IOC Report
Y5JXqbeNdS

loading gif

Files

File Path
Type
Category
Malicious
Y5JXqbeNdS.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\Thermo_Chromeleon_7.2.10_ES_MUa_20240403070104.log
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (3622), with CRLF line terminators
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\BootstrapperCore.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\BootstrapperCore.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\Eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\Individual License Agreement.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\Installation Guide - Chromeleon 7.2.10.pdf
PDF document, version 1.4
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\Thermo.BootstrapperApplication.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\Thermo.Chromeleon.BaExtension.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\mbahost.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\mbapreq.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\mbapreq.png
PNG image data, 427 x 519, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\mbapreq.thm
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{C1068606-A2DC-4449-96C7-3E7413773EA0}\.ba\mbapreq.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{FA80094D-F9A9-4117-87F4-0E9C1E31A138}\.cr\Y5JXqbeNdS.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Y5JXqbeNdS.exe
"C:\Users\user\Desktop\Y5JXqbeNdS.exe"
C:\Windows\Temp\{FA80094D-F9A9-4117-87F4-0E9C1E31A138}\.cr\Y5JXqbeNdS.exe
"C:\Windows\Temp\{FA80094D-F9A9-4117-87F4-0E9C1E31A138}\.cr\Y5JXqbeNdS.exe" -burn.clean.room="C:\Users\user\Desktop\Y5JXqbeNdS.exe" -burn.filehandle.attached=528 -burn.filehandle.self=544

URLs

Name
IP
Malicious
http://defaultcontainer/Thermo.BootstrapperApplication;component/views/GlobalStyles.xamld
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://wixtoolset.org/schemas/thmutil/2010
unknown
http://defaultcontainer/Thermo.BootstrapperApplication;component/views/welcomeview.xamld
unknown
http://ocsp.thawte.com0
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
http://foo/bar/views/welcomeview.baml
unknown
http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor
unknown
http://wixtoolset.org/news/
unknown
http://www.symauth.com/cps0(
unknown
http://wixtoolset.org/releases/SCreating
unknown
http://www.thermofisher.com
unknown
http://wixtoolset.org/releases/
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://foo/views/welcomeview.xaml
unknown
http://www.symauth.com/rpa00
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://foo/bar/views/welcomeview.bamld
unknown
http://www.thermoscientific.com/support
unknown
http://wixtoolset.org/
unknown
http://wixtoolset.org/telemetry/v
unknown
http://www.thermoscientific.com/support~
unknown
http://schemas.datacontract.org/2004/07/System
unknown
http://.crl0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.thermoscientific.com/chromeleon
unknown
http://appsyndication.org/2006/appsyn
unknown
There are 17 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3116000
trusted library allocation
page read and write
BE5B000
heap
page read and write
BE86000
heap
page read and write
5F50000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
BED2000
heap
page read and write
349E000
trusted library allocation
page read and write
BC11000
heap
page read and write
6633000
heap
page read and write
BEAB000
heap
page read and write
3080000
trusted library allocation
page read and write
6ABB000
heap
page read and write
6678000
heap
page read and write
BECB000
heap
page read and write
2E38000
trusted library allocation
page read and write
BF28000
heap
page read and write
6AB7000
heap
page read and write
66BC000
heap
page read and write
3438000
heap
page read and write
3085000
trusted library allocation
page read and write
A40000
unkown
page readonly
2C24000
trusted library allocation
page read and write
980000
unkown
page readonly
BF0B000
heap
page read and write
66CA000
heap
page read and write
C57000
heap
page read and write
73AB000
heap
page read and write
3483000
heap
page read and write
BE3E000
heap
page read and write
347C000
heap
page read and write
63A6000
heap
page read and write
6040000
trusted library allocation
page read and write
88B000
heap
page read and write
343C000
heap
page read and write
EA0000
trusted library allocation
page read and write
7550000
heap
page read and write
90C000
heap
page read and write
2C70000
heap
page read and write
2ECF000
trusted library allocation
page read and write
D4E000
stack
page read and write
F50000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
63A6000
heap
page read and write
6AC7000
heap
page read and write
EE0000
trusted library allocation
page read and write
347A000
heap
page read and write
3040000
trusted library allocation
page read and write
BE6D000
heap
page read and write
BE6D000
heap
page read and write
3082000
trusted library allocation
page read and write
63C3000
heap
page read and write
5F77000
trusted library allocation
page read and write
2EBB000
trusted library allocation
page read and write
6CC04000
unkown
page readonly
732E000
heap
page read and write
6480000
trusted library allocation
page read and write
6AB9000
heap
page read and write
66FA000
heap
page read and write
63BF000
heap
page read and write
6040000
trusted library allocation
page read and write
90C000
heap
page read and write
BDC9000
heap
page read and write
3485000
heap
page read and write
7F2D1000
trusted library allocation
page execute read
BF37000
heap
page read and write
6292000
heap
page read and write
CF0000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
63CB000
heap
page read and write
BDC9000
heap
page read and write
63BF000
heap
page read and write
6AB5000
heap
page read and write
6300000
heap
page read and write
33F3000
heap
page read and write
3077000
trusted library allocation
page read and write
BE36000
heap
page read and write
30DA000
trusted library allocation
page read and write
BE6D000
heap
page read and write
6304000
heap
page read and write
30B9000
trusted library allocation
page read and write
63CB000
heap
page read and write
3439000
heap
page read and write
30A8000
trusted library allocation
page read and write
6BFC000
heap
page read and write
66BA000
heap
page read and write
BE80000
heap
page read and write
347E000
heap
page read and write
66BF000
heap
page read and write
7370000
heap
page read and write
6D20000
trusted library allocation
page read and write
DF2000
heap
page read and write
BE36000
heap
page read and write
3100000
trusted library allocation
page read and write
2EC5000
trusted library allocation
page read and write
63B3000
heap
page read and write
CAC1000
heap
page read and write
3092000
trusted library allocation
page read and write
A8B000
unkown
page readonly
6440000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
C81F000
heap
page read and write
2EB5000
trusted library allocation
page read and write
3743000
trusted library allocation
page read and write
7F2E8000
trusted library allocation
page execute read
909000
heap
page read and write
5CBE000
stack
page read and write
32A4000
heap
page read and write
3062000
trusted library allocation
page read and write
C793000
heap
page read and write
8D9000
heap
page read and write
347B000
heap
page read and write
30EC000
trusted library allocation
page read and write
BEC3000
heap
page read and write
305E000
trusted library allocation
page read and write
BE6D000
heap
page read and write
BF34000
heap
page read and write
6287000
heap
page read and write
63A6000
heap
page read and write
5F10000
trusted library allocation
page read and write
5F80000
trusted library allocation
page execute and read and write
848000
heap
page read and write
66F4000
heap
page read and write
2DF9000
trusted library allocation
page read and write
6B77000
heap
page read and write
63D1000
heap
page read and write
BED2000
heap
page read and write
6636000
heap
page read and write
63CB000
heap
page read and write
63A6000
heap
page read and write
BE04000
heap
page read and write
3488000
heap
page read and write
BE8E000
heap
page read and write
5F10000
trusted library allocation
page read and write
7F2EE000
trusted library allocation
page execute read
6300000
heap
page read and write
BE80000
heap
page read and write
C55000
heap
page read and write
6AC7000
heap
page read and write
BE5B000
heap
page read and write
CCB9000
heap
page read and write
30F4000
trusted library allocation
page read and write
68F0000
trusted library allocation
page read and write
2E6F000
trusted library allocation
page read and write
B1B0000
trusted library allocation
page read and write
347B000
heap
page read and write
BECB000
heap
page read and write
6637000
heap
page read and write
C925000
heap
page read and write
3418000
trusted library allocation
page read and write
BE6D000
heap
page read and write
C5A1000
heap
page read and write
B1E0000
trusted library allocation
page read and write
8D3000
heap
page read and write
66D1000
heap
page read and write
CEB000
heap
page read and write
6627000
stack
page read and write
BDC9000
heap
page read and write
BE3E000
heap
page read and write
5B30000
trusted library allocation
page read and write
2EB7000
trusted library allocation
page read and write
9F0000
heap
page read and write
3115000
trusted library allocation
page read and write
307C000
trusted library allocation
page read and write
B1D0000
trusted library allocation
page read and write
347B000
heap
page read and write
BECB000
heap
page read and write
62C9000
heap
page read and write
BE36000
heap
page read and write
6B78000
heap
page read and write
64E2000
unkown
page readonly
BDBE000
heap
page read and write
8D4000
heap
page read and write
66C2000
heap
page read and write
BED5000
heap
page read and write
BF0B000
heap
page read and write
2E44000
trusted library allocation
page read and write
2E58000
trusted library allocation
page read and write
837000
heap
page read and write
3497000
trusted library allocation
page read and write
BE7D000
heap
page read and write
6634000
heap
page read and write
BECB000
heap
page read and write
6C37000
heap
page read and write
2EAC000
trusted library allocation
page read and write
CE8000
heap
page read and write
BEC3000
heap
page read and write
63C1000
heap
page read and write
63A6000
heap
page read and write
63D8000
heap
page read and write
2ED3000
trusted library allocation
page read and write
C818000
heap
page read and write
CAB9000
heap
page read and write
63B3000
heap
page read and write
BDC5000
heap
page read and write
72E7000
heap
page read and write
6304000
heap
page read and write
2EA0000
trusted library allocation
page read and write
305D000
trusted library allocation
page read and write
3057000
trusted library allocation
page read and write
6C34000
heap
page read and write
2E98000
trusted library allocation
page read and write
62E3000
heap
page read and write
3088000
trusted library allocation
page read and write
B220000
trusted library allocation
page read and write
BDBE000
heap
page read and write
347B000
heap
page read and write
6277000
heap
page read and write
6BB7000
heap
page read and write
3030000
heap
page read and write
3052000
trusted library allocation
page read and write
BEAB000
heap
page read and write
6309000
heap
page read and write
30A0000
trusted library allocation
page read and write
ABA000
unkown
page readonly
6C3B000
heap
page read and write
66F7000
heap
page read and write
73FC000
heap
page read and write
66C1000
heap
page read and write
BEC3000
heap
page read and write
63D8000
heap
page read and write
2EB3000
trusted library allocation
page read and write
758B000
heap
page read and write
30EF000
trusted library allocation
page read and write
7372000
heap
page read and write
66CD000
heap
page read and write
2E1D000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
627B000
heap
page read and write
311A000
trusted library allocation
page read and write
627B000
heap
page read and write
BDBE000
heap
page read and write
CEA000
heap
page read and write
667E000
heap
page read and write
841000
heap
page read and write
6702000
heap
page read and write
62FA000
heap
page read and write
BE6D000
heap
page read and write
2E57000
trusted library allocation
page read and write
30A9000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
BDBE000
heap
page read and write
3487000
heap
page read and write
BEC4000
heap
page read and write
2EC7000
trusted library allocation
page read and write
3B19000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
62AE000
heap
page read and write
6637000
heap
page read and write
63C1000
heap
page read and write
78A7000
heap
page read and write
BE6D000
heap
page read and write
62EB000
heap
page read and write
2E95000
trusted library allocation
page read and write
BE04000
heap
page read and write
CAF2000
heap
page read and write
3489000
heap
page read and write
84A000
heap
page read and write
629B000
heap
page read and write
66BC000
heap
page read and write
CA2E000
heap
page read and write
6900000
trusted library allocation
page read and write
BEB6000
heap
page read and write
CA75000
heap
page read and write
BE36000
heap
page read and write
7F2F0000
trusted library allocation
page execute and read and write
B9DE000
heap
page read and write
EB0000
trusted library allocation
page read and write
3B15000
trusted library allocation
page read and write
74C8000
heap
page read and write
6B75000
heap
page read and write
35B0000
heap
page read and write
D1C000
heap
page read and write
48D1000
trusted library allocation
page read and write
307A000
trusted library allocation
page read and write
B9E0000
heap
page read and write
3481000
heap
page read and write
BDBE000
heap
page read and write
6309000
heap
page read and write
347B000
heap
page read and write
BEBB000
heap
page read and write
BDB9000
heap
page read and write
BE86000
heap
page read and write
BE36000
heap
page read and write
66C4000
heap
page read and write
58D8000
trusted library allocation
page read and write
D22000
heap
page read and write
31F1000
heap
page read and write
BE6D000
heap
page read and write
6B74000
heap
page read and write
C7D6000
heap
page read and write
BEFC000
heap
page read and write
90E000
heap
page read and write
6C01000
heap
page read and write
BEC3000
heap
page read and write
66CA000
heap
page read and write
667D000
heap
page read and write
BDAC000
heap
page read and write
2E65000
trusted library allocation
page read and write
6AC3000
heap
page read and write
8D4000
heap
page read and write
EE0000
trusted library allocation
page read and write
2EA4000
trusted library allocation
page read and write
304E000
trusted library allocation
page read and write
66BF000
heap
page read and write
736C000
heap
page read and write
63A6000
heap
page read and write
66C3000
heap
page read and write
66FA000
heap
page read and write
6283000
heap
page read and write
347D000
heap
page read and write
66C9000
heap
page read and write
62AE000
heap
page read and write
6266000
heap
page read and write
2E34000
trusted library allocation
page read and write
848000
heap
page read and write
77EA000
heap
page read and write
C818000
heap
page read and write
5AF7000
heap
page execute and read and write
309B000
trusted library allocation
page read and write
CE4000
heap
page read and write
2DE0000
heap
page read and write
BEBB000
heap
page read and write
ABA000
unkown
page readonly
630C000
heap
page read and write
BBDD000
heap
page read and write
678E000
trusted library allocation
page read and write
2ECE000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
2E56000
trusted library allocation
page read and write
30E4000
trusted library allocation
page read and write
6ABC000
heap
page read and write
BDBA000
heap
page read and write
BE5B000
heap
page read and write
6C0A000
heap
page read and write
BDB9000
heap
page read and write
BE6D000
heap
page read and write
621F000
heap
page read and write
34BF000
heap
page read and write
6292000
heap
page read and write
66C6000
heap
page read and write
888000
heap
page read and write
9F2000
trusted library allocation
page read and write
BE36000
heap
page read and write
BA5B000
heap
page read and write
908000
heap
page read and write
6AC1000
heap
page read and write
FE0000
heap
page read and write
BE8E000
heap
page read and write
33F2000
heap
page read and write
CF1000
heap
page read and write
63C8000
heap
page read and write
7373000
heap
page read and write
7E0000
heap
page read and write
737D000
heap
page read and write
347A000
heap
page read and write
BF17000
heap
page read and write
33FD000
heap
page read and write
BE36000
heap
page read and write
3490000
heap
page read and write
BF34000
heap
page read and write
905000
heap
page read and write
BDBE000
heap
page read and write
B400000
trusted library allocation
page read and write
34C3000
heap
page read and write
2C30000
trusted library allocation
page read and write
6ABD000
heap
page read and write
5F80000
trusted library allocation
page read and write
CF0000
heap
page read and write
63CF000
heap
page read and write
6528000
stack
page read and write
3484000
heap
page read and write
BE5B000
heap
page read and write
981000
unkown
page execute read
BE04000
heap
page read and write
7F2D2000
trusted library allocation
page readonly
6C39000
heap
page read and write
63CB000
heap
page read and write
BF28000
heap
page read and write
63B4000
heap
page read and write
72EA000
heap
page read and write
2EBA000
trusted library allocation
page read and write
7375000
heap
page read and write
E5D000
heap
page read and write
6C08000
heap
page read and write
2E0C000
trusted library allocation
page read and write
2E5A000
trusted library allocation
page read and write
BE80000
heap
page read and write
3442000
heap
page read and write
67B0000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
7F2DB000
trusted library allocation
page execute read
3054000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
BBD0000
heap
page read and write
8D7000
heap
page read and write
D80000
heap
page read and write
BBF1000
trusted library allocation
page read and write
5F10000
trusted library allocation
page read and write
62EB000
heap
page read and write
7875000
heap
page read and write
2ECB000
trusted library allocation
page read and write
343B000
heap
page read and write
2E0F000
trusted library allocation
page read and write
34B5000
heap
page read and write
BE04000
heap
page read and write
343F000
heap
page read and write
30A1000
trusted library allocation
page read and write
BF28000
heap
page read and write
38D1000
trusted library allocation
page read and write
CA2E000
heap
page read and write
61E0000
trusted library allocation
page read and write
C818000
heap
page read and write
888000
heap
page read and write
33F0000
trusted library allocation
page read and write
D1D000
heap
page read and write
E3E000
heap
page read and write
347C000
heap
page read and write
C822000
heap
page read and write
5DFB000
stack
page read and write
66FA000
heap
page read and write
62EB000
heap
page read and write
B9DE000
heap
page read and write
8D8000
heap
page read and write
DA3000
heap
page read and write
35B3000
heap
page read and write
9EA000
unkown
page read and write
3122000
trusted library allocation
page read and write
63CF000
heap
page read and write
BE5B000
heap
page read and write
8D5000
heap
page read and write
2E17000
trusted library allocation
page read and write
34B6000
heap
page read and write
6C3C000
heap
page read and write
667B000
heap
page read and write
2E20000
trusted library allocation
page read and write
BE82000
heap
page read and write
2EC7000
trusted library allocation
page read and write
2EAE000
trusted library allocation
page read and write
AAD000
unkown
page readonly
2ED2000
trusted library allocation
page read and write
8D3000
heap
page read and write
BEB6000
heap
page read and write
BDC5000
heap
page read and write
2ECC000
trusted library allocation
page read and write
3442000
heap
page read and write
2E48000
trusted library allocation
page read and write
667F000
heap
page read and write
7830000
heap
page read and write
3090000
trusted library allocation
page read and write
2EBF000
trusted library allocation
page read and write
6BFA000
heap
page read and write
5F80000
trusted library allocation
page read and write
E20000
heap
page read and write
33FC000
heap
page read and write
6ABB000
heap
page read and write
30F8000
trusted library allocation
page read and write
343A000
heap
page read and write
3492000
heap
page read and write
62EB000
heap
page read and write
6309000
heap
page read and write
6C06000
heap
page read and write
66BA000
heap
page read and write
2E9E000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
BBDF000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
90A000
heap
page read and write
2B90000
heap
page read and write
2C52000
trusted library allocation
page read and write
3094000
trusted library allocation
page read and write
BE8E000
heap
page read and write
66CA000
heap
page read and write
2E2C000
trusted library allocation
page read and write
BEB6000
heap
page read and write
E2C000
heap
page read and write
3488000
heap
page read and write
6304000
heap
page read and write
CCB7000
heap
page read and write
EA0000
trusted library allocation
page read and write
66C7000
heap
page read and write
30A4000
trusted library allocation
page read and write
8D5000
heap
page read and write
625F000
heap
page read and write
BE3E000
heap
page read and write
F10000
trusted library allocation
page read and write
B36000
unkown
page readonly
CCE000
stack
page read and write
2EAB000
trusted library allocation
page read and write
8D8000
heap
page read and write
BE86000
heap
page read and write
BED5000
heap
page read and write
2E51000
trusted library allocation
page read and write
2E99000
trusted library allocation
page read and write
6ACC000
heap
page read and write
30E9000
trusted library allocation
page read and write
BE36000
heap
page read and write
6C35000
heap
page read and write
6050000
trusted library allocation
page read and write
6300000
heap
page read and write
623B000
heap
page read and write
5F00000
trusted library allocation
page read and write
BE36000
heap
page read and write
66C8000
heap
page read and write
2EB0000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
66BF000
heap
page read and write
66BE000
heap
page read and write
667C000
heap
page read and write
BE86000
heap
page read and write
5F80000
trusted library allocation
page read and write
BF34000
heap
page read and write
30FB000
trusted library allocation
page read and write
6631000
heap
page read and write
C5A6000
heap
page read and write
348E000
heap
page read and write
5F10000
trusted library allocation
page read and write
3486000
heap
page read and write
A40000
unkown
page readonly
CCC1000
heap
page read and write
2E07000
trusted library allocation
page read and write
63D1000
heap
page read and write
6AC3000
heap
page read and write
BE3E000
heap
page read and write
BDC9000
heap
page read and write
BF28000
heap
page read and write
6304000
heap
page read and write
33F5000
heap
page read and write
BE3E000
heap
page read and write
BF37000
heap
page read and write
67F0000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
667E000
heap
page read and write
63E1000
heap
page read and write
BDC3000
heap
page read and write
7442000
heap
page read and write
67B5000
trusted library allocation
page read and write
A30000
heap
page read and write
BE36000
heap
page read and write
2E59000
trusted library allocation
page read and write
63D8000
heap
page read and write
BE05000
heap
page read and write
6ACD000
heap
page read and write
30AD000
trusted library allocation
page read and write
BBF6000
heap
page read and write
6AB7000
heap
page read and write
BDC3000
heap
page read and write
BE36000
heap
page read and write
34B4000
heap
page read and write
6C00000
heap
page read and write
2EA6000
trusted library allocation
page read and write
2EB4000
trusted library allocation
page read and write
741A000
heap
page read and write
CA5000
heap
page read and write
A41000
unkown
page execute read
3484000
heap
page read and write
BDC9000
heap
page read and write
307F000
trusted library allocation
page read and write
BE6D000
heap
page read and write
63BF000
heap
page read and write
629B000
heap
page read and write
6BBA000
heap
page read and write
63CB000
heap
page read and write
6C04000
heap
page read and write
8DA000
heap
page read and write
7873000
heap
page read and write
8D3000
heap
page read and write
BED5000
heap
page read and write
30A6000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
BECB000
heap
page read and write
311E000
trusted library allocation
page read and write
63C3000
heap
page read and write
CE5000
heap
page read and write
62FA000
heap
page read and write
CE2000
heap
page read and write
6300000
heap
page read and write
6410000
trusted library allocation
page read and write
C9C000
heap
page read and write
BE80000
heap
page read and write
6AC1000
heap
page read and write
6040000
trusted library allocation
page read and write
6C43000
heap
page read and write
CABB000
heap
page read and write
6770000
trusted library allocation
page read and write
66C5000
heap
page read and write
6C37000
heap
page read and write
F00000
trusted library allocation
page read and write
88C000
heap
page read and write
EF0000
trusted library allocation
page read and write
3485000
heap
page read and write
36BD000
stack
page read and write
3440000
heap
page read and write
6BBB000
heap
page read and write
6CC0E000
unkown
page readonly
BE86000
heap
page read and write
BDD3000
heap
page read and write
3101000
trusted library allocation
page read and write
6042000
trusted library allocation
page read and write
BE74000
heap
page read and write
2BD0000
trusted library section
page read and write
6369000
heap
page read and write
745C000
heap
page read and write
6A94000
heap
page read and write
F40000
trusted library allocation
page read and write
C58D000
heap
page read and write
BDAD000
heap
page read and write
BA5B000
heap
page read and write
63CB000
heap
page read and write
BE36000
heap
page read and write
6AC1000
heap
page read and write
3480000
heap
page read and write
BF37000
heap
page read and write
EE0000
trusted library allocation
page read and write
6248000
heap
page read and write
EA0000
trusted library allocation
page read and write
6C06000
heap
page read and write
6BBF000
heap
page read and write
6304000
heap
page read and write
2E15000
trusted library allocation
page read and write
8CC000
heap
page read and write
30C9000
trusted library allocation
page read and write
BBDD000
heap
page read and write
33FB000
heap
page read and write
63D8000
heap
page read and write
BEAB000
heap
page read and write
3446000
heap
page read and write
BDA5000
heap
page read and write
BE6D000
heap
page read and write
BE6D000
heap
page read and write
3480000
heap
page read and write
2E3F000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
5EFC000
stack
page read and write
63A6000
heap
page read and write
BDD3000
heap
page read and write
BF0B000
heap
page read and write
6BBE000
heap
page read and write
63A6000
heap
page read and write
CDA000
heap
page read and write
6681000
heap
page read and write
CE5000
heap
page read and write
BDBA000
heap
page read and write
E2C000
heap
page read and write
2E33000
trusted library allocation
page read and write
6430000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
BBF8000
trusted library allocation
page read and write
66BA000
heap
page read and write
BE5B000
heap
page read and write
6050000
trusted library allocation
page read and write
BE3E000
heap
page read and write
3099000
trusted library allocation
page read and write
6292000
heap
page read and write
696C000
stack
page read and write
8CF000
heap
page read and write
2E09000
trusted library allocation
page read and write
3063000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
CE0000
heap
page read and write
66C9000
heap
page read and write
90B000
heap
page read and write
6AC7000
heap
page read and write
62F6000
heap
page read and write
347F000
heap
page read and write
34B5000
heap
page read and write
BE04000
heap
page read and write
8DB000
heap
page read and write
7C0000
heap
page read and write
BBE3000
heap
page read and write
34B7000
heap
page read and write
A20000
trusted library allocation
page read and write
63C1000
heap
page read and write
7F2E4000
trusted library allocation
page execute read
7375000
heap
page read and write
8CC000
heap
page read and write
306B000
trusted library allocation
page read and write
E3B000
heap
page read and write
63AF000
heap
page read and write
306C000
trusted library allocation
page read and write
34C1000
heap
page read and write
3055000
trusted library allocation
page read and write
3098000
trusted library allocation
page read and write
6BFE000
heap
page read and write
62E3000
heap
page read and write
3488000
heap
page read and write
2E54000
trusted library allocation
page read and write
62E3000
heap
page read and write
BEB8000
heap
page read and write
34BB000
heap
page read and write
B1D0000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
C850000
heap
page read and write
BF0B000
heap
page read and write
BEAB000
heap
page read and write
BF19000
heap
page read and write
311F000
trusted library allocation
page read and write
D1B000
heap
page read and write
34B9000
heap
page read and write
732A000
heap
page read and write
8CA000
heap
page read and write
62AE000
heap
page read and write
5F80000
trusted library allocation
page read and write
34A4000
trusted library allocation
page read and write
63AF000
heap
page read and write
BED2000
heap
page read and write
C849000
heap
page read and write
305F000
trusted library allocation
page read and write
3081000
trusted library allocation
page read and write
33F1000
heap
page read and write
2E5D000
trusted library allocation
page read and write
3064000
trusted library allocation
page read and write
63B6000
heap
page read and write
73A7000
heap
page read and write
BE6D000
heap
page read and write
63DA000
heap
page read and write
30EA000
trusted library allocation
page read and write
BDBE000
heap
page read and write
2E0D000
trusted library allocation
page read and write
BDBA000
heap
page read and write
6AC3000
heap
page read and write
62C9000
heap
page read and write
308F000
trusted library allocation
page read and write
6AC3000
heap
page read and write
2E9B000
trusted library allocation
page read and write
63A6000
heap
page read and write
66CB000
heap
page read and write
BBD6000
heap
page read and write
2E32000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
905000
heap
page read and write
3446000
heap
page read and write
347D000
heap
page read and write
6287000
heap
page read and write
9F0000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
6048000
trusted library allocation
page read and write
5F10000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
88B000
heap
page read and write
6292000
heap
page read and write
6040000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
30E2000
trusted library allocation
page read and write
BEAB000
heap
page read and write
6B7F000
heap
page read and write
C51000
heap
page read and write
667B000
heap
page read and write
BDA5000
heap
page read and write
5B02000
unkown
page readonly
BA2A000
heap
page read and write
34B4000
heap
page read and write
6040000
trusted library allocation
page read and write
BF0B000
heap
page read and write
72ED000
heap
page read and write
BDC9000
heap
page read and write
68E0000
heap
page read and write
66C2000
heap
page read and write
3060000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
732E000
heap
page read and write
BDB3000
heap
page read and write
8D1000
heap
page read and write
C853000
heap
page read and write
90E000
heap
page read and write
6686000
heap
page read and write
BE3E000
heap
page read and write
62EF000
heap
page read and write
BE5B000
heap
page read and write
C54000
heap
page read and write
6B72000
heap
page read and write
EF0000
trusted library allocation
page read and write
6ACC000
heap
page read and write
3000000
heap
page read and write
F30000
trusted library allocation
page read and write
3487000
heap
page read and write
6218000
heap
page read and write
347E000
heap
page read and write
66C6000
heap
page read and write
63BF000
heap
page read and write
BED5000
heap
page read and write
6AC7000
heap
page read and write
3439000
heap
page read and write
63B4000
heap
page read and write
BE36000
heap
page read and write
62C9000
heap
page read and write
747B000
heap
page read and write
6AC7000
heap
page read and write
6072000
unkown
page readonly
30E3000
trusted library allocation
page read and write
348A000
heap
page read and write
72E3000
heap
page read and write
627C000
heap
page read and write
3486000
heap
page read and write
A10000
trusted library allocation
page read and write
84B000
heap
page read and write
63BD000
heap
page read and write
E37000
heap
page read and write
BDBA000
heap
page read and write
6AAD000
heap
page read and write
EE0000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
6300000
heap
page read and write
63B3000
heap
page read and write
63DA000
heap
page read and write
2E35000
trusted library allocation
page read and write
BDC0000
heap
page read and write
63A6000
heap
page read and write
34B8000
heap
page read and write
8CC000
heap
page read and write
84C000
heap
page read and write
BE3E000
heap
page read and write
6AC7000
heap
page read and write
3104000
trusted library allocation
page read and write
6BBC000
heap
page read and write
30BD000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
3107000
trusted library allocation
page read and write
BF32000
heap
page read and write
7B0000
heap
page read and write
BE8E000
heap
page read and write
C596000
heap
page read and write
BDBA000
heap
page read and write
66C3000
heap
page read and write
347E000
heap
page read and write
2C23000
trusted library allocation
page execute and read and write
BF28000
heap
page read and write
6AC3000
heap
page read and write
5B93000
heap
page read and write
736B000
heap
page read and write
2C2D000
trusted library allocation
page execute and read and write
63B4000
heap
page read and write
629B000
heap
page read and write
8D7000
heap
page read and write
2DE0000
heap
page read and write
BDBE000
heap
page read and write
33FF000
heap
page read and write
33FD000
heap
page read and write
3486000
heap
page read and write
3510000
trusted library allocation
page read and write
CDC000
heap
page read and write
CA28000
heap
page read and write
5F80000
trusted library allocation
page read and write
BED5000
heap
page read and write
C817000
heap
page read and write
2E88000
trusted library allocation
page read and write
BE6D000
heap
page read and write
A16000
trusted library allocation
page read and write
DA7000
heap
page read and write
5F50000
trusted library allocation
page read and write
6AB9000
heap
page read and write
BC11000
heap
page read and write
BE7B000
heap
page read and write
C80E000
heap
page read and write
3093000
trusted library allocation
page read and write
73AE000
heap
page read and write
BE74000
heap
page read and write
8CC000
heap
page read and write
33F0000
trusted library allocation
page read and write
347B000
heap
page read and write
C786000
heap
page read and write
BE3E000
heap
page read and write
2E6C000
trusted library allocation
page read and write
3105000
trusted library allocation
page read and write
BE36000
heap
page read and write
67C0000
trusted library allocation
page read and write
347D000
heap
page read and write
663E000
heap
page read and write
BED5000
heap
page read and write
3484000
heap
page read and write
8E2000
heap
page read and write
907000
heap
page read and write
5F80000
trusted library allocation
page read and write
BBE9000
trusted library allocation
page read and write
5BD7000
heap
page read and write
30E5000
trusted library allocation
page read and write
62FA000
heap
page read and write
66C7000
heap
page read and write
2E3B000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
CE6000
heap
page read and write
5B4C000
heap
page read and write
F00000
trusted library allocation
page read and write
BF32000
heap
page read and write
BECB000
heap
page read and write
348E000
heap
page read and write
BDBA000
heap
page read and write
F10000
trusted library allocation
page read and write
66BC000
heap
page read and write
B997000
heap
page read and write
BECB000
heap
page read and write
BEB6000
heap
page read and write
CE8000
heap
page read and write
6C36000
heap
page read and write
3480000
trusted library allocation
page read and write
BDBE000
heap
page read and write
BA22000
heap
page read and write
B22E000
stack
page read and write
BDC5000
heap
page read and write
BE3E000
heap
page read and write
9CB000
unkown
page readonly
2E9F000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
307E000
trusted library allocation
page read and write
64C0000
trusted library allocation
page read and write
BA9E000
stack
page read and write
7448000
heap
page read and write
33F2000
heap
page read and write
667A000
heap
page read and write
30FC000
trusted library allocation
page read and write
BF28000
heap
page read and write
C586000
heap
page read and write
F00000
trusted library allocation
page read and write
B98C000
stack
page read and write
6BFE000
heap
page read and write
604C000
trusted library allocation
page read and write
891000
heap
page read and write
3059000
trusted library allocation
page read and write
BE86000
heap
page read and write
C586000
heap
page read and write
C7D3000
heap
page read and write
2EC5000
trusted library allocation
page read and write
BF34000
heap
page read and write
6040000
trusted library allocation
page read and write
3749000
trusted library allocation
page execute and read and write
2E42000
trusted library allocation
page read and write
C5B000
heap
page read and write
C8EA000
heap
page read and write
3BC5000
trusted library allocation
page read and write
3079000
trusted library allocation
page read and write
629B000
heap
page read and write
BED5000
heap
page read and write
3746000
trusted library allocation
page execute and read and write
BF17000
heap
page read and write
2AD0000
trusted library allocation
page read and write
34B6000
heap
page read and write
6040000
trusted library allocation
page read and write
88E000
heap
page read and write
66BC000
heap
page read and write
A00000
trusted library allocation
page read and write
BE36000
heap
page read and write
63CF000
heap
page read and write
63D1000
heap
page read and write
7F2DD000
trusted library allocation
page execute read
BE5B000
heap
page read and write
305B000
trusted library allocation
page read and write
CDD000
heap
page read and write
3442000
heap
page read and write
BF37000
heap
page read and write
C51000
heap
page read and write
F20000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
C81A000
heap
page read and write
5F00000
trusted library allocation
page read and write
2EAD000
trusted library allocation
page read and write
BDC9000
heap
page read and write
667A000
heap
page read and write
C596000
heap
page read and write
810000
heap
page read and write
389C000
stack
page read and write
BE36000
heap
page read and write
63A6000
heap
page read and write
BA22000
heap
page read and write
6470000
trusted library allocation
page read and write
63D1000
heap
page read and write
6A9C000
heap
page read and write
677A000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
348A000
heap
page read and write
3115000
trusted library allocation
page read and write
6BB9000
heap
page read and write
3411000
trusted library allocation
page read and write
8D1000
heap
page read and write
7440000
heap
page read and write
5F20000
trusted library allocation
page execute and read and write
8CE000
heap
page read and write
2E02000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
3470000
heap
page read and write
BED5000
heap
page read and write
BDBE000
heap
page read and write
2BC0000
trusted library section
page read and write
2E06000
trusted library allocation
page read and write
BF0B000
heap
page read and write
2E27000
trusted library allocation
page read and write
88C000
heap
page read and write
E54000
heap
page read and write
34C1000
heap
page read and write
BE86000
heap
page read and write
BECB000
heap
page read and write
CA75000
heap
page read and write
F10000
trusted library allocation
page read and write
BE9D000
heap
page read and write
C5D000
heap
page read and write
7F2D9000
trusted library allocation
page execute read
C780000
heap
page read and write
D21000
heap
page read and write
2E61000
trusted library allocation
page read and write
3109000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
9FA000
unkown
page readonly
D90000
heap
page read and write
BE6D000
heap
page read and write
6AC3000
heap
page read and write
A10000
trusted library allocation
page read and write
66BF000
heap
page read and write
62EF000
heap
page read and write
C593000
heap
page read and write
C815000
heap
page read and write
3487000
heap
page read and write
BEB6000
heap
page read and write
2E37000
trusted library allocation
page read and write
910000
heap
page read and write
6420000
trusted library allocation
page read and write
3438000
heap
page read and write
6C39000
heap
page read and write
CE7000
heap
page read and write
C99000
heap
page read and write
7A0000
heap
page read and write
308E000
trusted library allocation
page read and write
2E9C000
trusted library allocation
page read and write
BEB6000
heap
page read and write
2E45000
trusted library allocation
page read and write
6BFC000
heap
page read and write
62EF000
heap
page read and write
73D3000
heap
page read and write
F80000
trusted library allocation
page read and write
6782000
trusted library allocation
page read and write
CE8000
heap
page read and write
BF32000
heap
page read and write
63B3000
heap
page read and write
BDC3000
heap
page read and write
66C0000
heap
page read and write
63BF000
heap
page read and write
896000
heap
page read and write
38C0000
heap
page execute and read and write
62EF000
heap
page read and write
3479000
heap
page read and write
5F20000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
63A6000
heap
page read and write
306F000
trusted library allocation
page read and write
6309000
heap
page read and write
2E1B000
trusted library allocation
page read and write
6BFE000
heap
page read and write
BE3E000
heap
page read and write
349A000
trusted library allocation
page read and write
BEC4000
heap
page read and write
3439000
heap
page read and write
BED5000
heap
page read and write
2E0A000
trusted library allocation
page read and write
6C6E000
stack
page read and write
66C1000
heap
page read and write
6900000
trusted library allocation
page execute and read and write
BE3E000
heap
page read and write
BE6D000
heap
page read and write
6AB6000
heap
page read and write
347A000
heap
page read and write
67E0000
trusted library allocation
page read and write
8CD000
heap
page read and write
63E0000
heap
page read and write
2DC0000
trusted library allocation
page read and write
310C000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
625F000
heap
page read and write
30B1000
trusted library allocation
page read and write
913000
heap
page read and write
30AA000
trusted library allocation
page read and write
3048000
trusted library allocation
page read and write
BF34000
heap
page read and write
305C000
trusted library allocation
page read and write
6920000
trusted library allocation
page execute and read and write
BF34000
heap
page read and write
32F2000
heap
page read and write
892000
heap
page read and write
66D0000
heap
page read and write
BE6D000
heap
page read and write
2E6B000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
BF0B000
heap
page read and write
F00000
trusted library allocation
page read and write
CEA000
heap
page read and write
73FE000
heap
page read and write
66C9000
heap
page read and write
63CF000
heap
page read and write
63C1000
heap
page read and write
63CF000
heap
page read and write
B997000
heap
page read and write
62AE000
heap
page read and write
BE6D000
heap
page read and write
2EB9000
trusted library allocation
page read and write
2EB8000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
6AC7000
heap
page read and write
E4E000
heap
page read and write
BE36000
heap
page read and write
3488000
heap
page read and write
6917000
trusted library allocation
page read and write
33FF000
heap
page read and write
BE5B000
heap
page read and write
63B9000
heap
page read and write
ED0000
trusted library allocation
page read and write
CA2000
heap
page read and write
34B6000
heap
page read and write
5F70000
trusted library allocation
page read and write
BDBE000
heap
page read and write
BE6D000
heap
page read and write
BE3E000
heap
page read and write
3483000
heap
page read and write
3488000
heap
page read and write
BE36000
heap
page read and write
63B4000
heap
page read and write
BE3E000
heap
page read and write
2E70000
trusted library allocation
page read and write
347E000
heap
page read and write
CDA000
heap
page read and write
63A6000
heap
page read and write
348E000
heap
page read and write
66BE000
heap
page read and write
33F8000
heap
page read and write
348E000
trusted library allocation
page read and write
62EF000
heap
page read and write
6B75000
heap
page read and write
6AC1000
heap
page read and write
7831000
heap
page read and write
36E6000
heap
page read and write
6AC3000
heap
page read and write
C593000
heap
page read and write
2EC6000
trusted library allocation
page read and write
BE36000
heap
page read and write
8CA000
heap
page read and write
E40000
heap
page read and write
343A000
heap
page read and write
CDF000
heap
page read and write
3486000
heap
page read and write
6BFE000
heap
page read and write
7F2E0000
trusted library allocation
page execute read
62EB000
heap
page read and write
66D2000
heap
page read and write
BBF6000
heap
page read and write
6305000
heap
page read and write
6634000
heap
page read and write
BE3E000
heap
page read and write
6309000
heap
page read and write
63CB000
heap
page read and write
BF1B000
heap
page read and write
347D000
heap
page read and write
C58D000
heap
page read and write
61DA000
unkown
page readonly
63CB000
heap
page read and write
66BD000
heap
page read and write
BE36000
heap
page read and write
63D1000
heap
page read and write
3730000
trusted library allocation
page read and write
BE36000
heap
page read and write
5F70000
trusted library allocation
page read and write
66BF000
heap
page read and write
2E94000
trusted library allocation
page read and write
30F9000
trusted library allocation
page read and write
BDC5000
heap
page read and write
6309000
heap
page read and write
905000
heap
page read and write
30AB000
trusted library allocation
page read and write
6AB6000
heap
page read and write
C796000
heap
page read and write
A10000
trusted library allocation
page read and write
6701000
heap
page read and write
63D8000
heap
page read and write
BDC3000
heap
page read and write
BF28000
heap
page read and write
2EA1000
trusted library allocation
page read and write
BDC5000
heap
page read and write
3492000
heap
page read and write
304C000
trusted library allocation
page read and write
6C06000
heap
page read and write
3446000
heap
page read and write
BEAB000
heap
page read and write
BEAD000
heap
page read and write
BA22000
heap
page read and write
627B000
heap
page read and write
BDBE000
heap
page read and write
63CB000
heap
page read and write
63CB000
heap
page read and write
7376000
heap
page read and write
6BFD000
heap
page read and write
63B4000
heap
page read and write
2E91000
trusted library allocation
page read and write
841000
heap
page read and write
CAB1000
heap
page read and write
8D7000
heap
page read and write
6287000
heap
page read and write
33F5000
heap
page read and write
F30000
heap
page read and write
7372000
heap
page read and write
BDC5000
heap
page read and write
EC0000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page execute and read and write
6292000
heap
page read and write
BF32000
heap
page read and write
CE8000
heap
page read and write
750C000
heap
page read and write
6BFD000
heap
page read and write
6287000
heap
page read and write
CE1000
heap
page read and write
306E000
trusted library allocation
page read and write
3071000
trusted library allocation
page read and write
34B4000
heap
page read and write
372E000
stack
page read and write
6060000
trusted library allocation
page read and write
BDC9000
heap
page read and write
CE4000
heap
page read and write
BDC5000
heap
page read and write
491D000
trusted library allocation
page read and write
3484000
heap
page read and write
907000
heap
page read and write
BDBE000
heap
page read and write
63BF000
heap
page read and write
7F2E1000
trusted library allocation
page readonly
66BC000
heap
page read and write
2EB1000
trusted library allocation
page read and write
6AD0000
heap
page read and write
BEBC000
heap
page read and write
34F0000
trusted library allocation
page read and write
66C8000
heap
page read and write
30E1000
trusted library allocation
page read and write
2E36000
trusted library allocation
page read and write
73B5000
heap
page read and write
306D000
trusted library allocation
page read and write
893000
heap
page read and write
BE6D000
heap
page read and write
BE3E000
heap
page read and write
30BF000
trusted library allocation
page read and write
73AA000
heap
page read and write
F00000
trusted library allocation
page read and write
66FB000
heap
page read and write
6C07000
heap
page read and write
BF0E000
heap
page read and write
33FE000
heap
page read and write
CDE000
heap
page read and write
2E9A000
trusted library allocation
page read and write
66C9000
heap
page read and write
CC2E000
heap
page read and write
63D1000
heap
page read and write
BE5B000
heap
page read and write
BE8E000
heap
page read and write
2E25000
trusted library allocation
page read and write
C7A7000
heap
page read and write
6292000
heap
page read and write
6309000
heap
page read and write
63B3000
heap
page read and write
BECB000
heap
page read and write
2E52000
trusted library allocation
page read and write
3069000
trusted library allocation
page read and write
2E2F000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
CA1000
heap
page read and write
6B71000
heap
page read and write
BF34000
heap
page read and write
CE6000
heap
page read and write
D15000
heap
page read and write
BEB6000
heap
page read and write
6703000
heap
page read and write
C822000
heap
page read and write
BE3E000
heap
page read and write
BE3E000
heap
page read and write
6300000
heap
page read and write
3083000
trusted library allocation
page read and write
6C38000
heap
page read and write
73B7000
heap
page read and write
6BFB000
heap
page read and write
30C2000
trusted library allocation
page read and write
FE6000
heap
page read and write
6304000
heap
page read and write
33FF000
trusted library allocation
page read and write
33FF000
heap
page read and write
2C34000
trusted library allocation
page read and write
BE04000
heap
page read and write
BE5C000
heap
page read and write
66C3000
heap
page read and write
BE86000
heap
page read and write
5BD5000
heap
page read and write
BE6D000
heap
page read and write
CAC1000
heap
page read and write
84C000
heap
page read and write
63C8000
heap
page read and write
33F3000
heap
page read and write
BE3E000
heap
page read and write
66C7000
heap
page read and write
2E64000
trusted library allocation
page read and write
6BC4000
heap
page read and write
30BE000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
63C1000
heap
page read and write
BF32000
heap
page read and write
6060000
trusted library allocation
page read and write
2E1C000
trusted library allocation
page read and write
BE80000
heap
page read and write
750E000
heap
page read and write
BE5B000
heap
page read and write
5B14000
unkown
page readonly
BE8E000
heap
page read and write
BE6D000
heap
page read and write
BF0B000
heap
page read and write
BE36000
heap
page read and write
BDA5000
heap
page read and write
6BC6000
heap
page read and write
4960000
trusted library allocation
page read and write
843000
heap
page read and write
2EB6000
trusted library allocation
page read and write
6309000
heap
page read and write
3482000
heap
page read and write
3492000
heap
page read and write
910000
heap
page read and write
8DD000
heap
page read and write
8D0000
heap
page read and write
6400000
trusted library allocation
page read and write
C785000
heap
page read and write
6C08000
heap
page read and write
66BC000
heap
page read and write
786E000
heap
page read and write
BE3E000
heap
page read and write
2EA2000
trusted library allocation
page read and write
2E89000
trusted library allocation
page read and write
88A000
heap
page read and write
3484000
heap
page read and write
BDAD000
heap
page read and write
3117000
trusted library allocation
page read and write
30ED000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
66FA000
heap
page read and write
7F2ED000
trusted library allocation
page readonly
304D000
trusted library allocation
page read and write
3757000
heap
page read and write
BE8A000
heap
page read and write
30F3000
trusted library allocation
page read and write
D15000
heap
page read and write
3487000
heap
page read and write
BDC9000
heap
page read and write
6678000
heap
page read and write
6C12000
heap
page read and write
3488000
heap
page read and write
888000
heap
page read and write
BE36000
heap
page read and write
8D8000
heap
page read and write
BE6D000
heap
page read and write
3265000
heap
page read and write
3492000
heap
page read and write
3437000
heap
page read and write
3446000
heap
page read and write
308A000
trusted library allocation
page read and write
7F308000
trusted library allocation
page execute and read and write
30B7000
trusted library allocation
page read and write
5F10000
trusted library allocation
page read and write
63BD000
heap
page read and write
8CF000
heap
page read and write
BE5B000
heap
page read and write
6AC7000
heap
page read and write
6ACC000
heap
page read and write
62AE000
heap
page read and write
BE86000
heap
page read and write
BE6D000
heap
page read and write
EE0000
trusted library allocation
page read and write
BDC5000
heap
page read and write
7F2DF000
trusted library allocation
page execute read
2E79000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
C58000
heap
page read and write
6AC3000
heap
page read and write
BEB8000
heap
page read and write
BDC9000
heap
page read and write
CED000
heap
page read and write
2E93000
trusted library allocation
page read and write
3073000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
2E23000
trusted library allocation
page read and write
66C1000
heap
page read and write
62E3000
heap
page read and write
66C1000
heap
page read and write
845000
heap
page read and write
6060000
trusted library allocation
page read and write
BDB5000
heap
page read and write
6460000
trusted library allocation
page read and write
7F2D3000
trusted library allocation
page execute read
BEF2000
heap
page read and write
34BF000
heap
page read and write
C9E000
heap
page read and write
2E0E000
trusted library allocation
page read and write
6BFE000
heap
page read and write
9CB000
unkown
page readonly
33F0000
heap
page read and write
D0E000
stack
page read and write
63D8000
heap
page read and write
3484000
heap
page read and write
2E26000
trusted library allocation
page read and write
737A000
heap
page read and write
BE8E000
heap
page read and write
D18000
heap
page read and write
8D5000
heap
page read and write
891000
heap
page read and write
2E86000
trusted library allocation
page read and write
6304000
heap
page read and write
2E62000
trusted library allocation
page read and write
BED5000
heap
page read and write
BDC5000
heap
page read and write
2E6A000
trusted library allocation
page read and write
786C000
heap
page read and write
BEAB000
heap
page read and write
BDC9000
heap
page read and write
6BFF000
heap
page read and write
30B4000
trusted library allocation
page read and write
3446000
heap
page read and write
6AB5000
heap
page read and write
62C9000
heap
page read and write
BEAB000
heap
page read and write
30EB000
trusted library allocation
page read and write
8D8000
heap
page read and write
C5E000
heap
page read and write
EC0000
trusted library allocation
page read and write
33F2000
heap
page read and write
6B7D000
heap
page read and write
C55000
heap
page read and write
2E3D000
trusted library allocation
page read and write
2E43000
trusted library allocation
page read and write
2C57000
trusted library allocation
page execute and read and write
BE80000
heap
page read and write
DA0000
heap
page read and write
2E24000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
6702000
heap
page read and write
6309000
heap
page read and write
5AEE000
stack
page read and write
BF37000
heap
page read and write
2E46000
trusted library allocation
page read and write
6BFC000
heap
page read and write
A20000
trusted library allocation
page read and write
62AE000
heap
page read and write
BF37000
heap
page read and write
7376000
heap
page read and write
B420000
trusted library allocation
page read and write
7497000
heap
page read and write
3070000
trusted library allocation
page read and write
CDE000
heap
page read and write
622D000
heap
page read and write
62C9000
heap
page read and write
6631000
heap
page read and write
63D1000
heap
page read and write
30A2000
trusted library allocation
page read and write
7876000
heap
page read and write
BDA5000
heap
page read and write
66F8000
heap
page read and write
3072000
trusted library allocation
page read and write
BE3E000
heap
page read and write
D1E000
heap
page read and write
BEB6000
heap
page read and write
A21000
trusted library allocation
page read and write
84F000
heap
page read and write
2E6E000
trusted library allocation
page read and write
2EA5000
trusted library allocation
page read and write
CF2000
heap
page read and write
2E14000
trusted library allocation
page read and write
3488000
heap
page read and write
62C9000
heap
page read and write
3488000
heap
page read and write
2E66000
trusted library allocation
page read and write
6BB8000
heap
page read and write
87E000
stack
page read and write
BE36000
heap
page read and write
35A0000
trusted library allocation
page read and write
3078000
trusted library allocation
page read and write
BE36000
heap
page read and write
2E40000
heap
page read and write
2E1F000
trusted library allocation
page read and write
BED2000
heap
page read and write
BE8E000
heap
page read and write
63A6000
heap
page read and write
2E19000
trusted library allocation
page read and write
2E08000
trusted library allocation
page read and write
2E49000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
BECB000
heap
page read and write
BEC4000
heap
page read and write
CAEC000
heap
page read and write
BED5000
heap
page read and write
BDC9000
heap
page read and write
307D000
trusted library allocation
page read and write
BDC9000
heap
page read and write
CE3000
heap
page read and write
BED2000
heap
page read and write
629B000
heap
page read and write
63D1000
heap
page read and write
63D1000
heap
page read and write
E37000
heap
page read and write
BDC3000
heap
page read and write
6304000
heap
page read and write
63CB000
heap
page read and write
908000
heap
page read and write
BE6D000
heap
page read and write
33FB000
heap
page read and write
E30000
heap
page read and write
63D1000
heap
page read and write
6703000
heap
page read and write
6225000
heap
page read and write
2E2D000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
6309000
heap
page read and write
3488000
heap
page read and write
667D000
heap
page read and write
BF0B000
heap
page read and write
2E3E000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
6042000
trusted library allocation
page read and write
663D000
heap
page read and write
F50000
trusted library allocation
page read and write
BE3E000
heap
page read and write
5F80000
trusted library allocation
page read and write
63BB000
heap
page read and write
C796000
heap
page read and write
32F5000
heap
page read and write
6040000
trusted library allocation
page read and write
BE6D000
heap
page read and write
5AF0000
heap
page execute and read and write
5F00000
trusted library allocation
page read and write
909000
heap
page read and write
2C60000
heap
page read and write
304F000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
BF0B000
heap
page read and write
6C03000
heap
page read and write
7334000
heap
page read and write
7F2EA000
trusted library allocation
page execute read
6277000
heap
page read and write
3123000
trusted library allocation
page read and write
66C1000
heap
page read and write
BECB000
heap
page read and write
BE36000
heap
page read and write
CE4000
heap
page read and write
7379000
heap
page read and write
C78D000
heap
page read and write
BDB9000
heap
page read and write
981000
unkown
page execute read
BE6D000
heap
page read and write
BE5B000
heap
page read and write
BE80000
heap
page read and write
73A6000
heap
page read and write
309E000
trusted library allocation
page read and write
BF34000
heap
page read and write
BED5000
heap
page read and write
30C0000
trusted library allocation
page read and write
BE36000
heap
page read and write
3492000
heap
page read and write
3540000
heap
page read and write
BE5B000
heap
page read and write
3482000
heap
page read and write
3430000
heap
page read and write
3074000
trusted library allocation
page read and write
6369000
heap
page read and write
3061000
trusted library allocation
page read and write
63DA000
heap
page read and write
63BF000
heap
page read and write
3485000
heap
page read and write
32BF000
heap
page read and write
63A6000
heap
page read and write
6060000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
3437000
heap
page read and write
C2F5000
heap
page read and write
343E000
heap
page read and write
BE80000
heap
page read and write
62EF000
heap
page read and write
5F80000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page read and write
C78F000
heap
page read and write
BE36000
heap
page read and write
2E18000
trusted library allocation
page read and write
30FD000
trusted library allocation
page read and write
BE6D000
heap
page read and write
7F2D5000
trusted library allocation
page execute read
BDBA000
heap
page read and write
6AB6000
heap
page read and write
30F5000
trusted library allocation
page read and write
BED2000
heap
page read and write
BA22000
heap
page read and write
61E0000
heap
page read and write
6AB8000
heap
page read and write
BEC4000
heap
page read and write
AAD000
unkown
page readonly
BE36000
heap
page read and write
2BE0000
heap
page read and write
6685000
heap
page read and write
BE3E000
heap
page read and write
2ECA000
trusted library allocation
page read and write
7370000
heap
page read and write
33F0000
heap
page read and write
2E8A000
trusted library allocation
page read and write
BECB000
heap
page read and write
622A000
heap
page read and write
CE0000
heap
page read and write
CAB9000
heap
page read and write
BF32000
heap
page read and write
BE04000
heap
page read and write
BDBE000
heap
page read and write
980000
unkown
page readonly
6677000
heap
page read and write
FC0000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
8CE000
heap
page read and write
BBEC000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
63C1000
heap
page read and write
63A6000
heap
page read and write
BDBE000
heap
page read and write
7F2D8000
trusted library allocation
page readonly
63C1000
heap
page read and write
CAB7000
heap
page read and write
663F000
heap
page read and write
348A000
heap
page read and write
8DF000
heap
page read and write
BEAD000
heap
page read and write
36C0000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
BF28000
heap
page read and write
63D1000
heap
page read and write
6050000
trusted library allocation
page read and write
30FE000
trusted library allocation
page read and write
3740000
trusted library allocation
page read and write
D50000
heap
page read and write
E3B000
heap
page read and write
347D000
heap
page read and write
6780000
trusted library allocation
page read and write
6C05000
heap
page read and write
BDC5000
heap
page read and write
BA20000
heap
page read and write
3486000
heap
page read and write
33F5000
heap
page read and write
BDC3000
heap
page read and write
BDA0000
heap
page read and write
6C0A000
heap
page read and write
74C7000
heap
page read and write
BF37000
heap
page read and write
F10000
trusted library allocation
page read and write
2E2A000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
64E0000
unkown
page readonly
2C55000
trusted library allocation
page execute and read and write
34B9000
heap
page read and write
BDB7000
heap
page read and write
BE04000
heap
page read and write
BDA5000
heap
page read and write
BDAC000
heap
page read and write
67D0000
trusted library allocation
page read and write
BDC3000
heap
page read and write
BEFC000
heap
page read and write
C810000
heap
page read and write
C580000
heap
page read and write
6300000
heap
page read and write
6BFB000
heap
page read and write
2E68000
trusted library allocation
page read and write
63D1000
heap
page read and write
63CB000
heap
page read and write
BBD6000
heap
page read and write
BE3E000
heap
page read and write
7466000
heap
page read and write
5F80000
trusted library allocation
page read and write
2C00000
heap
page read and write
66F7000
heap
page read and write
6B73000
heap
page read and write
DC5000
heap
page read and write
63C1000
heap
page read and write
2DFF000
trusted library allocation
page read and write
BF0B000
heap
page read and write
3087000
trusted library allocation
page read and write
BF32000
heap
page read and write
33F0000
trusted library allocation
page read and write
D88000
heap
page read and write
6A80000
heap
page read and write
3CC000
stack
page read and write
BE04000
heap
page read and write
BE3E000
heap
page read and write
BE80000
heap
page read and write
CDC000
heap
page read and write
BE8E000
heap
page read and write
6AB8000
heap
page read and write
F00000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page read and write
63CB000
heap
page read and write
6ACC000
heap
page read and write
BED2000
heap
page read and write
6AC3000
heap
page read and write
2E5E000
trusted library allocation
page read and write
C1DE000
stack
page read and write
2EAA000
trusted library allocation
page read and write
BE36000
heap
page read and write
6AC3000
heap
page read and write
3B17000
trusted library allocation
page read and write
2E72000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
BE3E000
heap
page read and write
6BBA000
heap
page read and write
B999000
heap
page read and write
30B2000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
BDBA000
heap
page read and write
BF34000
heap
page read and write
6636000
heap
page read and write
BE6D000
heap
page read and write
63CF000
heap
page read and write
2EAF000
trusted library allocation
page read and write
3485000
heap
page read and write
E5C000
heap
page read and write
63D8000
heap
page read and write
BDC5000
heap
page read and write
8CE000
heap
page read and write
7874000
heap
page read and write
63B4000
heap
page read and write
2E3A000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
F90000
trusted library allocation
page execute and read and write
30F1000
trusted library allocation
page read and write
667D000
heap
page read and write
3065000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
C59000
heap
page read and write
347C000
heap
page read and write
630B000
heap
page read and write
E52000
heap
page read and write
6304000
heap
page read and write
BF34000
heap
page read and write
3442000
heap
page read and write
BF28000
heap
page read and write
8D6000
heap
page read and write
2EA8000
trusted library allocation
page read and write
36E0000
heap
page read and write
2E74000
trusted library allocation
page read and write
66C6000
heap
page read and write
BE6D000
heap
page read and write
66C9000
heap
page read and write
BE5B000
heap
page read and write
2DFC000
trusted library allocation
page read and write
BED5000
heap
page read and write
9EA000
unkown
page write copy
6AC0000
heap
page read and write
78AE000
heap
page read and write
BA2C000
heap
page read and write
2E2E000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
343B000
heap
page read and write
C580000
heap
page read and write
6300000
heap
page read and write
310D000
trusted library allocation
page read and write
627D000
heap
page read and write
7F2E5000
trusted library allocation
page readonly
BF32000
heap
page read and write
66F5000
heap
page read and write
BDC3000
heap
page read and write
C5A0000
heap
page read and write
624F000
heap
page read and write
67A0000
trusted library allocation
page read and write
BDB7000
heap
page read and write
844000
heap
page read and write
30FA000
trusted library allocation
page read and write
3443000
heap
page read and write
77E9000
heap
page read and write
7440000
heap
page read and write
6ABF000
heap
page read and write
BEB6000
heap
page read and write
FD0000
heap
page read and write
30AC000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
BEAB000
heap
page read and write
C7CC000
heap
page read and write
BF6000
unkown
page readonly
B3F0000
trusted library allocation
page read and write
BE3E000
heap
page read and write
8D4000
heap
page read and write
2E31000
trusted library allocation
page read and write
73AB000
heap
page read and write
311A000
trusted library allocation
page read and write
6300000
heap
page read and write
5F80000
trusted library allocation
page read and write
88C000
heap
page read and write
BE6D000
heap
page read and write
3439000
heap
page read and write
E1C000
heap
page read and write
BDC3000
heap
page read and write
A00000
trusted library allocation
page read and write
347F000
heap
page read and write
3445000
heap
page read and write
8DA000
heap
page read and write
BF37000
heap
page read and write
3053000
trusted library allocation
page read and write
C98000
heap
page read and write
BDC3000
heap
page read and write
BE3E000
heap
page read and write
3500000
trusted library allocation
page read and write
BA20000
heap
page read and write
67D0000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
2EA7000
trusted library allocation
page read and write
63B3000
heap
page read and write
BE6D000
heap
page read and write
BEC4000
heap
page read and write
3096000
trusted library allocation
page read and write
BE8F000
heap
page read and write
6678000
heap
page read and write
737A000
heap
page read and write
66BD000
heap
page read and write
30C4000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
8D2000
heap
page read and write
BECB000
heap
page read and write
2E29000
trusted library allocation
page read and write
CCF2000
heap
page read and write
BF0B000
heap
page read and write
3095000
trusted library allocation
page read and write
63A6000
heap
page read and write
6AB7000
heap
page read and write
347B000
heap
page read and write
BE6D000
heap
page read and write
BE04000
heap
page read and write
C8A8000
heap
page read and write
307B000
trusted library allocation
page read and write
3058000
trusted library allocation
page read and write
6305000
heap
page read and write
C78D000
heap
page read and write
38A0000
trusted library allocation
page execute and read and write
2EC8000
trusted library allocation
page read and write
E3E000
heap
page read and write
8DF000
heap
page read and write
BEC4000
heap
page read and write
30B5000
trusted library allocation
page read and write
BEC4000
heap
page read and write
BE36000
heap
page read and write
6B73000
heap
page read and write
34B8000
heap
page read and write
CAB7000
heap
page read and write
5C10000
heap
page read and write
BDC5000
heap
page read and write
496E000
trusted library allocation
page read and write
BDC5000
heap
page read and write
BBD0000
heap
page read and write
310F000
trusted library allocation
page read and write
BDC3000
heap
page read and write
BDAD000
heap
page read and write
C79A000
heap
page read and write
BE6D000
heap
page read and write
34B5000
heap
page read and write
6AC1000
heap
page read and write
7F2DE000
trusted library allocation
page readonly
6B73000
heap
page read and write
B997000
heap
page read and write
6911000
trusted library allocation
page read and write
BE36000
heap
page read and write
BDC5000
heap
page read and write
88F000
heap
page read and write
5F83000
trusted library allocation
page read and write
2E50000
heap
page read and write
BDC5000
heap
page read and write
97E000
stack
page read and write
385E000
stack
page read and write
6AC3000
heap
page read and write
6C08000
heap
page read and write
63C1000
heap
page read and write
33FB000
heap
page read and write
BE3E000
heap
page read and write
6256000
heap
page read and write
EE0000
trusted library allocation
page read and write
3068000
trusted library allocation
page read and write
66FE000
heap
page read and write
BED5000
heap
page read and write
33F0000
trusted library allocation
page read and write
BE04000
heap
page read and write
F00000
trusted library allocation
page read and write
BECB000
heap
page read and write
BE3E000
heap
page read and write
6B71000
heap
page read and write
9FA000
unkown
page readonly
66BE000
heap
page read and write
BE7B000
heap
page read and write
2E13000
trusted library allocation
page read and write
7F2DA000
trusted library allocation
page readonly
2E00000
trusted library allocation
page read and write
2E3C000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
CE2000
heap
page read and write
2ECA000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
730000
heap
page read and write
6070000
unkown
page readonly
63B3000
heap
page read and write
A00000
trusted library allocation
page read and write
8D1000
heap
page read and write
6AC1000
heap
page read and write
2EA9000
trusted library allocation
page read and write
3437000
heap
page read and write
BDC9000
heap
page read and write
846000
heap
page read and write
BBE6000
heap
page read and write
BE36000
heap
page read and write
BE6D000
heap
page read and write
CA6F000
heap
page read and write
F00000
trusted library allocation
page read and write
34C3000
heap
page read and write
347D000
heap
page read and write
BE80000
heap
page read and write
348A000
heap
page read and write
BE86000
heap
page read and write
6635000
heap
page read and write
72E7000
heap
page read and write
63C000
stack
page read and write
3480000
heap
page read and write
308D000
trusted library allocation
page read and write
6283000
heap
page read and write
311C000
trusted library allocation
page read and write
BEC4000
heap
page read and write
61E0000
trusted library allocation
page read and write
BEB6000
heap
page read and write
2EC8000
trusted library allocation
page read and write
66F8000
heap
page read and write
BED2000
heap
page read and write
BE5B000
heap
page read and write
C78C000
heap
page read and write
63CB000
heap
page read and write
6040000
trusted library allocation
page read and write
BE5B000
heap
page read and write
787C000
heap
page read and write
63A6000
heap
page read and write
782A000
heap
page read and write
309A000
trusted library allocation
page read and write
BE04000
heap
page read and write
3488000
heap
page read and write
63E0000
trusted library allocation
page read and write
BE6D000
heap
page read and write
6636000
heap
page read and write
63D1000
heap
page read and write
BF32000
heap
page read and write
E16000
heap
page read and write
6309000
heap
page read and write
D19000
heap
page read and write
6BFC000
heap
page read and write
2DF8000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
2E4D000
trusted library allocation
page read and write
623F000
heap
page read and write
2E6D000
trusted library allocation
page read and write
BF28000
heap
page read and write
6490000
trusted library allocation
page read and write
66F9000
heap
page read and write
6630000
heap
page read and write
3483000
heap
page read and write
3490000
heap
page read and write
CE7000
heap
page read and write
3438000
heap
page read and write
3479000
heap
page read and write
30B8000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
C7A6000
heap
page read and write
5F00000
trusted library allocation
page read and write
308C000
trusted library allocation
page read and write
348A000
heap
page read and write
6040000
trusted library allocation
page read and write
8D0000
heap
page read and write
EF0000
trusted library allocation
page read and write
743E000
heap
page read and write
E58000
heap
page read and write
BE3E000
heap
page read and write
BE6D000
heap
page read and write
8DD000
heap
page read and write
306A000
trusted library allocation
page read and write
63CB000
heap
page read and write
2E73000
trusted library allocation
page read and write
90F000
heap
page read and write
BE6D000
heap
page read and write
BDC3000
heap
page read and write
63AF000
heap
page read and write
7872000
heap
page read and write
BEFC000
heap
page read and write
7F2E2000
trusted library allocation
page execute read
841000
heap
page read and write
6287000
heap
page read and write
667D000
heap
page read and write
2E1A000
trusted library allocation
page read and write
6AB3000
heap
page read and write
33F1000
heap
page read and write
D70000
heap
page read and write
63BD000
heap
page read and write
6BFA000
heap
page read and write
30EE000
trusted library allocation
page read and write
30A7000
trusted library allocation
page read and write
BF34000
heap
page read and write
CE4000
heap
page read and write
893000
heap
page read and write
62E3000
heap
page read and write
F50000
trusted library allocation
page read and write
DE6000
heap
page read and write
BE04000
heap
page read and write
C786000
heap
page read and write
30AE000
trusted library allocation
page read and write
31F0000
heap
page read and write
30E8000
trusted library allocation
page read and write
72E2000
heap
page read and write
63B4000
heap
page read and write
755A000
heap
page read and write
3444000
heap
page read and write
BE36000
heap
page read and write
BDC3000
heap
page read and write
6266000
heap
page read and write
66D2000
heap
page read and write
CAB3000
heap
page read and write
6ACF000
heap
page read and write
B1E0000
trusted library allocation
page read and write
2E92000
trusted library allocation
page read and write
C9C000
heap
page read and write
BB9C000
stack
page read and write
C5A7000
heap
page read and write
6633000
heap
page read and write
BDAD000
heap
page read and write
A20000
trusted library allocation
page read and write
6BF9000
heap
page read and write
6060000
trusted library allocation
page read and write
66C9000
heap
page read and write
C7D6000
heap
page read and write
6636000
heap
page read and write
BED2000
heap
page read and write
BDB7000
heap
page read and write
7481000
heap
page read and write
33F2000
heap
page read and write
30F7000
trusted library allocation
page read and write
736E000
heap
page read and write
BE6D000
heap
page read and write
C793000
heap
page read and write
6AB3000
heap
page read and write
63C3000
heap
page read and write
77E3000
heap
page read and write
2E4C000
trusted library allocation
page read and write
310A000
trusted library allocation
page read and write
3084000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
3479000
heap
page read and write
C5A000
heap
page read and write
2E9D000
trusted library allocation
page read and write
D19000
heap
page read and write
2EA3000
trusted library allocation
page read and write
6305000
heap
page read and write
33F4000
heap
page read and write
625A000
heap
page read and write
750A000
heap
page read and write
629B000
heap
page read and write
2E03000
trusted library allocation
page read and write
34BD000
heap
page read and write
34C3000
heap
page read and write
63BB000
heap
page read and write
BED2000
heap
page read and write
3117000
trusted library allocation
page read and write
30F2000
trusted library allocation
page read and write
6C10000
heap
page read and write
6196000
unkown
page readonly
8D0000
heap
page read and write
63A6000
heap
page read and write
9ED000
unkown
page readonly
8D6000
heap
page read and write
732D000
heap
page read and write
BE36000
heap
page read and write
63BB000
heap
page read and write
BE80000
heap
page read and write
A8B000
unkown
page readonly
66C4000
heap
page read and write
84A000
heap
page read and write
2E2B000
trusted library allocation
page read and write
2E47000
trusted library allocation
page read and write
33F9000
heap
page read and write
BE8A000
heap
page read and write
BE80000
heap
page read and write
66F5000
heap
page read and write
2ECD000
trusted library allocation
page read and write
6BBA000
heap
page read and write
5AAE000
stack
page read and write
6684000
heap
page read and write
6050000
trusted library allocation
page read and write
736F000
heap
page read and write
347E000
heap
page read and write
BEBB000
heap
page read and write
BA20000
heap
page read and write
BE86000
heap
page read and write
EA0000
trusted library allocation
page read and write
8D7000
heap
page read and write
63A6000
heap
page read and write
BBD0000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
BBD0000
trusted library allocation
page read and write
BE8E000
heap
page read and write
7380000
heap
page read and write
6309000
heap
page read and write
5B20000
trusted library allocation
page read and write
2E69000
trusted library allocation
page read and write
7F2D7000
trusted library allocation
page execute read
3491000
heap
page read and write
62EB000
heap
page read and write
BF34000
heap
page read and write
6ACC000
heap
page read and write
B1B0000
trusted library allocation
page read and write
6266000
heap
page read and write
BBE6000
heap
page read and write
6C00000
heap
page read and write
E4E000
heap
page read and write
3439000
heap
page read and write
2B88000
stack
page read and write
C861000
heap
page read and write
BBE3000
trusted library allocation
page read and write
6242000
heap
page read and write
C7C1000
heap
page read and write
7F2E6000
trusted library allocation
page execute read
66CA000
heap
page read and write
BEAB000
heap
page read and write
C81A000
heap
page read and write
6685000
heap
page read and write
32AF000
heap
page read and write
CDB000
heap
page read and write
BBD0000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
63D1000
heap
page read and write
BE3E000
heap
page read and write
CE0000
heap
page read and write
BE36000
heap
page read and write
6304000
heap
page read and write
5DBC000
stack
page read and write
6AC1000
heap
page read and write
BE6D000
heap
page read and write
66BB000
heap
page read and write
3103000
trusted library allocation
page read and write
63A6000
heap
page read and write
73B000
stack
page read and write
3110000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
BE04000
heap
page read and write
2EC9000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
66BF000
heap
page read and write
62E3000
heap
page read and write
63BD000
heap
page read and write
311B000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
BF32000
heap
page read and write
C853000
heap
page read and write
3118000
trusted library allocation
page read and write
B4B2000
trusted library allocation
page read and write
B3F3000
trusted library allocation
page read and write
C9B000
heap
page read and write
64F0000
trusted library allocation
page read and write
663E000
heap
page read and write
5B00000
unkown
page readonly
B1D0000
heap
page read and write
BDBA000
heap
page read and write
BE6D000
heap
page read and write
6686000
heap
page read and write
6283000
heap
page read and write
3067000
trusted library allocation
page read and write
2EB2000
trusted library allocation
page read and write
2E76000
trusted library allocation
page read and write
BE6D000
heap
page read and write
30F6000
trusted library allocation
page read and write
66F7000
heap
page read and write
63D1000
heap
page read and write
8D0000
heap
page read and write
88A000
heap
page read and write
63B3000
heap
page read and write
845000
heap
page read and write
6C41000
heap
page read and write
BE36000
heap
page read and write
8CE000
heap
page read and write
78AD000
heap
page read and write
63C1000
heap
page read and write
BE8E000
heap
page read and write
30B3000
trusted library allocation
page read and write
36DD000
trusted library allocation
page execute and read and write
7331000
heap
page read and write
348F000
heap
page read and write
3485000
heap
page read and write
33FF000
heap
page read and write
6631000
heap
page read and write
BDC3000
heap
page read and write
8D6000
heap
page read and write
30D6000
trusted library allocation
page read and write
BE36000
heap
page read and write
BF1E000
heap
page read and write
310B000
trusted library allocation
page read and write
BA5B000
heap
page read and write
63D8000
heap
page read and write
BF28000
heap
page read and write
73B1000
heap
page read and write
BED5000
heap
page read and write
663A000
heap
page read and write
CA4000
heap
page read and write
63B3000
heap
page read and write
7514000
heap
page read and write
8CA000
heap
page read and write
6305000
heap
page read and write
BE3E000
heap
page read and write
BDC3000
heap
page read and write
72E6000
heap
page read and write
FA0000
trusted library allocation
page read and write
BDC3000
heap
page read and write
6AB8000
heap
page read and write
BA24000
heap
page read and write
348A000
heap
page read and write
6BFC000
heap
page read and write
6AC1000
heap
page read and write
2E5C000
trusted library allocation
page read and write
E0C000
heap
page read and write
348B000
heap
page read and write
736D000
heap
page read and write
6770000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
C78F000
heap
page read and write
7329000
heap
page read and write
6B70000
heap
page read and write
34BC000
heap
page read and write
6638000
heap
page read and write
C8EC000
heap
page read and write
63C3000
heap
page read and write
787D000
heap
page read and write
BDBA000
heap
page read and write
63C1000
heap
page read and write
3486000
heap
page read and write
33F2000
heap
page read and write
B9DE000
heap
page read and write
6A68000
stack
page read and write
6309000
heap
page read and write
BE8E000
heap
page read and write
6450000
trusted library allocation
page read and write
34B7000
heap
page read and write
BE3E000
heap
page read and write
CE3000
heap
page read and write
2E30000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
BEB6000
heap
page read and write
5F10000
trusted library allocation
page read and write
63D1000
heap
page read and write
3075000
trusted library allocation
page read and write
34C2000
heap
page read and write
30BA000
trusted library allocation
page read and write
8DB000
heap
page read and write
3484000
heap
page read and write
845000
heap
page read and write
343C000
heap
page read and write
5A6D000
stack
page read and write
7378000
heap
page read and write
F10000
trusted library allocation
page read and write
340C000
trusted library allocation
page read and write
C780000
heap
page read and write
30C6000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
BE5A000
heap
page read and write
BE3E000
heap
page read and write
C7A1000
heap
page read and write
6CBF1000
unkown
page execute read
66D1000
heap
page read and write
3444000
heap
page read and write
6AC4000
heap
page read and write
BE6D000
heap
page read and write
3480000
heap
page read and write
F20000
trusted library allocation
page read and write
AAA000
unkown
page write copy
BE36000
heap
page read and write
6C0B000
heap
page read and write
BE36000
heap
page read and write
5BDF000
heap
page read and write
3119000
trusted library allocation
page read and write
2E39000
trusted library allocation
page read and write
30D9000
trusted library allocation
page read and write
BE5B000
heap
page read and write
BBD0000
trusted library allocation
page read and write
C5F000
heap
page read and write
BF32000
heap
page read and write
33F0000
trusted library allocation
page read and write
BE36000
heap
page read and write
6A70000
heap
page read and write
CEE000
heap
page read and write
BF28000
heap
page read and write
BE3E000
heap
page read and write
E40000
heap
page read and write
EF0000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
BDC9000
heap
page read and write
BA2A000
heap
page read and write
744A000
heap
page read and write
6C02000
heap
page read and write
63B3000
heap
page read and write
BE3E000
heap
page read and write
BDC5000
heap
page read and write
34B6000
heap
page read and write
BEB6000
heap
page read and write
2C20000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
30C3000
trusted library allocation
page read and write
BA5D000
heap
page read and write
88F000
heap
page read and write
EE0000
trusted library allocation
page execute and read and write
309F000
trusted library allocation
page read and write
830000
heap
page read and write
66FC000
heap
page read and write
BDAF000
heap
page read and write
34C3000
heap
page read and write
63BD000
heap
page read and write
A41000
unkown
page execute read
8D3000
heap
page read and write
C9F000
heap
page read and write
63D1000
heap
page read and write
33F0000
heap
page read and write
6C37000
heap
page read and write
62FA000
heap
page read and write
6AC1000
heap
page read and write
F00000
trusted library allocation
page read and write
844000
heap
page read and write
BE36000
heap
page read and write
D1F000
heap
page read and write
7F2D4000
trusted library allocation
page readonly
66C8000
heap
page read and write
9F0000
trusted library allocation
page read and write
6CBF0000
unkown
page readonly
66FB000
heap
page read and write
CDD000
heap
page read and write
CA0000
heap
page read and write
BED2000
heap
page read and write
2E11000
trusted library allocation
page read and write
3118000
trusted library allocation
page read and write
C8F4000
heap
page read and write
3750000
heap
page read and write
2C50000
heap
page read and write
6AC7000
heap
page read and write
BE3E000
heap
page read and write
33FF000
heap
page read and write
6BB8000
heap
page read and write
6ABD000
heap
page read and write
7F2EB000
trusted library allocation
page readonly
34BF000
heap
page read and write
3066000
trusted library allocation
page read and write
BBE3000
heap
page read and write
2EBE000
trusted library allocation
page read and write
847000
heap
page read and write
8D4000
heap
page read and write
BF37000
heap
page read and write
348C000
heap
page read and write
6C04000
heap
page read and write
48D5000
trusted library allocation
page read and write
66F5000
heap
page read and write
347D000
heap
page read and write
EF6000
trusted library allocation
page read and write
7F2E9000
trusted library allocation
page readonly
34C0000
heap
page read and write
8CF000
heap
page read and write
6C08000
heap
page read and write
EF0000
trusted library allocation
page read and write
D16000
heap
page read and write
66C8000
heap
page read and write
3086000
trusted library allocation
page read and write
2E4F000
trusted library allocation
page read and write
63D8000
heap
page read and write
63D8000
heap
page read and write
30FF000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
BF6000
unkown
page readonly
6C03000
heap
page read and write
66C6000
heap
page read and write
BE6D000
heap
page read and write
2E05000
trusted library allocation
page read and write
6CC0C000
unkown
page read and write
2DD0000
trusted library allocation
page execute and read and write
34B9000
heap
page read and write
6309000
heap
page read and write
63A6000
heap
page read and write
663F000
heap
page read and write
63C1000
heap
page read and write
E31000
heap
page read and write
BE6D000
heap
page read and write
2E50000
trusted library allocation
page read and write
6A85000
heap
page read and write
6780000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
74DE000
stack
page read and write
2BF0000
trusted library allocation
page read and write
AAA000
unkown
page read and write
B1C0000
trusted library allocation
page read and write
88D000
heap
page read and write
3485000
heap
page read and write
BEC3000
heap
page read and write
347B000
heap
page read and write
2E21000
trusted library allocation
page read and write
7479000
heap
page read and write
6C06000
heap
page read and write
66C4000
heap
page read and write
8DE000
heap
page read and write
BE36000
heap
page read and write
BA2A000
heap
page read and write
2E63000
trusted library allocation
page read and write
CAF2000
heap
page read and write
33F1000
heap
page read and write
667A000
heap
page read and write
BF32000
heap
page read and write
BE04000
heap
page read and write
6320000
heap
page read and write
BF28000
heap
page read and write
6633000
heap
page read and write
6BBC000
heap
page read and write
BDC9000
heap
page read and write
8D5000
heap
page read and write
8CC000
heap
page read and write
30D8000
trusted library allocation
page read and write
BDD1000
heap
page read and write
67D0000
trusted library allocation
page read and write
909000
heap
page read and write
7371000
heap
page read and write
C98000
heap
page read and write
7F2EC000
trusted library allocation
page execute read
BE3E000
heap
page read and write
32E5000
heap
page read and write
D23000
heap
page read and write
6AAF000
heap
page read and write
7552000
heap
page read and write
34B6000
heap
page read and write
36D0000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
66C0000
heap
page read and write
2E4B000
trusted library allocation
page read and write
6287000
heap
page read and write
3108000
trusted library allocation
page read and write
6300000
heap
page read and write
343C000
heap
page read and write
66C0000
heap
page read and write
836000
heap
page read and write
C52000
heap
page read and write
8CD000
heap
page read and write
BF28000
heap
page read and write
BED2000
heap
page read and write
BE3E000
heap
page read and write
34C0000
heap
page read and write
2C50000
trusted library allocation
page read and write
BEAB000
heap
page read and write
3049000
trusted library allocation
page read and write
347C000
heap
page read and write
309C000
trusted library allocation
page read and write
BE6D000
heap
page read and write
66B9000
heap
page read and write
3483000
heap
page read and write
844000
heap
page read and write
3120000
trusted library allocation
page read and write
63CF000
heap
page read and write
66BE000
heap
page read and write
9ED000
unkown
page readonly
BE04000
heap
page read and write
BECB000
heap
page read and write
B36000
unkown
page readonly
6277000
heap
page read and write
BEC3000
heap
page read and write
745E000
heap
page read and write
34C3000
heap
page read and write
3486000
heap
page read and write
33F7000
heap
page read and write
347C000
heap
page read and write
F60000
trusted library allocation
page read and write
63C3000
heap
page read and write
6AB3000
heap
page read and write
CEC000
heap
page read and write
3119000
trusted library allocation
page read and write
7545000
heap
page read and write
BF37000
heap
page read and write
66C7000
heap
page read and write
BE3E000
heap
page read and write
6050000
trusted library allocation
page read and write
F20000
heap
page read and write
33F4000
heap
page read and write
6F8000
stack
page read and write
2E67000
trusted library allocation
page read and write
6041000
trusted library allocation
page read and write
B494000
trusted library allocation
page read and write
BE8E000
heap
page read and write
3097000
trusted library allocation
page read and write
67D0000
heap
page execute and read and write
6C35000
heap
page read and write
305A000
trusted library allocation
page read and write
CA6000
heap
page read and write
310E000
trusted library allocation
page read and write
BE3E000
heap
page read and write
EE0000
trusted library allocation
page read and write
BF28000
heap
page read and write
C2DC000
stack
page read and write
63CB000
heap
page read and write
73DE000
stack
page read and write
6C00000
heap
page read and write
2E28000
trusted library allocation
page read and write
6ACC000
heap
page read and write
6214000
heap
page read and write
308B000
trusted library allocation
page read and write
BE3E000
heap
page read and write
63CB000
heap
page read and write
BEB6000
heap
page read and write
E1C000
heap
page read and write
CC75000
heap
page read and write
2E60000
trusted library allocation
page read and write
There are 2497 hidden memdumps, click here to show them.