IOC Report

loading gif

Files

File Path
Type
Category
Malicious
smphost.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\6\5507.ocx
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_regsvr32.exe_6a6ca821ebbab05224d67cc3f7b1b60df6be9b5_7a325c51_102a2f91\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16CB.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1CD7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFB43.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Jan 30 21:43:59 2022, 0x1205a4 type
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_regsvr32.exe_e8da9d9d47a999f039c77c46f5a596d8854d75e_7a325c51_195cb6b3\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E8B.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2AB2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFBA1.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Jan 30 21:31:02 2022, 0x1205a4 type
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\smphost.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /i /s C:\Users\user\Desktop\smphost.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\smphost.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\smphost.dll,DllInstall
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\smphost.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\smphost.dll,DllUnregisterServer
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /MO 3 /TN 5507 /TR "%windir%\system32\regsvr32.exe -e C:\ProgramData\6\5507.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe -e C:\ProgramData\6\5507.ocx
malicious
C:\Windows\SysWOW64\regsvr32.exe
-e C:\ProgramData\6\5507.ocx
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\smphost.dll"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6260 -s 2076
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 2064
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://manageintel.com/WUzZRUBQje/Auth.php
185.14.31.158
malicious
https://manageintel.com/RKyiihqXQiyE/xukYadevoVow/QXms.xml
185.14.31.158
malicious
https://manageintel.com/RKyiihqXQiyE/xukYadevoVow/BhJM.xml
185.14.31.158
malicious
https://manageintel.com/WUzZRUBQje/vAtVEC.xml
185.14.31.158
malicious
https://the.earth.li/~sgtatham/putty/latest/w64/putty.exe
93.93.131.124
https://the.earth.li/~sgtatham/putty/0.76/w64/putty.exe
93.93.131.124
https://manageintel.com/
unknown

Domains

Name
IP
Malicious
manageintel.com
185.14.31.158
malicious
the.earth.li
93.93.131.124

IPs

IP
Domain
Country
Malicious
185.14.31.158
manageintel.com
Ukraine
malicious
93.93.131.124
the.earth.li
United Kingdom
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
ProgramId
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
FileId
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
LowerCaseLongPath
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
LongPathHash
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Name
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Publisher
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Version
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
BinFileVersion
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
BinaryType
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
ProductName
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
ProductVersion
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
LinkDate
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
BinProductVersion
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Size
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Language
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
IsPeFile
\REGISTRY\A\{9c0f2aa1-ed1f-4c3f-e840-9922186e3c05}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
ProgramId
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
FileId
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
LowerCaseLongPath
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
LongPathHash
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Name
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Publisher
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Version
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
BinFileVersion
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
BinaryType
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
ProductName
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
ProductVersion
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
LinkDate
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
BinProductVersion
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Size
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Language
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
IsPeFile
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
IsOsComponent
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
D64000
heap
page read and write
D64000
heap
page read and write
21AB9513000
unkown
page read and write
5247000
trusted library allocation
page read and write
1AFBAF87000
unkown
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
4CBA000
trusted library allocation
page read and write
BD6000
heap
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
50BE000
trusted library allocation
page read and write
C5E000
heap
page read and write
FBA277E000
stack
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
52E7000
trusted library allocation
page read and write
C5E000
heap
page read and write
4AB1000
heap
page read and write
B30000
trusted library allocation
page read and write
FBA207E000
stack
page read and write
1AFBAFB5000
unkown
page read and write
E35000
heap
page read and write
1AFBB402000
unkown
page read and write
C57000
heap
page read and write
1EF5F200000
unkown
page read and write
5151000
trusted library allocation
page read and write
C5E000
heap
page read and write
5151000
trusted library allocation
page read and write
4D5D000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C55000
heap
page read and write
6E9F5000
unkown
page readonly
51CC000
trusted library allocation
page read and write
D64000
heap
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
C02067E000
stack
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
50B9000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
D37000
heap
page read and write
C57000
heap
page read and write
507E000
trusted library allocation
page read and write
21AB9508000
unkown
page read and write
2C989C54000
unkown
page read and write
1AFBA866000
unkown
page read and write
4A60000
trusted library allocation
page read and write
C57000
heap
page read and write
52D7000
trusted library allocation
page read and write
2AA230E4000
unkown
page read and write
4C75000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
D37000
heap
page read and write
1EF5F315000
unkown
page read and write
5151000
trusted library allocation
page read and write
FBA21FB000
stack
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
D37000
heap
page read and write
C5E000
heap
page read and write
4C6B000
trusted library allocation
page read and write
1AFBAF7E000
unkown
page read and write
5074000
trusted library allocation
page read and write
C57000
heap
page read and write
1AFBAF9F000
unkown
page read and write
5051000
trusted library allocation
page read and write
2C989C6A000
unkown
page read and write
C5E000
heap
page read and write
D37000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
5074000
trusted library allocation
page read and write
B3C000
heap
page read and write
BB3000
heap
page read and write
1AFBAF77000
unkown
page read and write
D64000
heap
page read and write
6F6D5000
unkown
page readonly
1EF5F613000
unkown
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
4CBA000
trusted library allocation
page read and write
C5E000
heap
page read and write
C01000
heap
page read and write
4D5D000
trusted library allocation
page read and write
E4B000
heap
page read and write
21AB9454000
unkown
page read and write
4B61000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
C02057D000
stack
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
4D44000
trusted library allocation
page read and write
C5E000
heap
page read and write
5074000
trusted library allocation
page read and write
D64000
heap
page read and write
E7A78FE000
stack
page read and write
C01000
heap
page read and write
5051000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
2C989C89000
unkown
page read and write
1AFBA8D2000
unkown
page read and write
C5E000
heap
page read and write
9DA847C000
stack
page read and write
509A000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
1AFBAF1B000
unkown
page read and write
D74000
heap
page read and write
D64000
heap
page read and write
4AB1000
heap
page read and write
5051000
trusted library allocation
page read and write
2D5029B0000
heap
page read and write
1EF5F228000
unkown
page read and write
21C22062000
unkown
page read and write
4AB1000
heap
page read and write
2F4F000
stack
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
1AFBA8E8000
unkown
page read and write
C5E000
heap
page read and write
4C77000
trusted library allocation
page read and write
C57000
heap
page read and write
1AFBAF73000
unkown
page read and write
BB3000
heap
page read and write
509A000
trusted library allocation
page read and write
F5870FE000
stack
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
21C22108000
unkown
page read and write
4C7C000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
2FC0000
heap
page read and write
D37000
heap
page read and write
C5E000
heap
page read and write
A80000
unkown
page readonly
D37000
heap
page read and write
C5E000
heap
page read and write
1AFBA880000
unkown
page read and write
C5E000
heap
page read and write
1AFBAF83000
unkown
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
50C9000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
D4B000
heap
page read and write
21AB946E000
unkown
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
E7A7BFE000
stack
page read and write
E70000
trusted library allocation
page read and write
A6A1977000
stack
page read and write
353C000
heap
page read and write
1AFBAF24000
unkown
page read and write
D0B000
heap
page read and write
2C989C56000
unkown
page read and write
5580000
heap
page read and write
4CBA000
trusted library allocation
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
5074000
trusted library allocation
page read and write
5089000
trusted library allocation
page read and write
C5E000
heap
page read and write
5074000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
C57000
heap
page read and write
1AFBAF7F000
unkown
page read and write
D64000
heap
page read and write
BA0000
heap
page read and write
509A000
trusted library allocation
page read and write
C57000
heap
page read and write
52B0000
heap
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
4AB1000
heap
page read and write
5151000
trusted library allocation
page read and write
1AFBAF94000
unkown
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
1AFBAFB5000
unkown
page read and write
9DA857E000
stack
page read and write
4AB1000
heap
page read and write
518E000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
D74000
heap
page read and write
50C9000
trusted library allocation
page read and write
1AFBAF6F000
unkown
page read and write
509A000
trusted library allocation
page read and write
C5E000
heap
page read and write
32D0000
heap
page read and write
1AFBAF7D000
unkown
page read and write
51D0000
remote allocation
page read and write
B20000
heap
page read and write
D64000
heap
page read and write
3510000
heap
page read and write
5074000
trusted library allocation
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
50BB000
trusted library allocation
page read and write
C5E000
heap
page read and write
513C000
trusted library allocation
page read and write
D37000
heap
page read and write
D64000
heap
page read and write
C18000
heap
page read and write
C57000
heap
page read and write
A6A167E000
stack
page read and write
C5E000
heap
page read and write
4AB1000
heap
page read and write
5350000
trusted library allocation
page read and write
4AB1000
heap
page read and write
C57000
heap
page read and write
1AFBAFD3000
unkown
page read and write
5074000
trusted library allocation
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
50C9000
trusted library allocation
page read and write
21AB948A000
unkown
page read and write
50C9000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
21C2205B000
unkown
page read and write
5151000
trusted library allocation
page read and write
D64000
heap
page read and write
563E000
stack
page read and write
51CC000
trusted library allocation
page read and write
21C22085000
unkown
page read and write
1AFBAFBC000
unkown
page read and write
C5E000
heap
page read and write
5074000
trusted library allocation
page read and write
C57000
heap
page read and write
1AFBADF0000
remote allocation
page read and write
50C9000
trusted library allocation
page read and write
6B722FE000
stack
page read and write
5051000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
1AFBAF7D000
unkown
page read and write
C5E000
heap
page read and write
D37000
heap
page read and write
5151000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
BB1000
heap
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
21C21FA0000
unkown
page read and write
D37000
heap
page read and write
52A8000
heap
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
F58707F000
stack
page read and write
C57000
heap
page read and write
2890000
heap
page read and write
D74000
heap
page read and write
C57000
heap
page read and write
CEA000
heap
page read and write
D74000
heap
page read and write
C5E000
heap
page read and write
D37000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
3BC000
stack
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
D37000
heap
page read and write
D4C000
heap
page read and write
332A000
heap
page read and write
D37000
heap
page read and write
50C9000
trusted library allocation
page read and write
D37000
heap
page read and write
5244000
trusted library allocation
page read and write
D64000
heap
page read and write
2D502A77000
heap
page read and write
E7A737B000
stack
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
D64000
heap
page read and write
50C9000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
D00000
heap
page read and write
C5E000
heap
page read and write
BA4000
heap
page read and write
5151000
trusted library allocation
page read and write
C50000
heap
page read and write
50C9000
trusted library allocation
page read and write
D74000
heap
page read and write
1AFBAF73000
unkown
page read and write
5051000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
1AFBA7F0000
unkown
page read and write
C57000
heap
page read and write
21AB943C000
unkown
page read and write
C5E000
heap
page read and write
508C000
trusted library allocation
page read and write
21C22057000
unkown
page read and write
5051000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
5151000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
588F000
stack
page read and write
5051000
trusted library allocation
page read and write
D37000
heap
page read and write
D64000
heap
page read and write
51CC000
trusted library allocation
page read and write
1AFBAFB6000
unkown
page read and write
B63000
heap
page read and write
D64000
heap
page read and write
B5C000
heap
page read and write
C5E000
heap
page read and write
FBA2477000
stack
page read and write
55BD000
stack
page read and write
1EF5F602000
unkown
page read and write
567F000
stack
page read and write
D37000
heap
page read and write
D64000
heap
page read and write
509A000
trusted library allocation
page read and write
D64000
heap
page read and write
F80000
heap
page read and write
21AB947C000
unkown
page read and write
2FCF000
stack
page read and write
50C9000
trusted library allocation
page read and write
4C68000
trusted library allocation
page read and write
D37000
heap
page read and write
4EF0000
heap
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
A6A1D7F000
stack
page read and write
1AFBA85C000
unkown
page read and write
C57000
heap
page read and write
2D502A7F000
heap
page read and write
50C9000
trusted library allocation
page read and write
1AFBAF72000
unkown
page read and write
6B726FE000
stack
page read and write
C5E000
heap
page read and write
50C2000
trusted library allocation
page read and write
1AFBAF79000
unkown
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
D2D000
heap
page read and write
E70000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
1AFBAF83000
unkown
page read and write
C57000
heap
page read and write
E00000
heap
page read and write
52C1000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
4C75000
trusted library allocation
page read and write
C57000
heap
page read and write
3360000
heap
page read and write
D64000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
2B70000
unkown
page readonly
C57000
heap
page read and write
D64000
heap
page read and write
51CC000
trusted library allocation
page read and write
3070000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
21AB946E000
unkown
page read and write
CDD000
heap
page read and write
C5E000
heap
page read and write
289A000
heap
page read and write
1AFBAF83000
unkown
page read and write
346E000
stack
page read and write
9DB000
stack
page read and write
21AB9500000
unkown
page read and write
5051000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
21AB9C02000
unkown
page read and write
2C989C51000
unkown
page read and write
D64000
heap
page read and write
51CC000
trusted library allocation
page read and write
21AB9502000
unkown
page read and write
C5E000
heap
page read and write
BA0000
heap
page read and write
5151000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
3531000
heap
page read and write
D37000
heap
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
4DD5000
trusted library allocation
page read and write
C5E000
heap
page read and write
353B000
heap
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
C5E000
heap
page read and write
BA5000
heap
page read and write
C57000
heap
page read and write
F587179000
stack
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
5151000
trusted library allocation
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
1AFBAF6D000
unkown
page read and write
C5E000
heap
page read and write
50C9000
trusted library allocation
page read and write
1EF5F302000
unkown
page read and write
1AFBAF98000
unkown
page read and write
920000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
52A8000
heap
page read and write
51CC000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
D64000
heap
page read and write
50C9000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
C5E000
heap
page read and write
D4A000
heap
page read and write
5151000
trusted library allocation
page read and write
D74000
heap
page read and write
1AFBAFAE000
unkown
page read and write
5151000
trusted library allocation
page read and write
1AFBB463000
unkown
page read and write
C57000
heap
page read and write
107B000
heap
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
3500000
heap
page read and write
5051000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
34AE000
stack
page read and write
50C9000
trusted library allocation
page read and write
50AD000
trusted library allocation
page read and write
4AB1000
heap
page read and write
2C989D02000
unkown
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
2AA2306D000
unkown
page read and write
4B61000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
50C9000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
21C21EA0000
heap
page read and write
D74000
heap
page read and write
660000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
C5E000
heap
page read and write
5151000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
4D48000
trusted library allocation
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
5074000
trusted library allocation
page read and write
BA7000
heap
page read and write
C57000
heap
page read and write
50BF000
trusted library allocation
page read and write
E7A777B000
stack
page read and write
2AB0000
heap
page read and write
5074000
trusted library allocation
page read and write
C5E000
heap
page read and write
6B724FE000
stack
page read and write
53F0000
trusted library allocation
page read and write
D74000
heap
page read and write
2FF0000
heap
page read and write
2B60000
unkown
page readonly
D37000
heap
page read and write
1AFBAF8F000
unkown
page read and write
D37000
heap
page read and write
C07000
heap
page read and write
C5E000
heap
page read and write
1AFBAF6D000
unkown
page read and write
C5E000
heap
page read and write
50C9000
trusted library allocation
page read and write
C5E000
heap
page read and write
5151000
trusted library allocation
page read and write
4D44000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
4AB1000
heap
page read and write
1AFBA858000
unkown
page read and write
5074000
trusted library allocation
page read and write
1AFBA913000
unkown
page read and write
3FB000
stack
page read and write
4AB1000
heap
page read and write
509A000
trusted library allocation
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
5249000
trusted library allocation
page read and write
C5E000
heap
page read and write
1AFBAFB5000
unkown
page read and write
2D7F000
stack
page read and write
50C9000
trusted library allocation
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
2AA230CB000
unkown
page read and write
5051000
trusted library allocation
page read and write
3540000
heap
page read and write
DAE000
stack
page read and write
C57000
heap
page read and write
D37000
heap
page read and write
D37000
heap
page read and write
4EB0000
remote allocation
page read and write
21C22052000
unkown
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
1AFBAF7F000
unkown
page read and write
1AFBAF7B000
unkown
page read and write
C5E000
heap
page read and write
6E9FE000
unkown
page readonly
507F000
trusted library allocation
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
1AFBAF8A000
unkown
page read and write
D64000
heap
page read and write
D49000
heap
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
A3C000
stack
page read and write
1AFBAFAB000
unkown
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
557E000
stack
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
1AFBAF83000
unkown
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
2C989C2E000
unkown
page read and write
C5E000
heap
page read and write
3540000
heap
page read and write
50C9000
trusted library allocation
page read and write
4AB1000
heap
page read and write
51CC000
trusted library allocation
page read and write
2C6E000
stack
page read and write
5074000
trusted library allocation
page read and write
1EF5F213000
unkown
page read and write
2C989D13000
unkown
page read and write
5084000
trusted library allocation
page read and write
5BC000
stack
page read and write
BE8000
heap
page read and write
51CC000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C07000
heap
page read and write
524A000
trusted library allocation
page read and write
D37000
heap
page read and write
C5E000
heap
page read and write
1AFBB400000
unkown
page read and write
5051000
trusted library allocation
page read and write
D74000
heap
page read and write
5074000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
2A70000
heap
page read and write
508B000
trusted library allocation
page read and write
2B70000
unkown
page readonly
C57000
heap
page read and write
C02037D000
stack
page read and write
1AFBB402000
unkown
page read and write
1AFBA8E9000
unkown
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
4CBA000
trusted library allocation
page read and write
50B5000
trusted library allocation
page read and write
1AFBAFA4000
unkown
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
D37000
heap
page read and write
5350000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
4AB1000
heap
page read and write
C5E000
heap
page read and write
29F0000
trusted library allocation
page read and write
C57000
heap
page read and write
C01F9AC000
stack
page read and write
E7A787B000
stack
page read and write
509A000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
CE0000
heap
page read and write
5051000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
D37000
heap
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
4280000
heap
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
6B7237E000
stack
page read and write
C5E000
heap
page read and write
4B70000
heap
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
50C9000
trusted library allocation
page read and write
1AFBAF7B000
unkown
page read and write
C57000
heap
page read and write
CC9000
heap
page read and write
50C5000
trusted library allocation
page read and write
2AA2303E000
unkown
page read and write
5051000
trusted library allocation
page read and write
1AFBA916000
unkown
page read and write
584E000
stack
page read and write
BDD000
heap
page read and write
C5E000
heap
page read and write
1AFBAFC8000
unkown
page read and write
1AFBAFD0000
unkown
page read and write
21C22802000
unkown
page read and write
D37000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
50C9000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
D74000
heap
page read and write
2C989C49000
unkown
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
D74000
heap
page read and write
EE8000
heap
page read and write
6B727F9000
stack
page read and write
51D0000
remote allocation
page read and write
5074000
trusted library allocation
page read and write
C0201FD000
stack
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
508A000
trusted library allocation
page read and write
355B000
heap
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
50C9000
trusted library allocation
page read and write
1AFBAF87000
unkown
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
4EAD000
stack
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
3507000
heap
page read and write
51CC000
trusted library allocation
page read and write
D64000
heap
page read and write
5087000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
6F6DC000
unkown
page read and write
3543000
heap
page read and write
C5E000
heap
page read and write
509A000
trusted library allocation
page read and write
D64000
heap
page read and write
1AFBAF85000
unkown
page read and write
5151000
trusted library allocation
page read and write
C5E000
heap
page read and write
F5871FF000
stack
page read and write
50C9000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
4C84000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
D74000
heap
page read and write
C5E000
heap
page read and write
C01000
heap
page read and write
50C9000
trusted library allocation
page read and write
FBA267F000
stack
page read and write
C57000
heap
page read and write
509A000
trusted library allocation
page read and write
21C2203C000
unkown
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
1AFBA5B0000
heap
page read and write
21C22102000
unkown
page read and write
5074000
trusted library allocation
page read and write
28AC000
stack
page read and write
D64000
heap
page read and write
5051000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
C30000
heap
page read and write
D6E000
stack
page read and write
5051000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
2B80000
unkown
page read and write
D37000
heap
page read and write
5074000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
D48000
heap
page read and write
5074000
trusted library allocation
page read and write
C5E000
heap
page read and write
51D0000
remote allocation
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
A6A1A7E000
stack
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
4C82000
trusted library allocation
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
53F0000
trusted library allocation
page read and write
F586DDE000
stack
page read and write
508A000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
50B2000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
C57000
heap
page read and write
5074000
trusted library allocation
page read and write
2CA0000
heap
page read and write
1AFBAF8C000
unkown
page read and write
50C9000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
2D502D30000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
D64000
heap
page read and write
D64000
heap
page read and write
5151000
trusted library allocation
page read and write
3537000
heap
page read and write
55FD000
stack
page read and write
C5E000
heap
page read and write
5087000
trusted library allocation
page read and write
1AFBAF7B000
unkown
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
1AFBA859000
unkown
page read and write
D74000
heap
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
2C989C92000
unkown
page read and write
5081000
trusted library allocation
page read and write
C01000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
350A000
heap
page read and write
D74000
heap
page read and write
1AFBA902000
unkown
page read and write
50C9000
trusted library allocation
page read and write
D74000
heap
page read and write
1AFBA85E000
unkown
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
D74000
heap
page read and write
5074000
trusted library allocation
page read and write
2FCA000
heap
page read and write
2D502A79000
heap
page read and write
D64000
heap
page read and write
1AFBAF7D000
unkown
page read and write
C5E000
heap
page read and write
50C9000
trusted library allocation
page read and write
2BFE000
stack
page read and write
C5E000
heap
page read and write
D34000
heap
page read and write
5074000
trusted library allocation
page read and write
1AFBADF0000
remote allocation
page read and write
EEB000
heap
page read and write
C18000
heap
page read and write
D4C000
heap
page read and write
C5E000
heap
page read and write
F586D5E000
stack
page read and write
E7A73FE000
stack
page read and write
F586CDA000
stack
page read and write
D74000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
509A000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
D64000
heap
page read and write
3554000
heap
page read and write
4CBA000
trusted library allocation
page read and write
D52000
heap
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
5074000
trusted library allocation
page read and write
1AFBAF4F000
unkown
page read and write
D64000
heap
page read and write
5074000
trusted library allocation
page read and write
2720000
heap
page read and write
4AB1000
heap
page read and write
BE2000
heap
page read and write
D37000
heap
page read and write
50C9000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
C98000
heap
page read and write
5074000
trusted library allocation
page read and write
C5E000
heap
page read and write
C18000
heap
page read and write
5151000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
A80000
unkown
page readonly
C5E000
heap
page read and write
D37000
heap
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
9DA7E7E000
stack
page read and write
5350000
trusted library allocation
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
D37000
heap
page read and write
50C9000
trusted library allocation
page read and write
D64000
heap
page read and write
C1D000
heap
page read and write
5151000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
2AA23029000
unkown
page read and write
D64000
heap
page read and write
1AFBA861000
unkown
page read and write
4760000
heap
page read and write
2C989C4B000
unkown
page read and write
6B725FF000
stack
page read and write
D37000
heap
page read and write
C57000
heap
page read and write
CDE000
heap
page read and write
7F0000
unkown
page readonly
51CC000
trusted library allocation
page read and write
D70000
heap
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
B5C000
heap
page read and write
4DD6000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
C5E000
heap
page read and write
4B61000
heap
page read and write
D37000
heap
page read and write
51CC000
trusted library allocation
page read and write
D64000
heap
page read and write
1AFBAF72000
unkown
page read and write
D74000
heap
page read and write
1AFBAF9B000
unkown
page read and write
C57000
heap
page read and write
5151000
trusted library allocation
page read and write
4C68000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
1AFBB402000
unkown
page read and write
1AFBAF96000
unkown
page read and write
D64000
heap
page read and write
5151000
trusted library allocation
page read and write
1AFBA8B1000
unkown
page read and write
1AFBA864000
unkown
page read and write
D37000
heap
page read and write
5151000
trusted library allocation
page read and write
C5E000
heap
page read and write
4AB1000
heap
page read and write
50C9000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
D49000
heap
page read and write
C0200FC000
stack
page read and write
509A000
trusted library allocation
page read and write
6EE000
stack
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
5051000
trusted library allocation
page read and write
D74000
heap
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
D37000
heap
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
BEE000
heap
page read and write
C5E000
heap
page read and write
A6A177B000
stack
page read and write
C5E000
heap
page read and write
C01000
heap
page read and write
EA0000
trusted library allocation
page read and write
2D502A5B000
heap
page read and write
5400000
trusted library allocation
page read and write
28EB000
stack
page read and write
C57000
heap
page read and write
2C989C55000
unkown
page read and write
4DD0000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
5074000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
BFB000
heap
page read and write
5051000
trusted library allocation
page read and write
2C989C4E000
unkown
page read and write
5074000
trusted library allocation
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
2B70000
unkown
page readonly
1AFBA862000
unkown
page read and write
C57000
heap
page read and write
5102000
trusted library allocation
page read and write
D74000
heap
page read and write
C57000
heap
page read and write
33D0000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
1AFBAF70000
unkown
page read and write
50C9000
trusted library allocation
page read and write
51CB000
trusted library allocation
page read and write
D37000
heap
page read and write
C57000
heap
page read and write
4AB1000
heap
page read and write
51CC000
trusted library allocation
page read and write
A90000
unkown
page read and write
509A000
trusted library allocation
page read and write
BEE000
heap
page read and write
51CC000
trusted library allocation
page read and write
21AB9413000
unkown
page read and write
D37000
heap
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
CEA000
heap
page read and write
51CC000
trusted library allocation
page read and write
21AB9240000
heap
page read and write
1EF5F700000
unkown
page read and write
D37000
heap
page read and write
FBA20FE000
stack
page read and write
D37000
heap
page read and write
2B80000
unkown
page read and write
C5E000
heap
page read and write
524C000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
D37000
heap
page read and write
5074000
trusted library allocation
page read and write
2B1D000
stack
page read and write
4DD8000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
4CB6000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
52C3000
trusted library allocation
page read and write
D74000
heap
page read and write
1AFBA852000
unkown
page read and write
509A000
trusted library allocation
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
1AFBA829000
unkown
page read and write
D37000
heap
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
1EF5F202000
unkown
page read and write
51CC000
trusted library allocation
page read and write
4AB1000
heap
page read and write
5102000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
4C6D000
trusted library allocation
page read and write
D64000
heap
page read and write
50C1000
trusted library allocation
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
4C81000
trusted library allocation
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
D46000
heap
page read and write
C5E000
heap
page read and write
9DA8277000
stack
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
21AB92A0000
heap
page read and write
52A5000
heap
page read and write
C5E000
heap
page read and write
2AA22F00000
heap
page read and write
C5E000
heap
page read and write
A6A1CFE000
stack
page read and write
4D60000
trusted library allocation
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
5074000
trusted library allocation
page read and write
C5E000
heap
page read and write
BB1000
heap
page read and write
2B5A000
stack
page read and write
3537000
heap
page read and write
2D502A66000
heap
page read and write
21C22064000
unkown
page read and write
D64000
heap
page read and write
D74000
heap
page read and write
5051000
trusted library allocation
page read and write
1AFBA85D000
unkown
page read and write
5151000
trusted library allocation
page read and write
2AA23102000
unkown
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
550000
heap
page read and write
2D502A61000
heap
page read and write
50C9000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
50BC000
trusted library allocation
page read and write
C5E000
heap
page read and write
2AA23113000
unkown
page read and write
1AFBAF94000
unkown
page read and write
1AFBAF73000
unkown
page read and write
4AB1000
heap
page read and write
D37000
heap
page read and write
5082000
trusted library allocation
page read and write
1AFBA5C0000
heap
page read and write
52A1000
heap
page read and write
50C9000
trusted library allocation
page read and write
5086000
trusted library allocation
page read and write
C5E000
heap
page read and write
2C989A10000
heap
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
354A000
heap
page read and write
5074000
trusted library allocation
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
2AA230BA000
unkown
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
6A30000
trusted library allocation
page read and write
D64000
heap
page read and write
B42000
heap
page read and write
D74000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
B9E000
heap
page read and write
C5E000
heap
page read and write
4D44000
trusted library allocation
page read and write
6F6C1000
unkown
page execute read
21C2205C000
unkown
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
C9C000
stack
page read and write
34F0000
trusted library allocation
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
1AFBB402000
unkown
page read and write
2B90000
heap
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
350000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
4C82000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
1AFBAF8A000
unkown
page read and write
C5E000
heap
page read and write
9DA7B9B000
stack
page read and write
5083000
trusted library allocation
page read and write
C57000
heap
page read and write
51AE000
stack
page read and write
5151000
trusted library allocation
page read and write
C57000
heap
page read and write
509A000
trusted library allocation
page read and write
1AFBA8F8000
unkown
page read and write
2C989C81000
unkown
page read and write
D64000
heap
page read and write
52A0000
heap
page read and write
9DA817B000
stack
page read and write
4AB1000
heap
page read and write
21AB945F000
unkown
page read and write
C57000
heap
page read and write
DF0000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
BF5000
heap
page read and write
4AB1000
heap
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
C18000
heap
page read and write
2C989C47000
unkown
page read and write
C57000
heap
page read and write
A6A130B000
stack
page read and write
2C989C13000
unkown
page read and write
C5E000
heap
page read and write
5074000
trusted library allocation
page read and write
D74000
heap
page read and write
2F8E000
stack
page read and write
C01000
heap
page read and write
4C65000
trusted library allocation
page read and write
1AFBAF73000
unkown
page read and write
21AB9464000
unkown
page read and write
4C82000
trusted library allocation
page read and write
C57000
heap
page read and write
D55000
heap
page read and write
5074000
trusted library allocation
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
21C2205D000
unkown
page read and write
C07000
heap
page read and write
2AA23013000
unkown
page read and write
4B60000
heap
page read and write
21C22061000
unkown
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
5151000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
BCF000
heap
page read and write
C5E000
heap
page read and write
3420000
heap
page read and write
5051000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
4C6D000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
1EF5F323000
heap
page read and write
C57000
heap
page read and write
2C98A402000
unkown
page read and write
2C989B80000
unkown
page read and write
52A5000
heap
page read and write
1070000
heap
page read and write
C5E000
heap
page read and write
1AFBAF7E000
unkown
page read and write
5410000
trusted library allocation
page read and write
BE2000
heap
page read and write
5051000
trusted library allocation
page read and write
2D502990000
heap
page read and write
1AFBA800000
unkown
page read and write
509A000
trusted library allocation
page read and write
7F0000
unkown
page readonly
5151000
trusted library allocation
page read and write
1AFBAE02000
unkown
page read and write
50C9000
trusted library allocation
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
4AB1000
heap
page read and write
4DD7000
trusted library allocation
page read and write
D44000
heap
page read and write
D64000
heap
page read and write
2B80000
unkown
page read and write
50C9000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
1AFBAF9A000
unkown
page read and write
D64000
heap
page read and write
325A000
stack
page read and write
D37000
heap
page read and write
52AC000
heap
page read and write
5074000
trusted library allocation
page read and write
C18000
heap
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
E80000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
BF5000
heap
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
D37000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
4C6D000
trusted library allocation
page read and write
D64000
heap
page read and write
D64000
heap
page read and write
2ED0000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
1AFBA8DF000
unkown
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
D74000
heap
page read and write
C57000
heap
page read and write
1AFBAFA7000
unkown
page read and write
509A000
trusted library allocation
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
1AFBA8A8000
unkown
page read and write
D37000
heap
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
56F0000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
4AB1000
heap
page read and write
B28000
heap
page read and write
C57000
heap
page read and write
1AFBA880000
unkown
page read and write
D3C000
heap
page read and write
4DEA000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
B40000
heap
page read and write
1AFBAFC3000
unkown
page read and write
1AFBAFBE000
unkown
page read and write
2C989C00000
unkown
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
50FA000
trusted library allocation
page read and write
4DEA000
trusted library allocation
page read and write
5084000
trusted library allocation
page read and write
A6A187B000
stack
page read and write
50C9000
trusted library allocation
page read and write
21AB942A000
unkown
page read and write
C57000
heap
page read and write
50B6000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
4AB1000
heap
page read and write
50C9000
trusted library allocation
page read and write
2B60000
unkown
page readonly
51CC000
trusted library allocation
page read and write
D64000
heap
page read and write
50C9000
trusted library allocation
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
2C989D00000
unkown
page read and write
C57000
heap
page read and write
2AA23000000
unkown
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
52D1000
trusted library allocation
page read and write
C5E000
heap
page read and write
21C2202A000
unkown
page read and write
C5E000
heap
page read and write
50C9000
trusted library allocation
page read and write
D64000
heap
page read and write
4C7C000
trusted library allocation
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
4D44000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
509A000
trusted library allocation
page read and write
4EB0000
remote allocation
page read and write
51CC000
trusted library allocation
page read and write
4AB1000
heap
page read and write
6F6DE000
unkown
page readonly
4AB1000
heap
page read and write
51CC000
trusted library allocation
page read and write
1EF5F236000
unkown
page read and write
D40000
trusted library allocation
page read and write
1AFBAF87000
unkown
page read and write
B0E000
stack
page read and write
C57000
heap
page read and write
6A0000
heap
page read and write
BA2000
heap
page read and write
2D502A7F000
heap
page read and write
C57000
heap
page read and write
4C78000
trusted library allocation
page read and write
4CBA000
trusted library allocation
page read and write
2AA2393A000
unkown
page read and write
C5E000
heap
page read and write
4AB1000
heap
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
1AFBAF6F000
unkown
page read and write
5075000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
D64000
heap
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
5051000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
CE2000
heap
page read and write
EE0000
heap
page read and write
2C989C48000
unkown
page read and write
C57000
heap
page read and write
4B1E000
stack
page read and write
C5E000
heap
page read and write
4B5E000
stack
page read and write
1AFBA8A7000
unkown
page read and write
C5E000
heap
page read and write
11B0000
heap
page read and write
C5E000
heap
page read and write
21C2206A000
unkown
page read and write
5151000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
1AFBADF0000
remote allocation
page read and write
D64000
heap
page read and write
4CB6000
trusted library allocation
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
4AB1000
heap
page read and write
D64000
heap
page read and write
D37000
heap
page read and write
21C22113000
unkown
page read and write
1AFBA813000
unkown
page read and write
4C71000
trusted library allocation
page read and write
D64000
heap
page read and write
52B8000
heap
page read and write
D37000
heap
page read and write
DEE000
stack
page read and write
D45000
heap
page read and write
50B8000
trusted library allocation
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
51CC000
trusted library allocation
page read and write
5081000
trusted library allocation
page read and write
2D1E000
stack
page read and write
5074000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
1AFBAF75000
unkown
page read and write
C5E000
heap
page read and write
509A000
trusted library allocation
page read and write
D64000
heap
page read and write
1EF5F100000
heap
page read and write
C57000
heap
page read and write
1AFBA620000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
D44000
heap
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
2AA23802000
unkown
page read and write
C5E000
heap
page read and write
5074000
trusted library allocation
page read and write
1AFBAF6A000
unkown
page read and write
C5E000
heap
page read and write
5151000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
9FC000
stack
page read and write
51CC000
trusted library allocation
page read and write
50B3000
trusted library allocation
page read and write
C5E000
heap
page read and write
D37000
heap
page read and write
509A000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
D64000
heap
page read and write
1AFBAF7F000
unkown
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
1AFBAFA9000
unkown
page read and write
E47000
heap
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
CDB000
stack
page read and write
720000
heap
page read and write
50C9000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
C07000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
2AA22FA0000
unkown
page read and write
5051000
trusted library allocation
page read and write
2F00000
heap
page read and write
1AFBAF7D000
unkown
page read and write
C5E000
heap
page read and write
1AFBAF6F000
unkown
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
BFB000
heap
page read and write
D64000
heap
page read and write
D64000
heap
page read and write
5074000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
21C22065000
unkown
page read and write
B3F000
heap
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
C5E000
heap
page read and write
C01FF7F000
stack
page read and write
1AFBA908000
unkown
page read and write
C18000
heap
page read and write
4AB1000
heap
page read and write
51CC000
trusted library allocation
page read and write
2AA22F70000
heap
page read and write
C57000
heap
page read and write
1AFBAF75000
unkown
page read and write
52A2000
heap
page read and write
4CBA000
trusted library allocation
page read and write
C57000
heap
page read and write
BFB000
heap
page read and write
E7A79F7000
stack
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
E30000
heap
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
1EF5F110000
unkown
page read and write
5051000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
C5E000
heap
page read and write
1AFBAF6C000
unkown
page read and write
C5E000
heap
page read and write
FBA237B000
stack
page read and write
C5E000
heap
page read and write
BFB000
heap
page read and write
1EF5F713000
unkown
page read and write
C5E000
heap
page read and write
BB1000
heap
page read and write
2C989C53000
unkown
page read and write
50C9000
trusted library allocation
page read and write
FBA227E000
stack
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
1AFBA83C000
unkown
page read and write
C57000
heap
page read and write
2D502A90000
heap
page read and write
C5E000
heap
page read and write
1AFBAF70000
unkown
page read and write
4AB1000
heap
page read and write
5051000
trusted library allocation
page read and write
5074000
trusted library allocation
page read and write
1AFBAF83000
unkown
page read and write
4AB1000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
4D44000
trusted library allocation
page read and write
21C21E40000
heap
page read and write
51CC000
trusted library allocation
page read and write
2CAF000
stack
page read and write
4AB1000
heap
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
B9C000
heap
page read and write
C5E000
heap
page read and write
73A000
heap
page read and write
C02027B000
stack
page read and write
7F0000
heap
page read and write
C5E000
heap
page read and write
6E9FC000
unkown
page read and write
2D502D35000
heap
page read and write
51CC000
trusted library allocation
page read and write
C01000
heap
page read and write
5151000
trusted library allocation
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
D37000
heap
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
A90000
unkown
page read and write
D74000
heap
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
5151000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
1AFBAF89000
unkown
page read and write
6F6C0000
unkown
page readonly
C57000
heap
page read and write
21AB945A000
unkown
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
7F0000
unkown
page readonly
1AFBAF77000
unkown
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
D37000
heap
page read and write
D74000
heap
page read and write
2C989A20000
heap
page read and write
C5E000
heap
page read and write
5151000
trusted library allocation
page read and write
2AA22F10000
heap
page read and write
5080000
trusted library allocation
page read and write
D64000
heap
page read and write
553E000
stack
page read and write
D53000
heap
page read and write
1AFBAFB6000
unkown
page read and write
CE8000
heap
page read and write
4AB1000
heap
page read and write
2C989A80000
heap
page read and write
1AFBAF6C000
unkown
page read and write
890000
heap
page read and write
5051000
trusted library allocation
page read and write
1AFBAF19000
unkown
page read and write
C57000
heap
page read and write
4CBA000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
1AFBA8C5000
unkown
page read and write
4EB0000
remote allocation
page read and write
1AFBAF71000
unkown
page read and write
5074000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
2D502A7F000
heap
page read and write
5051000
trusted library allocation
page read and write
50AF000
trusted library allocation
page read and write
54FF000
stack
page read and write
C5E000
heap
page read and write
1AFBAF7B000
unkown
page read and write
4AB1000
heap
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
1AFBAF71000
unkown
page read and write
51CC000
trusted library allocation
page read and write
8FD000
stack
page read and write
C5E000
heap
page read and write
1EF5F702000
unkown
page read and write
5151000
trusted library allocation
page read and write
C57000
heap
page read and write
5151000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
C57000
heap
page read and write
5085000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
C07000
heap
page read and write
D37000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
5062000
trusted library allocation
page read and write
1AFBAF1B000
unkown
page read and write
D64000
heap
page read and write
509A000
trusted library allocation
page read and write
4AB1000
heap
page read and write
52E7000
trusted library allocation
page read and write
4460000
heap
page read and write
C18000
heap
page read and write
4D44000
trusted library allocation
page read and write
6E9E0000
unkown
page readonly
3540000
heap
page read and write
C18000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
1AFBA8BE000
unkown
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
4AB1000
heap
page read and write
50C9000
trusted library allocation
page read and write
D74000
heap
page read and write
1AFBA886000
unkown
page read and write
51CC000
trusted library allocation
page read and write
1AFBAF9F000
unkown
page read and write
5051000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
D74000
heap
page read and write
C18000
heap
page read and write
5074000
trusted library allocation
page read and write
A6A138E000
stack
page read and write
C5E000
heap
page read and write
D37000
heap
page read and write
D74000
heap
page read and write
509A000
trusted library allocation
page read and write
6B7247F000
stack
page read and write
4CB6000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
1EF5F170000
heap
page read and write
C5E000
heap
page read and write
5074000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
50C9000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
C57000
heap
page read and write
21AB945C000
unkown
page read and write
509A000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
6E9E1000
unkown
page execute read
5051000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
52A8000
heap
page read and write
B3C000
heap
page read and write
3543000
heap
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
4DEA000
trusted library allocation
page read and write
4AB1000
heap
page read and write
C18000
heap
page read and write
21C22069000
unkown
page read and write
C5E000
heap
page read and write
3546000
heap
page read and write
C5E000
heap
page read and write
509A000
trusted library allocation
page read and write
C02007F000
stack
page read and write
C57000
heap
page read and write
C01FDFC000
stack
page read and write
9DA7EFE000
stack
page read and write
BB3000
heap
page read and write
50C9000
trusted library allocation
page read and write
329B000
stack
page read and write
4AB1000
heap
page read and write
C5E000
heap
page read and write
5151000
trusted library allocation
page read and write
4D5D000
trusted library allocation
page read and write
BA5000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
2C989D08000
unkown
page read and write
C18000
heap
page read and write
B42000
heap
page read and write
C07000
heap
page read and write
D53000
heap
page read and write
C57000
heap
page read and write
1AFBAF9D000
unkown
page read and write
C57000
heap
page read and write
2AA23912000
unkown
page read and write
C57000
heap
page read and write
2AA23900000
unkown
page read and write
1AFBAF72000
unkown
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
21AB93A0000
unkown
page read and write
1EF5F300000
unkown
page read and write
C57000
heap
page read and write
5151000
trusted library allocation
page read and write
1AFBAF75000
unkown
page read and write
C5E000
heap
page read and write
A6A1C7F000
stack
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
1AFBAF7B000
unkown
page read and write
A90000
unkown
page read and write
D2D000
heap
page read and write
D37000
heap
page read and write
7C0000
heap
page read and write
C57000
heap
page read and write
4DD0000
trusted library allocation
page read and write
1AFBAFA4000
unkown
page read and write
1AFBAF87000
unkown
page read and write
4CBA000
trusted library allocation
page read and write
C57000
heap
page read and write
2DC0000
heap
page read and write
5074000
trusted library allocation
page read and write
4EEE000
stack
page read and write
6990000
trusted library allocation
page read and write
D64000
heap
page read and write
BDD000
heap
page read and write
52C7000
trusted library allocation
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
4D5E000
trusted library allocation
page read and write
52A5000
heap
page read and write
D37000
heap
page read and write
5FB000
stack
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
D37000
heap
page read and write
5051000
trusted library allocation
page read and write
6B7227D000
stack
page read and write
C57000
heap
page read and write
4DD0000
trusted library allocation
page read and write
730000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
5074000
trusted library allocation
page read and write
1AFBAF19000
unkown
page read and write
D37000
heap
page read and write
411F000
stack
page read and write
50C9000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
D74000
heap
page read and write
50C9000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
FBA257C000
stack
page read and write
C57000
heap
page read and write
4D44000
trusted library allocation
page read and write
C57000
heap
page read and write
4AB1000
heap
page read and write
C57000
heap
page read and write
A72000
stack
page read and write
1AFBA85A000
unkown
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
4DD0000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
D37000
heap
page read and write
C5E000
heap
page read and write
5151000
trusted library allocation
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
21C22067000
unkown
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
50C9000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
C5E000
heap
page read and write
5074000
trusted library allocation
page read and write
C5E000
heap
page read and write
5074000
trusted library allocation
page read and write
21C22013000
unkown
page read and write
C57000
heap
page read and write
A6A1B77000
stack
page read and write
21AB9400000
unkown
page read and write
D74000
heap
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
52A8000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
351A000
heap
page read and write
D64000
heap
page read and write
5050000
trusted library allocation
page read and write
C5E000
heap
page read and write
5246000
trusted library allocation
page read and write
C57000
heap
page read and write
4D5D000
trusted library allocation
page read and write
C57000
heap
page read and write
E30000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
509A000
trusted library allocation
page read and write
C5E000
heap
page read and write
E40000
heap
page read and write
51CC000
trusted library allocation
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
4C7C000
trusted library allocation
page read and write
C57000
heap
page read and write
D37000
heap
page read and write
C02047F000
stack
page read and write
1AFBA8E5000
unkown
page read and write
5151000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
21AB9458000
unkown
page read and write
5151000
trusted library allocation
page read and write
9DA807E000
stack
page read and write
5151000
trusted library allocation
page read and write
D64000
heap
page read and write
D64000
heap
page read and write
2D30000
heap
page read and write
C5E000
heap
page read and write
C18000
heap
page read and write
5151000
trusted library allocation
page read and write
B98000
heap
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
D64000
heap
page read and write
50C9000
trusted library allocation
page read and write
D64000
heap
page read and write
CDB000
heap
page read and write
C57000
heap
page read and write
50C9000
trusted library allocation
page read and write
E7A767E000
stack
page read and write
50C9000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
D37000
heap
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
5151000
trusted library allocation
page read and write
C57000
heap
page read and write
5151000
trusted library allocation
page read and write
BFB000
heap
page read and write
2C989C29000
unkown
page read and write
1AFBAFD0000
unkown
page read and write
50C9000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
2D502A91000
heap
page read and write
D37000
heap
page read and write
53E0000
trusted library allocation
page read and write
5088000
trusted library allocation
page read and write
4C7C000
trusted library allocation
page read and write
C5E000
heap
page read and write
FBA1DAC000
stack
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
2B60000
unkown
page readonly
C57000
heap
page read and write
21C22060000
unkown
page read and write
5051000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
1AFBAF00000
unkown
page read and write
50C9000
trusted library allocation
page read and write
1AFBAF7B000
unkown
page read and write
4DD0000
trusted library allocation
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
BFB000
heap
page read and write
1AFBAF88000
unkown
page read and write
1AFBAF71000
unkown
page read and write
5074000
trusted library allocation
page read and write
1AFBAF89000
unkown
page read and write
2AA230C8000
unkown
page read and write
9DA837F000
stack
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
BA7000
heap
page read and write
577D000
stack
page read and write
21C22000000
unkown
page read and write
C5E000
heap
page read and write
1AFBAF89000
unkown
page read and write
4EF4000
heap
page read and write
BD7000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
E50000
heap
page read and write
C57000
heap
page read and write
D37000
heap
page read and write
51CC000
trusted library allocation
page read and write
C18000
heap
page read and write
1AFBAF0C000
unkown
page read and write
5051000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
2AA23088000
unkown
page read and write
5074000
trusted library allocation
page read and write
52BE000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
5051000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
C07000
heap
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
3078000
heap
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
C5E000
heap
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
51CC000
trusted library allocation
page read and write
2C989C4C000
unkown
page read and write
51CC000
trusted library allocation
page read and write
5051000
trusted library allocation
page read and write
3543000
heap
page read and write
509A000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
51CC000
trusted library allocation
page read and write
50C4000
trusted library allocation
page read and write
E7A7AFE000
stack
page read and write
C57000
heap
page read and write
1AFBAF0B000
unkown
page read and write
5051000
trusted library allocation
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
4D5D000
trusted library allocation
page read and write
C01000
heap
page read and write
C5E000
heap
page read and write
C5E000
heap
page read and write
5051000
trusted library allocation
page read and write
BE8000
heap
page read and write
C5E000
heap
page read and write
3532000
heap
page read and write
5051000
trusted library allocation
page read and write
A80000
unkown
page readonly
50C9000
trusted library allocation
page read and write
5151000
trusted library allocation
page read and write
1AFBA867000
unkown
page read and write
2D502A50000
heap
page read and write
BA2000
heap
page read and write
C07000
heap
page read and write
1AFBAF77000
unkown
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
C5E000
heap
page read and write
57BB000
stack
page read and write
4AB1000
heap
page read and write
1AFBAF6D000
unkown
page read and write
5051000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
3320000
heap
page read and write
CDB000
heap
page read and write
C57000
heap
page read and write
53F0000
trusted library allocation
page read and write
50FA000
trusted library allocation
page read and write
5243000
trusted library allocation
page read and write
21AB9230000
heap
page read and write
1AFBAFB0000
unkown
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
1AFBAF71000
unkown
page read and write
2C989C3C000
unkown
page read and write
21C22100000
unkown
page read and write
C57000
heap
page read and write
D64000
heap
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
C5E000
heap
page read and write
21C21E30000
heap
page read and write
C5E000
heap
page read and write
D64000
heap
page read and write
C57000
heap
page read and write
C57000
heap
page read and write
34E0000
trusted library allocation
page read and write
1AFBA860000
unkown
page read and write
D37000
heap
page read and write
21C2205F000
unkown
page read and write
2D502930000
heap
page read and write
D74000
heap
page read and write
51CE000
trusted library allocation
page read and write
C5E000
heap
page read and write
51CC000
trusted library allocation
page read and write
D74000
heap
page read and write
There are 2075 hidden memdumps, click here to show them.