library allocation
page read and write
4DB2000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
650000
unkown
page readonly
4D92000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4EC0000
heap
page read and write
4D9A000
trusted library allocation
page read and write
4DBA000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4C60000
trusted library allocation
page execute and read and write
6B00000
trusted library allocation
page read and write
4DC9000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
1D590D40000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
E84000
heap
page read and write
DE7000
trusted library allocation
page execute and read and write
7F0000
heap
page read and write
54AE000
stack
page read and write
79C000
stack
page read and write
2525785D000
heap
page read and write
22FC000
stack
page read and write
89F000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page read and write
4DA3000
trusted library allocation
page read and write
5080000
heap
page read and write
4DB3000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
895000
heap
page read and write
4DB1000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
4D93000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DBE000
trusted library allocation
page read and write
CAD000
trusted library allocation
page execute and read and write
4DCE000
trusted library allocation
page read and write
3F9B67F000
stack
page read and write
4DD0000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4D93000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
CA3000
trusted library allocation
page execute and read and write
4D94000
trusted library allocation
page read and write
25257902000
heap
page read and write
50A0000
trusted library allocation
page read and write
1D590BE0000
heap
page read and write
1D590E13000
heap
page read and write
4DCC000
trusted library allocation
page read and write
4DB8000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
27283628000
heap
page read and write
4DD3000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
532E000
stack
page read and write
3F9B57B000
stack
page read and write
4DAB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
889000
heap
page read and write
9B8832B000
stack
page read and write
D0000
unkown
page readonly
8A5000
heap
page read and write
4DAB000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
6C40000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
630000
heap
page read and write
4DC5000
trusted library allocation
page read and write
3F9B47E000
stack
page read and write
4DCC000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
221E3D08000
heap
page read and write
4DBF000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
1D20BE76000
heap
page read and write
650000
unkown
page readonly
9906AF9000
stack
page read and write
4DAB000
trusted library allocation
page read and write
652000
unkown
page readonly
4DCE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAD000
trusted library allocation
page read and write
4DB2000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
E4E000
stack
page read and write
4DCC000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
5EDE000
stack
page read and write
820000
heap
page read and write
6DB0000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
AF7000
stack
page read and write
4DD4000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
80F000
stack
page read and write
4DAF000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
822E000
stack
page read and write
4DAF000
trusted library allocation
page read and write
221E3C02000
heap
page read and write
EDE000
heap
page read and write
4DBC000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAF000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
2940000
trusted library allocation
page execute and read and write
293E000
stack
page read and write
4F80000
trusted library allocation
page read and write
650000
unkown
page readonly
6D40000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
2325000
trusted library allocation
page read and write
4D9B000
trusted library allocation
page read and write
5C1E000
stack
page read and write
4DA3000
trusted library allocation
page read and write
8210000
trusted library allocation
page read and write
3F24B7E000
stack
page read and write
DE7000
trusted library allocation
page execute and read and write
4D93000
trusted library allocation
page read and write
4D9B000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
7B0000
remote allocation
page read and write
27283510000
heap
page read and write
4DCE000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
1220000
heap
page read and write
2290000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
1D590E54000
heap
page read and write
AA7000
heap
page read and write
4D9A000
trusted library allocation
page read and write
4DA3000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
851000
heap
page read and write
4DAB000
trusted library allocation
page read and write
2525786F000
heap
page read and write
3B41000
trusted library allocation
page read and write
46FE5CE000
stack
page read and write
4DAB000
trusted library allocation
page read and write
1D20BF13000
heap
page read and write
50B0000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
3F24DFE000
stack
page read and write
88A000
heap
page read and write
27283900000
heap
page read and write
4DD0000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
88D000
heap
page read and write
50B0000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4DCC000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
4AA0000
trusted library allocation
page read and write
18A000
unkown
page readonly
99063DD000
stack
page read and write
4DAB000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
1D20BE4B000
heap
page read and write
7B0000
remote allocation
page read and write
2950000
trusted library allocation
page read and write
46FE97C000
stack
page read and write
16E22800000
heap
page read and write
4DAB000
trusted library allocation
page read and write
537000
stack
page read and write
E5A000
heap
page read and write
4D92000
trusted library allocation
page read and write
228E000
stack
page read and write
7B0000
remote allocation
page read and write
4DCE000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
536E000
stack
page read and write
4DCE000
trusted library allocation
page read and write
5EDE000
stack
page read and write
8A3000
heap
page read and write
CCA000
trusted library allocation
page execute and read and write
4DAB000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
There are 1564 hidden memdumps, click here to show them.