IOC Report
as-installer-7.0.2594-web.exe

loading gif

Files

File Path
Type
Category
Malicious
as-installer-7.0.2594-web.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\Xeam.VisualInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\AtmelStudio_7.0.2594\AS_20240425230623.log
ASCII text, with CRLF, LF line terminators
modified
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1028\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1029\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1030\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1031\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1032\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1035\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1036\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1038\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1040\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1041\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1042\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1043\mbapreq.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1044\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1045\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1046\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1049\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1051\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1053\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1055\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\1060\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\2052\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\2070\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\3082\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (606), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\BootstrapperCore.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\BootstrapperCore.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\Configuration.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\License.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\Xeam.DummyLicenseValidator.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\Xeam.VisualInstaller.Data.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\Xeam.VisualInstaller.SystemValidation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\as-bootstrapper.Ui.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\en-US.wxl
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\mbahost.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\mbapreq.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\mbapreq.png
PNG image data, 63 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\mbapreq.thm
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\mbapreq.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\notok.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\ok.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\systemvalidation_en-US.wxl
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{d92df7bb-bc43-4267-a5fe-1ba3bdf1a813}\.ba1\warning.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
There are 35 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\as-installer-7.0.2594-web.exe
"C:\Users\user\Desktop\as-installer-7.0.2594-web.exe"
malicious
C:\Users\user\Desktop\as-installer-7.0.2594-web.exe
"C:\Users\user\Desktop\as-installer-7.0.2594-web.exe" -burn.unelevated BurnPipe.{D84EEA79-1F13-4715-8116-E5DD7E6F96FB} {86C0AC07-21D7-4C0B-B966-E37DDFE95ADA} 7504
malicious

URLs

Name
IP
Malicious
http://www.gnu.org/licenses/lgpl.htmlLR
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/7.0.2594/driver-atmel-installer-x86-7.0.2594.msi
unknown
http://defaultcontainer/Xeam.Base.UI;component/Styles/Controls.Buttons.xamld
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/7.0.2594/avr32toolchain-7.0.2594.7zXzN
unknown
http://www.xeam-solutions.com/products/visual-installer.html
unknown
http://ww1.microchip.com/downloads/en/DeviceDoc/Getting-Started-with-Atmel-Studio7.pdf
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/xc8-installer-v2.36-win.x64.exe
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:Sequences
unknown
http://www.laika42.com/schemas/visualinstaller/updateinfo/1.0:UpdateInfo
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:PasswordVariable
unknown
http://opensource.org/licenses/apache2.0.phpLR
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:SqlServerConnection
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:Pages
unknown
https://github.cLR
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:FolderValidation
unknown
http://www.opensource.org/licenses/mit-license.php
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/7.0.2594/avrtoolchain-7.0.2594.7z
unknown
http://Laika42.License.PrivateKeyFile
unknown
https://github.com/JamesNK/Newtonsoft.Json/blob/master/LICENSE.md
unknown
http://www.laika42.com/BootstrapperConfiguration.xsdl
unknown
http://www.opensource.org/licenses/UoI-NCSA.phpLR
unknown
http://www.gnu.org/licenses/lgpl.htmla
unknown
http://www.gnu.org/licenses/lgpl.htmld
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:ThemeBase
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:LogDir
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/7.0.2594/avr32toolchain-7.0.2594.msi
unknown
http://www.gnu.org/licenses/lgpl.htmlo
unknown
http://mvvmlight.codeplex.com/license
unknown
http://www.opensource.org/licenses/UoI-NCSA.php
unknown
http://www.gnu.org/licenses/lgpl.htmlv
unknown
http://mvvmlight.codeplex.com/licenseo
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:LaunchCommand
unknown
http://www.gnu.org/licenses/lgpl.htmlt
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:UserNameVariable
unknown
http://www.opensource.org/licenses/mit-license.phpJ
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:ShowInstallDirSelection
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/7.0.2594/as-installer-7.0.2594-web.exe
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/7.0.2594/sampacks-7.0I
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:InputMaskSectionLength
unknown
http://www.laika42.com/schemas/visualinstaller/updateinfo/1.0:DownloadUrl
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:InstallWelcome
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:UpdateAvailable
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:PathSelection//www.laika42.com/BootstrapperConf
unknown
https://github.com/JamesNK/Newtonsoft.Json/blob/master/LICENSE.mdLR
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:PathSelection
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:WiXToolsetVersionk:Deactivated
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:LicenseValidation
unknown
http://defaultcontainer/Xeam.Base.UI;component/Styles/Colours.xamld
unknown
http://test.laika42.com/update/testsetup.exe
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:QueryDatabase
unknown
http://www.microchip.comLR
unknown
http://www.gnu.org/licenses/lgpl.html
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:LaunchProductEnabled
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:UI
unknown
http://foo/bar/styles/controls.baml
unknown
http://foo/bar/styles/controls.bamld
unknown
http://www.laika42.com/schemas/visualinstaller/updateinfo/1.0:DownloadSize
unknown
https://microchipsupport.force.com/s/article/Atmel-Studio-intallation-error-specified-account-exists
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:Laika42.Wix.Bootstrapper;
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:LicenseClassWithNamespace
unknown
https://imr.xeam-solutions.com/receiver.aspx
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:LaunchCommandl
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:TempDirVariable
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:SendMetricsDefault
unknown
http://schemas.datacontract.org/2004/07/Laika42.Base.Documents
unknown
http://www.laika42.com/schemas/visualinstaller/updateinfo/1.0::False:
unknown
http://www.atmel.com/About/privacy.aspx
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:InstallMetrics
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:DataDir
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:DatabaseNameVariable
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:InstallDirVariable
unknown
http://www.boost.org/users/license.html:
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:AccentContrastColor
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:Laika42.Wix.Bootstrapper
unknown
http://www.laika42.com/schemas/visualinstaller/updateinfo/1.0:Description
unknown
https://dotnetzip.codeplex.com/licenseLR
unknown
https://www.microchip.com/mplab/compilers?utm_source=StudioXC8&utm_medium=Install&utm_campaign=Studi
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/7.0.2594/avrpacks-7.0.2594.7z
unknown
http://foo/bar/styles/controls.scrollbars.bamld
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:FinishError
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/7.0.2594/driver-libusb0-installer-x64-7.0.2594.msi
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:OutlookVersion
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/visual-studio-isolated-shell-14.0.23107.10.exe
unknown
http://Laika42.License.LicenseInfoObject
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:InstanceNameVariable
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:LayoutWelcome
unknown
http://www.laika42.com/schemas/visualinstaller/updateinfo/1.0:Descri
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd$
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:ShowSendMetrics
unknown
http://www.wixtoolset.org
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:VisioVersion
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/7
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd#Configuration.xml
unknown
http://www.laika42.com/BootstrapperConfiguration.xsd:Laika42.Wix.Bootstrapper:False:l
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/7.0.2594/driver-segger-installer-x64-7.0.2594.msi
unknown
http://cs-g2-crl.thawte.com/ThawteCSG2.crl0
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://s3-us-west-2.amazonaws.com/atmel-studio/7.0.2594/avr32packs-7.0.2594.7z
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s3-us-west-2.amazonaws.com
52.92.181.152

IPs

IP
Domain
Country
Malicious
52.92.181.152
s3-us-west-2.amazonaws.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\VisualInstaller
id
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\as-installer-7_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\VisualInstaller
SendMetrics_cc644864-ecc1-4925-a8b2-b9ab11b59943
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
40D8000
heap
page read and write
E59B000
heap
page read and write
E3FF000
heap
page read and write
E496000
heap
page read and write
7490000
trusted library allocation
page read and write
B84B000
heap
page read and write
B8AC000
heap
page read and write
73D0000
trusted library allocation
page read and write
E33F000
heap
page read and write
40EB000
heap
page read and write
B7AB000
heap
page read and write
B75C000
heap
page read and write
7220000
trusted library allocation
page read and write
40DF000
heap
page read and write
DB70000
heap
page read and write
7490000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
40BA000
heap
page read and write
7750000
trusted library allocation
page read and write
B743000
heap
page read and write
7490000
trusted library allocation
page read and write
B8C1000
heap
page read and write
BAC0000
heap
page read and write
73D0000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
BA2E000
heap
page read and write
E0FF000
heap
page read and write
7116000
heap
page read and write
7400000
trusted library allocation
page read and write
BA13000
heap
page read and write
E798000
heap
page read and write
B8A4000
heap
page read and write
E16B000
heap
page read and write
E706000
heap
page read and write
E71C000
heap
page read and write
6A80000
unkown
page readonly
B76D000
heap
page read and write
E004000
heap
page read and write
7985000
heap
page read and write
E78D000
heap
page read and write
B8C7000
heap
page read and write
73F0000
trusted library allocation
page read and write
B897000
heap
page read and write
DCAE000
stack
page read and write
7410000
trusted library allocation
page read and write
7952000
heap
page read and write
7140000
trusted library allocation
page read and write
A8000
unkown
page readonly
BAB5000
heap
page read and write
E701000
heap
page read and write
73D0000
trusted library allocation
page read and write
B753000
heap
page read and write
B87B000
heap
page read and write
E782000
heap
page read and write
BA5C000
heap
page read and write
7400000
trusted library allocation
page read and write
B7BD000
heap
page read and write
DD45000
heap
page read and write
673E000
stack
page read and write
B97E000
heap
page read and write
B4C0000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
B7BD000
heap
page read and write
40D8000
heap
page read and write
7800000
trusted library allocation
page read and write
E764000
heap
page read and write
B7BD000
heap
page read and write
7044000
heap
page read and write
7410000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
B7C4000
heap
page read and write
73F0000
trusted library allocation
page read and write
9334000
heap
page read and write
B75C000
heap
page read and write
B774000
heap
page read and write
BAC2000
heap
page read and write
4207000
heap
page read and write
78C0000
trusted library allocation
page read and write
B743000
heap
page read and write
9421000
heap
page read and write
E771000
heap
page read and write
7150000
trusted library allocation
page read and write
B75C000
heap
page read and write
7740000
trusted library allocation
page read and write
B7D3000
heap
page read and write
73D0000
trusted library allocation
page read and write
795D000
heap
page read and write
B718000
heap
page read and write
40E9000
heap
page read and write
73D0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
A2000
unkown
page write copy
B76A000
heap
page read and write
73D0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
E2D3000
heap
page read and write
7ACE000
stack
page read and write
7410000
trusted library allocation
page read and write
6CD7000
heap
page read and write
B76D000
heap
page read and write
77D0000
trusted library allocation
page read and write
40E5000
heap
page read and write
7400000
trusted library allocation
page read and write
BAC0000
heap
page read and write
73F0000
trusted library allocation
page read and write
E716000
heap
page read and write
B9E1000
heap
page read and write
E350000
heap
page read and write
73F0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
BA61000
heap
page read and write
6655000
heap
page read and write
73F0000
trusted library allocation
page read and write
B83A000
heap
page read and write
E7A8000
heap
page read and write
E445000
heap
page read and write
E6F5000
heap
page read and write
BAB5000
heap
page read and write
43B4000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
B797000
heap
page read and write
BAC5000
heap
page read and write
10B2000
heap
page read and write
9434000
heap
page read and write
69E0000
trusted library section
page read and write
40E3000
heap
page read and write
7490000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
B820000
heap
page read and write
B911000
heap
page read and write
7810000
trusted library allocation
page read and write
7FD43000
trusted library allocation
page execute read
6CB16000
unkown
page read and write
B767000
heap
page read and write
40C1000
heap
page read and write
73D0000
trusted library allocation
page read and write
DCB3000
heap
page read and write
E7DF000
heap
page read and write
E794000
heap
page read and write
B814000
heap
page read and write
E71C000
heap
page read and write
7947000
heap
page read and write
B863000
heap
page read and write
E72C000
heap
page read and write
BA5C000
heap
page read and write
7410000
trusted library allocation
page read and write
9225000
heap
page read and write
E6D2000
heap
page read and write
E36C000
heap
page read and write
E19A000
heap
page read and write
B76D000
heap
page read and write
93EA000
heap
page read and write
928D000
heap
page read and write
73D0000
trusted library allocation
page read and write
B774000
heap
page read and write
40DF000
heap
page read and write
D980000
heap
page read and write
146000
unkown
page readonly
7400000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
BAAA000
heap
page read and write
D96000
heap
page read and write
71D0000
trusted library allocation
page execute and read and write
7240000
trusted library allocation
page read and write
B7AA000
heap
page read and write
B7B0000
heap
page read and write
E71C000
heap
page read and write
BA42000
heap
page read and write
40DF000
heap
page read and write
E716000
heap
page read and write
E727000
heap
page read and write
7150000
trusted library allocation
page read and write
B774000
heap
page read and write
B7D0000
heap
page read and write
E6F5000
heap
page read and write
E6F0000
heap
page read and write
7150000
trusted library section
page read and write
B8AA000
heap
page read and write
7400000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
E829000
heap
page read and write
7790000
trusted library allocation
page read and write
BAD4000
heap
page read and write
4646000
trusted library allocation
page read and write
40E5000
heap
page read and write
B84B000
heap
page read and write
7160000
trusted library allocation
page read and write
1100000
heap
page read and write
40C5000
heap
page read and write
7490000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
E347000
heap
page read and write
7400000
trusted library allocation
page read and write
40BA000
heap
page read and write
B863000
heap
page read and write
73D0000
trusted library allocation
page read and write
B817000
heap
page read and write
BAC5000
heap
page read and write
3020000
trusted library allocation
page read and write
BA1E000
heap
page read and write
40EB000
heap
page read and write
69D0000
trusted library allocation
page read and write
E7CE000
heap
page read and write
E7D7000
heap
page read and write
6D16000
heap
page read and write
B7CF000
heap
page read and write
B7F4000
heap
page read and write
7FD4C000
trusted library allocation
page readonly
7400000
trusted library allocation
page read and write
BAAE000
heap
page read and write
B851000
heap
page read and write
B8C7000
heap
page read and write
B4A0000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
EE4000
heap
page read and write
E267000
heap
page read and write
E72C000
heap
page read and write
B628000
heap
page read and write
40EA000
heap
page read and write
73F0000
trusted library allocation
page read and write
B4E0000
trusted library allocation
page read and write
DCF9000
heap
page read and write
BAC0000
heap
page read and write
E6F0000
heap
page read and write
40C4000
heap
page read and write
7320000
heap
page read and write
40D3000
heap
page read and write
B774000
heap
page read and write
B87B000
heap
page read and write
B7D1000
heap
page read and write
793C000
heap
page read and write
B79B000
heap
page read and write
4316000
trusted library allocation
page execute and read and write
69F2000
unkown
page readonly
7410000
trusted library allocation
page read and write
BA72000
heap
page read and write
E5BA000
heap
page read and write
B85E000
heap
page read and write
BA52000
heap
page read and write
E70C000
heap
page read and write
7140000
trusted library allocation
page read and write
B6F8000
heap
page read and write
E7B3000
heap
page read and write
D986000
heap
page read and write
7140000
trusted library allocation
page read and write
7000000
heap
page read and write
E721000
heap
page read and write
BAB5000
heap
page read and write
7490000
trusted library allocation
page read and write
BA2C000
heap
page read and write
40E7000
heap
page read and write
B7C4000
heap
page read and write
D860000
trusted library allocation
page execute and read and write
E36B000
heap
page read and write
B7BD000
heap
page read and write
92B6000
heap
page read and write
73F0000
trusted library allocation
page read and write
B7B0000
heap
page read and write
B8C7000
heap
page read and write
40B9000
heap
page read and write
BAAE000
heap
page read and write
40BE000
heap
page read and write
7913000
heap
page read and write
7490000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
BAB0000
heap
page read and write
32F0000
heap
page read and write
40E3000
heap
page read and write
BAA8000
heap
page read and write
7220000
trusted library allocation
page read and write
10B9000
heap
page read and write
B867000
heap
page read and write
2DED000
stack
page read and write
DA7D000
stack
page read and write
73F0000
trusted library allocation
page read and write
B979000
heap
page read and write
D996000
heap
page read and write
B7B0000
heap
page read and write
7140000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
B824000
heap
page read and write
73F0000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
B869000
heap
page read and write
7220000
trusted library allocation
page read and write
DA83000
heap
page read and write
E693000
heap
page read and write
B9AF000
heap
page read and write
7400000
trusted library allocation
page read and write
40C0000
heap
page read and write
E88B000
heap
page read and write
E73D000
heap
page read and write
E097000
heap
page read and write
B7BD000
heap
page read and write
7150000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
E711000
heap
page read and write
BAA8000
heap
page read and write
B846000
heap
page read and write
B912000
heap
page read and write
E6FB000
heap
page read and write
73F0000
trusted library allocation
page read and write
B7D0000
heap
page read and write
6D08000
heap
page read and write
938E000
heap
page read and write
BAA0000
heap
page read and write
E146000
heap
page read and write
B7F4000
heap
page read and write
2FB0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
78D4000
trusted library allocation
page read and write
E6F5000
heap
page read and write
B7AD000
heap
page read and write
B85A000
heap
page read and write
40E9000
heap
page read and write
7140000
trusted library allocation
page read and write
E094000
heap
page read and write
BAB7000
heap
page read and write
668E000
heap
page read and write
E793000
heap
page read and write
B863000
heap
page read and write
40BA000
heap
page read and write
B7C4000
heap
page read and write
73F0000
trusted library allocation
page read and write
DB40000
trusted library section
page read and write
41000
unkown
page execute read
73D0000
trusted library allocation
page read and write
B91E000
heap
page read and write
7400000
trusted library allocation
page read and write
B867000
heap
page read and write
BACD000
heap
page read and write
93AE000
heap
page read and write
B8A7000
heap
page read and write
7410000
trusted library allocation
page read and write
4320000
trusted library allocation
page execute and read and write
B8AC000
heap
page read and write
9075000
heap
page read and write
7220000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
E7B9000
heap
page read and write
7490000
trusted library allocation
page read and write
B4C0000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
E77000
heap
page read and write
73D0000
trusted library allocation
page read and write
BAAE000
heap
page read and write
BAA8000
heap
page read and write
E6D2000
heap
page read and write
BAA0000
heap
page read and write
9341000
heap
page read and write
B86C000
heap
page read and write
E85A000
heap
page read and write
9020000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
E161000
heap
page read and write
3093000
trusted library allocation
page execute and read and write
7400000
trusted library allocation
page read and write
40D3000
heap
page read and write
7400000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
BABB000
heap
page read and write
7410000
trusted library allocation
page read and write
7FD4B000
trusted library allocation
page execute read
BAC0000
heap
page read and write
E7D6000
heap
page read and write
73F0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
E7B9000
heap
page read and write
7150000
trusted library allocation
page read and write
E4DA000
heap
page read and write
40EA000
heap
page read and write
797D000
heap
page read and write
40D9000
heap
page read and write
B7C0000
heap
page read and write
7160000
trusted library allocation
page read and write
E7A3000
heap
page read and write
BA29000
heap
page read and write
7FD78000
trusted library allocation
page execute and read and write
6EBF000
stack
page read and write
7FD32000
trusted library allocation
page readonly
73F0000
trusted library allocation
page read and write
BAA0000
heap
page read and write
7410000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
B84F000
heap
page read and write
7AC6000
heap
page read and write
BAB1000
heap
page read and write
E711000
heap
page read and write
BA5E000
heap
page read and write
E7F8000
heap
page read and write
74A0000
trusted library allocation
page read and write
E787000
heap
page read and write
7400000
trusted library allocation
page read and write
7700000
trusted library allocation
page execute and read and write
E271000
heap
page read and write
E7DD000
heap
page read and write
40C2000
heap
page read and write
7140000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
B8C7000
heap
page read and write
73D0000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
40D4000
heap
page read and write
7490000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
B9E0000
heap
page read and write
7AE1000
heap
page read and write
E721000
heap
page read and write
E065000
heap
page read and write
B889000
heap
page read and write
B7D3000
heap
page read and write
7A1F000
heap
page read and write
E58000
heap
page read and write
7710000
trusted library allocation
page read and write
73E0000
unkown
page readonly
B90C000
heap
page read and write
8F28000
heap
page read and write
B814000
heap
page read and write
BAAA000
heap
page read and write
A2000
unkown
page write copy
E04B000
heap
page read and write
B851000
heap
page read and write
B7AD000
heap
page read and write
4834000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
B828000
heap
page read and write
E787000
heap
page read and write
BACC000
heap
page read and write
40D8000
heap
page read and write
9417000
heap
page read and write
7AB6000
heap
page read and write
7410000
trusted library allocation
page read and write
E5AB000
heap
page read and write
B7D0000
heap
page read and write
7FD50000
trusted library allocation
page execute read
B82C000
heap
page read and write
B7CF000
heap
page read and write
911F000
heap
page read and write
E7AE000
heap
page read and write
76F8000
stack
page read and write
40D8000
heap
page read and write
BAA8000
heap
page read and write
31E0000
heap
page read and write
7490000
trusted library allocation
page read and write
B88B000
heap
page read and write
E72C000
heap
page read and write
E1CC000
heap
page read and write
E79E000
heap
page read and write
7126000
heap
page read and write
B85E000
heap
page read and write
B817000
heap
page read and write
BAA0000
heap
page read and write
B869000
heap
page read and write
B86C000
heap
page read and write
BA69000
heap
page read and write
B753000
heap
page read and write
E7F7000
heap
page read and write
4AD4000
trusted library allocation
page read and write
1356000
heap
page read and write
7490000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
73E4000
unkown
page readonly
3060000
heap
page read and write
7240000
trusted library allocation
page read and write
8F1D000
heap
page read and write
7220000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
B739000
heap
page read and write
B873000
heap
page read and write
B8C7000
heap
page read and write
B6D0000
trusted library allocation
page read and write
40C1000
heap
page read and write
E753000
heap
page read and write
B853000
heap
page read and write
B851000
heap
page read and write
E743000
heap
page read and write
B7B0000
heap
page read and write
B97E000
heap
page read and write
913F000
heap
page read and write
B741000
heap
page read and write
7720000
trusted library allocation
page read and write
9419000
heap
page read and write
40D3000
heap
page read and write
5355000
trusted library allocation
page read and write
E2FB000
heap
page read and write
7410000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
407D000
stack
page read and write
7490000
trusted library allocation
page read and write
40DF000
heap
page read and write
B7B0000
heap
page read and write
DD77000
heap
page read and write
7FD54000
trusted library allocation
page execute read
B87B000
heap
page read and write
B7F1000
heap
page read and write
DD3C000
heap
page read and write
7720000
trusted library allocation
page read and write
1158000
stack
page read and write
7230000
trusted library allocation
page read and write
B87F000
heap
page read and write
B8A4000
heap
page read and write
7400000
trusted library allocation
page read and write
702D000
heap
page read and write
73D0000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
B7E3000
heap
page read and write
B9FF000
heap
page read and write
7790000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
B7D3000
heap
page read and write
791F000
heap
page read and write
7126000
heap
page read and write
7410000
trusted library allocation
page read and write
93D5000
heap
page read and write
B762000
heap
page read and write
E706000
heap
page read and write
40D8000
heap
page read and write
40BE000
heap
page read and write
B93E000
heap
page read and write
6580000
unkown
page readonly
EEA000
heap
page read and write
8F1B000
heap
page read and write
E770000
heap
page read and write
40E9000
heap
page read and write
7490000
trusted library allocation
page read and write
B853000
heap
page read and write
E7AE000
heap
page read and write
B7D5000
heap
page read and write
73F0000
trusted library allocation
page read and write
155000
unkown
page readonly
B7E7000
heap
page read and write
B7C7000
heap
page read and write
7FD47000
trusted library allocation
page execute read
B7AD000
heap
page read and write
7140000
trusted library allocation
page read and write
E701000
heap
page read and write
7140000
trusted library allocation
page read and write
91D0000
heap
page read and write
793B000
heap
page read and write
40BE000
heap
page read and write
71E0000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
7FD5D000
trusted library allocation
page readonly
7140000
trusted library allocation
page read and write
7FD3F000
trusted library allocation
page execute read
E701000
heap
page read and write
7490000
trusted library allocation
page read and write
9314000
heap
page read and write
E6D2000
heap
page read and write
7FD35000
trusted library allocation
page readonly
40D3000
heap
page read and write
D3B0000
trusted library allocation
page read and write
B6E0000
trusted library allocation
page execute and read and write
B889000
heap
page read and write
7FD56000
trusted library allocation
page execute read
BAAA000
heap
page read and write
7220000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
E21B000
heap
page read and write
78A0000
trusted library allocation
page execute and read and write
40E9000
heap
page read and write
B88B000
heap
page read and write
93FA000
heap
page read and write
E5A000
heap
page read and write
BA54000
heap
page read and write
40D8000
heap
page read and write
93D9000
heap
page read and write
547C000
trusted library allocation
page read and write
BA59000
heap
page read and write
7FD3E000
trusted library allocation
page readonly
B753000
heap
page read and write
E1DE000
heap
page read and write
73D0000
trusted library allocation
page read and write
BA20000
heap
page read and write
B7E7000
heap
page read and write
E6D0000
heap
page read and write
B4D0000
heap
page execute and read and write
7400000
trusted library allocation
page read and write
41D0000
trusted library allocation
page read and write
B77A000
heap
page read and write
73D0000
trusted library allocation
page read and write
40C1000
heap
page read and write
E762000
heap
page read and write
E536000
heap
page read and write
40D9000
heap
page read and write
B4D0000
trusted library allocation
page read and write
40D3000
heap
page read and write
75B0000
heap
page read and write
E70C000
heap
page read and write
7400000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
7FD4F000
trusted library allocation
page execute read
41BC000
stack
page read and write
E44F000
heap
page read and write
73F0000
trusted library allocation
page read and write
7991000
heap
page read and write
BAAC000
heap
page read and write
E08F000
heap
page read and write
40D8000
heap
page read and write
E3B3000
heap
page read and write
B7D5000
heap
page read and write
BAC2000
heap
page read and write
93DF000
heap
page read and write
40D8000
heap
page read and write
7490000
trusted library allocation
page read and write
7905000
heap
page read and write
B774000
heap
page read and write
B7B7000
heap
page read and write
7400000
trusted library allocation
page read and write
B8BA000
heap
page read and write
B916000
heap
page read and write
BAB1000
heap
page read and write
7410000
trusted library allocation
page read and write
B763000
heap
page read and write
73D0000
trusted library allocation
page read and write
40D8000
heap
page read and write
7490000
trusted library allocation
page read and write
E701000
heap
page read and write
E701000
heap
page read and write
7490000
trusted library allocation
page read and write
7931000
heap
page read and write
7400000
trusted library allocation
page read and write
4D43000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
E272000
heap
page read and write
B7B7000
heap
page read and write
E00E000
heap
page read and write
6980000
trusted library allocation
page read and write
B7D0000
heap
page read and write
73F0000
trusted library allocation
page read and write
7982000
heap
page read and write
73D0000
trusted library allocation
page read and write
9027000
heap
page read and write
7490000
trusted library allocation
page read and write
4572000
trusted library allocation
page read and write
B84F000
heap
page read and write
B74E000
heap
page read and write
B77A000
heap
page read and write
8E9D000
heap
page read and write
40B8000
heap
page read and write
7150000
trusted library allocation
page read and write
BAB3000
heap
page read and write
B7B0000
heap
page read and write
6653000
heap
page read and write
7AD0000
heap
page read and write
B75C000
heap
page read and write
70CB000
heap
page read and write
40BA000
heap
page read and write
B6EC000
heap
page read and write
7400000
trusted library allocation
page read and write
ED3000
heap
page read and write
B743000
heap
page read and write
BAC0000
heap
page read and write
40E9000
heap
page read and write
40D8000
heap
page read and write
73F0000
trusted library allocation
page read and write
B869000
heap
page read and write
B7BD000
heap
page read and write
B708000
heap
page read and write
40D8000
heap
page read and write
B97E000
heap
page read and write
B8C3000
heap
page read and write
E166000
heap
page read and write
E1DD000
heap
page read and write
BA24000
heap
page read and write
E093000
heap
page read and write
9293000
heap
page read and write
E706000
heap
page read and write
40D3000
heap
page read and write
E0C8000
heap
page read and write
918B000
heap
page read and write
E701000
heap
page read and write
40E5000
heap
page read and write
DD0000
heap
page read and write
73D0000
trusted library allocation
page read and write
B7B0000
heap
page read and write
91FA000
heap
page read and write
B9E1000
heap
page read and write
73F0000
trusted library allocation
page read and write
E710000
heap
page read and write
B7C1000
heap
page read and write
A8000
unkown
page readonly
E082000
heap
page read and write
7410000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
B887000
heap
page read and write
40DF000
heap
page read and write
E6D2000
heap
page read and write
B774000
heap
page read and write
7220000
trusted library allocation
page read and write
B7E0000
heap
page read and write
73D0000
trusted library allocation
page read and write
B7BD000
heap
page read and write
78F4000
heap
page read and write
7490000
trusted library allocation
page read and write
E762000
heap
page read and write
73D0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
B87F000
heap
page read and write
9216000
heap
page read and write
BACB000
heap
page read and write
7FD55000
trusted library allocation
page readonly
7470000
unkown
page readonly
40D3000
heap
page read and write
B85E000
heap
page read and write
40A5000
heap
page read and write
B7A9000
heap
page read and write
B74E000
heap
page read and write
B7B7000
heap
page read and write
2FA0000
trusted library allocation
page read and write
B762000
heap
page read and write
73D0000
trusted library allocation
page read and write
7472000
unkown
page readonly
7BCC000
stack
page read and write
E7AE000
heap
page read and write
73D0000
trusted library allocation
page read and write
D434000
trusted library allocation
page read and write
E00B000
heap
page read and write
90B7000
heap
page read and write
7490000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
B7E7000
heap
page read and write
78BE000
heap
page read and write
EE1000
heap
page read and write
7947000
heap
page read and write
92CD000
heap
page read and write
E03F000
heap
page read and write
40D8000
heap
page read and write
E5B3000
heap
page read and write
E721000
heap
page read and write
90C1000
heap
page read and write
E1B5000
heap
page read and write
BAB0000
heap
page read and write
BAB7000
heap
page read and write
B86C000
heap
page read and write
7126000
heap
page read and write
B7AC000
heap
page read and write
B774000
heap
page read and write
E727000
heap
page read and write
7220000
trusted library allocation
page read and write
936F000
heap
page read and write
E828000
heap
page read and write
B940000
heap
page read and write
B889000
heap
page read and write
B87B000
heap
page read and write
7400000
trusted library allocation
page read and write
E08D000
heap
page read and write
B7BD000
heap
page read and write
797F000
heap
page read and write
7150000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
B9AF000
heap
page read and write
7410000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
E733000
heap
page read and write
B7A9000
heap
page read and write
B7D5000
heap
page read and write
BAC0000
heap
page read and write
7720000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
B76D000
heap
page read and write
6350000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
652E000
stack
page read and write
73F0000
trusted library allocation
page read and write
9150000
heap
page read and write
B7E7000
heap
page read and write
9391000
heap
page read and write
7400000
trusted library allocation
page read and write
B83A000
heap
page read and write
E33D000
heap
page read and write
BAC5000
heap
page read and write
41000
unkown
page execute read
E7C2000
heap
page read and write
7410000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
B77A000
heap
page read and write
456A000
trusted library allocation
page read and write
113B000
heap
page read and write
B91C000
heap
page read and write
E7DF000
heap
page read and write
40D8000
heap
page read and write
E378000
heap
page read and write
E798000
heap
page read and write
B889000
heap
page read and write
8E92000
heap
page read and write
DFFE000
stack
page read and write
312B000
trusted library allocation
page execute and read and write
E08F000
heap
page read and write
40DF000
heap
page read and write
40D8000
heap
page read and write
7A70000
trusted library allocation
page read and write
E711000
heap
page read and write
E161000
heap
page read and write
B6BB000
heap
page read and write
B9E0000
heap
page read and write
B721000
heap
page read and write
B897000
heap
page read and write
E3FE000
heap
page read and write
E414000
heap
page read and write
DB0C000
heap
page read and write
B87F000
heap
page read and write
B8B8000
heap
page read and write
7720000
trusted library allocation
page read and write
E54D000
heap
page read and write
B86C000
heap
page read and write
B7E2000
heap
page read and write
BAB5000
heap
page read and write
40E9000
heap
page read and write
B869000
heap
page read and write
E7A3000
heap
page read and write
40EA000
heap
page read and write
7490000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
BAB7000
heap
page read and write
8F26000
heap
page read and write
8F5F000
heap
page read and write
E18000
heap
page read and write
2E7B000
heap
page read and write
BAC0000
heap
page read and write
E764000
heap
page read and write
E08D000
heap
page read and write
E72D000
heap
page read and write
7490000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
E7D3000
heap
page read and write
BAAE000
heap
page read and write
E044000
heap
page read and write
B7AA000
heap
page read and write
E6FB000
heap
page read and write
70BF000
heap
page read and write
B9FF000
heap
page read and write
40C1000
heap
page read and write
40E8000
heap
page read and write
90BA000
heap
page read and write
B94B000
heap
page read and write
73D0000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
BAB7000
heap
page read and write
B764000
heap
page read and write
BA95000
heap
page read and write
40D3000
heap
page read and write
6FCC000
heap
page read and write
40D8000
heap
page read and write
E7A9000
heap
page read and write
4838000
trusted library allocation
page read and write
DB47000
heap
page read and write
B7D1000
heap
page read and write
B7C7000
heap
page read and write
7720000
trusted library allocation
page read and write
E6F5000
heap
page read and write
77F0000
trusted library allocation
page read and write
7AC3000
heap
page read and write
B7D5000
heap
page read and write
1200000
heap
page read and write
40B9000
heap
page read and write
BA40000
heap
page read and write
B680000
trusted library allocation
page read and write
41E0000
heap
page execute and read and write
7220000
trusted library allocation
page read and write
DD76000
heap
page read and write
933E000
heap
page read and write
BAC0000
heap
page read and write
7410000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
B7AB000
heap
page read and write
30B0000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
7041000
heap
page read and write
7220000
trusted library allocation
page read and write
7210000
trusted library allocation
page execute and read and write
7400000
trusted library allocation
page read and write
9336000
heap
page read and write
BAC6000
heap
page read and write
7400000
trusted library allocation
page read and write
B95C000
heap
page read and write
73D0000
trusted library allocation
page read and write
EA8000
heap
page read and write
E19A000
heap
page read and write
B7BD000
heap
page read and write
7880000
trusted library allocation
page read and write
40D8000
heap
page read and write
B7AB000
heap
page read and write
69C9000
stack
page read and write
B7D0000
heap
page read and write
B767000
heap
page read and write
73F0000
trusted library allocation
page read and write
B739000
heap
page read and write
B7C1000
heap
page read and write
B7C1000
heap
page read and write
BAC2000
heap
page read and write
B9FB000
heap
page read and write
E1F5000
heap
page read and write
796D000
heap
page read and write
E0CC000
heap
page read and write
7400000
trusted library allocation
page read and write
B7A9000
heap
page read and write
B7D3000
heap
page read and write
7490000
trusted library allocation
page read and write
B863000
heap
page read and write
E7B3000
heap
page read and write
7297000
heap
page read and write
7140000
trusted library allocation
page read and write
146000
unkown
page readonly
40EB000
heap
page read and write
40B8000
heap
page read and write
7A90000
heap
page read and write
B7D0000
heap
page read and write
7140000
trusted library allocation
page read and write
E727000
heap
page read and write
33E0000
heap
page read and write
9020000
trusted library allocation
page read and write
B76D000
heap
page read and write
E1C3000
heap
page read and write
73D0000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
BAAC000
heap
page read and write
73F0000
trusted library allocation
page read and write
7230000
trusted library allocation
page read and write
B79C000
heap
page read and write
B85C000
heap
page read and write
40EB000
heap
page read and write
7987000
heap
page read and write
3070000
trusted library section
page read and write
E7C5000
heap
page read and write
B739000
heap
page read and write
7400000
trusted library allocation
page read and write
BAAC000
heap
page read and write
E79E000
heap
page read and write
B824000
heap
page read and write
70C0000
heap
page read and write
3300000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
9429000
heap
page read and write
40DF000
heap
page read and write
7400000
trusted library allocation
page read and write
B753000
heap
page read and write
B9DE000
heap
page read and write
7410000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
B8A4000
heap
page read and write
7490000
trusted library allocation
page read and write
B6C0000
trusted library allocation
page read and write
6537000
heap
page execute and read and write
B7AD000
heap
page read and write
B7C0000
heap
page read and write
B9E0000
heap
page read and write
71E0000
trusted library allocation
page read and write
B710000
heap
page read and write
E793000
heap
page read and write
40E8000
heap
page read and write
E738000
heap
page read and write
73D0000
trusted library allocation
page read and write
B75C000
heap
page read and write
9FC000
stack
page read and write
B774000
heap
page read and write
7A70000
trusted library allocation
page read and write
E097000
heap
page read and write
B849000
heap
page read and write
BAC5000
heap
page read and write
11B0000
unkown
page read and write
7410000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
7A27000
heap
page read and write
B7AD000
heap
page read and write
7140000
trusted library allocation
page read and write
B8C3000
heap
page read and write
B774000
heap
page read and write
7490000
trusted library allocation
page read and write
6990000
trusted library allocation
page read and write
E096000
heap
page read and write
7490000
trusted library allocation
page read and write
DD3B000
heap
page read and write
E5A000
heap
page read and write
73F0000
trusted library allocation
page read and write
113D000
heap
page read and write
B8C1000
heap
page read and write
7490000
trusted library allocation
page read and write
E093000
heap
page read and write
7490000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
DACA000
heap
page read and write
BAB1000
heap
page read and write
B867000
heap
page read and write
BAB5000
heap
page read and write
7140000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
A8000
unkown
page readonly
B797000
heap
page read and write
E7C6000
heap
page read and write
7400000
trusted library allocation
page read and write
E06B000
heap
page read and write
B9E1000
heap
page read and write
7957000
heap
page read and write
E57A000
heap
page read and write
B943000
heap
page read and write
F2F000
heap
page read and write
E721000
heap
page read and write
9452000
heap
page read and write
B7CF000
heap
page read and write
7410000
trusted library allocation
page read and write
E706000
heap
page read and write
B897000
heap
page read and write
7720000
trusted library allocation
page read and write
B824000
heap
page read and write
707D000
heap
page read and write
73F0000
trusted library allocation
page read and write
40C3000
heap
page read and write
7410000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
E225000
heap
page read and write
B890000
heap
page read and write
7AC3000
heap
page read and write
B721000
heap
page read and write
E0B7000
heap
page read and write
E580000
heap
page read and write
7400000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
7FD60000
trusted library allocation
page execute and read and write
B76A000
heap
page read and write
74B0000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
7FD48000
trusted library allocation
page readonly
BAAA000
heap
page read and write
B8AC000
heap
page read and write
D430000
trusted library allocation
page read and write
78CE000
trusted library allocation
page read and write
B848000
heap
page read and write
B7E7000
heap
page read and write
BA3E000
heap
page read and write
E213000
heap
page read and write
7AB6000
heap
page read and write
73D0000
trusted library allocation
page read and write
EFA000
heap
page read and write
797D000
heap
page read and write
E762000
heap
page read and write
79A9000
heap
page read and write
B77A000
heap
page read and write
7410000
trusted library allocation
page read and write
BAA0000
heap
page read and write
85000
unkown
page readonly
E793000
heap
page read and write
7490000
trusted library allocation
page read and write
B77A000
heap
page read and write
DAB0000
trusted library allocation
page read and write
E7B9000
heap
page read and write
8F61000
heap
page read and write
7490000
trusted library allocation
page read and write
E4DF000
heap
page read and write
97C000
stack
page read and write
40DF000
heap
page read and write
7FD46000
trusted library allocation
page readonly
73D0000
trusted library allocation
page read and write
B6C0000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
9269000
heap
page read and write
40D8000
heap
page read and write
7410000
trusted library allocation
page read and write
32EF000
stack
page read and write
E5A000
heap
page read and write
E3F4000
heap
page read and write
B7D5000
heap
page read and write
7410000
trusted library allocation
page read and write
B76D000
heap
page read and write
B774000
heap
page read and write
2E0C000
stack
page read and write
D9A6000
heap
page read and write
E7B9000
heap
page read and write
714B000
trusted library allocation
page read and write
BAA0000
heap
page read and write
DB16000
heap
page read and write
4351000
trusted library allocation
page read and write
B7C7000
heap
page read and write
73D0000
trusted library allocation
page read and write
BA13000
heap
page read and write
B8A4000
heap
page read and write
7410000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
E09E000
heap
page read and write
E72C000
heap
page read and write
E050000
heap
page read and write
B8AE000
heap
page read and write
7400000
trusted library allocation
page read and write
E317000
heap
page read and write
3010000
trusted library allocation
page read and write
B8A4000
heap
page read and write
7A80000
trusted library allocation
page read and write
B985000
heap
page read and write
BAB1000
heap
page read and write
79B0000
trusted library allocation
page read and write
40D3000
heap
page read and write
73F0000
trusted library allocation
page read and write
40DF000
heap
page read and write
DD3E000
heap
page read and write
11F0000
heap
page read and write
90B0000
heap
page read and write
40B8000
heap
page read and write
B9DE000
heap
page read and write
F3C000
heap
page read and write
B762000
heap
page read and write
E7F7000
heap
page read and write
E828000
heap
page read and write
797F000
heap
page read and write
B7C7000
heap
page read and write
E794000
heap
page read and write
7400000
trusted library allocation
page read and write
40E9000
heap
page read and write
B7F5000
heap
page read and write
73F0000
trusted library allocation
page read and write
8F26000
heap
page read and write
7490000
trusted library allocation
page read and write
72E3000
heap
page read and write
73F0000
trusted library allocation
page execute and read and write
40D8000
heap
page read and write
3780000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
E1FE000
heap
page read and write
7900000
trusted library allocation
page read and write
E79E000
heap
page read and write
E721000
heap
page read and write
1144000
heap
page read and write
E78D000
heap
page read and write
E64F000
heap
page read and write
E1D8000
heap
page read and write
B743000
heap
page read and write
7720000
trusted library allocation
page read and write
B7D0000
heap
page read and write
3050000
trusted library section
page read and write
B7E2000
heap
page read and write
7410000
trusted library allocation
page read and write
B86C000
heap
page read and write
E731000
heap
page read and write
7800000
trusted library allocation
page read and write
40D4000
heap
page read and write
E052000
heap
page read and write
7150000
trusted library allocation
page read and write
B75C000
heap
page read and write
B83A000
heap
page read and write
73D0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
E78D000
heap
page read and write
93CE000
heap
page read and write
B6A0000
trusted library allocation
page read and write
BA3C000
heap
page read and write
78D0000
trusted library allocation
page read and write
B85A000
heap
page read and write
79DB000
heap
page read and write
7400000
trusted library allocation
page read and write
E711000
heap
page read and write
E58B000
heap
page read and write
7720000
trusted library allocation
page read and write
7029000
heap
page read and write
BAB5000
heap
page read and write
7490000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
E799000
heap
page read and write
B8AA000
heap
page read and write
BAC2000
heap
page read and write
BAC5000
heap
page read and write
B77A000
heap
page read and write
B87F000
heap
page read and write
40D3000
heap
page read and write
7116000
heap
page read and write
E008000
heap
page read and write
B762000
heap
page read and write
1145000
heap
page read and write
7490000
trusted library allocation
page read and write
BAB5000
heap
page read and write
E3B2000
heap
page read and write
40D3000
heap
page read and write
73D0000
trusted library allocation
page read and write
72DE000
heap
page read and write
B7B7000
heap
page read and write
7AD7000
heap
page read and write
E711000
heap
page read and write
40B2000
heap
page read and write
D3E0000
trusted library allocation
page read and write
7143000
trusted library allocation
page read and write
7230000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
E782000
heap
page read and write
7790000
trusted library allocation
page read and write
E4E9000
heap
page read and write
79A0000
heap
page read and write
B7C7000
heap
page read and write
7400000
trusted library allocation
page read and write
E1E8000
heap
page read and write
40D1000
heap
page read and write
7FD3B000
trusted library allocation
page execute read
73F0000
trusted library allocation
page read and write
933F000
heap
page read and write
BA24000
heap
page read and write
40D8000
heap
page read and write
7720000
trusted library allocation
page read and write
DB7A000
heap
page read and write
7490000
trusted library allocation
page execute and read and write
B7B0000
heap
page read and write
BAB3000
heap
page read and write
7322000
heap
page read and write
B873000
heap
page read and write
7034000
heap
page read and write
85000
unkown
page readonly
B75C000
heap
page read and write
B867000
heap
page read and write
7400000
trusted library allocation
page read and write
9183000
heap
page read and write
E0D6000
heap
page read and write
E782000
heap
page read and write
B9C7000
heap
page read and write
B94D000
heap
page read and write
E56A000
heap
page read and write
3000000
trusted library allocation
page read and write
B8BA000
heap
page read and write
7A1D000
heap
page read and write
7734000
trusted library allocation
page read and write
735B000
heap
page read and write
40BC000
heap
page read and write
E798000
heap
page read and write
7750000
trusted library allocation
page read and write
40D8000
heap
page read and write
B84B000
heap
page read and write
73F0000
trusted library allocation
page read and write
7974000
heap
page read and write
E222000
heap
page read and write
7A70000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
B85A000
heap
page read and write
7024000
heap
page read and write
3020000
trusted library allocation
page read and write
70A1000
heap
page read and write
709A000
heap
page read and write
CF5000
heap
page read and write
73D0000
trusted library allocation
page read and write
E7B4000
heap
page read and write
40D3000
heap
page read and write
B7C1000
heap
page read and write
E11D000
heap
page read and write
6D12000
heap
page read and write
BA9A000
heap
page read and write
BABE000
heap
page read and write
B7B0000
heap
page read and write
B8AC000
heap
page read and write
B7C7000
heap
page read and write
5394000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
BAAB000
heap
page read and write
703B000
heap
page read and write
7150000
trusted library allocation
page read and write
EA0000
heap
page read and write
7760000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
B819000
heap
page read and write
B7E7000
heap
page read and write
797D000
heap
page read and write
BAA0000
heap
page read and write
73D0000
trusted library allocation
page read and write
40DF000
heap
page read and write
E239000
heap
page read and write
B814000
heap
page read and write
8ED9000
heap
page read and write
B8AA000
heap
page read and write
7490000
trusted library allocation
page read and write
7FD5E000
trusted library allocation
page execute read
11C0000
heap
page read and write
BAAE000
heap
page read and write
7987000
heap
page read and write
77C0000
trusted library allocation
page read and write
B8AE000
heap
page read and write
E75E000
heap
page read and write
7400000
trusted library allocation
page read and write
B83A000
heap
page read and write
7720000
trusted library allocation
page read and write
90F8000
heap
page read and write
8F24000
heap
page read and write
69D0000
trusted library allocation
page read and write
B84B000
heap
page read and write
71D0000
trusted library allocation
page read and write
40E4000
heap
page read and write
E829000
heap
page read and write
B7D3000
heap
page read and write
7490000
trusted library allocation
page read and write
40EB000
heap
page read and write
B7C7000
heap
page read and write
7490000
trusted library allocation
page read and write
E572000
heap
page read and write
7220000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
B86C000
heap
page read and write
B7A9000
heap
page read and write
B762000
heap
page read and write
B7C4000
heap
page read and write
E15F000
heap
page read and write
B825000
heap
page read and write
B87F000
heap
page read and write
B86C000
heap
page read and write
EE1000
heap
page read and write
BAA8000
heap
page read and write
B85C000
heap
page read and write
BA5F000
heap
page read and write
73F0000
trusted library allocation
page read and write
B74E000
heap
page read and write
92AB000
heap
page read and write
9405000
heap
page read and write
7490000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
BAA0000
heap
page read and write
B8A6000
heap
page read and write
7490000
trusted library allocation
page read and write
7420000
unkown
page readonly
7936000
heap
page read and write
7490000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
B76D000
heap
page read and write
40DF000
heap
page read and write
B846000
heap
page read and write
7092000
heap
page read and write
BABE000
heap
page read and write
E711000
heap
page read and write
E2A2000
heap
page read and write
E20A000
heap
page read and write
73D0000
trusted library allocation
page read and write
B851000
heap
page read and write
E09B000
heap
page read and write
7140000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
B7B7000
heap
page read and write
E175000
heap
page read and write
7400000
trusted library allocation
page read and write
309D000
trusted library allocation
page execute and read and write
7490000
trusted library allocation
page read and write
B867000
heap
page read and write
73D0000
trusted library allocation
page read and write
B500000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
EEA000
heap
page read and write
10F9000
heap
page read and write
70D0000
heap
page read and write
B7C7000
heap
page read and write
7410000
trusted library allocation
page read and write
DA80000
trusted library section
page read and write
73D0000
trusted library allocation
page read and write
40D8000
heap
page read and write
4330000
trusted library allocation
page read and write
B762000
heap
page read and write
B75A000
heap
page read and write
39EF000
stack
page read and write
90B9000
heap
page read and write
E79E000
heap
page read and write
73D0000
trusted library allocation
page read and write
B943000
heap
page read and write
E4D8000
heap
page read and write
B6C0000
trusted library allocation
page read and write
B79C000
heap
page read and write
BAAC000
heap
page read and write
40D3000
heap
page read and write
BAAA000
heap
page read and write
B739000
heap
page read and write
7490000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
B753000
heap
page read and write
E69B000
heap
page read and write
40D8000
heap
page read and write
40DE000
heap
page read and write
69D0000
trusted library allocation
page read and write
7720000
trusted library section
page read and write
922B000
heap
page read and write
BAC9000
heap
page read and write
B7CF000
heap
page read and write
DAC0000
trusted library section
page read and write
B77A000
heap
page read and write
B9DE000
heap
page read and write
91A1000
heap
page read and write
4310000
trusted library allocation
page read and write
7FD5C000
trusted library allocation
page execute read
902E000
heap
page read and write
7400000
trusted library allocation
page read and write
E770000
heap
page read and write
B7AB000
heap
page read and write
E5D7000
heap
page read and write
B6C0000
trusted library allocation
page read and write
6A82000
unkown
page readonly
B763000
heap
page read and write
E07B000
heap
page read and write
7221000
trusted library allocation
page read and write
B85E000
heap
page read and write
E68000
heap
page read and write
B774000
heap
page read and write
B897000
heap
page read and write
7400000
trusted library allocation
page read and write
B739000
heap
page read and write
BAAC000
heap
page read and write
7490000
trusted library allocation
page read and write
B8AC000
heap
page read and write
73F0000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
BA4B000
heap
page read and write
73D0000
trusted library allocation
page read and write
B8AE000
heap
page read and write
7220000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
40C0000
heap
page read and write
E7BE000
heap
page read and write
E7DF000
heap
page read and write
6D08000
heap
page read and write
B83A000
heap
page read and write
90F2000
heap
page read and write
B814000
heap
page read and write
BA10000
heap
page read and write
9020000
trusted library allocation
page read and write
F08000
heap
page read and write
785E000
stack
page read and write
40DF000
heap
page read and write
2FE0000
heap
page read and write
41000
unkown
page execute read
73F0000
trusted library allocation
page read and write
BAD9000
heap
page read and write
7160000
trusted library allocation
page read and write
7C0E000
stack
page read and write
E793000
heap
page read and write
40BA000
heap
page read and write
B7D5000
heap
page read and write
DCB3000
heap
page read and write
6980000
trusted library allocation
page read and write
E828000
heap
page read and write
6D35000
heap
page read and write
DBAB000
heap
page read and write
40B8000
heap
page read and write
40DF000
heap
page read and write
40D3000
heap
page read and write
E016000
heap
page read and write
7490000
trusted library allocation
page read and write
B88B000
heap
page read and write
77E0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
B8AE000
heap
page read and write
E203000
heap
page read and write
6C74000
stack
page read and write
7AB0000
heap
page read and write
7A70000
trusted library allocation
page read and write
F98000
heap
page read and write
B7E0000
heap
page read and write
70B7000
heap
page read and write
BAAE000
heap
page read and write
B76D000
heap
page read and write
B75C000
heap
page read and write
E704000
heap
page read and write
E5A2000
heap
page read and write
7490000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
E701000
heap
page read and write
D870000
trusted library allocation
page read and write
B8A7000
heap
page read and write
E58000
heap
page read and write
3125000
trusted library allocation
page execute and read and write
E3F7000
heap
page read and write
7220000
trusted library allocation
page read and write
E188000
heap
page read and write
40C0000
heap
page read and write
2CB0000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
B916000
heap
page read and write
78B0000
trusted library allocation
page read and write
7B40000
heap
page read and write
B77A000
heap
page read and write
73D0000
trusted library allocation
page read and write
BAC0000
heap
page read and write
40D3000
heap
page read and write
E6DE000
heap
page read and write
B921000
heap
page read and write
74AA000
trusted library allocation
page read and write
BA40000
heap
page read and write
7490000
trusted library allocation
page read and write
B84B000
heap
page read and write
79A0000
heap
page read and write
E7C5000
heap
page read and write
B7B0000
heap
page read and write
7410000
trusted library allocation
page read and write
B85A000
heap
page read and write
4627000
trusted library allocation
page read and write
E782000
heap
page read and write
B91E000
heap
page read and write
B7EE000
heap
page read and write
E7B9000
heap
page read and write
665D000
heap
page read and write
7400000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
CF0000
heap
page read and write
E55F000
heap
page read and write
B79C000
heap
page read and write
E18A000
heap
page read and write
D430000
trusted library section
page read and write
38EF000
stack
page read and write
D970000
trusted library allocation
page read and write
40B9000
heap
page read and write
73D0000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
D3C0000
trusted library allocation
page read and write
B7C0000
heap
page read and write
7A58000
heap
page read and write
73F0000
trusted library allocation
page read and write
B7D1000
heap
page read and write
B897000
heap
page read and write
73D0000
trusted library allocation
page read and write
40DF000
heap
page read and write
40E7000
heap
page read and write
E7A8000
heap
page read and write
7A70000
trusted library allocation
page read and write
B77A000
heap
page read and write
41000
unkown
page execute read
9F0000
heap
page read and write
7490000
trusted library allocation
page read and write
B7BD000
heap
page read and write
2FD0000
trusted library allocation
page read and write
BAB7000
heap
page read and write
E829000
heap
page read and write
B867000
heap
page read and write
B873000
heap
page read and write
74A0000
trusted library allocation
page read and write
40D8000
heap
page read and write
B892000
heap
page read and write
2FC0000
trusted library allocation
page read and write
E748000
heap
page read and write
B6E0000
trusted library allocation
page read and write
B7C4000
heap
page read and write
B93E000
heap
page read and write
7410000
trusted library allocation
page read and write
40C4000
heap
page read and write
3290000
trusted library allocation
page read and write
40EB000
heap
page read and write
7410000
trusted library allocation
page read and write
6CB01000
unkown
page execute read
B87F000
heap
page read and write
B897000
heap
page read and write
B873000
heap
page read and write
7400000
trusted library allocation
page read and write
E7DF000
heap
page read and write
93FF000
heap
page read and write
E787000
heap
page read and write
7158000
trusted library allocation
page read and write
E716000
heap
page read and write
7FD31000
trusted library allocation
page execute read
7490000
trusted library allocation
page read and write
BA13000
heap
page read and write
79BE000
trusted library allocation
page read and write
40E7000
heap
page read and write
B8AA000
heap
page read and write
9356000
heap
page read and write
BAA8000
heap
page read and write
B7C0000
heap
page read and write
B7C7000
heap
page read and write
7490000
trusted library allocation
page read and write
40C1000
heap
page read and write
B940000
heap
page read and write
E7B3000
heap
page read and write
B9FB000
heap
page read and write
B7A9000
heap
page read and write
B7B7000
heap
page read and write
8F25000
heap
page read and write
E716000
heap
page read and write
4BC2000
trusted library allocation
page read and write
E241000
heap
page read and write
B6B1000
heap
page read and write
B92E000
heap
page read and write
B8AE000
heap
page read and write
DB72000
heap
page read and write
7490000
trusted library allocation
page read and write
B83A000
heap
page read and write
B851000
heap
page read and write
B86C000
heap
page read and write
E570000
heap
page read and write
B7BD000
heap
page read and write
40D3000
heap
page read and write
B77A000
heap
page read and write
114C000
heap
page read and write
40E3000
heap
page read and write
71E0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
7FD53000
trusted library allocation
page readonly
40DE000
heap
page read and write
7A70000
remote allocation
page read and write
6B70000
unkown
page readonly
E7C2000
heap
page read and write
4080000
heap
page read and write
40D8000
heap
page read and write
70B1000
heap
page read and write
B7C1000
heap
page read and write
40DB000
heap
page read and write
4CD2000
trusted library allocation
page read and write
E770000
heap
page read and write
732A000
heap
page read and write
7400000
trusted library allocation
page read and write
B4E0000
trusted library allocation
page read and write
40E7000
heap
page read and write
40C1000
heap
page read and write
7490000
trusted library allocation
page read and write
B869000
heap
page read and write
BAC5000
heap
page read and write
B814000
heap
page read and write
71E0000
trusted library allocation
page read and write
E782000
heap
page read and write
B7D5000
heap
page read and write
7410000
trusted library allocation
page read and write
B7B0000
heap
page read and write
B7B0000
heap
page read and write
E78D000
heap
page read and write
7490000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
7945000
heap
page read and write
B76D000
heap
page read and write
B7E7000
heap
page read and write
E430000
heap
page read and write
B9AF000
heap
page read and write
7143000
trusted library allocation
page read and write
7968000
heap
page read and write
E716000
heap
page read and write
E71C000
heap
page read and write
BA9A000
heap
page read and write
EEC000
heap
page read and write
73D0000
trusted library allocation
page read and write
B7F1000
heap
page read and write
9262000
heap
page read and write
B76A000
heap
page read and write
B8A4000
heap
page read and write
B7CF000
heap
page read and write
7143000
trusted library allocation
page read and write
E716000
heap
page read and write
B85C000
heap
page read and write
7740000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
B7E7000
heap
page read and write
7078000
heap
page read and write
7720000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
90B2000
heap
page read and write
B888000
heap
page read and write
BAA0000
heap
page read and write
B855000
heap
page read and write
7720000
trusted library allocation
page read and write
65CA000
heap
page read and write
69D0000
trusted library allocation
page read and write
B889000
heap
page read and write
E6F0000
heap
page read and write
7720000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
B718000
heap
page read and write
73D0000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
B75C000
heap
page read and write
B7C0000
heap
page read and write
E6FB000
heap
page read and write
77E0000
trusted library allocation
page read and write
906E000
heap
page read and write
40D8000
heap
page read and write
7410000
trusted library allocation
page read and write
92A8000
heap
page read and write
92F2000
heap
page read and write
B79C000
heap
page read and write
7140000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
E590000
heap
page read and write
E0D3000
heap
page read and write
B849000
heap
page read and write
937A000
heap
page read and write
E5BE000
heap
page read and write
E764000
heap
page read and write
93B0000
heap
page read and write
B8B4000
heap
page read and write
73F0000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
B869000
heap
page read and write
E04F000
heap
page read and write
B7AD000
heap
page read and write
E7AE000
heap
page read and write
7FD41000
trusted library allocation
page execute read
7400000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
B6C0000
trusted library allocation
page read and write
B7B0000
heap
page read and write
B756000
heap
page read and write
7720000
trusted library allocation
page read and write
6358000
trusted library allocation
page read and write
7AA0000
heap
page read and write
E02D000
heap
page read and write
E7BE000
heap
page read and write
E727000
heap
page read and write
D96E000
stack
page read and write
B8C7000
heap
page read and write
E793000
heap
page read and write
E787000
heap
page read and write
B848000
heap
page read and write
D90000
heap
page read and write
B7D5000
heap
page read and write
73F0000
trusted library allocation
page read and write
DAC0000
trusted library allocation
page read and write
7994000
heap
page read and write
73F0000
trusted library allocation
page read and write
B84B000
heap
page read and write
E733000
heap
page read and write
93F4000
heap
page read and write
B8AE000
heap
page read and write
7410000
trusted library allocation
page read and write
40DF000
heap
page read and write
4313000
trusted library allocation
page read and write
B950000
heap
page read and write
B7C0000
heap
page read and write
B6F0000
heap
page read and write
B774000
heap
page read and write
B500000
trusted library allocation
page read and write
B7BD000
heap
page read and write
40D3000
heap
page read and write
73D0000
trusted library allocation
page read and write
B4E0000
trusted library allocation
page read and write
4583000
trusted library allocation
page read and write
8FC000
stack
page read and write
E52C000
heap
page read and write
B720000
heap
page read and write
729C000
heap
page read and write
7490000
trusted library allocation
page read and write
B8A7000
heap
page read and write
7140000
trusted library allocation
page read and write
B7C0000
heap
page read and write
73D0000
trusted library allocation
page read and write
BA2C000
heap
page read and write
7230000
trusted library allocation
page read and write
926F000
heap
page read and write
B7C7000
heap
page read and write
DCFA000
heap
page read and write
B8D0000
heap
page read and write
E456000
heap
page read and write
E585000
heap
page read and write
E197000
heap
page read and write
91BC000
heap
page read and write
B764000
heap
page read and write
B77A000
heap
page read and write
B8B8000
heap
page read and write
B4F0000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
B8AE000
heap
page read and write
B8A6000
heap
page read and write
E004000
heap
page read and write
D3E0000
trusted library allocation
page read and write
7AC6000
heap
page read and write
B7AC000
heap
page read and write
7490000
trusted library allocation
page read and write
BAC2000
heap
page read and write
BA8F000
heap
page read and write
6C81000
heap
page read and write
7400000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
B981000
heap
page read and write
7360000
heap
page read and write
7150000
trusted library allocation
page read and write
B87F000
heap
page read and write
F2F000
heap
page read and write
E7BE000
heap
page read and write
7490000
trusted library allocation
page read and write
7AA6000
heap
page read and write
7410000
trusted library allocation
page read and write
BAC5000
heap
page read and write
7220000
trusted library allocation
page read and write
941F000
heap
page read and write
B814000
heap
page read and write
BAA0000
heap
page read and write
E0AE000
heap
page read and write
7490000
trusted library allocation
page read and write
E7A8000
heap
page read and write
B75C000
heap
page read and write
E1E3000
heap
page read and write
B7C0000
heap
page read and write
E74D000
heap
page read and write
73D0000
trusted library allocation
page read and write
468D000
trusted library allocation
page read and write
E72C000
heap
page read and write
7290000
trusted library allocation
page read and write
B7AC000
heap
page read and write
7490000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
E79E000
heap
page read and write
7490000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
D454000
trusted library allocation
page read and write
40DF000
heap
page read and write
E0A5000
heap
page read and write
70B8000
heap
page read and write
A8000
unkown
page readonly
336E000
stack
page read and write
3130000
heap
page read and write
B762000
heap
page read and write
79C9000
trusted library allocation
page read and write
40E5000
heap
page read and write
73F0000
trusted library allocation
page read and write
B7C7000
heap
page read and write
E31F000
heap
page read and write
30B4000
trusted library allocation
page read and write
9271000
heap
page read and write
B7E2000
heap
page read and write
B817000
heap
page read and write
D3E0000
trusted library allocation
page read and write
E731000
heap
page read and write
91E4000
heap
page read and write
E16D000
heap
page read and write
7490000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
40D8000
heap
page read and write
E7DF000
heap
page read and write
4319000
trusted library allocation
page execute and read and write
73D0000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
EEC000
heap
page read and write
B85A000
heap
page read and write
7400000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
73E2000
unkown
page readonly
E716000
heap
page read and write
E0CF000
heap
page read and write
E68000
heap
page read and write
117D000
heap
page read and write
3118000
stack
page read and write
E10000
heap
page read and write
7870000
trusted library allocation
page read and write
6CB19000
unkown
page readonly
E762000
heap
page read and write
9267000
heap
page read and write
69D0000
trusted library allocation
page read and write
BAA0000
heap
page read and write
7220000
trusted library allocation
page read and write
B6E0000
trusted library allocation
page read and write
F3C000
heap
page read and write
EEC000
heap
page read and write
9360000
heap
page read and write
657F000
stack
page read and write
BABE000
heap
page read and write
78F0000
trusted library allocation
page read and write
B7D5000
heap
page read and write
40DF000
heap
page read and write
B7CF000
heap
page read and write
E42F000
heap
page read and write
B706000
heap
page read and write
E702000
heap
page read and write
7490000
trusted library allocation
page read and write
B754000
heap
page read and write
E721000
heap
page read and write
8EE4000
heap
page read and write
7160000
trusted library section
page read and write
73D0000
trusted library allocation
page read and write
EFA000
heap
page read and write
E6FB000
heap
page read and write
BAA8000
heap
page read and write
DA90000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
30D0000
heap
page read and write
40D3000
heap
page read and write
B7C7000
heap
page read and write
7490000
trusted library allocation
page read and write
7FD33000
trusted library allocation
page execute read
B828000
heap
page read and write
E6DE000
heap
page read and write
E6CC000
heap
page read and write
B76D000
heap
page read and write
6FA4000
heap
page read and write
E6F5000
heap
page read and write
77A0000
trusted library allocation
page read and write
798D000
heap
page read and write
40DF000
heap
page read and write
73D0000
trusted library allocation
page read and write
3127000
trusted library allocation
page execute and read and write
40D3000
heap
page read and write
E6DE000
heap
page read and write
7710000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
B7C0000
heap
page read and write
41000
unkown
page execute read
70D0000
heap
page read and write
BAB1000
heap
page read and write
B851000
heap
page read and write
5351000
trusted library allocation
page read and write
B814000
heap
page read and write
5385000
trusted library allocation
page read and write
A2000
unkown
page read and write
40E5000
heap
page read and write
73F0000
trusted library allocation
page read and write
40D3000
heap
page read and write
73F0000
trusted library allocation
page read and write
E6DE000
heap
page read and write
B754000
heap
page read and write
7160000
trusted library allocation
page read and write
69FE000
unkown
page readonly
B7B7000
heap
page read and write
B86C000
heap
page read and write
73D0000
trusted library allocation
page read and write
6582000
unkown
page readonly
BA8F000
heap
page read and write
B7CF000
heap
page read and write
F08000
heap
page read and write
B8AE000
heap
page read and write
7490000
trusted library allocation
page read and write
E701000
heap
page read and write
73D0000
trusted library allocation
page read and write
B79C000
heap
page read and write
BA7E000
heap
page read and write
BA2C000
heap
page read and write
B7CF000
heap
page read and write
B9AF000
heap
page read and write
7400000
trusted library allocation
page read and write
B7B7000
heap
page read and write
7400000
trusted library allocation
page read and write
BA7E000
heap
page read and write
B855000
heap
page read and write
E1F3000
heap
page read and write
6C80000
heap
page read and write
7941000
heap
page read and write
7410000
trusted library allocation
page read and write
7870000
heap
page read and write
7800000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
BA00000
heap
page read and write
D472000
trusted library allocation
page read and write
E7C5000
heap
page read and write
40DF000
heap
page read and write
B84B000
heap
page read and write
A2000
unkown
page read and write
40D3000
heap
page read and write
B7E0000
heap
page read and write
B87B000
heap
page read and write
683C000
stack
page read and write
7410000
trusted library allocation
page read and write
E7C2000
heap
page read and write
7410000
trusted library allocation
page read and write
E269000
heap
page read and write
7490000
trusted library allocation
page read and write
6D27000
heap
page read and write
E218000
heap
page read and write
B4A0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
B87F000
heap
page read and write
B7AA000
heap
page read and write
E788000
heap
page read and write
DD46000
heap
page read and write
E021000
heap
page read and write
40C1000
heap
page read and write
73F0000
trusted library allocation
page read and write
715F000
trusted library allocation
page read and write
B8C3000
heap
page read and write
41DD000
trusted library allocation
page execute and read and write
E787000
heap
page read and write
B83E000
heap
page read and write
7490000
trusted library allocation
page read and write
747E000
unkown
page readonly
E70C000
heap
page read and write
B7C1000
heap
page read and write
D993000
heap
page read and write
B8DC000
heap
page read and write
E782000
heap
page read and write
D440000
trusted library allocation
page read and write
BAAE000
heap
page read and write
E721000
heap
page read and write
E79E000
heap
page read and write
B74E000
heap
page read and write
E513000
heap
page read and write
1350000
heap
page read and write
E829000
heap
page read and write
9258000
heap
page read and write
73F0000
trusted library allocation
page read and write
6EC0000
trusted library section
page read and write
73D0000
trusted library allocation
page read and write
B87F000
heap
page read and write
7490000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
E7B3000
heap
page read and write
E237000
heap
page read and write
BAC5000
heap
page read and write
E7A8000
heap
page read and write
B83A000
heap
page read and write
E5EF000
heap
page read and write
6F30000
heap
page read and write
940A000
heap
page read and write
73D0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
B7C4000
heap
page read and write
40EB000
heap
page read and write
73D0000
trusted library allocation
page read and write
40DF000
heap
page read and write
B853000
heap
page read and write
BAA8000
heap
page read and write
B889000
heap
page read and write
E381000
heap
page read and write
BAA5000
heap
page read and write
E70C000
heap
page read and write
BAC2000
heap
page read and write
BAC0000
heap
page read and write
B85E000
heap
page read and write
BA5F000
heap
page read and write
6FCF000
heap
page read and write
7FD4D000
trusted library allocation
page execute read
BAA5000
heap
page read and write
E85A000
heap
page read and write
79B8000
heap
page read and write
B7D1000
heap
page read and write
E764000
heap
page read and write
B70F000
heap
page read and write
B8A7000
heap
page read and write
B8A6000
heap
page read and write
78CA000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
40D8000
heap
page read and write
6DBE000
stack
page read and write
73D0000
trusted library allocation
page read and write
B9FB000
heap
page read and write
78BE000
trusted library allocation
page read and write
B764000
heap
page read and write
7410000
trusted library allocation
page read and write
B763000
heap
page read and write
B85C000
heap
page read and write
E770000
heap
page read and write
B7C7000
heap
page read and write
E04B000
heap
page read and write
9241000
heap
page read and write
7490000
trusted library allocation
page read and write
7FD49000
trusted library allocation
page execute read
40EA000
heap
page read and write
7720000
trusted library allocation
page read and write
E77000
heap
page read and write
B858000
heap
page read and write
40D3000
heap
page read and write
79D1000
trusted library allocation
page read and write
B75C000
heap
page read and write
B76D000
heap
page read and write
40E2000
heap
page read and write
1142000
heap
page read and write
B6C0000
trusted library allocation
page read and write
E22D000
heap
page read and write
B8A4000
heap
page read and write
7410000
trusted library allocation
page read and write
B7B0000
heap
page read and write
B7E3000
heap
page read and write
B7B7000
heap
page read and write
BA52000
heap
page read and write
DAA0000
trusted library allocation
page read and write
B4B0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
E794000
heap
page read and write
7240000
trusted library allocation
page read and write
7422000
unkown
page readonly
B989000
heap
page read and write
B7B7000
heap
page read and write
B76D000
heap
page read and write
B7C7000
heap
page read and write
40EB000
heap
page read and write
D440000
trusted library allocation
page read and write
B743000
heap
page read and write
687C000
stack
page read and write
B7E2000
heap
page read and write
30A0000
heap
page read and write
7400000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
BAA0000
heap
page read and write
B897000
heap
page read and write
93EF000
heap
page read and write
E060000
heap
page read and write
E04A000
heap
page read and write
B867000
heap
page read and write
B762000
heap
page read and write
73D0000
trusted library allocation
page read and write
9277000
heap
page read and write
B8BF000
heap
page read and write
7490000
trusted library allocation
page read and write
B8C7000
heap
page read and write
B7C1000
heap
page read and write
1176000
heap
page read and write
40A8000
heap
page read and write
40C0000
heap
page read and write
3120000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
7997000
heap
page read and write
B94B000
heap
page read and write
7160000
trusted library allocation
page read and write
B92E000
heap
page read and write
B774000
heap
page read and write
40DF000
heap
page read and write
BAB5000
heap
page read and write
7730000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
E72C000
heap
page read and write
DB00000
trusted library section
page read and write
7327000
heap
page read and write
E596000
heap
page read and write
8F30000
heap
page read and write
73F0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
BA5D000
heap
page read and write
B7D5000
heap
page read and write
7490000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
E72C000
heap
page read and write
2FA0000
heap
page read and write
BAB5000
heap
page read and write
7170000
trusted library allocation
page read and write
B851000
heap
page read and write
B4C0000
trusted library section
page readonly
E6D2000
heap
page read and write
EC8000
heap
page read and write
430E000
stack
page read and write
73F0000
trusted library allocation
page read and write
926D000
heap
page read and write
75FB000
stack
page read and write
71D0000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
B91C000
heap
page read and write
6FFC000
heap
page read and write
73D0000
trusted library allocation
page read and write
705D000
heap
page read and write
E6F0000
heap
page read and write
73F0000
trusted library allocation
page read and write
7FD36000
trusted library allocation
page execute read
B824000
heap
page read and write
7FD58000
trusted library allocation
page execute read
7240000
trusted library allocation
page read and write
7FD5A000
trusted library allocation
page execute read
8F56000
heap
page read and write
B863000
heap
page read and write
E7DF000
heap
page read and write
7720000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
6D1C000
heap
page read and write
B817000
heap
page read and write
65A0000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
E727000
heap
page read and write
40D3000
heap
page read and write
7410000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
DB0E000
heap
page read and write
73D0000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
E70C000
heap
page read and write
7490000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
B774000
heap
page read and write
E0D6000
heap
page read and write
2E10000
heap
page read and write
7730000
trusted library allocation
page read and write
40D3000
heap
page read and write
93BC000
heap
page read and write
457F000
trusted library allocation
page read and write
78C7000
trusted library allocation
page read and write
E6F0000
heap
page read and write
B756000
heap
page read and write
7AC6000
heap
page read and write
B77A000
heap
page read and write
91B2000
heap
page read and write
B7C0000
heap
page read and write
7220000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
B7D5000
heap
page read and write
33F0000
trusted library allocation
page read and write
BAA0000
heap
page read and write
69D0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7AB3000
heap
page read and write
798C000
heap
page read and write
E1A9000
heap
page read and write
B7D1000
heap
page read and write
40BA000
heap
page read and write
7410000
trusted library allocation
page read and write
E7B9000
heap
page read and write
7FD52000
trusted library allocation
page execute read
B7AC000
heap
page read and write
7400000
trusted library allocation
page read and write
E055000
heap
page read and write
B83A000
heap
page read and write
E6FB000
heap
page read and write
BAB5000
heap
page read and write
8F2E000
heap
page read and write
B85C000
heap
page read and write
7ABD000
heap
page read and write
E7DE000
heap
page read and write
73F0000
trusted library allocation
page read and write
B87F000
heap
page read and write
E091000
heap
page read and write
E701000
heap
page read and write
B7C4000
heap
page read and write
7410000
trusted library allocation
page read and write
B7BD000
heap
page read and write
E0E2000
heap
page read and write
E1C7000
heap
page read and write
7220000
trusted library allocation
page read and write
32DE000
stack
page read and write
73D0000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
74AC000
trusted library allocation
page read and write
BA42000
heap
page read and write
7C10000
trusted library allocation
page read and write
1220000
heap
page read and write
73D0000
trusted library allocation
page read and write
40C0000
heap
page read and write
E793000
heap
page read and write
2E70000
heap
page read and write
EFA000
heap
page read and write
B883000
heap
page read and write
B82C000
heap
page read and write
40D3000
heap
page read and write
BA72000
heap
page read and write
B848000
heap
page read and write
E169000
heap
page read and write
BABE000
heap
page read and write
7145000
trusted library allocation
page read and write
B7B7000
heap
page read and write
9192000
heap
page read and write
9194000
heap
page read and write
E08B000
heap
page read and write
919F000
heap
page read and write
7FD3D000
trusted library allocation
page execute read
B7D0000
heap
page read and write
DB2E000
heap
page read and write
7810000
trusted library allocation
page read and write
9422000
heap
page read and write
B8A7000
heap
page read and write
40BE000
heap
page read and write
7982000
heap
page read and write
B7AB000
heap
page read and write
E129000
heap
page read and write
7490000
trusted library allocation
page read and write
B851000
heap
page read and write
7900000
heap
page read and write
E798000
heap
page read and write
BAB5000
heap
page read and write
7983000
heap
page read and write
7400000
trusted library allocation
page read and write
BAC2000
heap
page read and write
73D0000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
E731000
heap
page read and write
B889000
heap
page read and write
E315000
heap
page read and write
BA10000
heap
page read and write
E764000
heap
page read and write
73F0000
trusted library allocation
page read and write
40EA000
heap
page read and write
E09A000
heap
page read and write
DEFE000
stack
page read and write
E78D000
heap
page read and write
40E8000
heap
page read and write
7230000
trusted library allocation
page read and write
B855000
heap
page read and write
E762000
heap
page read and write
7410000
trusted library allocation
page read and write
40DF000
heap
page read and write
74A0000
trusted library allocation
page read and write
92FD000
heap
page read and write
73D0000
trusted library allocation
page read and write
7AB0000
heap
page read and write
7410000
trusted library allocation
page read and write
B853000
heap
page read and write
B897000
heap
page read and write
B83A000
heap
page read and write
BABE000
heap
page read and write
E7F7000
heap
page read and write
73F0000
trusted library allocation
page read and write
91CD000
heap
page read and write
7150000
trusted library allocation
page read and write
40E9000
heap
page read and write
7490000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
7039000
heap
page read and write
BAAA000
heap
page read and write
73D0000
trusted library allocation
page read and write
B79C000
heap
page read and write
40D3000
heap
page read and write
B754000
heap
page read and write
E6DE000
heap
page read and write
B762000
heap
page read and write
E1F8000
heap
page read and write
B6C0000
trusted library allocation
page read and write
B7B7000
heap
page read and write
E71C000
heap
page read and write
73F0000
trusted library allocation
page read and write
E6F0000
heap
page read and write
40B8000
heap
page read and write
E608000
heap
page read and write
7140000
trusted library allocation
page read and write
B8A7000
heap
page read and write
7860000
trusted library allocation
page read and write
B7BD000
heap
page read and write
7140000
trusted library allocation
page read and write
E41000
heap
page read and write
DD3D000
heap
page read and write
91AA000
heap
page read and write
78E0000
trusted library allocation
page read and write
C60000
heap
page read and write
BACC000
heap
page read and write
B94B000
heap
page read and write
40D3000
heap
page read and write
B4E0000
trusted library allocation
page read and write
E7C2000
heap
page read and write
E15E000
heap
page read and write
6FF9000
heap
page read and write
93E4000
heap
page read and write
7490000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
B863000
heap
page read and write
7140000
trusted library allocation
page read and write
B8BA000
heap
page read and write
D98D000
heap
page read and write
E564000
heap
page read and write
B721000
heap
page read and write
32E0000
trusted library allocation
page execute and read and write
E52000
heap
page read and write
EEA000
heap
page read and write
7490000
trusted library allocation
page read and write
E15C000
heap
page read and write
7AB6000
heap
page read and write
B6E0000
trusted library allocation
page read and write
3063000
heap
page read and write
B821000
heap
page read and write
B709000
heap
page read and write
B76D000
heap
page read and write
B7CF000
heap
page read and write
B4E0000
trusted library allocation
page read and write
B7C7000
heap
page read and write
78FE000
heap
page read and write
B940000
heap
page read and write
E721000
heap
page read and write
E169000
heap
page read and write
E52E000
heap
page read and write
B76D000
heap
page read and write
E770000
heap
page read and write
B897000
heap
page read and write
7230000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
E49D000
heap
page read and write
78FA000
heap
page read and write
E7BF000
heap
page read and write
D3E0000
trusted library allocation
page read and write
BAAE000
heap
page read and write
7490000
trusted library allocation
page read and write
B75C000
heap
page read and write
73F0000
trusted library allocation
page read and write
7008000
heap
page read and write
B8D0000
heap
page read and write
73D0000
trusted library allocation
page read and write
B85A000
heap
page read and write
73D0000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
B888000
heap
page read and write
B739000
heap
page read and write
BAC5000
heap
page read and write
B6C0000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
E3F5000
heap
page read and write
7AD1000
heap
page read and write
7A70000
remote allocation
page read and write
B7B7000
heap
page read and write
7170000
trusted library allocation
page read and write
40DF000
heap
page read and write
73F0000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
B7B7000
heap
page read and write
BA54000
heap
page read and write
2F90000
trusted library allocation
page read and write
F94000
heap
page read and write
73D0000
trusted library allocation
page read and write
E39000
heap
page read and write
2F40000
heap
page read and write
7410000
trusted library allocation
page read and write
B869000
heap
page read and write
E6D2000
heap
page read and write
7400000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
4200000
heap
page read and write
69A0000
trusted library allocation
page read and write
E11D000
heap
page read and write
64EE000
stack
page read and write
A8000
unkown
page readonly
E706000
heap
page read and write
E28C000
heap
page read and write
91DE000
heap
page read and write
71E0000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
CF8000
stack
page read and write
7410000
trusted library allocation
page read and write
40D8000
heap
page read and write
79B8000
heap
page read and write
E798000
heap
page read and write
78F4000
heap
page read and write
E727000
heap
page read and write
7410000
trusted library allocation
page read and write
B814000
heap
page read and write
7490000
trusted library allocation
page read and write
2F8E000
stack
page read and write
73F0000
trusted library allocation
page read and write
7FD39000
trusted library allocation
page execute read
EFA000
heap
page read and write
7951000
heap
page read and write
7220000
trusted library allocation
page read and write
B8A7000
heap
page read and write
B815000
heap
page read and write
73E0000
trusted library allocation
page read and write
31B0000
heap
page read and write
B848000
heap
page read and write
91A9000
heap
page read and write
E727000
heap
page read and write
B8A4000
heap
page read and write
7AAD000
heap
page read and write
B93E000
heap
page read and write
DEBE000
stack
page read and write
9285000
heap
page read and write
40000
unkown
page readonly
6FD5000
heap
page read and write
793B000
heap
page read and write
B74E000
heap
page read and write
B9C7000
heap
page read and write
B7D5000
heap
page read and write
697C000
stack
page read and write
7962000
heap
page read and write
E7A3000
heap
page read and write
7A70000
remote allocation
page read and write
7220000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
3030000
heap
page read and write
73D0000
trusted library allocation
page read and write
B620000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
B721000
heap
page read and write
8E9B000
heap
page read and write
7150000
trusted library allocation
page read and write
B7C4000
heap
page read and write
E691000
heap
page read and write
7989000
heap
page read and write
40000
unkown
page readonly
4340000
heap
page read and write
7140000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
9E0000
heap
page read and write
7220000
trusted library allocation
page read and write
B897000
heap
page read and write
B7C4000
heap
page read and write
7220000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
1226000
heap
page read and write
EEC000
heap
page read and write
73D0000
trusted library allocation
page read and write
B943000
heap
page read and write
69E0000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
79CD000
trusted library allocation
page read and write
BA10000
heap
page read and write
B7AB000
heap
page read and write
E7BE000
heap
page read and write
E6F5000
heap
page read and write
E52000
heap
page read and write
7FD51000
trusted library allocation
page readonly
7730000
trusted library allocation
page read and write
BA22000
heap
page read and write
7490000
trusted library allocation
page read and write
B66F000
heap
page read and write
73D0000
trusted library allocation
page read and write
40E5000
heap
page read and write
73D0000
trusted library allocation
page read and write
40DF000
heap
page read and write
B853000
heap
page read and write
73F0000
trusted library allocation
page read and write
BA95000
heap
page read and write
E78D000
heap
page read and write
B65D000
stack
page read and write
40BE000
heap
page read and write
BAC2000
heap
page read and write
B889000
heap
page read and write
73D0000
trusted library allocation
page read and write
DA80000
trusted library allocation
page read and write
B7D1000
heap
page read and write
79C7000
trusted library allocation
page read and write
E58000
heap
page read and write
7460000
unkown
page readonly
9109000
heap
page read and write
B814000
heap
page read and write
B824000
heap
page read and write
B77A000
heap
page read and write
73D0000
trusted library allocation
page read and write
9166000
heap
page read and write
E6DE000
heap
page read and write
B7C4000
heap
page read and write
78B0000
trusted library allocation
page read and write
B86C000
heap
page read and write
7490000
trusted library allocation
page read and write
B739000
heap
page read and write
155000
unkown
page readonly
40D3000
heap
page read and write
E70C000
heap
page read and write
6D59000
heap
page read and write
E6F5000
heap
page read and write
73D0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
B894000
heap
page read and write
4096000
heap
page read and write
7FD45000
trusted library allocation
page execute read
7490000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
BABB000
heap
page read and write
B756000
heap
page read and write
40000
unkown
page readonly
B7B0000
heap
page read and write
73F0000
trusted library allocation
page read and write
D3B3000
trusted library allocation
page read and write
6981000
trusted library allocation
page read and write
85000
unkown
page readonly
7490000
trusted library allocation
page read and write
B814000
heap
page read and write
155000
unkown
page readonly
E71C000
heap
page read and write
BA32000
heap
page read and write
E6FB000
heap
page read and write
7AD6000
heap
page read and write
941A000
heap
page read and write
B7C7000
heap
page read and write
8EE2000
heap
page read and write
2E80000
heap
page read and write
B762000
heap
page read and write
B83A000
heap
page read and write
B7D5000
heap
page read and write
BAB3000
heap
page read and write
BAC7000
heap
page read and write
B762000
heap
page read and write
E765000
heap
page read and write
4082000
heap
page read and write
BAAC000
heap
page read and write
7490000
trusted library allocation
page read and write
D9C1000
heap
page read and write
B7B7000
heap
page read and write
7490000
trusted library allocation
page read and write
7082000
heap
page read and write
E3C8000
heap
page read and write
D3E8000
trusted library allocation
page read and write
E711000
heap
page read and write
332E000
stack
page read and write
B8AA000
heap
page read and write
41C0000
trusted library allocation
page read and write
146000
unkown
page readonly
7720000
trusted library allocation
page read and write
DAA0000
trusted library section
page read and write
71E0000
trusted library allocation
page read and write
E706000
heap
page read and write
E7A3000
heap
page read and write
B690000
trusted library allocation
page read and write
E5C5000
heap
page read and write
7410000
trusted library allocation
page read and write
DAE7000
heap
page read and write
E1ED000
heap
page read and write
7400000
trusted library allocation
page read and write
9349000
heap
page read and write
E192000
heap
page read and write
B7B0000
heap
page read and write
77C0000
trusted library allocation
page read and write
E7BE000
heap
page read and write
B7F1000
heap
page read and write
40E5000
heap
page read and write
B9E1000
heap
page read and write
7985000
heap
page read and write
7410000
trusted library allocation
page read and write
BAAA000
heap
page read and write
E7A4000
heap
page read and write
B7C1000
heap
page read and write
7140000
trusted library allocation
page read and write
B7A9000
heap
page read and write
B84B000
heap
page read and write
3080000
trusted library allocation
page read and write
B87B000
heap
page read and write
7490000
trusted library allocation
page read and write
9116000
heap
page read and write
7ABD000
heap
page read and write
7140000
trusted library allocation
page read and write
E6FB000
heap
page read and write
E7AE000
heap
page read and write
73D0000
trusted library allocation
page read and write
B77A000
heap
page read and write
E7B3000
heap
page read and write
E1D2000
heap
page read and write
E2B4000
heap
page read and write
7490000
trusted library allocation
page read and write
91E3000
heap
page read and write
40B7000
heap
page read and write
301E000
stack
page read and write
40C0000
heap
page read and write
2F80000
heap
page read and write
74B0000
trusted library allocation
page read and write
E4E2000
heap
page read and write
B90E000
heap
page read and write
B8D0000
heap
page read and write
7400000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
B7BD000
heap
page read and write
7490000
trusted library allocation
page read and write
B756000
heap
page read and write
40D0000
heap
page read and write
6CB00000
unkown
page readonly
E05A000
heap
page read and write
DAD0000
trusted library allocation
page read and write
B820000
heap
page read and write
7908000
heap
page read and write
73D0000
trusted library allocation
page read and write
E71C000
heap
page read and write
7400000
trusted library allocation
page read and write
E1AE000
heap
page read and write
71E4000
trusted library allocation
page read and write
1330000
heap
page read and write
73D0000
trusted library allocation
page read and write
E7A3000
heap
page read and write
E0C8000
heap
page read and write
91DA000
heap
page read and write
41F0000
trusted library allocation
page read and write
732F000
heap
page read and write
B7B7000
heap
page read and write
40E5000
heap
page read and write
B7B0000
heap
page read and write
BA38000
heap
page read and write
B7AA000
heap
page read and write
7150000
trusted library allocation
page read and write
E1A6000
heap
page read and write
73D0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
146000
unkown
page readonly
7730000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
B6C0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6530000
heap
page execute and read and write
7987000
heap
page read and write
7490000
trusted library allocation
page read and write
B851000
heap
page read and write
E6F0000
heap
page read and write
BAB3000
heap
page read and write
D430000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
70BF000
heap
page read and write
7490000
trusted library allocation
page read and write
6CB10000
unkown
page readonly
73D0000
trusted library allocation
page read and write
E7DF000
heap
page read and write
7400000
trusted library allocation
page read and write
85000
unkown
page readonly
73D0000
trusted library allocation
page read and write
E7F7000
heap
page read and write
B774000
heap
page read and write
40B8000
heap
page read and write
B7EE000
heap
page read and write
3094000
trusted library allocation
page read and write
A8000
unkown
page readonly
40D8000
heap
page read and write
40000
unkown
page readonly
BAAA000
heap
page read and write
7400000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
BAC6000
heap
page read and write
BAB5000
heap
page read and write
E541000
heap
page read and write
11D0000
heap
page read and write
B6B3000
heap
page read and write
E68000
heap
page read and write
B7A9000
heap
page read and write
E5CE000
heap
page read and write
B912000
heap
page read and write
2E40000
heap
page read and write
915D000
heap
page read and write
7400000
trusted library allocation
page read and write
EEA000
heap
page read and write
7150000
trusted library allocation
page read and write
40E9000
heap
page read and write
E076000
heap
page read and write
6611000
heap
page read and write
73F0000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
E6DE000
heap
page read and write
73D0000
trusted library allocation
page read and write
B8A7000
heap
page read and write
B72B000
heap
page read and write
7A80000
trusted library allocation
page read and write
BAC2000
heap
page read and write
6D0D000
heap
page read and write
7410000
trusted library allocation
page read and write
E36000
heap
page read and write
B7C7000
heap
page read and write
BAC5000
heap
page read and write
B4E0000
trusted library allocation
page read and write
E793000
heap
page read and write
B855000
heap
page read and write
7410000
trusted library allocation
page read and write
155000
unkown
page readonly
55F9000
trusted library allocation
page read and write
7942000
heap
page read and write
B7AD000
heap
page read and write
40E3000
heap
page read and write
77D0000
trusted library allocation
page read and write
B6B0000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
B8C7000
heap
page read and write
7410000
trusted library allocation
page read and write
90EB000
heap
page read and write
E11A000
heap
page read and write
BAA8000
heap
page read and write
7410000
trusted library allocation
page read and write
40DB000
heap
page read and write
7840000
heap
page read and write
73F0000
trusted library allocation
page read and write
B718000
heap
page read and write
B7E7000
heap
page read and write
B85A000
heap
page read and write
B853000
heap
page read and write
40D3000
heap
page read and write
40E5000
heap
page read and write
B7AD000
heap
page read and write
7490000
trusted library allocation
page read and write
DB20000
trusted library section
page read and write
73F0000
trusted library allocation
page read and write
B7EE000
heap
page read and write
40D3000
heap
page read and write
E15F000
heap
page read and write
E70C000
heap
page read and write
B7C7000
heap
page read and write
7400000
trusted library allocation
page read and write
BA5E000
heap
page read and write
7FD3A000
trusted library allocation
page readonly
B75A000
heap
page read and write
B7E3000
heap
page read and write
E758000
heap
page read and write
919C000
heap
page read and write
B767000
heap
page read and write
B820000
heap
page read and write
ED3000
heap
page read and write
92A2000
heap
page read and write
B7B7000
heap
page read and write
69F0000
unkown
page readonly
B7DF000
heap
page read and write
7145000
trusted library allocation
page read and write
7FD30000
trusted library allocation
page readonly
E070000
heap
page read and write
E48000
heap
page read and write
B894000
heap
page read and write
B873000
heap
page read and write
2CEE000
stack
page read and write
BA4B000
heap
page read and write
E6D2000
heap
page read and write
93D3000
heap
page read and write
40E8000
heap
page read and write
92BE000
heap
page read and write
7A70000
trusted library allocation
page read and write
40E5000
heap
page read and write
B77A000
heap
page read and write
9181000
heap
page read and write
40E9000
heap
page read and write
79C2000
heap
page read and write
73D0000
trusted library allocation
page read and write
B7E0000
heap
page read and write
B821000
heap
page read and write
2DF0000
trusted library allocation
page read and write
B7D3000
heap
page read and write
4AAE000
trusted library allocation
page read and write
9283000
heap
page read and write
7150000
trusted library allocation
page read and write
B87B000
heap
page read and write
794C000
heap
page read and write
B7BD000
heap
page read and write
9358000
heap
page read and write
B75E000
heap
page read and write
3090000
trusted library allocation
page read and write
E7DF000
heap
page read and write
B85C000
heap
page read and write
7490000
trusted library allocation
page read and write
E3F6000
heap
page read and write
7140000
trusted library allocation
page read and write
7325000
heap
page read and write
BAB3000
heap
page read and write
41000
unkown
page execute read
7150000
trusted library allocation
page read and write
E1A7000
heap
page read and write
7400000
trusted library allocation
page read and write
BA2C000
heap
page read and write
B7BD000
heap
page read and write
B7AB000
heap
page read and write
7410000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
B873000
heap
page read and write
D430000
trusted library allocation
page read and write
BABE000
heap
page read and write
BAAE000
heap
page read and write
DAE0000
trusted library section
page read and write
E727000
heap
page read and write
40DF000
heap
page read and write
E7CE000
heap
page read and write
B7D5000
heap
page read and write
7220000
trusted library allocation
page read and write
7949000
heap
page read and write
BAAB000
heap
page read and write
B4E0000
trusted library allocation
page read and write
B7D3000
heap
page read and write
7140000
trusted library allocation
page read and write
9411000
heap
page read and write
BAA8000
heap
page read and write
B821000
heap
page read and write
E7A8000
heap
page read and write
7220000
trusted library allocation
page read and write
78E0000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
E706000
heap
page read and write
E575000
heap
page read and write
79BE000
heap
page read and write
40E9000
heap
page read and write
BA10000
heap
page read and write
40BA000
heap
page read and write
7490000
trusted library allocation
page read and write
B848000
heap
page read and write
7220000
trusted library allocation
page read and write
B7BD000
heap
page read and write
40D8000
heap
page read and write
7400000
trusted library allocation
page read and write
40E4000
heap
page read and write
B7D3000
heap
page read and write
7490000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
E51A000
heap
page read and write
E7AE000
heap
page read and write
B873000
heap
page read and write
73D1000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
There are 2858 hidden memdumps, click here to show them.