IOC Report
4c6fK85tK7.exe

loading gif

Files

File Path
Type
Category
Malicious
4c6fK85tK7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Recovery\zufsVvjyWcGfJF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\Downloads\WmiPrvSE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ yberLoad.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1ad27169-68a1-4284-b3a4-ab1d46640beb.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\55dc47f4-7c66-4fb4-aa2a-4ea28e92c8cc.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\6334e2d8-afed-41d5-8a9a-b81dc662bd51.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\CyberLoader.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\EunsIO9tk2.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\MVPLoader.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\c327c276-7051-4e25-8eb9-181648a7a409.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\d096c949-588b-4f62-9035-9022be100ad8.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\d365112d-c481-40f0-92bb-6621c11733c0.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\e99985a1-94fc-4281-b02a-ceb1639f4b4a.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\e9b737bd-75a6-4059-b77c-a41b4b38424b.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\msPortRefnetdhcp\componentWininto.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\msPortRefnetdhcp\zRMFcMzN1094wnGdurNck4fGlt.vbe
data
dropped
malicious
C:\Recovery\e5c7b42f1665e5
ASCII text, with no line terminators
dropped
C:\Users\Default\Downloads\24dbde2999530e
ASCII text, with very long lines (562), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\componentWininto.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\zufsVvjyWcGfJF.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\StYiK3n2EA
ASCII text, with no line terminators
dropped
C:\Windows\ShellComponents\e5c7b42f1665e5
ASCII text, with no line terminators
dropped
C:\msPortRefnetdhcp\file.vbs
ASCII text, with no line terminators
dropped
C:\msPortRefnetdhcp\m6JlOKDKnmGOe6a.bat
ASCII text, with no line terminators
dropped
\Device\Null
ASCII text
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4c6fK85tK7.exe
"C:\Users\user\Desktop\4c6fK85tK7.exe"
malicious
C:\Users\user\AppData\Local\Temp\ yberLoad.exe
"C:\Users\user\AppData\Local\Temp\ yberLoad.exe"
malicious
C:\Users\user\AppData\Local\Temp\CyberLoader.exe
"C:\Users\user\AppData\Local\Temp\CyberLoader.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\msPortRefnetdhcp\zRMFcMzN1094wnGdurNck4fGlt.vbe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\msPortRefnetdhcp\file.vbs"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\msPortRefnetdhcp\componentWininto.exe
"C:\msPortRefnetdhcp\componentWininto.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\Downloads\WmiPrvSE.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default User\Downloads\WmiPrvSE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\Downloads\WmiPrvSE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "zufsVvjyWcGfJFz" /sc MINUTE /mo 13 /tr "'C:\Recovery\zufsVvjyWcGfJF.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "zufsVvjyWcGfJF" /sc ONLOGON /tr "'C:\Recovery\zufsVvjyWcGfJF.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "zufsVvjyWcGfJFz" /sc MINUTE /mo 14 /tr "'C:\Recovery\zufsVvjyWcGfJF.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "zufsVvjyWcGfJFz" /sc MINUTE /mo 11 /tr "'C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "zufsVvjyWcGfJF" /sc ONLOGON /tr "'C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "zufsVvjyWcGfJFz" /sc MINUTE /mo 6 /tr "'C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\EunsIO9tk2.bat"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe
C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe
malicious
C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe
C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\6eef2b35-f577-4ffd-aafd-9efeb85439f2.vbs"
malicious
C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe
"C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\da4d56e5-dd25-4b11-bec9-392111f2ec60.vbs"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\Default\Downloads\WmiPrvSE.exe
"C:\Users\Default User\Downloads\WmiPrvSE.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\e99985a1-94fc-4281-b02a-ceb1639f4b4a.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\6334e2d8-afed-41d5-8a9a-b81dc662bd51.vbs"
malicious
C:\Users\Default\Downloads\WmiPrvSE.exe
"C:\Users\Default User\Downloads\WmiPrvSE.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\1ad27169-68a1-4284-b3a4-ab1d46640beb.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\d096c949-588b-4f62-9035-9022be100ad8.vbs"
malicious
C:\Users\Default\Downloads\WmiPrvSE.exe
"C:\Users\Default User\Downloads\WmiPrvSE.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\d365112d-c481-40f0-92bb-6621c11733c0.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\c327c276-7051-4e25-8eb9-181648a7a409.vbs"
malicious
C:\Users\Default\Downloads\WmiPrvSE.exe
"C:\Users\Default User\Downloads\WmiPrvSE.exe"
malicious
C:\Users\user\AppData\Local\Temp\MVPLoader.exe
"C:\Users\user\AppData\Local\Temp\MVPLoader.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\msPortRefnetdhcp\m6JlOKDKnmGOe6a.bat" "
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
There are 27 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://a0947291.xsph.ru/1606aca9.php?cucOyHPjcFsCiapNYlxb8AP6pF=a3qL3&vw0E6VKq1Z0QnGVYYOq=dzcegjt&zp=3ydwnyJbQmvHkZpB8uBecfsG&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&cucOyHPjcFsCiapNYlxb8AP6pF=a3qL3&vw0E6VKq1Z0QnGVYYOq=dzcegjt&zp=3ydwnyJbQmvHkZpB8uBecfsG
141.8.194.74
https://cp.sprinthost.ru
unknown
https://index.from.sh/pages/game.html
unknown
http://a0947291.xsph.ru
unknown
http://a0947291.xsph.ru/1606aca9.php?NmF4dcz1AZPsODb7c4ZJsHpxaH=XN7y&dCgr8zVnf24JM9e1=Ek3Y&HF7ReWWco
unknown
http://a0947291.xsph.ru/1606aca9.php?Va8TbDE3pURmmcb44lzH99wN=hAzBJZDaz2bjGSGnaj3&7jMwN3LmsuWnut3CP1f4OLxk9UyStej=2Ol8yDyQOasFfx&WYDXiE9vwvmw2E33OL6ugH5OMD=qxcrEMfc3&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&Va8TbDE3pURmmcb44lzH99wN=hAzBJZDaz2bjGSGnaj3&7jMwN3LmsuWnut3CP1f4OLxk9UyStej=2Ol8yDyQOasFfx&WYDXiE9vwvmw2E33OL6ugH5OMD=qxcrEMfc3
141.8.194.74
http://a0947291.xsph.ru/1606aca9.php?NmF4dcz1AZPsODb7c4ZJsHpxaH=XN7y&dCgr8zVnf24JM9e1=Ek3Y&HF7ReWWcoDkvPMgt9nivozNf=bmOSJW4Fs5auqV9RDO1j&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&NmF4dcz1AZPsODb7c4ZJsHpxaH=XN7y&dCgr8zVnf24JM9e1=Ek3Y&HF7ReWWcoDkvPMgt9nivozNf=bmOSJW4Fs5auqV9RDO1j
141.8.194.74
http://a0947291.xsph.ru/1606aca9.php?UDHxzzcas1EAv9DMmpw3fnZY=rCOtt0GvVNct1WrGn4NENdapnoSCQPr&79de6a
unknown
https://cp.sprinthost.ru/auth/login
unknown
http://a0947291.xsph.ruPo
unknown
http://a0947291.xsph.ru/1606aca9.php?Kp0YJjcTuh6rHq0W3cybAgWVGNOKtko=Imszz&BTtKkvEZk=Up7qPN7oSeS&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&Kp0YJjcTuh6rHq0W3cybAgWVGNOKtko=Imszz&BTtKkvEZk=Up7qPN7oSeS
141.8.194.74
http://a0947291.xsph.ru/
unknown
http://a0947291.xsph.ru/1606aca9.php?cucOyHPjcFsCiapNYlxb8AP6pF=a3qL3&vw0E6VKq1Z0QnGVYYOq=dzcegjt&zp
unknown
http://a0947291.xsph.ru/1606aca9.php?n8ux2yA6XyMoklAzV5ek7V=UqOdN8&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&n8ux2yA6XyMoklAzV5ek7V=UqOdN8
141.8.194.74
http://a0947291.xsph.ru/1606aca9.php?LB0fbF4jPSXn2GcGAitDf41seHeqJO=wQJizLUNdVtoEeR&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&LB0fbF4jPSXn2GcGAitDf41seHeqJO=wQJizLUNdVtoEeR
141.8.194.74
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://a0947291.xsph.ru/1606aca9.php?n8ux2yA6XyMoklAzV5ek7V=UqOdN8&79de6aec23413a4ab0f953d98ee3ec95=
unknown
http://a0947291.xsph.ru/1606aca9.php?UDHxzzcas1EAv9DMmpw3fnZY=rCOtt0GvVNct1WrGn4NENdapnoSCQPr&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&UDHxzzcas1EAv9DMmpw3fnZY=rCOtt0GvVNct1WrGn4NENdapnoSCQPr
141.8.194.74
http://a0947291.xsph.ru/@=kTYjFmNwYTM
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
a0947291.xsph.ru
141.8.194.74

IPs

IP
Domain
Country
Malicious
141.8.194.74
a0947291.xsph.ru
Russian Federation

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
PromptOnSecureDesktop
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\29ddd7bb6e2351198888c5855f94a15ecf7b3ec4
7caa7ba4682597816b516b5ad2a7ed9c844e3a69
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany

Memdumps

Base Address
Regiontype
Protect
Malicious
2DC1000
trusted library allocation
page read and write
malicious
2860000
trusted library allocation
page read and write
malicious
2651000
trusted library allocation
page read and write
malicious
3411000
trusted library allocation
page read and write
malicious
290D000
trusted library allocation
page read and write
malicious
2E71000
trusted library allocation
page read and write
malicious
1341D000
trusted library allocation
page read and write
malicious
266B000
trusted library allocation
page read and write
malicious
2E81000
trusted library allocation
page read and write
malicious
37C7000
trusted library allocation
page read and write
malicious
33C1000
trusted library allocation
page read and write
malicious
7FFD9B9FC000
trusted library allocation
page execute and read and write
167E000
heap
page read and write
297E000
stack
page read and write
ADE000
heap
page read and write
290A000
heap
page read and write
2904000
heap
page read and write
2E9A000
trusted library allocation
page read and write
1ADC0000
trusted library allocation
page read and write
257A3B6F000
heap
page read and write
1835C4D0000
heap
page read and write
7FFD9BD0A000
trusted library allocation
page read and write
189B170B000
heap
page read and write
16D0000
heap
page read and write
15C6F000
trusted library allocation
page read and write
130E000
stack
page read and write
189B16C9000
heap
page read and write
133CF000
trusted library allocation
page read and write
1C32A000
stack
page read and write
87E000
stack
page read and write
1B34D000
stack
page read and write
157AF000
trusted library allocation
page read and write
18302000
trusted library allocation
page read and write
1C570000
heap
page read and write
2C7E000
trusted library allocation
page read and write
2AEF7348000
heap
page read and write
2952000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
3166000
heap
page read and write
7FFD9BD74000
trusted library allocation
page read and write
13629000
trusted library allocation
page read and write
7EE000
heap
page read and write
29A9ADD0000
heap
page read and write
16FE6000
trusted library allocation
page read and write
13670000
trusted library allocation
page read and write
1C4AD000
stack
page read and write
7FFD9BCF8000
trusted library allocation
page read and write
2540000
heap
page read and write
13D0000
heap
page read and write
29A9AF5C000
heap
page read and write
2E81000
trusted library allocation
page read and write
2CC5000
trusted library allocation
page read and write
7FFD9BB3C000
trusted library allocation
page read and write
1D28A000
heap
page read and write
E9FB9FF000
stack
page read and write
271000
unkown
page execute read
189B16ED000
heap
page read and write
17A1D000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1C790000
trusted library section
page read and write
303E000
trusted library allocation
page read and write
B0A000
heap
page read and write
1879E000
trusted library allocation
page read and write
790000
heap
page read and write
195E000
stack
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
15C1D000
trusted library allocation
page read and write
2C19000
trusted library allocation
page read and write
29A9AEB5000
heap
page read and write
2C82000
trusted library allocation
page read and write
980000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
2928000
heap
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
17628000
trusted library allocation
page read and write
3227000
trusted library allocation
page read and write
1B440000
trusted library allocation
page read and write
2947000
heap
page read and write
C9F000
stack
page read and write
1C42A000
stack
page read and write
2CC7000
trusted library allocation
page read and write
1B97F000
heap
page read and write
7FFD9BBC7000
trusted library allocation
page read and write
1BAEC000
heap
page read and write
1B700000
heap
page read and write
2EE7000
stack
page read and write
2944000
heap
page read and write
1642000
heap
page read and write
7FFD9BE40000
trusted library allocation
page read and write
18358000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9BBB2000
trusted library allocation
page read and write
2AEF7310000
heap
page read and write
1390C000
trusted library allocation
page read and write
26D3000
trusted library allocation
page read and write
3035000
trusted library allocation
page read and write
3424000
trusted library allocation
page read and write
2B04000
trusted library allocation
page read and write
324E000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
3450000
heap
page read and write
7FFD9BC3E000
trusted library allocation
page read and write
890000
heap
page read and write
189B16D6000
heap
page read and write
4ACF000
stack
page read and write
1280C000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
314F000
heap
page read and write
2BE8000
trusted library allocation
page read and write
1BEFA000
stack
page read and write
290E000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7FFD9BC1C000
trusted library allocation
page read and write
1BF90000
heap
page read and write
3050000
trusted library allocation
page read and write
1BE90000
trusted library section
page read and write
1A930000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
1C080000
trusted library section
page read and write
2AEF730B000
heap
page read and write
7FFD9B9B7000
trusted library allocation
page read and write
296F000
heap
page read and write
189B16E9000
heap
page read and write
17656000
trusted library allocation
page read and write
7FFD9BE46000
trusted library allocation
page read and write
1BBA3000
stack
page read and write
1A8E000
stack
page read and write
7FFD9B9AC000
trusted library allocation
page read and write
29A9AF18000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
850000
heap
page read and write
18785000
trusted library allocation
page read and write
3AE9000
trusted library allocation
page read and write
314A000
trusted library allocation
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
3B7B000
trusted library allocation
page read and write
1361F000
trusted library allocation
page read and write
3459000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FFD9BC08000
trusted library allocation
page read and write
7FFD9BD4F000
trusted library allocation
page read and write
2EE3000
stack
page read and write
189B16EF000
heap
page read and write
1C093000
heap
page read and write
165D9C18000
heap
page read and write
1B2A0000
heap
page execute and read and write
1835C296000
heap
page read and write
1F5000
heap
page read and write
2FD4000
trusted library allocation
page read and write
AC5000
heap
page read and write
13582000
trusted library allocation
page read and write
EF0000
heap
page read and write
133C8000
trusted library allocation
page read and write
7FFD9BE68000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
7FFD9BC2A000
trusted library allocation
page read and write
C6B000
heap
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
7FFD9BBF5000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
E7F000
stack
page read and write
189B16D4000
heap
page read and write
1C060000
trusted library section
page read and write
22AB9A87000
heap
page read and write
31E9000
heap
page read and write
1045000
heap
page read and write
7FFD9B9A7000
trusted library allocation
page read and write
1A880000
trusted library allocation
page read and write
348A000
heap
page read and write
C25000
heap
page read and write
1BC2E000
stack
page read and write
285D000
trusted library allocation
page read and write
7EB000
heap
page read and write
7FFD9BB94000
trusted library allocation
page read and write
56FB000
stack
page read and write
321B000
trusted library allocation
page read and write
2D8E000
stack
page read and write
563E000
stack
page read and write
35EF000
stack
page read and write
29A9AF2E000
heap
page read and write
3558000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
279E000
stack
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
2AEF733A000
heap
page read and write
1A53949B000
heap
page read and write
18704000
trusted library allocation
page read and write
304E000
trusted library allocation
page read and write
2BF0000
heap
page read and write
2BAD000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
12658000
trusted library allocation
page read and write
7FFD9BCB2000
trusted library allocation
page read and write
7FFD9BE62000
trusted library allocation
page read and write
7FFD9BB4B000
trusted library allocation
page read and write
7FFD9BE29000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page read and write
7FFD9BB2A000
trusted library allocation
page read and write
1AB0000
heap
page execute and read and write
1B9AE000
stack
page read and write
7FFD9BC84000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
1354E000
trusted library allocation
page read and write
14447000
trusted library allocation
page read and write
37A2000
trusted library allocation
page read and write
257A3B46000
heap
page read and write
A92000
heap
page read and write
7FFD9B993000
trusted library allocation
page read and write
7C67AFF000
stack
page read and write
2A8E000
trusted library allocation
page read and write
1B54E000
stack
page read and write
2949000
heap
page read and write
16F26000
trusted library allocation
page read and write
14F0000
heap
page read and write
2C1B000
trusted library allocation
page read and write
3058000
trusted library allocation
page read and write
1B5FE000
stack
page read and write
7FFD9BD90000
trusted library allocation
page execute and read and write
7FFD9BBC8000
trusted library allocation
page read and write
189B16FB000
heap
page read and write
1B72F000
stack
page read and write
7FFD9BDB0000
trusted library allocation
page execute and read and write
2938000
heap
page read and write
1C4A9000
stack
page read and write
7B0000
heap
page read and write
1279B000
trusted library allocation
page read and write
2C62000
trusted library allocation
page read and write
2A5D000
heap
page read and write
31DC000
trusted library allocation
page read and write
2AEF7355000
heap
page read and write
6B00000
heap
page read and write
7FFD9BD80000
trusted library allocation
page read and write
13ABE000
trusted library allocation
page read and write
3162000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
12E71000
trusted library allocation
page read and write
7FFD9BACA000
trusted library allocation
page execute and read and write
1280A000
trusted library allocation
page read and write
2BBC000
trusted library allocation
page read and write
38E6000
trusted library allocation
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
29A9AEE1000
heap
page read and write
7FFD9BD38000
trusted library allocation
page read and write
320A000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
7FFD9BB4E000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
2BB2000
trusted library allocation
page read and write
1686A000
trusted library allocation
page read and write
1B948000
heap
page read and write
1290D000
trusted library allocation
page read and write
2AEF7310000
heap
page read and write
7FFD9BB5E000
trusted library allocation
page read and write
34AF000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7FFD9BD60000
trusted library allocation
page read and write
257A3B07000
heap
page read and write
16D75000
trusted library allocation
page read and write
29A9ACF0000
heap
page read and write
7FFD9BC36000
trusted library allocation
page read and write
31CA000
heap
page read and write
134B2000
trusted library allocation
page read and write
1CFB1000
heap
page read and write
7FFD9BC77000
trusted library allocation
page read and write
7FFD9BD1A000
trusted library allocation
page read and write
354B000
trusted library allocation
page read and write
7FFD9BE2A000
trusted library allocation
page read and write
7FFD9BC47000
trusted library allocation
page read and write
1B6AE000
stack
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
37EE000
trusted library allocation
page read and write
770000
heap
page read and write
7FFD9B9DB000
trusted library allocation
page execute and read and write
29A9AEDC000
heap
page read and write
189B1719000
heap
page read and write
2E1F000
stack
page read and write
7FFD9BE80000
trusted library allocation
page execute and read and write
7FFD9BABA000
trusted library allocation
page execute and read and write
1B9F2000
stack
page read and write
149B7000
trusted library allocation
page read and write
257A3AFF000
heap
page read and write
163EB000
trusted library allocation
page read and write
7FFD9BB53000
trusted library allocation
page read and write
7FFD9BA46000
trusted library allocation
page read and write
1D7CB000
stack
page read and write
7FFD9BB71000
trusted library allocation
page read and write
2DA6000
trusted library allocation
page read and write
12DCA000
trusted library allocation
page read and write
1960000
heap
page read and write
22AB98A0000
heap
page read and write
7FFD9BC2E000
trusted library allocation
page read and write
7FFD9BD6A000
trusted library allocation
page read and write
7FFD9BE73000
trusted library allocation
page read and write
7FFD9B99C000
trusted library allocation
page read and write
29A9AF57000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
1020000
heap
page read and write
936000
stack
page read and write
2DC8000
trusted library allocation
page read and write
12825000
trusted library allocation
page read and write
17B98000
trusted library allocation
page read and write
2920000
heap
page read and write
2ECB000
trusted library allocation
page read and write
3309000
trusted library allocation
page read and write
7FFD9BB4C000
trusted library allocation
page read and write
133EF000
trusted library allocation
page read and write
331E000
trusted library allocation
page read and write
1320000
heap
page read and write
2ECF000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
980000
heap
page read and write
7FFD9BB63000
trusted library allocation
page read and write
7FFD9BD80000
trusted library allocation
page read and write
28E1000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BC57000
trusted library allocation
page read and write
1623A000
trusted library allocation
page read and write
3872000
trusted library allocation
page read and write
7FFD9BC1E000
trusted library allocation
page read and write
1C5AA000
stack
page read and write
7FFD9BB94000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page execute and read and write
18166000
trusted library allocation
page read and write
7FFD9BE80000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
1630000
heap
page read and write
133E1000
trusted library allocation
page read and write
1B84E000
stack
page read and write
15970000
trusted library allocation
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
2947000
heap
page read and write
29A9AEE1000
heap
page read and write
257A3B40000
heap
page read and write
1365E000
trusted library allocation
page read and write
116A000
heap
page read and write
7FFD9BA66000
trusted library allocation
page read and write
113C000
heap
page read and write
189B170F000
heap
page read and write
13D5000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2ABF000
stack
page read and write
2ED0000
stack
page read and write
1D43E000
stack
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
257A3B21000
heap
page read and write
1B21F000
stack
page read and write
13120000
trusted library allocation
page read and write
7FFD9BBE9000
trusted library allocation
page read and write
280E000
stack
page read and write
13130000
trusted library allocation
page read and write
29A9AF41000
heap
page read and write
7FFD9BB63000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
1BFC5000
heap
page read and write
7FFD9BC5A000
trusted library allocation
page read and write
3798000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
1B204000
heap
page read and write
12E91000
trusted library allocation
page read and write
7FFD9BC79000
trusted library allocation
page read and write
2C7C000
trusted library allocation
page read and write
189B171C000
heap
page read and write
12E65000
trusted library allocation
page read and write
1CFB5000
heap
page read and write
29A9AF0D000
heap
page read and write
1BDAE000
stack
page read and write
309E000
stack
page read and write
7FFD9BE40000
trusted library allocation
page read and write
2907000
heap
page read and write
DA0000
heap
page read and write
2CC9000
trusted library allocation
page read and write
7FFD9BC7C000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
2944000
heap
page read and write
18215000
trusted library allocation
page read and write
324E000
trusted library allocation
page read and write
3450000
trusted library allocation
page read and write
2ED6000
stack
page read and write
2D4A000
trusted library allocation
page read and write
257A3B1C000
heap
page read and write
AA796FA000
stack
page read and write
7FFD9BE16000
trusted library allocation
page read and write
7FFD9BDA2000
trusted library allocation
page read and write
13443000
trusted library allocation
page read and write
29A9AF0B000
heap
page read and write
14E0000
heap
page read and write
257A3D45000
heap
page read and write
257A3B45000
heap
page read and write
29A9AF10000
heap
page read and write
1984000
heap
page read and write
1CA5F000
stack
page read and write
3052000
trusted library allocation
page read and write
3328000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
12E19000
trusted library allocation
page read and write
1C084000
heap
page read and write
324C000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
2D9C000
trusted library allocation
page read and write
187FC000
trusted library allocation
page read and write
257A3B4E000
heap
page read and write
17BC9000
trusted library allocation
page read and write
4E4E000
stack
page read and write
2FD4000
trusted library allocation
page read and write
7FFD9BD18000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
7FFD9BD60000
trusted library allocation
page read and write
1B82F000
stack
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
1BEA0000
trusted library section
page read and write
17C7C000
trusted library allocation
page read and write
3A54000
trusted library allocation
page read and write
12AF5000
trusted library allocation
page read and write
291C000
trusted library allocation
page read and write
E80000
heap
page read and write
7FFD9BB53000
trusted library allocation
page read and write
376E000
stack
page read and write
1163000
heap
page read and write
3223000
trusted library allocation
page read and write
7FFD9BE10000
trusted library allocation
page read and write
7FFD9BBEE000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
257A3B0D000
heap
page read and write
2EFA000
stack
page read and write
189B16A0000
heap
page read and write
29A9AEF6000
heap
page read and write
189B15C0000
heap
page read and write
7FFD9BD64000
trusted library allocation
page read and write
2949000
heap
page read and write
7FFD9BBAD000
trusted library allocation
page read and write
2C1F000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
13D5000
heap
page read and write
2AEF734A000
heap
page read and write
303B000
trusted library allocation
page read and write
22AB9A30000
heap
page read and write
1CF80000
heap
page read and write
189B16DC000
heap
page read and write
2EC6000
stack
page read and write
1320D000
trusted library allocation
page read and write
1ADDD000
stack
page read and write
1BF9E000
stack
page read and write
7FFD9BB6B000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
7FFD9BE70000
trusted library allocation
page execute and read and write
1357B000
trusted library allocation
page read and write
7FFD9BC26000
trusted library allocation
page read and write
257A3B59000
heap
page read and write
3314000
trusted library allocation
page read and write
5A5D000
stack
page read and write
2851000
trusted library allocation
page read and write
29A9AF10000
heap
page read and write
21794EF0000
heap
page read and write
13AA5000
trusted library allocation
page read and write
189B18C5000
heap
page read and write
134FE000
trusted library allocation
page read and write
31E2000
trusted library allocation
page read and write
1753B000
trusted library allocation
page read and write
18891000
trusted library allocation
page read and write
2947000
heap
page read and write
296F000
heap
page read and write
7FFD9BC33000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
7FFD9BC92000
trusted library allocation
page read and write
257A3B3A000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
12D9F000
trusted library allocation
page read and write
7FFD9BC42000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
2840000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
E32000
unkown
page readonly
352E000
trusted library allocation
page read and write
7B0000
heap
page read and write
13D7A000
trusted library allocation
page read and write
38F0000
trusted library allocation
page read and write
318E000
heap
page read and write
1BD8E000
stack
page read and write
1BE10000
trusted library section
page read and write
7FFD9BBD9000
trusted library allocation
page read and write
156FF000
trusted library allocation
page read and write
126D7000
trusted library allocation
page read and write
1CB59000
stack
page read and write
189B1860000
heap
page read and write
3446000
trusted library allocation
page read and write
1661D000
trusted library allocation
page read and write
14DE000
stack
page read and write
7FFD9BC30000
trusted library allocation
page read and write
2C86000
trusted library allocation
page read and write
12EC9000
trusted library allocation
page read and write
7FFD9BC63000
trusted library allocation
page read and write
13454000
trusted library allocation
page read and write
39EC000
stack
page read and write
1A5394C8000
heap
page read and write
2901000
heap
page read and write
2B81000
trusted library allocation
page read and write
1C4B5000
heap
page read and write
2954000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BE26000
trusted library allocation
page read and write
189B1741000
heap
page read and write
13125000
trusted library allocation
page read and write
14139000
trusted library allocation
page read and write
A7A000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
257A3B0C000
heap
page read and write
290C000
heap
page read and write
7FFD9B993000
trusted library allocation
page read and write
133CD000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
1D293000
heap
page read and write
2925000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
134C4000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
7FFD9B9B3000
trusted library allocation
page read and write
1B99D000
stack
page read and write
13E0000
heap
page read and write
1350E000
trusted library allocation
page read and write
2FC5000
trusted library allocation
page read and write
2AEF7347000
heap
page read and write
32E1000
trusted library allocation
page read and write
7FFD9BE50000
trusted library allocation
page read and write
A15000
heap
page read and write
404000
unkown
page read and write
13A8C000
trusted library allocation
page read and write
18951000
trusted library allocation
page read and write
3487000
heap
page read and write
1762000
heap
page read and write
B319FFF000
stack
page read and write
2ED3000
trusted library allocation
page read and write
7FFD9BD4E000
trusted library allocation
page read and write
1C25A000
stack
page read and write
DA0000
heap
page read and write
3475000
trusted library allocation
page read and write
2EFA000
stack
page read and write
2B4000
unkown
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
7FFD9BE30000
trusted library allocation
page read and write
291A000
heap
page read and write
7FFD9BA0C000
trusted library allocation
page execute and read and write
7FFD9BBA7000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9BD68000
trusted library allocation
page read and write
7FFD9BE5A000
trusted library allocation
page read and write
12851000
trusted library allocation
page read and write
2B17000
trusted library allocation
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
7FFD9BC05000
trusted library allocation
page read and write
7FFD9BE5E000
trusted library allocation
page read and write
7FFD9BDAD000
trusted library allocation
page execute and read and write
2912000
heap
page read and write
7FFD9BBF8000
trusted library allocation
page read and write
189B1740000
heap
page read and write
18435000
trusted library allocation
page read and write
1174000
heap
page read and write
2C15000
trusted library allocation
page read and write
13065000
trusted library allocation
page read and write
182C5000
trusted library allocation
page read and write
7FFD9BC3B000
trusted library allocation
page read and write
17709000
trusted library allocation
page read and write
2D22000
trusted library allocation
page read and write
D9E000
stack
page read and write
7FFD9BC11000
trusted library allocation
page read and write
7FFD9BD48000
trusted library allocation
page read and write
176F6000
trusted library allocation
page read and write
B07000
heap
page read and write
32D7000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
11C9000
heap
page read and write
13429000
trusted library allocation
page read and write
1D1BC000
stack
page read and write
2937000
heap
page read and write
2921000
heap
page read and write
1274E000
trusted library allocation
page read and write
900000
heap
page read and write
7FFD9BE23000
trusted library allocation
page read and write
29A9AF43000
heap
page read and write
1B880000
heap
page execute and read and write
7FFD9BD08000
trusted library allocation
page read and write
520E000
stack
page read and write
1100000
heap
page read and write
2FCF000
stack
page read and write
3438000
trusted library allocation
page read and write
31CA000
heap
page read and write
1C7A0000
trusted library section
page read and write
1677000
heap
page read and write
18408000
trusted library allocation
page read and write
400000
unkown
page readonly
13E1D000
trusted library allocation
page read and write
7FFD9BB81000
trusted library allocation
page read and write
7FFD9B9B3000
trusted library allocation
page read and write
7FFD9BB77000
trusted library allocation
page read and write
3407000
heap
page read and write
23E0000
heap
page read and write
127A1000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
3277000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
7FFD9B9BC000
trusted library allocation
page read and write
11B6000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
136CD000
trusted library allocation
page read and write
1BDFA000
stack
page read and write
257A3B66000
heap
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
1BB20000
heap
page execute and read and write
2669000
trusted library allocation
page read and write
3549000
trusted library allocation
page read and write
7FFD9BA36000
trusted library allocation
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
19239000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
3868000
trusted library allocation
page read and write
7FFD9B986000
trusted library allocation
page read and write
BC0000
heap
page read and write
2BB8000
trusted library allocation
page read and write
1535000
heap
page read and write
7FFD9BB7C000
trusted library allocation
page read and write
3B65000
trusted library allocation
page read and write
2AEF7345000
heap
page read and write
29A9ADF0000
heap
page read and write
10DB000
heap
page read and write
CF9000
heap
page read and write
29A9AF39000
heap
page read and write
1C090000
trusted library section
page read and write
7FFD9B9AB000
trusted library allocation
page execute and read and write
7FFD9B99C000
trusted library allocation
page read and write
1B340000
heap
page read and write
7FFD9BD10000
trusted library allocation
page read and write
30A5000
heap
page read and write
2AEF72C0000
heap
page read and write
CB0000
heap
page read and write
257A3B72000
heap
page read and write
2949000
heap
page read and write
960000
heap
page read and write
1D5BC000
stack
page read and write
257A3B4B000
heap
page read and write
EF5000
heap
page read and write
1C770000
trusted library section
page read and write
1A70000
heap
page read and write
29A9AF4F000
heap
page read and write
2AEF72E9000
heap
page read and write
296F000
heap
page read and write
2D2000
unkown
page write copy
7FFD9BE80000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
2949000
heap
page read and write
29A9AEC0000
heap
page read and write
134E2000
trusted library allocation
page read and write
736000
stack
page read and write
2A8C000
trusted library allocation
page read and write
2AEF9160000
heap
page read and write
7FFD9BE2D000
trusted library allocation
page read and write
189B16ED000
heap
page read and write
38E4000
trusted library allocation
page read and write
292A000
heap
page read and write
1C072000
heap
page read and write
2E90000
trusted library allocation
page read and write
1D256000
heap
page read and write
7FFD9BB74000
trusted library allocation
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
31DA000
trusted library allocation
page read and write
5247000
heap
page read and write
F5F27FE000
stack
page read and write
189B16ED000
heap
page read and write
18767000
trusted library allocation
page read and write
2AEF7625000
heap
page read and write
12900000
trusted library allocation
page read and write
15209000
trusted library allocation
page read and write
1DA8467B000
heap
page read and write
29A9AF10000
heap
page read and write
1B7A1000
stack
page read and write
2AEF7309000
heap
page read and write
21794FC0000
heap
page read and write
1BFFE000
unkown
page read and write
1340000
heap
page read and write
2BB6000
trusted library allocation
page read and write
257A59A0000
heap
page read and write
3150000
heap
page read and write
169B6000
trusted library allocation
page read and write
7FFD9BC95000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
340C000
trusted library allocation
page read and write
1BDE0000
trusted library section
page read and write
7FFD9BD5F000
trusted library allocation
page read and write
12E78000
trusted library allocation
page read and write
135B1000
trusted library allocation
page read and write
189B170F000
heap
page read and write
1835C230000
heap
page read and write
2692000
trusted library allocation
page read and write
56BE000
stack
page read and write
295B000
heap
page read and write
3454000
trusted library allocation
page read and write
28C0000
heap
page read and write
7FFD9BEA0000
trusted library allocation
page execute and read and write
7FFD9BE31000
trusted library allocation
page read and write
E9FBBFE000
stack
page read and write
14CFA000
trusted library allocation
page read and write
15464000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FFD9BD58000
trusted library allocation
page read and write
4630000
heap
page read and write
3165000
heap
page read and write
CA9000
heap
page read and write
2E60000
heap
page execute and read and write
3192000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
135FB000
trusted library allocation
page read and write
2D2E000
stack
page read and write
1B44E000
stack
page read and write
17554000
trusted library allocation
page read and write
2EDB000
trusted library allocation
page read and write
7FFD9BB84000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1BAC8000
heap
page read and write
7FFD9B9B6000
trusted library allocation
page read and write
2AEF730D000
heap
page read and write
166A8000
trusted library allocation
page read and write
3138000
heap
page read and write
7C67EFE000
stack
page read and write
7FF7605BF000
unkown
page read and write
344D000
trusted library allocation
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
7FFD9BE8E000
trusted library allocation
page read and write
7FFD9BE70000
trusted library allocation
page read and write
29A9AF0F000
heap
page read and write
7FFD9BE70000
trusted library allocation
page read and write
2DF8000
trusted library allocation
page read and write
2BF2000
trusted library allocation
page read and write
7FFD9BE5C000
trusted library allocation
page read and write
1BCFA000
stack
page read and write
379E000
trusted library allocation
page read and write
7FFD9BBD7000
trusted library allocation
page read and write
29A9AEFC000
heap
page read and write
29A9AEF6000
heap
page read and write
7FFD9BE3D000
trusted library allocation
page read and write
344E000
stack
page read and write
7FFD9BBC2000
trusted library allocation
page read and write
29A9AF35000
heap
page read and write
1C030000
heap
page read and write
1700000
heap
page read and write
327B000
heap
page read and write
18827000
trusted library allocation
page read and write
12E8D000
trusted library allocation
page read and write
1C4EA000
heap
page read and write
364C000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
4E8E000
stack
page read and write
7FFD9BC20000
trusted library allocation
page read and write
189B14E0000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
189B170F000
heap
page read and write
9B000
stack
page read and write
1F0000
heap
page read and write
347A000
trusted library allocation
page read and write
7FFD9BC24000
trusted library allocation
page read and write
3145000
heap
page read and write
1B02E000
stack
page read and write
1B98A000
heap
page read and write
31C9000
heap
page read and write
7FFD9BB9D000
trusted library allocation
page read and write
1D200000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
1B4AF000
stack
page read and write
18194000
trusted library allocation
page read and write
13F3C000
trusted library allocation
page read and write
1D91B000
stack
page read and write
270000
unkown
page readonly
7FF7605C5000
unkown
page write copy
176A3000
trusted library allocation
page read and write
7FFD9BBDC000
trusted library allocation
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
1B8B6000
heap
page read and write
4F90000
heap
page read and write
C9E000
stack
page read and write
3095000
trusted library allocation
page read and write
B7F000
stack
page read and write
544C000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
17C89000
trusted library allocation
page read and write
7FF4B2350000
trusted library allocation
page execute and read and write
F5F29FF000
stack
page read and write
7FFD9BD80000
trusted library allocation
page execute and read and write
1621000
heap
page read and write
1CE4E000
stack
page read and write
2BA0000
heap
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
7FFD9BD42000
trusted library allocation
page read and write
10C6000
heap
page read and write
2AEF7354000
heap
page read and write
17BBC000
trusted library allocation
page read and write
1343B000
trusted library allocation
page read and write
7FFD9BAD7000
trusted library allocation
page execute and read and write
4680000
heap
page read and write
13B0000
heap
page read and write
15D2F000
trusted library allocation
page read and write
7FFD9BB2E000
trusted library allocation
page read and write
160ED000
trusted library allocation
page read and write
189B16BB000
heap
page read and write
7FFD9BB5B000
trusted library allocation
page read and write
7FFD9BD10000
trusted library allocation
page read and write
1701D000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
2D4F000
stack
page read and write
1D279000
heap
page read and write
2AD4000
trusted library allocation
page read and write
1B9A2000
heap
page read and write
7FFD9BB4C000
trusted library allocation
page read and write
2D9B000
trusted library allocation
page read and write
1C22D000
stack
page read and write
1D1C0000
heap
page read and write
386F000
stack
page read and write
21794F65000
heap
page read and write
7FFD9BE36000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
1834000
heap
page read and write
7FFD9BB8A000
trusted library allocation
page read and write
7FFD9BC08000
trusted library allocation
page read and write
181F7000
trusted library allocation
page read and write
21794FC8000
heap
page read and write
3417000
trusted library allocation
page read and write
16A66000
trusted library allocation
page read and write
1C710000
trusted library section
page read and write
3330000
heap
page read and write
7FFD9BB5C000
trusted library allocation
page read and write
23F0000
heap
page read and write
1ABDE000
heap
page read and write
1C6AA000
stack
page read and write
133D1000
trusted library allocation
page read and write
1827C000
trusted library allocation
page read and write
7FFD9BC26000
trusted library allocation
page read and write
2904000
heap
page read and write
7FFD9BC02000
trusted library allocation
page read and write
128ED000
trusted library allocation
page read and write
27F0000
heap
page read and write
1BA9F000
heap
page read and write
386C000
trusted library allocation
page read and write
2E9C000
trusted library allocation
page read and write
29A9AEFB000
heap
page read and write
A70000
heap
page read and write
1841D000
trusted library allocation
page read and write
1DA84310000
heap
page read and write
7FFD9BD72000
trusted library allocation
page read and write
33CA000
trusted library allocation
page read and write
12661000
trusted library allocation
page read and write
7FFD9BD7A000
trusted library allocation
page read and write
1B8A7000
stack
page read and write
525F000
stack
page read and write
2F4E000
stack
page read and write
2BEE000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
29A9AF4E000
heap
page read and write
31D4000
trusted library allocation
page read and write
1BFC2000
heap
page read and write
1A20000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
1726000
heap
page read and write
7FFD9BE10000
trusted library allocation
page read and write
133C3000
trusted library allocation
page read and write
144F7000
trusted library allocation
page read and write
1333A000
trusted library allocation
page read and write
12EC9000
trusted library allocation
page read and write
172E5000
trusted library allocation
page read and write
2AEF7349000
heap
page read and write
386E000
trusted library allocation
page read and write
189B16F0000
heap
page read and write
7FFD9BD72000
trusted library allocation
page read and write
F5F24FA000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
257A3AFC000
heap
page read and write
7FFD9BE36000
trusted library allocation
page read and write
28E8000
heap
page read and write
257A3AD0000
heap
page read and write
3209000
heap
page read and write
295B000
heap
page read and write
134AC000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
31D1000
heap
page read and write
F5F2BFF000
stack
page read and write
7FFD9BAA8000
trusted library allocation
page execute and read and write
7FFD9BB40000
trusted library allocation
page read and write
2ECE000
stack
page read and write
7FFD9BB30000
trusted library allocation
page read and write
2AEF72F6000
heap
page read and write
1330F000
trusted library allocation
page read and write
4BCF000
stack
page read and write
1190000
trusted library allocation
page read and write
31C9000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2D7C000
trusted library allocation
page read and write
1835C240000
heap
page read and write
A79000
heap
page read and write
296F000
heap
page read and write
189B34A0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
29A9AF3F000
heap
page read and write
7FFD9BE3D000
trusted library allocation
page read and write
9BC000
heap
page read and write
2959000
trusted library allocation
page read and write
2E02000
trusted library allocation
page read and write
D56000
stack
page read and write
7FFD9BD80000
trusted library allocation
page read and write
1274C000
trusted library allocation
page read and write
17659000
trusted library allocation
page read and write
2B0E000
trusted library allocation
page read and write
1B840000
heap
page execute and read and write
115B000
heap
page read and write
3B61000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
142FA000
trusted library allocation
page read and write
1720000
heap
page read and write
2AEF730D000
heap
page read and write
2AE000
unkown
page write copy
1C035000
heap
page read and write
EBE000
stack
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
1980000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1D6CD000
stack
page read and write
1196000
unkown
page readonly
1679000
heap
page read and write
3219000
trusted library allocation
page read and write
3167000
heap
page read and write
15340000
trusted library allocation
page read and write
1BFDA000
stack
page read and write
3443000
trusted library allocation
page read and write
4F8F000
stack
page read and write
29A9AF09000
heap
page read and write
2AEF7270000
heap
page read and write
7FFD9BC46000
trusted library allocation
page read and write
7FFD9BE30000
trusted library allocation
page read and write
31D1000
heap
page read and write
2D46000
trusted library allocation
page read and write
7C67CFE000
stack
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
29A9AF0D000
heap
page read and write
1B40C000
stack
page read and write
257A3AA0000
heap
page read and write
189B16CC000
heap
page read and write
E9FB35A000
stack
page read and write
7FFD9BE80000
trusted library allocation
page execute and read and write
31CA000
heap
page read and write
1D84B000
stack
page read and write
7FFD9BB50000
trusted library allocation
page read and write
189B16ED000
heap
page read and write
34C6000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
7FFD9BBB4000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
270000
unkown
page readonly
1929D000
trusted library allocation
page read and write
9A0000
heap
page read and write
1C1DE000
stack
page read and write
7FFD9BC10000
trusted library allocation
page read and write
7FFD9BE33000
trusted library allocation
page read and write
12819000
trusted library allocation
page read and write
26FB000
stack
page read and write
1BE23000
stack
page read and write
1C720000
trusted library section
page read and write
35C9000
trusted library allocation
page read and write
7FFD9B997000
trusted library allocation
page read and write
7FFD9BE40000
trusted library allocation
page read and write
257A3B54000
heap
page read and write
135CC000
trusted library allocation
page read and write
2EB2000
trusted library allocation
page read and write
1C700000
trusted library section
page read and write
330E000
stack
page read and write
1366000
stack
page read and write
1D065000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
1342D000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page read and write
31CA000
heap
page read and write
189B1721000
heap
page read and write
7FFD9BB43000
trusted library allocation
page read and write
1CA10000
trusted library section
page read and write
257A3AF0000
heap
page read and write
7FFD9B982000
trusted library allocation
page read and write
7FFD9BE19000
trusted library allocation
page read and write
7FFD9BBF7000
trusted library allocation
page read and write
1C62E000
unkown
page read and write
29A9AF3A000
heap
page read and write
7FFD9BAAA000
trusted library allocation
page execute and read and write
257A3AB0000
heap
page read and write
1CD4B000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
22AB9A79000
heap
page read and write
1A90000
trusted library allocation
page read and write
AA0000
heap
page read and write
29A9AF0D000
heap
page read and write
30A8000
trusted library allocation
page read and write
2F00000
heap
page readonly
134BF000
trusted library allocation
page read and write
257A3B5A000
heap
page read and write
29A9AF55000
heap
page read and write
7FFD9BA36000
trusted library allocation
page read and write
2CAA000
trusted library allocation
page read and write
189B16EA000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
2954000
heap
page read and write
7FFD9BD3F000
trusted library allocation
page read and write
1B44E000
stack
page read and write
3167000
heap
page read and write
1086000
heap
page read and write
31D1000
heap
page read and write
524B000
heap
page read and write
A80000
heap
page read and write
1380000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
2B0C000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
2D30000
heap
page read and write
1602D000
trusted library allocation
page read and write
1B5A4000
stack
page read and write
2947000
heap
page read and write
18988000
trusted library allocation
page read and write
7FFD9BD8B000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
30E6000
trusted library allocation
page read and write
189B16EB000
heap
page read and write
17F75000
trusted library allocation
page read and write
2B85000
trusted library allocation
page read and write
183B2000
trusted library allocation
page read and write
AA79DFF000
stack
page read and write
7FFD9BD00000
trusted library allocation
page read and write
126D4000
trusted library allocation
page read and write
7FFD9BC53000
trusted library allocation
page read and write
830000
heap
page read and write
1671000
heap
page read and write
A40000
heap
page read and write
31D1000
heap
page read and write
2DD5000
trusted library allocation
page read and write
3658000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
2AEF7332000
heap
page read and write
3221000
trusted library allocation
page read and write
1200000
heap
page read and write
2947000
heap
page read and write
30A4000
trusted library allocation
page read and write
7FFD9BAF3000
trusted library allocation
page execute and read and write
7FFD9BD82000
trusted library allocation
page read and write
17B22000
trusted library allocation
page read and write
128B1000
trusted library allocation
page read and write
2AEF730D000
heap
page read and write
17BF6000
trusted library allocation
page read and write
7FFD9BE4D000
trusted library allocation
page read and write
2AEF7340000
heap
page read and write
7FFD9BC82000
trusted library allocation
page read and write
12741000
trusted library allocation
page read and write
760000
heap
page read and write
2954000
heap
page read and write
1BFC0000
trusted library section
page read and write
7FFD9BBF2000
trusted library allocation
page read and write
257A3B46000
heap
page read and write
31D8000
trusted library allocation
page read and write
189B15E0000
heap
page read and write
404000
unkown
page read and write
1D1C4000
heap
page read and write
7FFD9BBE2000
trusted library allocation
page read and write
1DA84410000
heap
page read and write
35E7000
trusted library allocation
page read and write
1DA844F6000
heap
page read and write
162D000
heap
page read and write
2D1000
unkown
page read and write
2947000
heap
page read and write
1B040000
heap
page execute and read and write
7FFD9BB30000
trusted library allocation
page read and write
257A3B4E000
heap
page read and write
1835C430000
heap
page read and write
321D000
trusted library allocation
page read and write
13440000
trusted library allocation
page read and write
362E000
stack
page read and write
182DE000
trusted library allocation
page read and write
7FFD9BDBD000
trusted library allocation
page execute and read and write
2CAC000
trusted library allocation
page read and write
2925000
heap
page read and write
1B64E000
stack
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
2D24000
trusted library allocation
page read and write
3335000
trusted library allocation
page read and write
232B000
stack
page read and write
7FFD9BE20000
trusted library allocation
page read and write
32D5000
trusted library allocation
page read and write
131E000
stack
page read and write
E10000
heap
page execute and read and write
1BDDF000
stack
page read and write
29A9AF35000
heap
page read and write
7FFD9BBA4000
trusted library allocation
page read and write
290E000
heap
page read and write
17AC4000
trusted library allocation
page read and write
1351C000
trusted library allocation
page read and write
DFE000
stack
page read and write
7FFD9BD2A000
trusted library allocation
page read and write
1DA844E4000
heap
page read and write
34EE000
stack
page read and write
1AC85000
heap
page read and write
2944000
heap
page read and write
2AEF730D000
heap
page read and write
7FFD9BA36000
trusted library allocation
page read and write
6CB68FF000
stack
page read and write
3037000
trusted library allocation
page read and write
13A0000
heap
page read and write
7FFD9BE3A000
trusted library allocation
page read and write
7FFD9BB36000
trusted library allocation
page read and write
7FFD9BC3A000
trusted library allocation
page read and write
2AEF733C000
heap
page read and write
7FFD9BC74000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
113C000
heap
page read and write
2AEF72E9000
heap
page read and write
553E000
stack
page read and write
1AE80000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
1B962000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2DDE000
stack
page read and write
31AC000
trusted library allocation
page read and write
7C678FA000
stack
page read and write
1C0DE000
unkown
page read and write
740000
heap
page read and write
81B000
heap
page read and write
B319EFE000
stack
page read and write
12DCD000
trusted library allocation
page read and write
18872000
trusted library allocation
page read and write
257A3B60000
heap
page read and write
12F21000
trusted library allocation
page read and write
7FFD9BD31000
trusted library allocation
page read and write
29A9AF30000
heap
page read and write
7FFD9BB9F000
trusted library allocation
page read and write
2954000
heap
page read and write
257A3AFF000
heap
page read and write
7FFD9B9BC000
trusted library allocation
page read and write
189B16C0000
heap
page read and write
7FFD9BE10000
trusted library allocation
page read and write
CB3000
heap
page read and write
16ED59A000
stack
page read and write
7FFD9B9C3000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
7FFD9BBA0000
trusted library allocation
page read and write
257A3B20000
heap
page read and write
2B4E000
stack
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
1BD22000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2F50000
heap
page read and write
1CC4D000
stack
page read and write
7FFD9BE4A000
trusted library allocation
page read and write
2A3000
unkown
page readonly
7FFD9BB90000
trusted library allocation
page read and write
401000
unkown
page execute read
7FFD9BBFC000
trusted library allocation
page read and write
2B50000
heap
page read and write
AA79AFE000
stack
page read and write
21794F00000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
23DE000
stack
page read and write
7FFD9BBE7000
trusted library allocation
page read and write
257A3B07000
heap
page read and write
7FFD9BDAB000
trusted library allocation
page read and write
7FFD9B997000
trusted library allocation
page read and write
7FFD9BE30000
trusted library allocation
page read and write
184F5000
trusted library allocation
page read and write
1C52A000
stack
page read and write
29A9AF35000
heap
page read and write
1BAF0000
heap
page read and write
1AE8D000
stack
page read and write
A85000
heap
page read and write
7FFD9BC2E000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BB7B000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
2F53000
trusted library allocation
page read and write
189B16D6000
heap
page read and write
7FFD9BB3C000
trusted library allocation
page read and write
315A000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
18932000
trusted library allocation
page read and write
7FFD9BD50000
trusted library allocation
page read and write
3547000
trusted library allocation
page read and write
7FFD9BBEC000
trusted library allocation
page read and write
1C9C0000
trusted library section
page read and write
1B343000
stack
page read and write
176D8000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
295B000
heap
page read and write
461E000
stack
page read and write
316A000
heap
page read and write
7FFD9BBB8000
trusted library allocation
page read and write
7FF7605C5000
unkown
page read and write
2D3A000
heap
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
3400000
heap
page read and write
292C000
heap
page read and write
2900000
heap
page read and write
189B16C0000
heap
page read and write
7FFD9BE5D000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
DB0000
heap
page read and write
2DA0000
trusted library allocation
page read and write
13D0000
heap
page read and write
7FF7605C0000
unkown
page readonly
2EE6000
trusted library allocation
page read and write
12750000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
1B14E000
stack
page read and write
7FFD9BBED000
trusted library allocation
page read and write
31AA000
trusted library allocation
page read and write
2D3C000
trusted library allocation
page read and write
7FFD9BB5B000
trusted library allocation
page read and write
12E73000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
2923000
heap
page read and write
7FFD9B9CC000
trusted library allocation
page read and write
1C760000
trusted library section
page read and write
1D73D000
stack
page read and write
1DA85F30000
heap
page read and write
286A000
trusted library allocation
page read and write
2AEF72F6000
heap
page read and write
13584000
trusted library allocation
page read and write
1BAAF000
stack
page read and write
7FFD9BD41000
trusted library allocation
page read and write
1BD8E000
stack
page read and write
2947000
heap
page read and write
B9F000
stack
page read and write
2AEF7620000
heap
page read and write
190B7000
trusted library allocation
page read and write
1354B000
trusted library allocation
page read and write
113A000
heap
page read and write
2C5E000
trusted library allocation
page read and write
17AAB000
trusted library allocation
page read and write
22AB9A70000
heap
page read and write
126E3000
trusted library allocation
page read and write
1BA2E000
heap
page read and write
29A9AF10000
heap
page read and write
523F000
heap
page read and write
5210000
heap
page read and write
2DBA000
trusted library allocation
page read and write
12786000
trusted library allocation
page read and write
3050000
heap
page read and write
1146000
heap
page read and write
2BAE000
stack
page read and write
2EE9000
stack
page read and write
506E000
stack
page read and write
1A539380000
heap
page read and write
7C679FF000
stack
page read and write
585E000
stack
page read and write
38E8000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
1D8CF000
stack
page read and write
3AE7000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
7FFD9BEA0000
trusted library allocation
page read and write
1C070000
trusted library section
page read and write
18321000
trusted library allocation
page read and write
13411000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
274E000
stack
page read and write
B3198FA000
stack
page read and write
7FFD9BD70000
trusted library allocation
page read and write
EA5000
heap
page read and write
4D4D000
stack
page read and write
2909000
heap
page read and write
2ED1000
trusted library allocation
page read and write
165D9B30000
heap
page read and write
21794F6B000
heap
page read and write
31D1000
heap
page read and write
105D000
heap
page read and write
21794F60000
heap
page read and write
1CD2D000
stack
page read and write
312D000
trusted library allocation
page read and write
2AEF7340000
heap
page read and write
2EDE000
trusted library allocation
page read and write
1510000
heap
page read and write
37A0000
trusted library allocation
page read and write
2AE000
unkown
page read and write
7FFD9BB40000
trusted library allocation
page read and write
1D5CE000
stack
page read and write
B319CFE000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2D2000
unkown
page readonly
33BE000
stack
page read and write
1BA00000
heap
page read and write
10C3000
heap
page read and write
135FE000
trusted library allocation
page read and write
29A9AF48000
heap
page read and write
CDF000
heap
page read and write
7FFD9BE60000
trusted library allocation
page execute and read and write
1B15000
heap
page read and write
7FFD9BE50000
trusted library allocation
page read and write
182A7000
trusted library allocation
page read and write
2AD2000
trusted library allocation
page read and write
770000
heap
page read and write
7FFD9BD92000
trusted library allocation
page read and write
3A27000
trusted library allocation
page read and write
2C70000
heap
page read and write
EA0000
heap
page read and write
1C9E0000
trusted library section
page read and write
1C9F0000
heap
page read and write
32D9000
trusted library allocation
page read and write
13B7B000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page read and write
1344C000
trusted library allocation
page read and write
2B06000
trusted library allocation
page read and write
7FFD9BC51000
trusted library allocation
page read and write
1A5394C0000
heap
page read and write
3350000
trusted library allocation
page read and write
1A5394F6000
heap
page read and write
28FE000
stack
page read and write
12DC1000
trusted library allocation
page read and write
7FFD9BB56000
trusted library allocation
page read and write
1C6B0000
trusted library section
page read and write
38AE000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1532A000
trusted library allocation
page read and write
7FFD9BE50000
trusted library allocation
page read and write
257A3AF0000
heap
page read and write
1DA84670000
heap
page read and write
33C8000
trusted library allocation
page read and write
165D9D10000
heap
page read and write
2B88000
trusted library allocation
page read and write
7FFD9BB23000
trusted library allocation
page read and write
820000
heap
page read and write
12E7A000
trusted library allocation
page read and write
271000
unkown
page execute read
2B86000
stack
page read and write
7FFD9BBAF000
trusted library allocation
page read and write
2905000
heap
page read and write
4FEE000
stack
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
1D224000
heap
page read and write
1353D000
trusted library allocation
page read and write
2901000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
A8C000
heap
page read and write
2A3000
unkown
page readonly
D1E000
stack
page read and write
16EDBFE000
stack
page read and write
50F0000
heap
page read and write
7FFD9BB8F000
trusted library allocation
page read and write
300E000
stack
page read and write
7FFD9B984000
trusted library allocation
page read and write
7FFD9BB46000
trusted library allocation
page read and write
30C6000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
18226000
trusted library allocation
page read and write
3B63000
trusted library allocation
page read and write
2A2E000
stack
page read and write
1B3AE000
stack
page read and write
291E000
heap
page read and write
189B1709000
heap
page read and write
313D000
heap
page read and write
C3C000
heap
page read and write
7FFD9BBA2000
trusted library allocation
page read and write
257A3D40000
heap
page read and write
7FFD9BD50000
trusted library allocation
page read and write
148B5000
trusted library allocation
page read and write
7FFD9BC69000
trusted library allocation
page read and write
7FFD9BD60000
trusted library allocation
page read and write
32DD000
trusted library allocation
page read and write
1265D000
trusted library allocation
page read and write
7FFD9BBBF000
trusted library allocation
page read and write
1B9A6000
heap
page read and write
2B39000
stack
page read and write
31C0000
heap
page read and write
5241000
heap
page read and write
1BAFA000
heap
page read and write
126CC000
trusted library allocation
page read and write
2904000
heap
page read and write
1B24F000
stack
page read and write
1D21A000
heap
page read and write
7FFD9B996000
trusted library allocation
page read and write
162EA000
trusted library allocation
page read and write
257A3B41000
heap
page read and write
2B0A000
trusted library allocation
page read and write
35D5000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
12798000
trusted library allocation
page read and write
29A9AF3D000
heap
page read and write
2AEF7338000
heap
page read and write
2F55000
heap
page read and write
5200000
heap
page read and write
7FFD9B9C7000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
7FFD9BB2E000
trusted library allocation
page read and write
685BAFE000
stack
page read and write
178D000
heap
page read and write
7FFD9BD90000
trusted library allocation
page read and write
3AEC000
stack
page read and write
7FFD9BC40000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1B8FE000
stack
page read and write
1C07A000
heap
page read and write
30F4000
trusted library allocation
page read and write
2EC3000
trusted library allocation
page read and write
7FFD9BB7A000
trusted library allocation
page read and write
2C13000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page execute and read and write
3254000
trusted library allocation
page read and write
1128000
heap
page read and write
1BEB0000
heap
page read and write
321F000
trusted library allocation
page read and write
1873C000
trusted library allocation
page read and write
7FFD9B9A6000
trusted library allocation
page read and write
17133000
trusted library allocation
page read and write
30E4000
trusted library allocation
page read and write
7FFD9BD40000
trusted library allocation
page read and write
7FFD9BD80000
trusted library allocation
page read and write
16B68000
trusted library allocation
page read and write
2BB4000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
17BC6000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
2C80000
trusted library allocation
page read and write
178B000
heap
page read and write
1D1DA000
heap
page read and write
7FFD9BC28000
trusted library allocation
page read and write
ADC000
heap
page read and write
2E8F000
stack
page read and write
12651000
trusted library allocation
page read and write
2868000
trusted library allocation
page read and write
6CB60FA000
stack
page read and write
2E85000
trusted library allocation
page read and write
7FFD9BAB1000
trusted library allocation
page execute and read and write
1BBFA000
stack
page read and write
257A3B21000
heap
page read and write
2949000
heap
page read and write
1DA844C8000
heap
page read and write
29A9AEB0000
heap
page read and write
257A3B52000
heap
page read and write
409000
unkown
page readonly
1010000
heap
page read and write
133C1000
trusted library allocation
page read and write
310F000
stack
page read and write
286C000
trusted library allocation
page read and write
189B1729000
heap
page read and write
7FFD9BC82000
trusted library allocation
page read and write
1390000
heap
page execute and read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
1165000
heap
page read and write
3B5F000
trusted library allocation
page read and write
1885E000
trusted library allocation
page read and write
173A5000
trusted library allocation
page read and write
13389000
trusted library allocation
page read and write
16C28000
trusted library allocation
page read and write
4FA0000
heap
page read and write
33B1000
trusted library allocation
page read and write
7FFD9BBDD000
trusted library allocation
page read and write
2954000
heap
page read and write
295B000
heap
page read and write
2911000
heap
page read and write
189B171D000
heap
page read and write
1C04C000
heap
page read and write
7FFD9BBD2000
trusted library allocation
page read and write
2EBC000
stack
page read and write
7FFD9BB50000
trusted library allocation
page read and write
14DE000
stack
page read and write
189B171E000
heap
page read and write
19174000
trusted library allocation
page read and write
7FFD9BD82000
trusted library allocation
page read and write
7FFD9BE43000
trusted library allocation
page read and write
1C950000
heap
page read and write
31CB000
heap
page read and write
F5F25FE000
stack
page read and write
33E0000
heap
page read and write
372F000
stack
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
9CF000
heap
page read and write
E1E000
stack
page read and write
31CA000
heap
page read and write
167AA000
trusted library allocation
page read and write
7FFD9BD4F000
trusted library allocation
page read and write
1A539460000
heap
page read and write
2DA4000
trusted library allocation
page read and write
2E70000
heap
page read and write
2CCB000
trusted library allocation
page read and write
1835C260000
heap
page read and write
1DA84675000
heap
page read and write
AF6000
stack
page read and write
3290000
trusted library allocation
page read and write
1B4F0000
heap
page execute and read and write
15B6D000
trusted library allocation
page read and write
1B96C000
heap
page read and write
1C8AA000
stack
page read and write
2B95000
trusted library allocation
page read and write
7FFD9BBFE000
trusted library allocation
page read and write
7FFD9BE20000
trusted library allocation
page read and write
189B1720000
heap
page read and write
5247000
heap
page read and write
7FFD9BCA2000
trusted library allocation
page read and write
133F5000
trusted library allocation
page read and write
2AEF72F6000
heap
page read and write
35CD000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
3110000
heap
page read and write
7FFD9BAC8000
trusted library allocation
page execute and read and write
BDE000
stack
page read and write
7FFD9BC20000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
13510000
trusted library allocation
page read and write
28F1000
heap
page read and write
7FFD9BC4B000
trusted library allocation
page read and write
790000
heap
page read and write
7FFD9BA46000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7FFD9BD70000
trusted library allocation
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
7FFD9BB80000
trusted library allocation
page read and write
28C8000
heap
page read and write
2EF2000
stack
page read and write
B3199FE000
stack
page read and write
17EC5000
trusted library allocation
page read and write
2E37000
trusted library allocation
page read and write
29A9AF5B000
heap
page read and write
7FFD9BE20000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
189B1711000
heap
page read and write
7FFD9BC2C000
trusted library allocation
page read and write
7FFD9BBF8000
trusted library allocation
page read and write
31AE000
trusted library allocation
page read and write
685B9FF000
stack
page read and write
99B8FC000
stack
page read and write
2DA9000
trusted library allocation
page read and write
1A53AEA0000
heap
page read and write
17763000
trusted library allocation
page read and write
2CC0000
heap
page read and write
2944000
heap
page read and write
189B1714000
heap
page read and write
38EC000
trusted library allocation
page read and write
7FFD9BD1A000
trusted library allocation
page read and write
2920000
heap
page read and write
7FFD9B9BB000
trusted library allocation
page execute and read and write
7FFD9BC70000
trusted library allocation
page read and write
7FFD9BD6F000
trusted library allocation
page read and write
E9FB8FD000
stack
page read and write
A75000
heap
page read and write
7FFD9BB43000
trusted library allocation
page read and write
257A3AFB000
heap
page read and write
2FC3000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
7FFD9BD70000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
31B6000
trusted library allocation
page read and write
685B13A000
stack
page read and write
3B67000
trusted library allocation
page read and write
17CA6000
trusted library allocation
page read and write
2639000
heap
page read and write
19B000
stack
page read and write
895000
heap
page read and write
128AB000
trusted library allocation
page read and write
CDF000
stack
page read and write
34AD000
trusted library allocation
page read and write
3564000
trusted library allocation
page read and write
1C000000
trusted library section
page read and write
B31A0FE000
stack
page read and write
257A3B21000
heap
page read and write
313E000
heap
page read and write
7FFD9BC32000
trusted library allocation
page read and write
1C99B000
heap
page read and write
1BA2E000
stack
page read and write
2ECD000
trusted library allocation
page read and write
13B7E000
trusted library allocation
page read and write
31D1000
heap
page read and write
17604000
trusted library allocation
page read and write
7FFD9B9DD000
trusted library allocation
page execute and read and write
30A6000
trusted library allocation
page read and write
30A2000
trusted library allocation
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
1B94E000
stack
page read and write
189B16C8000
heap
page read and write
2AEF7356000
heap
page read and write
7FFD9BB97000
trusted library allocation
page read and write
7FFD9BC38000
trusted library allocation
page read and write
12DB5000
trusted library allocation
page read and write
760000
heap
page read and write
295B000
heap
page read and write
7FFD9B99C000
trusted library allocation
page read and write
3054000
trusted library allocation
page read and write
13449000
trusted library allocation
page read and write
35C5000
trusted library allocation
page read and write
320A000
heap
page read and write
3149000
heap
page read and write
174F2000
trusted library allocation
page read and write
1028000
heap
page read and write
2AD0000
trusted library allocation
page read and write
7FFD9BE52000
trusted library allocation
page read and write
3AEB000
trusted library allocation
page read and write
28F0000
heap
page read and write
7FFD9BB4B000
trusted library allocation
page read and write
392E000
trusted library allocation
page read and write
29A9AF30000
heap
page read and write
189B16CD000
heap
page read and write
1390F000
trusted library allocation
page read and write
30A0000
heap
page read and write
29A9AF30000
heap
page read and write
29A9AF32000
heap
page read and write
2FB1000
trusted library allocation
page read and write
2BEC000
trusted library allocation
page read and write
7FFD9BC8C000
trusted library allocation
page read and write
126DA000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
7FFD9BE53000
trusted library allocation
page read and write
1BF2E000
stack
page read and write
1315D000
trusted library allocation
page read and write
14F82000
trusted library allocation
page read and write
2694000
trusted library allocation
page read and write
2AEF733B000
heap
page read and write
324C000
stack
page read and write
29A9AEF6000
heap
page read and write
7FFD9B9D4000
trusted library allocation
page read and write
7FFD9BC16000
trusted library allocation
page read and write
37AF000
trusted library allocation
page read and write
7FFD9BE6F000
trusted library allocation
page read and write
35D9000
trusted library allocation
page read and write
23F6000
heap
page read and write
154F2000
trusted library allocation
page read and write
9B000
stack
page read and write
2BFE000
trusted library allocation
page read and write
314C000
stack
page read and write
7FFD9BD20000
trusted library allocation
page read and write
176FC000
trusted library allocation
page read and write
FF0000
heap
page read and write
191F000
stack
page read and write
5236000
heap
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
17A62000
trusted library allocation
page read and write
2D3000
unkown
page readonly
7FFD9BC10000
trusted library allocation
page read and write
290F000
heap
page read and write
1835C4DB000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
1D6CE000
stack
page read and write
1C109000
heap
page read and write
2820000
heap
page execute and read and write
7FFD9BE33000
trusted library allocation
page read and write
2AA2000
trusted library allocation
page read and write
2AEF7340000
heap
page read and write
1CF2C000
stack
page read and write
7FFD9BD3F000
trusted library allocation
page read and write
3415000
trusted library allocation
page read and write
7FFD9BB64000
trusted library allocation
page read and write
6CB64FE000
stack
page read and write
14D75000
trusted library allocation
page read and write
1B3F0000
trusted library allocation
page read and write
2BBA000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
1C2DE000
stack
page read and write
257A3B40000
heap
page read and write
7FFD9BB3C000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page execute and read and write
7FFD9BC67000
trusted library allocation
page read and write
1342B000
trusted library allocation
page read and write
12E4F000
trusted library allocation
page read and write
31D6000
trusted library allocation
page read and write
198B000
heap
page read and write
99B9FF000
stack
page read and write
7FFD9BB5B000
trusted library allocation
page read and write
1DA843F0000
heap
page read and write
1B94E000
stack
page read and write
7FFD9B997000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
7FFD9BD7B000
trusted library allocation
page read and write
14F5000
heap
page read and write
15E7B000
trusted library allocation
page read and write
C1A000
heap
page read and write
1D22F000
heap
page read and write
7FFD9BD90000
trusted library allocation
page execute and read and write
3400000
heap
page execute and read and write
7FFD9B993000
trusted library allocation
page execute and read and write
1BF8D000
stack
page read and write
7FFD9BC20000
trusted library allocation
page read and write
1481D000
trusted library allocation
page read and write
2906000
heap
page read and write
343E000
stack
page read and write
7FFD9BE00000
trusted library allocation
page read and write
1D63D000
stack
page read and write
1200000
heap
page read and write
189B16F0000
heap
page read and write
A70000
heap
page read and write
7FF7605C7000
unkown
page readonly
32DF000
trusted library allocation
page read and write
1B79D000
heap
page read and write
151F4000
trusted library allocation
page read and write
1202000
heap
page read and write
12653000
trusted library allocation
page read and write
32F0000
heap
page read and write
1D240000
heap
page read and write
2D9E000
stack
page read and write
34B1000
trusted library allocation
page read and write
7FF7605B1000
unkown
page execute read
2AEF735B000
heap
page read and write
28E0000
heap
page read and write
1CA57000
heap
page read and write
1D53E000
stack
page read and write
7FFD9BE50000
trusted library allocation
page read and write
32C2000
trusted library allocation
page read and write
9AE000
heap
page read and write
7FFD9BAC1000
trusted library allocation
page execute and read and write
1088000
heap
page read and write
E9E000
stack
page read and write
13446000
trusted library allocation
page read and write
7FFD9BC8F000
trusted library allocation
page read and write
1600000
heap
page read and write
7FFD9BBE2000
trusted library allocation
page read and write
1BFE0000
trusted library section
page read and write
257A3CA0000
heap
page read and write
343A000
trusted library allocation
page read and write
2BF0000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
17F58000
trusted library allocation
page read and write
1C2A3000
stack
page read and write
1B945000
heap
page read and write
7FF7605B1000
unkown
page execute read
7FFD9BAE7000
trusted library allocation
page execute and read and write
B5D000
heap
page read and write
A20000
heap
page read and write
2F54000
trusted library allocation
page read and write
3206000
heap
page read and write
13ABB000
trusted library allocation
page read and write
2A40000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
257A3AFE000
heap
page read and write
7FFD9BE5F000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page read and write
1120000
heap
page read and write
9A9000
heap
page read and write
1751D000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
2AEF7349000
heap
page read and write
330F000
stack
page read and write
29A9AEF6000
heap
page read and write
189B170F000
heap
page read and write
B9E000
stack
page read and write
1530000
heap
page read and write
257A3B6E000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
1BCAA000
stack
page read and write
13594000
trusted library allocation
page read and write
126DD000
trusted library allocation
page read and write
257A3B1A000
heap
page read and write
14BC4000
trusted library allocation
page read and write
1DA844C0000
heap
page read and write
7FFD9BC6A000
trusted library allocation
page read and write
1835C268000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
133ED000
trusted library allocation
page read and write
1ABEE000
stack
page read and write
1AEA0000
trusted library allocation
page read and write
7FFD9BB43000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
39AF000
stack
page read and write
29A9C860000
heap
page read and write
1822E000
trusted library allocation
page read and write
7FFD9BE50000
trusted library allocation
page execute and read and write
1B8A0000
heap
page read and write
288B000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
534B000
stack
page read and write
165F8000
trusted library allocation
page read and write
7FFD9BE6A000
trusted library allocation
page read and write
1C4B0000
heap
page read and write
30D1000
trusted library allocation
page read and write
1B8B0000
heap
page read and write
134BD000
trusted library allocation
page read and write
7FFD9BC7F000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FF7605B0000
unkown
page readonly
1204000
heap
page read and write
31D2000
trusted library allocation
page read and write
2460000
heap
page read and write
152C2000
trusted library allocation
page read and write
2DB0000
heap
page execute and read and write
7D5000
heap
page read and write
1A5394A0000
heap
page read and write
14089000
trusted library allocation
page read and write
7FFD9BD62000
trusted library allocation
page read and write
292A000
heap
page read and write
257A3B2A000
heap
page read and write
314F000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
2AEF7260000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
1285D000
trusted library allocation
page read and write
2C64000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
16E25000
trusted library allocation
page read and write
175EB000
trusted library allocation
page read and write
1D18E000
stack
page read and write
379A000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
7FFD9BDA0000
trusted library allocation
page execute and read and write
7FFD9BC5A000
trusted library allocation
page read and write
B319AFE000
stack
page read and write
1B7F3000
stack
page read and write
7FFD9BB66000
trusted library allocation
page read and write
1D4BD000
stack
page read and write
1108000
heap
page read and write
2390000
heap
page read and write
F5F2CFF000
stack
page read and write
1F0000
heap
page read and write
3034000
heap
page read and write
2BBE000
stack
page read and write
2AEF7337000
heap
page read and write
530F000
stack
page read and write
189B16F0000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
29A9CBF0000
heap
page read and write
7FFD9BC15000
trusted library allocation
page read and write
94E000
stack
page read and write
AA799FD000
stack
page read and write
7FFD9BB50000
trusted library allocation
page read and write
1BA20000
heap
page read and write
165D9C10000
heap
page read and write
7FFD9BE56000
trusted library allocation
page read and write
7FFD9BE26000
trusted library allocation
page read and write
DD6000
stack
page read and write
292A000
heap
page read and write
153F0000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
13D0000
heap
page read and write
18845000
trusted library allocation
page read and write
13CCA000
trusted library allocation
page read and write
7FFD9BD8B000
trusted library allocation
page read and write
7FFD9BE90000
trusted library allocation
page execute and read and write
386A000
trusted library allocation
page read and write
167B000
heap
page read and write
7FFD9BB9F000
trusted library allocation
page read and write
18E1D000
trusted library allocation
page read and write
189B16D6000
heap
page read and write
7FFD9BB2C000
trusted library allocation
page read and write
7FFD9BBD7000
trusted library allocation
page read and write
7FFD9BC4E000
trusted library allocation
page read and write
2AEF731A000
heap
page read and write
400000
unkown
page readonly
38EE000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
296F000
heap
page read and write
7C67FFF000
stack
page read and write
7FFD9BB60000
trusted library allocation
page read and write
26CC000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
7FFD9BBC4000
trusted library allocation
page read and write
1D1E1000
heap
page read and write
1A50000
heap
page execute and read and write
296F000
heap
page read and write
12B00000
trusted library allocation
page read and write
9A0000
heap
page read and write
7FFD9BAB8000
trusted library allocation
page execute and read and write
7B8000
heap
page read and write
313C000
heap
page read and write
567E000
stack
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
1B8F3000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
F5F2AFE000
stack
page read and write
1BED9000
stack
page read and write
3164000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
BD0000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
3030000
heap
page read and write
7FFD9BC5F000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7FFD9BD50000
trusted library allocation
page read and write
7FFD9BE4E000
trusted library allocation
page read and write
2913000
heap
page read and write
1C9F0000
trusted library section
page read and write
295B000
heap
page read and write
E30000
unkown
page readonly
313C000
heap
page read and write
1BA53000
heap
page read and write
24C0000
heap
page execute and read and write
1C730000
trusted library section
page read and write
3124000
trusted library allocation
page read and write
7FFD9BD40000
trusted library allocation
page read and write
DE0000
heap
page read and write
38EA000
trusted library allocation
page read and write
29A9AF1A000
heap
page read and write
1BBFD000
stack
page read and write
AA79CFF000
stack
page read and write
7FFD9B9AC000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
2949000
heap
page read and write
1BAE1000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
257A3B07000
heap
page read and write
3201000
heap
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
7FFD9BD9B000
trusted library allocation
page read and write
257A3AEB000
heap
page read and write
2AEF72DB000
heap
page read and write
7FFD9BB77000
trusted library allocation
page read and write
7FFD9BC01000
trusted library allocation
page read and write
1830000
heap
page read and write
1CC55000
stack
page read and write
1BD90000
heap
page read and write
2AEF734B000
heap
page read and write
1B80F000
stack
page read and write
2912000
heap
page read and write
4D6087E000
stack
page read and write
13535000
trusted library allocation
page read and write
257A3B3B000
heap
page read and write
32D3000
trusted library allocation
page read and write
E30000
unkown
page readonly
7FFD9B9A3000
trusted library allocation
page execute and read and write
CE5000
heap
page read and write
1A1E000
stack
page read and write
257A5630000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
257A3B49000
heap
page read and write
7FFD9BD90000
trusted library allocation
page read and write
C3A000
heap
page read and write
7FFD9BE83000
trusted library allocation
page read and write
1835DD70000
heap
page read and write
22AB9A34000
heap
page read and write
12BA5000
trusted library allocation
page read and write
7FFD9BB61000
trusted library allocation
page read and write
7FFD9BBE5000
trusted library allocation
page read and write
14F6000
stack
page read and write
36E2000
trusted library allocation
page read and write
7FF7605C7000
unkown
page readonly
17646000
trusted library allocation
page read and write
257A3B1E000
heap
page read and write
7FFD9BE40000
trusted library allocation
page read and write
28E8000
heap
page read and write
17928000
trusted library allocation
page read and write
257A3B66000
heap
page read and write
15290000
trusted library allocation
page read and write
32DB000
trusted library allocation
page read and write
2954000
heap
page read and write
2940000
trusted library allocation
page read and write
7FFD9BC89000
trusted library allocation
page read and write
2BEA000
trusted library allocation
page read and write
7FFD9BC18000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page read and write
30C3000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
13070000
trusted library allocation
page read and write
1185000
heap
page read and write
290E000
heap
page read and write
105B000
heap
page read and write
1C6AF000
unkown
page read and write
115D000
heap
page read and write
2AEF730F000
heap
page read and write
ABB000
heap
page read and write
1C9D0000
trusted library section
page read and write
316D000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
1B6F4000
stack
page read and write
33FE000
stack
page read and write
7FFD9BD46000
trusted library allocation
page read and write
31C9000
heap
page read and write
2AEF72E0000
heap
page read and write
1764C000
trusted library allocation
page read and write
AA9000
heap
page read and write
2904000
heap
page read and write
A75000
heap
page read and write
7FF7605BF000
unkown
page readonly
7FFD9B9BD000
trusted library allocation
page execute and read and write
7FFD9BB53000
trusted library allocation
page read and write
5230000
heap
page read and write
2C17000
trusted library allocation
page read and write
18244000
trusted library allocation
page read and write
1BAAD000
stack
page read and write
1D0AE000
stack
page read and write
7FFD9BC72000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1C9AA000
stack
page read and write
13D5000
heap
page read and write
7FFD9BE90000
trusted library allocation
page execute and read and write
257A3B3B000
heap
page read and write
7FFD9BAA8000
trusted library allocation
page execute and read and write
1BDF0000
trusted library section
page read and write
15134000
trusted library allocation
page read and write
189B1749000
heap
page read and write
21794FF6000
heap
page read and write
DC0000
heap
page read and write
2AEF7310000
heap
page read and write
1BE9E000
stack
page read and write
2AEF72EC000
heap
page read and write
7FFD9BAAA000
trusted library allocation
page execute and read and write
7FFD9BBE0000
trusted library allocation
page read and write
29A9AF31000
heap
page read and write
1C0A0000
heap
page execute and read and write
F5F28FF000
stack
page read and write
1BEAE000
stack
page read and write
15F2B000
trusted library allocation
page read and write
379C000
trusted library allocation
page read and write
134AE000
trusted library allocation
page read and write
1790000
heap
page read and write
7FFD9BCA5000
trusted library allocation
page read and write
C65000
heap
page read and write
7FFD9BB2C000
trusted library allocation
page read and write
C67000
heap
page read and write
1BFF0000
trusted library section
page read and write
7FFD9BAE1000
trusted library allocation
page execute and read and write
104B000
heap
page read and write
2705000
trusted library allocation
page read and write
2944000
heap
page read and write
2AEF72F6000
heap
page read and write
29A9AF5F000
heap
page read and write
17E98000
trusted library allocation
page read and write
C00000
heap
page read and write
1CA4F000
heap
page read and write
175CD000
trusted library allocation
page read and write
1361A000
trusted library allocation
page read and write
257A3B46000
heap
page read and write
2901000
heap
page read and write
C08000
heap
page read and write
29A9AF49000
heap
page read and write
2AEF7290000
heap
page read and write
15032000
trusted library allocation
page read and write
1840000
heap
page read and write
166F000
heap
page read and write
1B920000
heap
page read and write
7FFD9BD08000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
1C093000
stack
page read and write
2BF0000
trusted library allocation
page read and write
257A3B48000
heap
page read and write
292A000
heap
page read and write
152F5000
trusted library allocation
page read and write
1CA00000
trusted library section
page read and write
7FFD9BD52000
trusted library allocation
page read and write
2B08000
trusted library allocation
page read and write
7FFD9BB36000
trusted library allocation
page read and write
2949000
heap
page read and write
257A3B40000
heap
page read and write
190C2000
trusted library allocation
page read and write
7FFD9BBB2000
trusted library allocation
page read and write
257A3B07000
heap
page read and write
3134000
heap
page read and write
183D1000
trusted library allocation
page read and write
3AED000
trusted library allocation
page read and write
1C780000
trusted library section
page read and write
7FFD9BBEC000
trusted library allocation
page read and write
257A3B2B000
heap
page read and write
1835C4D5000
heap
page read and write
A70000
heap
page read and write
3A3F000
trusted library allocation
page read and write
7FFD9BE16000
trusted library allocation
page read and write
3334000
trusted library allocation
page read and write
29A9AF3F000
heap
page read and write
12901000
trusted library allocation
page read and write
2DC4000
trusted library allocation
page read and write
1A539495000
heap
page read and write
7FFD9BE20000
trusted library allocation
page read and write
29A9AF34000
heap
page read and write
14805000
trusted library allocation
page read and write
135E5000
trusted library allocation
page read and write
6CB66FF000
stack
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
7FFD9BE70000
trusted library allocation
page read and write
1170000
heap
page read and write
12E81000
trusted library allocation
page read and write
1C11C000
heap
page read and write
1CA91000
heap
page read and write
1C9B0000
trusted library section
page read and write
12E81000
trusted library allocation
page read and write
3252000
trusted library allocation
page read and write
1BE81000
stack
page read and write
765000
heap
page read and write
321F000
heap
page read and write
292D000
heap
page read and write
7FFD9BADA000
trusted library allocation
page execute and read and write
1AEB0000
trusted library allocation
page read and write
2925000
heap
page read and write
2AEF730D000
heap
page read and write
189B16DB000
heap
page read and write
189B1714000
heap
page read and write
17C86000
trusted library allocation
page read and write
2AEF730A000
heap
page read and write
1ADF0000
trusted library allocation
page read and write
174B000
heap
page read and write
13325000
trusted library allocation
page read and write
14C74000
trusted library allocation
page read and write
EF6000
stack
page read and write
257A3B5E000
heap
page read and write
12813000
trusted library allocation
page read and write
126D1000
trusted library allocation
page read and write
181CC000
trusted library allocation
page read and write
7FFD9BE6C000
trusted library allocation
page read and write
308B000
stack
page read and write
9AE000
heap
page read and write
685B7FE000
stack
page read and write
7FFD9BC80000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
7FF7605B0000
unkown
page readonly
BE0000
trusted library allocation
page read and write
7FFD9BB2C000
trusted library allocation
page read and write
1C55E000
heap
page read and write
9AA000
heap
page read and write
ADA000
heap
page read and write
98E000
stack
page read and write
158B0000
trusted library allocation
page read and write
1D1FC000
heap
page read and write
7FFD9B9AB000
trusted library allocation
page execute and read and write
7FFD9B9A4000
trusted library allocation
page read and write
164AB000
trusted library allocation
page read and write
7FFD9BC79000
trusted library allocation
page read and write
595F000
stack
page read and write
2EB9000
trusted library allocation
page read and write
1187000
heap
page read and write
1BB8E000
stack
page read and write
1A539490000
heap
page read and write
7FFD9BE36000
trusted library allocation
page read and write
189B170F000
heap
page read and write
7FFD9BE4E000
trusted library allocation
page read and write
173F000
heap
page read and write
1A900000
trusted library allocation
page read and write
19B000
stack
page read and write
5210000
trusted library allocation
page read and write
1CE2F000
stack
page read and write
7FFD9BD61000
trusted library allocation
page read and write
7FFD9BE77000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1C1AF000
stack
page read and write
7FFD9BE3A000
trusted library allocation
page read and write
189B16D6000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
1B2ED000
stack
page read and write
2AEF7332000
heap
page read and write
6CB61FE000
stack
page read and write
3118000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
15ABD000
trusted library allocation
page read and write
12E7D000
trusted library allocation
page read and write
685B6FD000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
1BE00000
trusted library section
page read and write
7FFD9B9B7000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
A65000
heap
page read and write
2928000
heap
page read and write
2AEF7332000
heap
page read and write
21796AE0000
heap
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
188C8000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
1521D000
trusted library allocation
page read and write
295B000
heap
page read and write
2AEF7344000
heap
page read and write
7FFD9BB64000
trusted library allocation
page read and write
1760000
heap
page read and write
2AEF7340000
heap
page read and write
189B16D6000
heap
page read and write
17A8D000
trusted library allocation
page read and write
290F000
heap
page read and write
191D6000
trusted library allocation
page read and write
181E000
stack
page read and write
139BC000
trusted library allocation
page read and write
1BC8B000
stack
page read and write
2C84000
trusted library allocation
page read and write
7FFD9BCCD000
trusted library allocation
page read and write
22AB9980000
heap
page read and write
1D3BE000
stack
page read and write
1BA4E000
stack
page read and write
4D605FF000
stack
page read and write
30CB000
trusted library allocation
page read and write
2FAF000
trusted library allocation
page read and write
816000
heap
page read and write
7FFD9BE30000
trusted library allocation
page read and write
1BB44000
stack
page read and write
1D01F000
heap
page read and write
1281B000
trusted library allocation
page read and write
7FFD9BB31000
trusted library allocation
page read and write
31C8000
heap
page read and write
2AEF8CC0000
heap
page read and write
D90000
heap
page read and write
2C66000
trusted library allocation
page read and write
2954000
heap
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
29A9AF3F000
heap
page read and write
1CFD9000
heap
page read and write
3054000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
13E7C000
trusted library allocation
page read and write
1279D000
trusted library allocation
page read and write
B319DFF000
stack
page read and write
1C3A5000
stack
page read and write
189B1728000
heap
page read and write
1130000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page execute and read and write
E9FBCFF000
stack
page read and write
7FFD9BC92000
trusted library allocation
page read and write
A25000
heap
page read and write
257A3B1E000
heap
page read and write
2944000
heap
page read and write
264E000
stack
page read and write
7FFD9BC99000
trusted library allocation
page read and write
7FFD9B9CB000
trusted library allocation
page execute and read and write
7FFD9BC60000
trusted library allocation
page read and write
1B959000
heap
page read and write
13B4C000
trusted library allocation
page read and write
17BB6000
trusted library allocation
page read and write
2B83000
trusted library allocation
page read and write
1BA91000
heap
page read and write
1751000
heap
page read and write
13A0000
trusted library allocation
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
12BB0000
trusted library allocation
page read and write
7FFD9BD50000
trusted library allocation
page read and write
3030000
heap
page read and write
13418000
trusted library allocation
page read and write
7FFD9BE90000
trusted library allocation
page execute and read and write
7C680FF000
stack
page read and write
16EDAFD000
stack
page read and write
1B2CE000
stack
page read and write
314F000
heap
page read and write
2944000
heap
page read and write
1B146000
heap
page read and write
408000
unkown
page readonly
145F9000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
17706000
trusted library allocation
page read and write
187C4000
trusted library allocation
page read and write
1D273000
heap
page read and write
3480000
heap
page read and write
1358A000
trusted library allocation
page read and write
13B65000
trusted library allocation
page read and write
7FFD9BE40000
trusted library allocation
page read and write
179D8000
trusted library allocation
page read and write
3149000
heap
page read and write
2AEF72F6000
heap
page read and write
2D34000
trusted library allocation
page read and write
FD0000
heap
page read and write
E50000
heap
page read and write
7FFD9BE90000
trusted library allocation
page read and write
189B170A000
heap
page read and write
7FFD9BD28000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
172C000
heap
page read and write
189B16F9000
heap
page read and write
405000
unkown
page write copy
1C3DE000
stack
page read and write
13558000
trusted library allocation
page read and write
314F000
heap
page read and write
1BFBE000
stack
page read and write
1D034000
heap
page read and write
21794F20000
heap
page read and write
6CB67FE000
stack
page read and write
1645000
heap
page read and write
7FFD9BE2F000
trusted library allocation
page read and write
1149000
heap
page read and write
296F000
heap
page read and write
7FFD9BB3E000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
1423A000
trusted library allocation
page read and write
31C8000
heap
page read and write
7FFD9BD70000
trusted library allocation
page read and write
189B1744000
heap
page read and write
1B10000
heap
page read and write
2AEF7319000
heap
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
7FFD9BB5C000
trusted library allocation
page read and write
3209000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1C027000
stack
page read and write
1D28D000
stack
page read and write
7FFD9B994000
trusted library allocation
page read and write
2AEF7349000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9B9A7000
trusted library allocation
page read and write
175A2000
trusted library allocation
page read and write
7FFD9BD20000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
7FFD9BB8C000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
1D000000
heap
page read and write
7FFD9BE06000
trusted library allocation
page read and write
189B1710000
heap
page read and write
311E000
trusted library allocation
page read and write
2AEF72ED000
heap
page read and write
22AB99A0000
heap
page read and write
171E3000
trusted library allocation
page read and write
6CB62FF000
stack
page read and write
189B18C0000
heap
page read and write
1A40000
trusted library allocation
page read and write
4D6057C000
stack
page read and write
131E000
stack
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
7FFD9BB73000
trusted library allocation
page read and write
1B913000
heap
page read and write
34AB000
trusted library allocation
page read and write
There are 2288 hidden memdumps, click here to show them.