IOC Report
slowday.exe

loading gif

Files

File Path
Type
Category
Malicious
slowday.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogons.url
MS Windows 95 Internet shortcut text (URL=<file:///C:\Users\user\AppData\Roaming\winlogons\winlogons.exe>), ASCII text, with CR line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\winlogons\winlogons.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\18da55c1-2652-5cda-252b-e5d7f7077c5d
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv2307.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x35b8f545, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\bhv8783.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x9c149ac1, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\bhvAE74.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x9c149ac1, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\bhvBB7.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x35b8f545, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\bhvCA97.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x9c149ac1, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\bhvCE9E.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x9c149ac1, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\bhvED61.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x2dfa5ec5, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\tmp33E2.tmp
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp36CB.tmp
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp43C.tmp
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp7E2A.tmp
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8255.tmp
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC5B7.tmp
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpF1A4.tmp
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\winlogons\winlogons.vbs
ASCII text, with CR line terminators
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\slowday.exe
"C:\Users\user\Desktop\slowday.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmpF1A4.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp33E2.tmp
malicious
C:\Users\user\AppData\Roaming\winlogons\winlogons.exe
"C:\Users\user\AppData\Roaming\winlogons\winlogons.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp8255.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp36CB.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp7E2A.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmpC5B7.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp43C.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp8271.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp4F4.tmp
malicious
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://a.pomf.cat/
unknown
malicious
http://pomf.cat/upload.php&https://a.pomf.cat/
unknown
malicious
http://pomf.cat/upload.php
unknown
malicious
http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/scripttemplate
unknown
https://www.google.com/chrome/static/images/folder-applications.svg
unknown
https://www.google.com/chrome/static/css/main.v2.min.css
unknown
https://www.google.com/chrome/static/images/fallback/google-chrome-logo.jpg
unknown
http://www.msn.com
unknown
http://www.nirsoft.net
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://www.google.com/chrome/static/images/chrome-logo.svg
unknown
https://www.google.com/chrome/static/images/homepage/homepage_features.png
unknown
https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=
unknown
https://www.google.com/chrome/static/images/download-browser/big_pixel_phone.png
unknown
https://www.google.com/chrome/
unknown
https://2542116.fls.doubleclick.net/activityi;src22
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCc13122162a9a46c3b4cbf05ffccde0f
unknown
https://www.google.com/chrome/static/images/homepage/hero-anim-bottom-left.png
unknown
https://www.google.com/chrome/static/images/chrome_safari-behavior.jpg
unknown
https://login.microsoftonline.com/common/oauth2/authorizeclient_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e3
unknown
https://maps.windows.com/windows-app-web-link
unknown
http://www.msn.com/?ocid=iehp
unknown
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=68568119166
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCee0d4d5fd4424c8390d703b105f82c3
unknown
https://srtb.msn.com/auction?a=de-ch&b=a8415ac9f9644a1396bc1648a4599445&c=MSN&d=http%3A%2F%2Fwww.msn
unknown
http://crl.pki.goog/GTS1O1core.crl0
unknown
https://www.google.com/chrome/static/images/icon-announcement.svg
unknown
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://c
unknown
http://www.nirsoft.net/
unknown
https://www.google.com/chrome/static/images/homepage/hero-anim-middle.png
unknown
https://www.google.com/chrome/static/css/main.v3.min.css
unknown
https://www.google.com/chrome/application/x-msdownloadC:
unknown
https://www.google.com/chrome/static/images/fallback/icon-file-download.jpg
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC5bdddb231cf54f958a5b6e76e9d8eee
unknown
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=447687274835
unknown
https://www.google.com/chrome/static/images/download-browser/pixel_phone.png
unknown
http://pki.goog/gsr2/GTS1O1.crt0
unknown
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
unknown
https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml
unknown
https://www.google.com/chrome/static/images/app-store-download.png
unknown
https://www.google.com/chrome/static/images/homepage/hero-anim-top-right.png
unknown
https://contextual.media.net/
unknown
https://pki.goog/repository/0
unknown
https://cvision.media.net/new/300x300/3/167/174/27/39ab3103-8560-4a55-bfc4-401f897cf6f2.jpg?v=9
unknown
http://www.msn.com/
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC828bc1cde9f04b788c98b5423157734
unknown
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674
unknown
https://www.google.com/chrome/static/images/fallback/google-logo-one-color.jpg
unknown
https://www.google.com/chrome/static/images/fallback/icon-twitter.jpg
unknown
http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/consent/55a804
unknown
https://contextual.media.net/803288796/fcmain.js?&gdpr=0&cid=8CU157172&cpcd=pC3JHgSCqY8UHihgrvGr0A%3
unknown
https://contextual.media.net/48/nrrV18753.js
unknown
https://www.google.com/chrome/static/images/fallback/icon-help.jpg
unknown
https://www.google.com/accounts/servicelogin
unknown
https://www.google.com/chrome/static/images/homepage/google-enterprise.png
unknown
https://www.google.com/chrome/static/images/homepage/google-dev.png
unknown
https://www.google.com/chrome/static/images/thank-you/thankyou-animation.json
unknown
http://crl.pki.goog/gsr2/gsr2.crl0?
unknown
http://pki.goog/gsr2/GTSGIAG3.crt0)
unknown
https://www.google.com/
unknown
https://www.google.com/chrome/static/images/fallback/icon-fb.jpg
unknown
https://www.google.com/chrome/static/images/mac-ico.png
unknown
http://pki.goog/gsr2/GTS1O1.crt0#
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
https://www.google.com/chrome/static/images/google-play-download.png
unknown
https://www.google.com/chrome/static/images/chrome_throbber_fast.gif
unknown
https://www.google.com/chrome/static/images/homepage/google-canary.png
unknown
https://www.google.com/chrome/static/images/favicons/favicon-16x16.png
unknown
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
unknown
https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
unknown
https://www.google.com/chrome/static/images/homepage/laptop_desktop.png
unknown
https://www.google.com/chrome/static/js/main.v2.min.js
unknown
https://www.google.com/chrome/static/images/fallback/icon-description-white-blue-bg.jpg
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCfd484f9188564713bbc5d13d862ebbf
unknown
https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e
unknown
https://www.google.com/chrome/static/images/homepage/homepage_privacy.png
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
unknown
https://www.google.com/chrome/static/images/fallback/icon-youtube.jpg
unknown
https://login.yahoo.com/config/login
unknown
https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
unknown
https://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&
unknown
https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7BFD3B6173
unknown
https://www.google.com/chrome/static/images/cursor-replay.cur
unknown
https://www.google.com/chrome/static/js/installer.min.js
unknown
http://crl.pki.goog/GTSGIAG3.crl0
unknown
https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gt
unknown
https://www.google.com/chrome/static/images/download-browser/pixel_tablet.png
unknown
https://www.google.com/chrome/static/images/homepage/homepage_tools.png
unknown
http://bot.whatismyipaddress.com/
unknown
http://pki.goog/gsr2/GTS1O1.crt0M
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCc71c68d7b8f049b6a6f3b669bd5d00c
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
unknown
https://www.google.com/chrome/static/images/homepage/google-beta.png
unknown
http://www.msn.com/de-ch/?ocid=iehp
unknown
https://www.google.com/chrome/static/images/icon-file-download.svg
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC9b2d2bc73c8a4a1d8dd5c3d69b6634a
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://amp.azure.net/libs/amp/1.8.0/azuremediaplayer.min.js
unknown
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC54c8a2b02c3446f48a60b41e8a5ff47
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2B09000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute read
malicious
402000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3B52000
direct allocation
page execute and read and write
malicious
2F69000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3792000
direct allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute read
malicious
402000
remote allocation
page execute read
malicious
4363000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
47C3000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2BB2000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
EC0000
trusted library section
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3106000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2C6D000
trusted library allocation
page read and write
malicious
2D53000
trusted library allocation
page read and write
malicious
4AF0000
trusted library section
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
6981000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2D12000
trusted library allocation
page read and write
malicious
3234000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute read
malicious
402000
remote allocation
page execute and read and write
malicious
2E12000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3176000
trusted library allocation
page read and write
malicious
3960000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3012000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3790000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
66D1000
trusted library allocation
page read and write
malicious
2800000
trusted library allocation
page read and write
655000
heap
page read and write
B1E000
trusted library allocation
page read and write
1002000
heap
page read and write
1DEB4520000
trusted library allocation
page read and write
2288000
trusted library allocation
page read and write
2268000
trusted library allocation
page read and write
21C1000
trusted library allocation
page read and write
B0D8C7D000
stack
page read and write
ACF000
stack
page read and write
20D2B202000
heap
page read and write
2158000
trusted library allocation
page read and write
227D000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
F50000
trusted library allocation
page read and write
9F5000
trusted library allocation
page read and write
31C3000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
1DEB4760000
trusted library allocation
page read and write
20D2B38A000
heap
page read and write
9D000
stack
page read and write
7710000
heap
page read and write
8F6000
stack
page read and write
1C0000
remote allocation
page read and write
1DEB48F5000
heap
page read and write
20D2AA57000
heap
page read and write
2841000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
DB55B7C000
stack
page read and write
235D000
trusted library allocation
page read and write
7D80000
trusted library allocation
page execute and read and write
8AF000
stack
page read and write
31BA000
trusted library allocation
page read and write
240E000
trusted library allocation
page read and write
2259000
trusted library allocation
page read and write
149F8DF0000
remote allocation
page read and write
66F000
stack
page read and write
89C000
heap
page read and write
3291000
trusted library allocation
page read and write
5F4000
heap
page read and write
400000
remote allocation
page readonly
7FD0000
trusted library allocation
page read and write
278F1E53000
heap
page read and write
594000
heap
page read and write
55B000
stack
page read and write
2418000
trusted library allocation
page read and write
20D2AAC9000
heap
page read and write
45B1EFE000
stack
page read and write
2290000
trusted library allocation
page read and write
A0D000
trusted library allocation
page read and write
AC5000
heap
page read and write
B2F000
trusted library allocation
page read and write
8080000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
20D2B1C0000
remote allocation
page read and write
AF8000
heap
page read and write
20D2B369000
heap
page read and write
69E000
stack
page read and write
3210000
trusted library allocation
page read and write
1DEB4790000
trusted library allocation
page read and write
D5E000
stack
page read and write
1C0000
remote allocation
page read and write
45B207E000
stack
page read and write
CFA000
trusted library allocation
page execute and read and write
4B80000
trusted library allocation
page read and write
25E0000
heap
page read and write
1DEB4861000
heap
page read and write
1DEB4660000
trusted library allocation
page read and write
E87000
unkown
page readonly
1DEB4490000
trusted library allocation
page read and write
2271000
trusted library allocation
page read and write
B23000
trusted library allocation
page read and write
2288000
trusted library allocation
page read and write
2290000
trusted library allocation
page read and write
867000
heap
page read and write
7FE0000
trusted library allocation
page read and write
20D2B390000
heap
page read and write
419000
remote allocation
page execute and read and write
AD0000
heap
page read and write
20D2B3A4000
heap
page read and write
AF4000
heap
page read and write
9D000
stack
page read and write
45B1DFE000
stack
page read and write
2259000
trusted library allocation
page read and write
2D97000
trusted library allocation
page read and write
B24000
trusted library allocation
page read and write
3172000
trusted library allocation
page read and write
B3C000
heap
page read and write
82F000
heap
page read and write
7FC000
stack
page read and write
8090000
trusted library allocation
page read and write
20D2AA4D000
heap
page read and write
9D000
stack
page read and write
2033D6C2000
heap
page read and write
31C1000
trusted library allocation
page read and write
590000
heap
page read and write
E4F000
unkown
page readonly
5F4000
heap
page read and write
31B0000
trusted library allocation
page read and write
20D2B38A000
heap
page read and write
226D000
trusted library allocation
page read and write
500000
heap
page read and write
30000
heap
page read and write
7CF000
stack
page read and write
227E000
trusted library allocation
page read and write
9F3000
heap
page read and write
2288000
trusted library allocation
page read and write
5BE000
stack
page read and write
278F1E10000
heap
page read and write
6E8000
heap
page read and write
570000
heap
page read and write
610000
heap
page read and write
5B4000
heap
page read and write
8080000
trusted library allocation
page read and write
B34000
trusted library allocation
page read and write
85F000
heap
page read and write
B2F000
trusted library allocation
page read and write
84F000
heap
page read and write
26E0000
trusted library allocation
page read and write
5F4000
heap
page read and write
8060000
trusted library allocation
page read and write
B50000
heap
page read and write
2DC3000
trusted library allocation
page read and write
195000
stack
page read and write
B60000
trusted library allocation
page read and write
220F000
trusted library allocation
page read and write
9D2000
heap
page read and write
504000
heap
page read and write
E7E000
unkown
page read and write
991000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
20D2B399000
heap
page read and write
84F000
heap
page read and write
627000
heap
page read and write
AF7DCFB000
stack
page read and write
7C73000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
9FE000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
2DFA0800000
heap
page read and write
8F9000
stack
page read and write
92E000
stack
page read and write
1DEB4630000
trusted library allocation
page read and write
45B1C7B000
stack
page read and write
20DB1402000
heap
page read and write
2206000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
27EB000
trusted library allocation
page read and write
20D2AA51000
heap
page read and write
149F8E2A000
heap
page read and write
6DE000
stack
page read and write
836000
heap
page read and write
B2F000
trusted library allocation
page read and write
1DEB00D0000
trusted library section
page readonly
454000
remote allocation
page execute and read and write
20D2B3A0000
heap
page read and write
BA9000
heap
page read and write
2351000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
18F3EB60000
heap
page read and write
1C0000
remote allocation
page read and write
A3D000
heap
page read and write
B13000
trusted library allocation
page read and write
E86FCFE000
stack
page read and write
1C0000
remote allocation
page read and write
B26000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
5B4000
heap
page read and write
6A826F8000
stack
page read and write
49E000
stack
page read and write
594000
heap
page read and write
18F3EBF0000
trusted library allocation
page read and write
9F3000
trusted library allocation
page read and write
227E000
trusted library allocation
page read and write
480000
heap
page read and write
75D000
stack
page read and write
400000
remote allocation
page readonly
B13000
trusted library allocation
page read and write
92E000
stack
page read and write
865000
heap
page read and write
4B70000
trusted library allocation
page read and write
85F000
heap
page read and write
B23000
trusted library allocation
page read and write
18F3EC3C000
heap
page read and write
590000
heap
page read and write
199000
stack
page read and write
19C000
stack
page read and write
18F3EC00000
heap
page read and write
2224000
trusted library allocation
page read and write
2DFA084A000
heap
page read and write
2361000
trusted library allocation
page read and write
1DEAEFD0000
heap
page read and write
2801000
trusted library allocation
page read and write
1DEAF000000
heap
page read and write
504000
heap
page read and write
1DEAF900000
heap
page read and write
504000
heap
page read and write
2926000
trusted library allocation
page read and write
327A000
trusted library allocation
page read and write
AF7DB7C000
stack
page read and write
2630000
heap
page read and write
20DB1413000
heap
page read and write
2130000
trusted library allocation
page read and write
E82000
unkown
page write copy
DFB5B7E000
stack
page read and write
2D9E000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
215BA902000
heap
page read and write
B26000
trusted library allocation
page read and write
5F5000
heap
page read and write
2948000
trusted library allocation
page read and write
8A9000
heap
page read and write
22BFAA4F000
heap
page read and write
2150000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
196DD7E000
stack
page read and write
2DFA0868000
heap
page read and write
2DFA0880000
heap
page read and write
1C0000
remote allocation
page read and write
1C0000
remote allocation
page read and write
1084000
heap
page read and write
7D70000
trusted library allocation
page read and write
1DEB0480000
trusted library allocation
page read and write
731E000
stack
page read and write
3205000
trusted library allocation
page read and write
5F4000
heap
page read and write
2DB1000
trusted library allocation
page read and write
7BE000
stack
page read and write
B10000
heap
page read and write
920000
trusted library allocation
page read and write
2418000
trusted library allocation
page read and write
195000
stack
page read and write
31F6000
trusted library allocation
page read and write
1DEB4750000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
B26000
trusted library allocation
page read and write
20D2B38E000
heap
page read and write
AD3000
heap
page read and write
2DFA0865000
heap
page read and write
820000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page read and write
A79000
trusted library allocation
page read and write
85F000
heap
page read and write
4B80000
trusted library allocation
page read and write
A54000
heap
page read and write
654000
heap
page read and write
2DFA084D000
heap
page read and write
52E000
stack
page read and write
9E9000
trusted library allocation
page read and write
28F6000
trusted library allocation
page read and write
9CF000
stack
page read and write
31D9000
trusted library allocation
page read and write
19C000
stack
page read and write
5B4000
heap
page read and write
107A000
heap
page read and write
B1E000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
25E0000
heap
page read and write
5F7000
heap
page read and write
45B1F7E000
stack
page read and write
1DEAF959000
heap
page read and write
F50000
trusted library allocation
page read and write
843000
heap
page read and write
2033D644000
heap
page read and write
28B6000
trusted library allocation
page read and write
21B1000
trusted library allocation
page read and write
877000
heap
page read and write
B24000
heap
page read and write
26E1000
trusted library allocation
page read and write
1DEAF102000
heap
page read and write
A55000
heap
page read and write
A2F000
stack
page read and write
2273000
trusted library allocation
page read and write
B80000
remote allocation
page read and write
4D90000
heap
page read and write
1342000
unkown
page write copy
1C0000
remote allocation
page read and write
7F470000
trusted library allocation
page execute and read and write
5F9000
heap
page read and write
1C0000
remote allocation
page read and write
149F8C60000
heap
page read and write
2670000
heap
page read and write
4D20000
trusted library allocation
page read and write
22BFAB08000
heap
page read and write
31D0000
trusted library allocation
page read and write
8A6087B000
stack
page read and write
18F3EC2A000
heap
page read and write
6A845FD000
stack
page read and write
AEF000
heap
page read and write
5B4000
heap
page read and write
20D2B3B6000
heap
page read and write
4D20000
trusted library allocation
page read and write
81C000
stack
page read and write
20D2B862000
heap
page read and write
890000
heap
page read and write
226B000
trusted library allocation
page read and write
2741000
heap
page read and write
3201000
trusted library allocation
page read and write
2DFA087D000
heap
page read and write
B1F000
trusted library allocation
page read and write
A3D000
heap
page read and write
1DEB4790000
remote allocation
page read and write
2C69000
trusted library allocation
page read and write
20D2B30D000
heap
page read and write
7D67000
trusted library allocation
page read and write
20DB1380000
trusted library allocation
page read and write
1BE0000
direct allocation
page execute and read and write
AA8000
heap
page read and write
25E1000
heap
page read and write
1C0000
remote allocation
page read and write
887000
heap
page read and write
400000
remote allocation
page readonly
B0D84F7000
stack
page read and write
1077000
heap
page read and write
20DB1C02000
trusted library allocation
page read and write
2B179C63000
heap
page read and write
B34000
trusted library allocation
page read and write
5F0000
heap
page read and write
560000
heap
page read and write
B1F000
trusted library allocation
page read and write
2DCE000
trusted library allocation
page read and write
300E000
trusted library allocation
page read and write
CCA000
trusted library allocation
page execute and read and write
8070000
trusted library allocation
page read and write
504000
heap
page read and write
2253000
trusted library allocation
page read and write
951000
trusted library allocation
page read and write
107D000
heap
page read and write
1C0000
remote allocation
page read and write
1DEB4660000
trusted library allocation
page read and write
25E1000
heap
page read and write
278F1E36000
heap
page read and write
21FA000
trusted library allocation
page read and write
CE0000
heap
page read and write
2950000
trusted library allocation
page read and write
843000
heap
page read and write
7CF000
stack
page read and write
30000
heap
page read and write
22BFA970000
heap
page read and write
2214000
trusted library allocation
page read and write
505000
heap
page read and write
1C0000
remote allocation
page read and write
484000
heap
page read and write
B80000
heap
page read and write
4B70000
trusted library allocation
page execute and read and write
654000
heap
page read and write
7BD0000
trusted library allocation
page read and write
800000
heap
page read and write
2DFA083E000
heap
page read and write
2B179D02000
heap
page read and write
6A842FE000
stack
page read and write
2631000
heap
page read and write
806F000
trusted library allocation
page read and write
149F8E13000
heap
page read and write
91F000
stack
page read and write
1DEAF09D000
heap
page read and write
31EF000
trusted library allocation
page read and write
19C000
stack
page read and write
B1A000
trusted library allocation
page read and write
AF7D9FE000
stack
page read and write
2DFA1002000
trusted library allocation
page read and write
A71000
trusted library allocation
page read and write
17C000
stack
page read and write
7BE0000
trusted library allocation
page read and write
2269000
trusted library allocation
page read and write
3263000
trusted library allocation
page read and write
20D2B38A000
heap
page read and write
1DEB48A7000
heap
page read and write
7FE0000
trusted library allocation
page read and write
620000
heap
page read and write
881000
heap
page read and write
31ED000
trusted library allocation
page read and write
8A60C77000
stack
page read and write
2DA9000
trusted library allocation
page read and write
2216000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
B1E000
trusted library allocation
page read and write
2DFA0848000
heap
page read and write
77DF000
stack
page read and write
8DC000
heap
page read and write
DFB577E000
stack
page read and write
504000
heap
page read and write
1DEB463E000
trusted library allocation
page read and write
BCD000
heap
page read and write
20DB1441000
heap
page read and write
1FE000
stack
page read and write
1DEB4674000
trusted library allocation
page read and write
7BCE000
stack
page read and write
484000
heap
page read and write
A08000
trusted library allocation
page read and write
DFA000
trusted library allocation
page execute and read and write
7EAD000
stack
page read and write
2218000
trusted library allocation
page read and write
460000
trusted library allocation
page read and write
AF9000
heap
page read and write
278F1E40000
heap
page read and write
63E000
stack
page read and write
2DFA0841000
heap
page read and write
6A843F7000
stack
page read and write
7C60000
trusted library allocation
page read and write
20D2AA87000
heap
page read and write
215BA913000
heap
page read and write
2770000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
8F9000
heap
page read and write
2273000
trusted library allocation
page read and write
881000
heap
page read and write
20D2AA55000
heap
page read and write
1C0000
remote allocation
page read and write
D0B000
trusted library allocation
page execute and read and write
B44000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
240A000
trusted library allocation
page read and write
7D61000
trusted library allocation
page read and write
9F3000
trusted library allocation
page read and write
27EC000
trusted library allocation
page read and write
1DEAF730000
trusted library allocation
page read and write
454000
remote allocation
page execute and read and write
F40000
trusted library allocation
page read and write
770B000
stack
page read and write
20D2AB08000
heap
page read and write
C2602FB000
stack
page read and write
6A844FF000
stack
page read and write
A40000
trusted library allocation
page read and write
20D2B367000
heap
page read and write
2DB8000
trusted library allocation
page read and write
1DEB48FD000
heap
page read and write
278F1E40000
heap
page read and write
2275000
trusted library allocation
page read and write
9D0000
heap
page read and write
2033D6E1000
heap
page read and write
4B70000
trusted library allocation
page read and write
2E05000
trusted library allocation
page read and write
419000
remote allocation
page execute and read and write
A3E000
heap
page read and write
5B5000
heap
page read and write
20D2B3C3000
heap
page read and write
326B000
trusted library allocation
page read and write
149F8DC0000
trusted library allocation
page read and write
454000
remote allocation
page execute and read and write
B0D8B7E000
stack
page read and write
6A8427B000
stack
page read and write
454000
remote allocation
page execute and read and write
2260000
trusted library allocation
page read and write
4D5000
heap
page read and write
30CB000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
A0B000
trusted library allocation
page read and write
20D2B3B3000
heap
page read and write
275C000
trusted library allocation
page read and write
2E3C000
trusted library allocation
page read and write
595000
heap
page read and write
18F3F402000
trusted library allocation
page read and write
B2E000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
DB55A7E000
stack
page read and write
4D0000
heap
page read and write
2DF8000
trusted library allocation
page read and write
4D4000
heap
page read and write
1077000
heap
page read and write
21A1000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
8A60E7F000
stack
page read and write
1DEAF902000
heap
page read and write
278F1F40000
heap
page read and write
20D2B821000
heap
page read and write
2421000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
AF7DDFD000
stack
page read and write
3174000
trusted library allocation
page read and write
9A0000
heap
page read and write
AD4000
heap
page read and write
7E60000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
5F4000
heap
page read and write
6A825FE000
unkown
page read and write
9F3000
trusted library allocation
page read and write
86C000
heap
page read and write
8EF000
stack
page read and write
2770000
heap
page read and write
1DEB0461000
trusted library allocation
page read and write
2DFA0E70000
trusted library allocation
page read and write
505000
heap
page read and write
9F0000
heap
page read and write
75F000
stack
page read and write
2DFA0861000
heap
page read and write
322B000
trusted library allocation
page read and write
85F000
heap
page read and write
2AF0000
trusted library allocation
page read and write
149F8DF0000
remote allocation
page read and write
B17000
heap
page read and write
595000
heap
page read and write
2279000
trusted library allocation
page read and write
2300000
trusted library allocation
page read and write
2B179B10000
heap
page read and write
485000
heap
page read and write
2DC7000
trusted library allocation
page read and write
27E6000
trusted library allocation
page read and write
85F000
heap
page read and write
1C0000
remote allocation
page read and write
18F3ED08000
heap
page read and write
5B4000
heap
page read and write
30D1000
trusted library allocation
page read and write
B07000
heap
page read and write
295B000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
834000
heap
page read and write
2DFA0863000
heap
page read and write
CC2000
trusted library allocation
page execute and read and write
759E000
stack
page read and write
DB558FE000
stack
page read and write
23B1000
heap
page read and write
20D2AA4E000
heap
page read and write
A71000
trusted library allocation
page read and write
7F0000
heap
page read and write
3226000
trusted library allocation
page read and write
B17000
heap
page read and write
1DEAF079000
heap
page read and write
17C000
stack
page read and write
2DFA087C000
heap
page read and write
A6D000
trusted library allocation
page read and write
2DFC000
trusted library allocation
page read and write
A11000
trusted library allocation
page read and write
9D000
stack
page read and write
DB55AFF000
stack
page read and write
2DE4000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
454000
remote allocation
page execute and read and write
7C60000
trusted library allocation
page read and write
7C90000
trusted library allocation
page read and write
7A8F000
stack
page read and write
1C0000
remote allocation
page read and write
1C0000
remote allocation
page read and write
B38000
trusted library allocation
page read and write
70000
heap
page read and write
22BFAB00000
heap
page read and write
8AA000
heap
page read and write
580000
remote allocation
page read and write
2273000
trusted library allocation
page read and write
2160000
trusted library allocation
page read and write
8A60D7F000
stack
page read and write
45B23FD000
stack
page read and write
1C0000
remote allocation
page read and write
843000
heap
page read and write
2AE0000
trusted library allocation
page read and write
220F000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
E74000
unkown
page readonly
580000
remote allocation
page read and write
B0D86FB000
stack
page read and write
30000
heap
page read and write
2279000
trusted library allocation
page read and write
654000
heap
page read and write
18F3EC5A000
heap
page read and write
30000
heap
page read and write
484000
heap
page read and write
20DB1210000
heap
page read and write
ACF000
heap
page read and write
1C0000
remote allocation
page read and write
20D2B371000
heap
page read and write
A49000
heap
page read and write
1C0000
remote allocation
page read and write
B2B000
heap
page read and write
BA7000
heap
page read and write
1031000
heap
page read and write
2268000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
29D4000
heap
page execute and read and write
5B0000
heap
page read and write
20D2B392000
heap
page read and write
20D2B1C0000
remote allocation
page read and write
CE6000
trusted library allocation
page execute and read and write
1DEB4780000
trusted library allocation
page read and write
1DEB4904000
heap
page read and write
DFB51FB000
stack
page read and write
22BFAA3C000
heap
page read and write
2DFA0833000
heap
page read and write
EC0000
heap
page read and write
226D000
trusted library allocation
page read and write
1DEB4740000
trusted library allocation
page read and write
1DEAF076000
heap
page read and write
400000
remote allocation
page execute and read and write
215BA87B000
heap
page read and write
2DFA0813000
heap
page read and write
7AE0000
trusted library allocation
page read and write
504000
heap
page read and write
AD4000
heap
page read and write
E87000
unkown
page readonly
1C0000
remote allocation
page read and write
594000
heap
page read and write
2203000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
E07000
trusted library allocation
page execute and read and write
1DEB00C0000
trusted library section
page readonly
30000
heap
page read and write
6D7000
heap
page read and write
B25000
trusted library allocation
page read and write
29CE000
stack
page read and write
4D4000
heap
page read and write
A78000
trusted library allocation
page read and write
ADF000
heap
page read and write
322F000
trusted library allocation
page read and write
2249000
trusted library allocation
page read and write
1DEB44A0000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
400000
remote allocation
page execute and read and write
2E0E000
trusted library allocation
page read and write
3B50000
direct allocation
page execute and read and write
DFB597F000
stack
page read and write
2214000
trusted library allocation
page read and write
484000
heap
page read and write
6AE000
stack
page read and write
8B6000
heap
page read and write
A5B000
stack
page read and write
755E000
stack
page read and write
881000
heap
page read and write
EA0000
trusted library allocation
page read and write
21A1000
trusted library allocation
page read and write
881000
heap
page read and write
9EA000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
E86FDFF000
stack
page read and write
580000
remote allocation
page read and write
B1E000
trusted library allocation
page read and write
226B000
trusted library allocation
page read and write
454000
remote allocation
page execute and read and write
20D2AAB5000
heap
page read and write
B0D8F7C000
stack
page read and write
21FC000
trusted library allocation
page read and write
2DE2000
trusted library allocation
page read and write
D70000
heap
page read and write
F50000
trusted library allocation
page read and write
2405000
trusted library allocation
page read and write
85F000
heap
page read and write
B12000
heap
page read and write
2870000
trusted library allocation
page read and write
594000
heap
page read and write
AE5000
heap
page read and write
B2F000
trusted library allocation
page read and write
2DDB000
trusted library allocation
page read and write
580000
remote allocation
page read and write
220F000
trusted library allocation
page read and write
20D2B38E000
heap
page read and write
4B70000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2205000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
2416000
trusted library allocation
page read and write
D02000
trusted library allocation
page read and write
4D4000
heap
page read and write
DCA000
trusted library allocation
page execute and read and write
B2E000
trusted library allocation
page read and write
B0D917F000
stack
page read and write
1DEB4902000
heap
page read and write
1281000
unkown
page execute read
3215000
trusted library allocation
page read and write
867000
heap
page read and write
9F0000
heap
page read and write
20D2B803000
heap
page read and write
1DEAF02A000
heap
page read and write
4D20000
trusted library allocation
page read and write
2DBC000
trusted library allocation
page read and write
3278000
trusted library allocation
page read and write
1BC0000
trusted library allocation
page read and write
23B1000
heap
page read and write
18F3EC5C000
heap
page read and write
278F1E26000
heap
page read and write
B5F000
heap
page read and write
2DFA0879000
heap
page read and write
2100000
heap
page read and write
2E38000
trusted library allocation
page read and write
2DFA083B000
heap
page read and write
B8A000
heap
page read and write
2D4D000
trusted library allocation
page read and write
316C000
trusted library allocation
page read and write
5F4000
heap
page read and write
654000
heap
page read and write
1DEAF918000
heap
page read and write
4D4000
heap
page read and write
B16000
trusted library allocation
page read and write
ADA000
heap
page read and write
1DEB4651000
trusted library allocation
page read and write
22BFAB13000
heap
page read and write
25E1000
heap
page read and write
31CE000
trusted library allocation
page read and write
22BFA960000
heap
page read and write
7DD000
stack
page read and write
220F000
trusted library allocation
page read and write
265E000
stack
page read and write
278F1E4D000
heap
page read and write
20D2AA53000
heap
page read and write
A08000
trusted library allocation
page read and write
2403000
trusted library allocation
page read and write
B0C000
trusted library allocation
page read and write
22BFA9D0000
heap
page read and write
2E48000
trusted library allocation
page read and write
BAA000
heap
page read and write
F40000
trusted library allocation
page read and write
B36000
trusted library allocation
page read and write
454000
remote allocation
page execute and read and write
AD4000
heap
page read and write
3222000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
2276000
trusted library allocation
page read and write
DFB537B000
stack
page read and write
2671000
heap
page read and write
195000
stack
page read and write
2421000
trusted library allocation
page read and write
C0000
trusted library allocation
page read and write
9FC000
heap
page read and write
20D2B39C000
heap
page read and write
650000
trusted library allocation
page read and write
B34000
trusted library allocation
page read and write
20D2B3D8000
heap
page read and write
1DEAF074000
heap
page read and write
228B000
trusted library allocation
page read and write
9F4000
trusted library allocation
page read and write
89E000
heap
page read and write
F40000
trusted library allocation
page read and write
9FE000
trusted library allocation
page read and write
AC3000
heap
page read and write
1077000
heap
page read and write
149F8E02000
heap
page read and write
1065000
heap
page read and write
17BF000
stack
page read and write
EB0000
heap
page read and write
18F3EC52000
heap
page read and write
84F000
heap
page read and write
133E000
unkown
page write copy
2203000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
2033D6CC000
heap
page read and write
225E000
trusted library allocation
page read and write
485000
heap
page read and write
F40000
trusted library allocation
page read and write
1DEB00F0000
trusted library section
page readonly
9F3000
trusted library allocation
page read and write
DB0000
heap
page read and write
5B4000
heap
page read and write
F40000
trusted library allocation
page execute and read and write
22BFAA52000
heap
page read and write
2801000
trusted library allocation
page read and write
484000
heap
page read and write
B89000
heap
page read and write
400000
remote allocation
page execute and read and write
22BFB130000
trusted library allocation
page read and write
2DFA0845000
heap
page read and write
4CA0000
trusted library allocation
page read and write
5BE000
stack
page read and write
2E42000
trusted library allocation
page read and write
2273000
trusted library allocation
page read and write
B2F000
trusted library allocation
page read and write
B0A000
trusted library allocation
page read and write
31DE000
trusted library allocation
page read and write
3267000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
5F4000
heap
page read and write
B0D88FB000
stack
page read and write
DEA000
trusted library allocation
page execute and read and write
2360000
trusted library allocation
page read and write
AF6000
heap
page read and write
941000
trusted library allocation
page read and write
215BA800000
heap
page read and write
4D5000
heap
page read and write
20D2AA13000
heap
page read and write
86A000
heap
page read and write
215BA908000
heap
page read and write
818000
heap
page read and write
1DEAF03D000
heap
page read and write
B80000
remote allocation
page read and write
2DAD000
trusted library allocation
page read and write
B13000
trusted library allocation
page read and write
2418000
trusted library allocation
page read and write
7AF000
stack
page read and write
1C0000
remote allocation
page read and write
2268000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
2E07000
trusted library allocation
page read and write
21C8000
trusted library allocation
page read and write
225B000
trusted library allocation
page read and write
4D4000
heap
page read and write
20D2AA4C000
heap
page read and write
AC1000
heap
page read and write
321E000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
20D2AAAA000
heap
page read and write
85F000
heap
page read and write
1C7F000
stack
page read and write
E86F97E000
stack
page read and write
454000
remote allocation
page execute and read and write
1C0000
remote allocation
page read and write
3F74000
trusted library allocation
page read and write
149F8CC0000
heap
page read and write
485000
heap
page read and write
B1F000
trusted library allocation
page read and write
A11000
trusted library allocation
page read and write
7980000
trusted library allocation
page execute and read and write
31DB000
trusted library allocation
page read and write
316E000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
56E000
stack
page read and write
2530000
trusted library allocation
page read and write
B36000
trusted library allocation
page read and write
1DEAF113000
heap
page read and write
C90000
trusted library allocation
page read and write
B17000
heap
page read and write
5F4000
heap
page read and write
20D2B3A7000
heap
page read and write
B23000
trusted library allocation
page read and write
226A000
trusted library allocation
page read and write
1334000
unkown
page readonly
2DFA086D000
heap
page read and write
2033D600000
heap
page read and write
149F8E00000
heap
page read and write
A11000
trusted library allocation
page read and write
9D000
stack
page read and write
594000
heap
page read and write
AD4000
heap
page read and write
1077000
heap
page read and write
B1F000
trusted library allocation
page read and write
B0D87FE000
stack
page read and write
1062000
heap
page read and write
20D2B802000
heap
page read and write
B2C000
heap
page read and write
2B179C55000
heap
page read and write
834000
heap
page read and write
1DEB0110000
trusted library section
page readonly
81E000
stack
page read and write
20D2B392000
heap
page read and write
AFB000
heap
page read and write
2F63000
trusted library allocation
page read and write
2286000
trusted library allocation
page read and write
2DFA086F000
heap
page read and write
1DEB48A3000
heap
page read and write
460000
heap
page read and write
20D2AB16000
heap
page read and write
8060000
trusted library allocation
page read and write
2268000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
20D2B38C000
heap
page read and write
A38000
heap
page read and write
20D2AA29000
heap
page read and write
20D2B386000
heap
page read and write
1C0000
remote allocation
page read and write
EA000
stack
page read and write
17C000
stack
page read and write
B5F000
heap
page read and write
2E2F000
trusted library allocation
page read and write
B34000
trusted library allocation
page read and write
215BA827000
heap
page read and write
B2B000
heap
page read and write
4B70000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
20D2B1C0000
remote allocation
page read and write
8A60A7C000
stack
page read and write
320A000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
2224000
trusted library allocation
page read and write
74CD000
stack
page read and write
5B4000
heap
page read and write
2DFA0860000
heap
page read and write
2033D629000
heap
page read and write
4B70000
trusted library allocation
page read and write
20D2AA3C000
heap
page read and write
838000
heap
page read and write
3217000
trusted library allocation
page read and write
B2F000
trusted library allocation
page read and write
31EB000
trusted library allocation
page read and write
B80000
remote allocation
page read and write
400000
remote allocation
page execute and read and write
B24000
trusted library allocation
page read and write
2B179C02000
heap
page read and write
4D4000
heap
page read and write
48C000
remote allocation
page readonly
225B000
trusted library allocation
page read and write
873000
heap
page read and write
B20000
heap
page read and write
275B000
trusted library allocation
page read and write
325B000
trusted library allocation
page read and write
B47000
heap
page read and write
21F9000
trusted library allocation
page read and write
18F3EBC0000
heap
page read and write
484000
heap
page read and write
1DEAF08B000
heap
page read and write
18F3ED02000
heap
page read and write
B0000
heap
page read and write
4B70000
trusted library allocation
page read and write
278F1E21000
heap
page read and write
B35000
trusted library allocation
page read and write
240E000
trusted library allocation
page read and write
DFB587E000
stack
page read and write
2796000
trusted library allocation
page read and write
2421000
trusted library allocation
page read and write
20D2AA5B000
heap
page read and write
485000
heap
page read and write
2B17A402000
trusted library allocation
page read and write
B0D000
heap
page read and write
21D0000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
133E000
unkown
page read and write
2DB6000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
4D4000
heap
page read and write
278F1E40000
heap
page read and write
31C7000
trusted library allocation
page read and write
22BFB202000
trusted library allocation
page read and write
595000
heap
page read and write
6FC000
heap
page read and write
2260000
trusted library allocation
page read and write
A4A000
heap
page read and write
8F0000
heap
page read and write
F40000
trusted library allocation
page read and write
4D5D000
stack
page read and write
31B2000
trusted library allocation
page read and write
26A4000
heap
page execute and read and write
20D2B313000
heap
page read and write
1C0000
remote allocation
page read and write
20DB142A000
heap
page read and write
4CAB000
trusted library allocation
page read and write
45B22FD000
stack
page read and write
30000
heap
page read and write
1C0000
remote allocation
page read and write
1DEAF802000
heap
page read and write
2218000
trusted library allocation
page read and write
2DF1000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
80000
trusted library allocation
page read and write
4D4000
heap
page read and write
2E0C000
trusted library allocation
page read and write
E74000
unkown
page readonly
220B000
trusted library allocation
page read and write
2C0E000
stack
page read and write
E86F8FE000
stack
page read and write
830000
heap
page read and write
6A81CFC000
stack
page read and write
215BA900000
heap
page read and write
80EE000
stack
page read and write
1280000
unkown
page readonly
650000
heap
page read and write
325D000
trusted library allocation
page read and write
106F000
heap
page read and write
5FA000
heap
page read and write
4B80000
trusted library allocation
page read and write
2DFA0902000
heap
page read and write
1DEAFFE0000
trusted library allocation
page read and write
9D000
stack
page read and write
1C0000
remote allocation
page read and write
B45000
heap
page read and write
1C0000
remote allocation
page read and write
224A000
trusted library allocation
page read and write
3AF1000
trusted library allocation
page read and write
1DEB4510000
trusted library allocation
page read and write
6A8417C000
stack
page read and write
4D5000
heap
page read and write
1C0000
remote allocation
page read and write
2218000
trusted library allocation
page read and write
2DF6000
trusted library allocation
page read and write
DFB4DAB000
stack
page read and write
4D4000
heap
page read and write
20D2B803000
heap
page read and write
187E000
stack
page read and write
A08000
trusted library allocation
page read and write
2D4F000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
278F1E54000
heap
page read and write
4F0000
heap
page read and write
B2B000
heap
page read and write
2960000
trusted library allocation
page read and write
2418000
trusted library allocation
page read and write
2DFA0864000
heap
page read and write
320E000
trusted library allocation
page read and write
AC3000
heap
page read and write
1C0000
remote allocation
page read and write
B2F000
trusted library allocation
page read and write
2DFA0853000
heap
page read and write
2B179BB0000
trusted library allocation
page read and write
B24000
trusted library allocation
page read and write
810000
heap
page read and write
B80000
remote allocation
page read and write
B0D8CFF000
stack
page read and write
20DB1466000
heap
page read and write
3288000
trusted library allocation
page read and write
2DFA086B000
heap
page read and write
1DEB4908000
heap
page read and write
31B8000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
23A1000
trusted library allocation
page read and write
A08000
trusted library allocation
page read and write
2406000
trusted library allocation
page read and write
B24000
trusted library allocation
page read and write
89F000
stack
page read and write
B0D8D7F000
stack
page read and write
31E2000
trusted library allocation
page read and write
1DEB0490000
trusted library allocation
page read and write
784E000
stack
page read and write
20D2AA50000
heap
page read and write
84F000
heap
page read and write
20D2B39C000
heap
page read and write
322D000
trusted library allocation
page read and write
7D60000
trusted library allocation
page read and write
987000
heap
page read and write
B2B000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
107C000
heap
page read and write
86E000
heap
page read and write
7D63000
trusted library allocation
page read and write
20D2B802000
heap
page read and write
20DB1470000
heap
page read and write
655000
heap
page read and write
2D99000
trusted library allocation
page read and write
5F5000
heap
page read and write
8B8000
heap
page read and write
8060000
trusted library allocation
page read and write
CD2000
trusted library allocation
page execute and read and write
1DEAF058000
heap
page read and write
2273000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
3252000
trusted library allocation
page read and write
2252000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
2418000
trusted library allocation
page read and write
2033D702000
heap
page read and write
760D000
stack
page read and write
2871000
trusted library allocation
page read and write
328C000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
798E000
stack
page read and write
AEF000
heap
page read and write
3269000
trusted library allocation
page read and write
320C000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page execute and read and write
2DBA000
trusted library allocation
page read and write
8B5000
heap
page read and write
2033D4D0000
heap
page read and write
AF7D87C000
stack
page read and write
20D2AA71000
heap
page read and write
ADF000
heap
page read and write
7C6F000
trusted library allocation
page read and write
454000
remote allocation
page execute and read and write
DC0000
unkown
page readonly
220E000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
2631000
heap
page read and write
948000
trusted library allocation
page read and write
321B000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
A80000
heap
page read and write
18F3EC13000
heap
page read and write
F50000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
2403000
trusted library allocation
page read and write
B59000
stack
page read and write
B0D85FA000
stack
page read and write
2741000
heap
page read and write
75CE000
stack
page read and write
31FA000
trusted library allocation
page read and write
9F0000
direct allocation
page execute and read and write
2C6B000
trusted library allocation
page read and write
A7D000
trusted library allocation
page read and write
2214000
trusted library allocation
page read and write
18F3EB50000
heap
page read and write
6BF000
stack
page read and write
419000
remote allocation
page execute and read and write
20D2B394000
heap
page read and write
1C0000
remote allocation
page read and write
20D2B3A5000
heap
page read and write
2216000
trusted library allocation
page read and write
83D000
heap
page read and write
2AF1000
trusted library allocation
page read and write
2033D66F000
heap
page read and write
A60000
trusted library allocation
page read and write
20D2B3B3000
heap
page read and write
CEA000
trusted library allocation
page execute and read and write
21A8000
trusted library allocation
page read and write
2871000
trusted library allocation
page read and write
17B000
stack
page read and write
1DEB4790000
remote allocation
page read and write
20D2B38C000
heap
page read and write
3B14000
trusted library allocation
page read and write
2DA6000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
81EE000
stack
page read and write
2403000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
B1F000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
87D000
heap
page read and write
AD4000
heap
page read and write
2266000
trusted library allocation
page read and write
20D2B38C000
heap
page read and write
FBB000
heap
page read and write
2B179C28000
heap
page read and write
4C8E000
stack
page read and write
8CD000
heap
page read and write
2771000
heap
page read and write
2DBF000
trusted library allocation
page read and write
B56000
stack
page read and write
B44000
trusted library allocation
page read and write
2290000
trusted library allocation
page read and write
23FA000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
1080000
heap
page read and write
80F000
stack
page read and write
2402000
trusted library allocation
page read and write
298E000
stack
page read and write
670000
heap
page read and write
1334000
unkown
page readonly
2B179C68000
heap
page read and write
B34000
trusted library allocation
page read and write
ADF000
heap
page read and write
220F000
trusted library allocation
page read and write
A08000
trusted library allocation
page read and write
9FF000
trusted library allocation
page read and write
20D2B38E000
heap
page read and write
AEF000
heap
page read and write
570000
trusted library allocation
page read and write
2151000
trusted library allocation
page read and write
B10000
heap
page read and write
196DC77000
stack
page read and write
215BA740000
heap
page read and write
2E36000
trusted library allocation
page read and write
22BFAA13000
heap
page read and write
B10000
heap
page read and write
20DB1220000
heap
page read and write
21A1000
trusted library allocation
page read and write
B2F000
trusted library allocation
page read and write
AEF000
heap
page read and write
1E0000
heap
page read and write
31BC000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
3295000
trusted library allocation
page read and write
20D2B397000
heap
page read and write
2268000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
4EE000
stack
page read and write
2DFA0849000
heap
page read and write
1347000
unkown
page readonly
1085000
heap
page read and write
31BF000
trusted library allocation
page read and write
19C000
stack
page read and write
20D2B38B000
heap
page read and write
1C0000
remote allocation
page read and write
3286000
trusted library allocation
page read and write
21B0000
trusted library allocation
page read and write
E4E000
stack
page read and write
215BA83C000
heap
page read and write
20D2B802000
heap
page read and write
620000
trusted library allocation
page read and write
6F0000
heap
page read and write
6F8000
heap
page read and write
454000
remote allocation
page execute and read and write
E9E000
stack
page read and write
20D2B3A2000
heap
page read and write
400000
remote allocation
page execute and read and write
326D000
trusted library allocation
page read and write
1DEB481B000
heap
page read and write
E86FAFE000
stack
page read and write
1C0000
remote allocation
page read and write
B1F000
trusted library allocation
page read and write
275C000
trusted library allocation
page read and write
484000
heap
page read and write
26E1000
trusted library allocation
page read and write
1077000
heap
page read and write
1C0000
remote allocation
page read and write
F50000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
20D2B3A4000
heap
page read and write
DF2000
trusted library allocation
page execute and read and write
4D4000
heap
page read and write
2D0E000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
18F3EC8B000
heap
page read and write
B28000
trusted library allocation
page read and write
278F1E32000
heap
page read and write
A90000
heap
page read and write
19C000
stack
page read and write
2033D6BB000
heap
page read and write
620000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
70D000
heap
page read and write
D07000
trusted library allocation
page execute and read and write
2403000
trusted library allocation
page read and write
883000
heap
page read and write
AF7DC7E000
stack
page read and write
400000
remote allocation
page execute and read and write
20DB1280000
heap
page read and write
21A0000
trusted library allocation
page read and write
A40000
heap
page read and write
2180000
trusted library allocation
page read and write
941000
trusted library allocation
page read and write
AE4000
heap
page read and write
4A0000
trusted library allocation
page read and write
1DEB483C000
heap
page read and write
48C000
remote allocation
page readonly
1DEAF959000
heap
page read and write
2351000
trusted library allocation
page read and write
B10000
heap
page read and write
1DEAF013000
heap
page read and write
23FA000
trusted library allocation
page read and write
325F000
trusted library allocation
page read and write
20D2B30F000
heap
page read and write
20D2AAE3000
heap
page read and write
81AB000
stack
page read and write
3265000
trusted library allocation
page read and write
2DFA0710000
heap
page read and write
2DA2000
trusted library allocation
page read and write
6A82377000
stack
page read and write
839000
heap
page read and write
196DE7F000
stack
page read and write
AC9000
heap
page read and write
DFB557F000
stack
page read and write
2DA0000
trusted library allocation
page read and write
B13000
trusted library allocation
page read and write
505000
heap
page read and write
20D2A9D0000
trusted library allocation
page read and write
B2E000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
1DEAF740000
trusted library section
page read and write
400000
remote allocation
page execute and read and write
2848000
trusted library allocation
page read and write
910000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
848000
heap
page read and write
1DEB0100000
trusted library section
page readonly
94D000
trusted library allocation
page read and write
2731000
trusted library allocation
page read and write
3256000
trusted library allocation
page read and write
2B179D13000
heap
page read and write
654000
heap
page read and write
2D93000
trusted library allocation
page read and write
594000
heap
page read and write
1DEB4902000
heap
page read and write
18F3ED00000
heap
page read and write
2288000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
30000
heap
page read and write
2033DE02000
heap
page read and write
28EB000
trusted library allocation
page read and write
20D2B3B7000
heap
page read and write
A55000
heap
page read and write
2DB4000
trusted library allocation
page read and write
7C60000
heap
page read and write
B24000
trusted library allocation
page read and write
215BA865000
heap
page read and write
278F1F10000
heap
page read and write
1DEB4849000
heap
page read and write
4A0000
trusted library allocation
page read and write
FCF000
heap
page read and write
2033D613000
heap
page read and write
EB7000
heap
page read and write
2253000
trusted library allocation
page read and write
618000
heap
page read and write
3254000
trusted library allocation
page read and write
2826000
trusted library allocation
page read and write
278F1E37000
heap
page read and write
2DFA0846000
heap
page read and write
22BFAB02000
heap
page read and write
278F1F50000
heap
page read and write
1347000
unkown
page readonly
1C00000
trusted library allocation
page read and write
1DEB4650000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
6A8407E000
stack
page read and write
13BE000
stack
page read and write
B34000
trusted library allocation
page read and write
196D8FD000
stack
page read and write
9FF000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
1DEB48DE000
heap
page read and write
1C0000
remote allocation
page read and write
215BA855000
heap
page read and write
504000
heap
page read and write
DB559F8000
stack
page read and write
F40000
trusted library allocation
page read and write
A9C000
heap
page read and write
2DDE000
trusted library allocation
page read and write
2DC5000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
20D2AA00000
heap
page read and write
89C000
heap
page read and write
2272000
trusted library allocation
page read and write
49E000
stack
page read and write
2203000
trusted library allocation
page read and write
2DFA000
trusted library allocation
page read and write
E4F000
unkown
page readonly
AF7DFFC000
stack
page read and write
1C0000
remote allocation
page read and write
8060000
trusted library allocation
page read and write
26A0000
heap
page execute and read and write
A08000
trusted library allocation
page read and write
22BFAA70000
heap
page read and write
2033D6C6000
heap
page read and write
2DC1000
trusted library allocation
page read and write
2E03000
trusted library allocation
page read and write
18F3EC59000
heap
page read and write
895000
heap
page read and write
B1B000
trusted library allocation
page read and write
2418000
trusted library allocation
page read and write
B28000
trusted library allocation
page read and write
241B000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
1DEB4638000
trusted library allocation
page read and write
2214000
trusted library allocation
page read and write
2271000
trusted library allocation
page read and write
5B4000
heap
page read and write
56E000
stack
page read and write
2256000
trusted library allocation
page read and write
31CC000
trusted library allocation
page read and write
2B00000
heap
page read and write
DD2000
trusted library allocation
page execute and read and write
FEF000
heap
page read and write
20D2AAEB000
heap
page read and write
8060000
trusted library allocation
page read and write
655000
heap
page read and write
2D10000
trusted library allocation
page read and write
9F2000
trusted library allocation
page read and write
8A608FE000
stack
page read and write
F48000
trusted library allocation
page read and write
B37000
heap
page read and write
B2F000
trusted library allocation
page read and write
FB0000
heap
page read and write
30CD000
trusted library allocation
page read and write
B43000
heap
page read and write
12A000
stack
page read and write
2033D530000
heap
page read and write
1281000
unkown
page execute read
4CDE000
stack
page read and write
721D000
stack
page read and write
215BA6D0000
heap
page read and write
2DFA0832000
heap
page read and write
4B80000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
833000
heap
page read and write
2771000
heap
page read and write
1DEAF092000
heap
page read and write
1C0000
remote allocation
page read and write
8CC000
stack
page read and write
4D5000
heap
page read and write
B05000
heap
page read and write
ADF000
heap
page read and write
2B179C79000
heap
page read and write
DC1000
unkown
page execute read
220F000
trusted library allocation
page read and write
2033D713000
heap
page read and write
215BA888000
heap
page read and write
20D2B396000
heap
page read and write
2D0A000
trusted library allocation
page read and write
220D000
trusted library allocation
page read and write
228E000
trusted library allocation
page read and write
8A7000
heap
page read and write
980000
heap
page read and write
8072000
trusted library allocation
page read and write
7E0000
heap
page read and write
AE7000
heap
page read and write
8B6000
heap
page read and write
484000
heap
page read and write
B1C000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
149F8E36000
heap
page read and write
1C0000
remote allocation
page read and write
20D2AAC2000
heap
page read and write
30000
heap
page read and write
7C60000
trusted library allocation
page read and write
B1D000
trusted library allocation
page read and write
A9D000
heap
page read and write
B34000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
AC7000
heap
page read and write
25E1000
heap
page read and write
7FC10000
trusted library allocation
page execute and read and write
20D2B3B6000
heap
page read and write
278F1CE0000
heap
page read and write
7FF0000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
AD0000
heap
page read and write
2E3E000
trusted library allocation
page read and write
31F8000
trusted library allocation
page read and write
505000
heap
page read and write
654000
heap
page read and write
5F0000
heap
page read and write
7C60000
trusted library allocation
page read and write
215BA86F000
heap
page read and write
AF7DAFE000
stack
page read and write
21FA000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
B24000
trusted library allocation
page read and write
2DFA06A0000
heap
page read and write
2214000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
220F000
trusted library allocation
page read and write
1DEB48FE000
heap
page read and write
2660000
trusted library allocation
page read and write
2B03000
trusted library allocation
page read and write
215BA813000
heap
page read and write
1DEB4906000
heap
page read and write
504000
heap
page read and write
1BF4000
heap
page read and write
2730000
trusted library allocation
page read and write
4CA5000
trusted library allocation
page read and write
DC1000
unkown
page execute read
B38000
trusted library allocation
page read and write
833000
heap
page read and write
5B4000
heap
page read and write
5EE000
stack
page read and write
2E3A000
trusted library allocation
page read and write
484000
heap
page read and write
7C60000
trusted library allocation
page read and write
8073000
trusted library allocation
page read and write
20DB1437000
heap
page read and write
B13000
heap
page read and write
7BD0000
trusted library allocation
page read and write
19C000
stack
page read and write
1C0000
remote allocation
page read and write
83C000
heap
page read and write
570000
trusted library allocation
page read and write
B16000
trusted library allocation
page read and write
2224000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
2D8F000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
AE2000
heap
page read and write
570000
trusted library allocation
page read and write
B2F000
trusted library allocation
page read and write
B0D8E7F000
stack
page read and write
79E000
stack
page read and write
B09000
trusted library allocation
page read and write
195000
stack
page read and write
8EC000
heap
page read and write
215BB002000
trusted library allocation
page read and write
2206000
trusted library allocation
page read and write
2159000
trusted library allocation
page read and write
A68000
trusted library allocation
page read and write
504000
heap
page read and write
400000
remote allocation
page execute and read and write
20D2B375000
heap
page read and write
20D2B398000
heap
page read and write
6E0000
heap
page read and write
2274000
trusted library allocation
page read and write
A2F000
stack
page read and write
B50000
heap
page read and write
3170000
trusted library allocation
page read and write
20D2B3AD000
heap
page read and write
2282000
trusted library allocation
page read and write
149F8E40000
heap
page read and write
A0D000
trusted library allocation
page read and write
9F3000
trusted library allocation
page read and write
278F1E34000
heap
page read and write
1C0000
remote allocation
page read and write
30CF000
trusted library allocation
page read and write
6A83D2C000
stack
page read and write
1C0000
remote allocation
page read and write
B1F000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
B28000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
EC7000
heap
page read and write
DE6000
trusted library allocation
page execute and read and write
89C000
heap
page read and write
3231000
trusted library allocation
page read and write
654000
heap
page read and write
2350000
trusted library allocation
page read and write
25E1000
heap
page read and write
2DEB000
trusted library allocation
page read and write
B0A000
trusted library allocation
page read and write
6A8227A000
stack
page read and write
2DE9000
trusted library allocation
page read and write
2741000
heap
page read and write
3282000
trusted library allocation
page read and write
5B4000
heap
page read and write
2DD2000
trusted library allocation
page read and write
B44000
trusted library allocation
page read and write
20D2B397000
heap
page read and write
580000
heap
page read and write
B1E000
trusted library allocation
page read and write
21C0000
trusted library allocation
page read and write
2DFA06B0000
heap
page read and write
2300000
trusted library allocation
page read and write
2403000
trusted library allocation
page read and write
DC2000
trusted library allocation
page execute and read and write
20D2B802000
heap
page read and write
A11000
trusted library allocation
page read and write
745E000
stack
page read and write
149F9602000
trusted library allocation
page read and write
8FA000
heap
page read and write
4D5000
heap
page read and write
4D30000
trusted library allocation
page read and write
20D2B397000
heap
page read and write
9EA000
trusted library allocation
page read and write
20D2B81A000
heap
page read and write
220F000
trusted library allocation
page read and write
8A60B7B000
stack
page read and write
215BA86F000
heap
page read and write
149F8F02000
heap
page read and write
7C80000
trusted library allocation
page read and write
195000
stack
page read and write
1DEAF918000
heap
page read and write
8B4000
heap
page read and write
90F000
stack
page read and write
21AD000
trusted library allocation
page read and write
149F8E51000
heap
page read and write
2290000
trusted library allocation
page read and write
241D000
trusted library allocation
page read and write
4B78000
trusted library allocation
page read and write
2D08000
trusted library allocation
page read and write
220F000
trusted library allocation
page read and write
4C0000
heap
page read and write
27B8000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
2DCC000
trusted library allocation
page read and write
A93000
heap
page read and write
DFB5A7F000
stack
page read and write
7C80000
trusted library allocation
page read and write
76DE000
stack
page read and write
215BA770000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
1C0000
remote allocation
page read and write
AC3000
heap
page read and write
107D000
heap
page read and write
220E000
trusted library allocation
page read and write
2206000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
2282000
trusted library allocation
page read and write
B7E000
heap
page read and write
9BF000
heap
page read and write
854000
heap
page read and write
484000
heap
page read and write
1DEAEF70000
heap
page read and write
2211000
trusted library allocation
page read and write
27AE000
stack
page read and write
2671000
heap
page read and write
2740000
heap
page read and write
9D000
stack
page read and write
1DEB4829000
heap
page read and write
22BFAA8A000
heap
page read and write
1DEB4700000
trusted library allocation
page read and write
2DFA0886000
heap
page read and write
594000
heap
page read and write
2DFA0842000
heap
page read and write
3203000
trusted library allocation
page read and write
20D2B802000
heap
page read and write
31E9000
trusted library allocation
page read and write
21C1000
trusted library allocation
page read and write
1C90000
heap
page read and write
1DEAF06F000
heap
page read and write
2B179D00000
heap
page read and write
4D4000
heap
page read and write
595000
heap
page read and write
A70000
trusted library allocation
page read and write
C25FCEB000
stack
page read and write
1C0000
remote allocation
page read and write
215BA860000
heap
page read and write
B23000
trusted library allocation
page read and write
2DFA084C000
heap
page read and write
AF7DEFF000
stack
page read and write
7C72000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
B26000
trusted library allocation
page read and write
5B5000
heap
page read and write
2DEF000
trusted library allocation
page read and write
C2604FE000
stack
page read and write
940000
trusted library allocation
page read and write
B2E000
trusted library allocation
page read and write
2033D4C0000
heap
page read and write
2253000
trusted library allocation
page read and write
8CD000
heap
page read and write
1DEB4770000
trusted library allocation
page read and write
690000
heap
page read and write
7BD0000
trusted library allocation
page read and write
A40000
heap
page read and write
B1F000
trusted library allocation
page read and write
21CD000
trusted library allocation
page read and write
B16000
trusted library allocation
page read and write
241D000
trusted library allocation
page read and write
E0B000
trusted library allocation
page execute and read and write
23B1000
heap
page read and write
2DE0000
trusted library allocation
page read and write
215BA88F000
heap
page read and write
CF2000
trusted library allocation
page execute and read and write
7FAB000
stack
page read and write
ACE000
heap
page read and write
594000
heap
page read and write
6A846FF000
stack
page read and write
2268000
trusted library allocation
page read and write
23B0000
heap
page read and write
AA0000
heap
page read and write
DA0000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1DEAF0FD000
heap
page read and write
31F4000
trusted library allocation
page read and write
6A83DAD000
stack
page read and write
20D2B3B5000
heap
page read and write
504000
heap
page read and write
2224000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page execute and read and write
130F000
unkown
page readonly
220F000
trusted library allocation
page read and write
2DFA0866000
heap
page read and write
454000
remote allocation
page execute and read and write
B5F000
heap
page read and write
A0B000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
B34000
trusted library allocation
page read and write
5E0000
heap
page read and write
20D2B3C8000
heap
page read and write
20D2B39A000
heap
page read and write
21A0000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
A61000
trusted library allocation
page read and write
1DEAF815000
heap
page read and write
27B8000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
678000
heap
page read and write
2B179C3D000
heap
page read and write
1DEB0483000
trusted library allocation
page read and write
A47000
heap
page read and write
228E000
trusted library allocation
page read and write
B0D8A7E000
stack
page read and write
20D2B3A0000
heap
page read and write
2206000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
22BFAA29000
heap
page read and write
B2E000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
20D2AA5A000
heap
page read and write
594000
heap
page read and write
6A8247F000
stack
page read and write
2B179C00000
heap
page read and write
278F1F45000
heap
page read and write
454000
remote allocation
page execute and read and write
18F3EC02000
heap
page read and write
A3D000
heap
page read and write
A69000
trusted library allocation
page read and write
7FEE000
stack
page read and write
6A8217E000
stack
page read and write
860000
heap
page read and write
80AD000
stack
page read and write
1C0000
remote allocation
page read and write
B2D000
heap
page read and write
7C65000
trusted library allocation
page read and write
8BF000
heap
page read and write
196DB7E000
stack
page read and write
2796000
trusted library allocation
page read and write
B23000
trusted library allocation
page read and write
9FF000
stack
page read and write
20D2B3A3000
heap
page read and write
B57000
heap
page read and write
20D2AAAB000
heap
page read and write
18F3EC80000
heap
page read and write
594000
heap
page read and write
224A000
trusted library allocation
page read and write
2253000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
400000
remote allocation
page execute and read and write
2215000
trusted library allocation
page read and write
4D4000
heap
page read and write
9F9000
trusted library allocation
page read and write
FA0000
trusted library allocation
page execute and read and write
20D2AADB000
heap
page read and write
56E000
stack
page read and write
8F7000
heap
page read and write
149F8C50000
heap
page read and write
45B21FF000
stack
page read and write
833000
heap
page read and write
9F9000
trusted library allocation
page read and write
63D000
heap
page read and write
2E44000
trusted library allocation
page read and write
8CD000
heap
page read and write
4CB0000
trusted library allocation
page read and write
20D2B39C000
heap
page read and write
F50000
trusted library allocation
page read and write
C2601FB000
stack
page read and write
B16000
trusted library allocation
page read and write
2BAE000
trusted library allocation
page read and write
28EC000
trusted library allocation
page read and write
8065000
trusted library allocation
page read and write
B13000
trusted library allocation
page read and write
20D2AAF6000
heap
page read and write
220E000
trusted library allocation
page read and write
6A81DFD000
stack
page read and write
654000
heap
page read and write
AEF000
heap
page read and write
5F5000
heap
page read and write
2404000
trusted library allocation
page read and write
48C000
remote allocation
page readonly
20DB1513000
heap
page read and write
1BBE000
stack
page read and write
2DFA0847000
heap
page read and write
6D0000
heap
page read and write
881000
heap
page read and write
B50000
heap
page read and write
B26000
trusted library allocation
page read and write
2271000
trusted library allocation
page read and write
31E6000
trusted library allocation
page read and write
B2F000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
7ACE000
stack
page read and write
196D5CB000
stack
page read and write
278F1E4E000
heap
page read and write
8070000
trusted library allocation
page read and write
400000
remote allocation
page readonly
B0D89FE000
stack
page read and write
20DB1502000
heap
page read and write
2161000
trusted library allocation
page read and write
2254000
trusted library allocation
page read and write
93B000
heap
page read and write
504E000
stack
page read and write
326F000
trusted library allocation
page read and write
655000
heap
page read and write
196DAFB000
stack
page read and write
24B0000
heap
page read and write
2DCA000
trusted library allocation
page read and write
98A000
heap
page read and write
8AD000
heap
page read and write
1072000
heap
page read and write
A50000
trusted library allocation
page read and write
419000
remote allocation
page execute and read and write
467000
heap
page read and write
D1E000
stack
page read and write
31CA000
trusted library allocation
page read and write
7FB0000
trusted library allocation
page read and write
1DEB488D000
heap
page read and write
1C0000
remote allocation
page read and write
4B70000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
484000
heap
page read and write
1C0000
remote allocation
page read and write
22BFAA00000
heap
page read and write
1DEB48FC000
heap
page read and write
AF0000
heap
page read and write
9F6000
trusted library allocation
page read and write
20D2B375000
heap
page read and write
B26000
trusted library allocation
page read and write
5F4000
heap
page read and write
31C5000
trusted library allocation
page read and write
577000
heap
page read and write
1DEB4670000
trusted library allocation
page read and write
1DEB4800000
heap
page read and write
484000
heap
page read and write
B5F000
heap
page read and write
1DEB48E4000
heap
page read and write
220F000
trusted library allocation
page read and write
ADF000
heap
page read and write
48C000
remote allocation
page readonly
2AE0000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
B44000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
610000
heap
page read and write
852000
heap
page read and write
7EE000
stack
page read and write
20D2B394000
heap
page read and write
485000
heap
page read and write
E86FBFF000
stack
page read and write
31B6000
trusted library allocation
page read and write
E86F87B000
stack
page read and write
20D2B3A0000
heap
page read and write
B59000
heap
page read and write
DB5000
heap
page read and write
3284000
trusted library allocation
page read and write
17C000
stack
page read and write
594000
heap
page read and write
DB5597E000
stack
page read and write
30000
heap
page read and write
AC1000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
B28000
trusted library allocation
page read and write
20D2B802000
heap
page read and write
2D0C000
trusted library allocation
page read and write
594000
heap
page read and write
20DB145A000
heap
page read and write
454000
remote allocation
page execute and read and write
1C0000
remote allocation
page read and write
1C0000
remote allocation
page read and write
2771000
heap
page read and write
328A000
trusted library allocation
page read and write
56E000
stack
page read and write
AC6000
heap
page read and write
17B000
stack
page read and write
220F000
trusted library allocation
page read and write
AF7E0FE000
stack
page read and write
220E000
trusted library allocation
page read and write
45E000
stack
page read and write
7C61000
heap
page read and write
1DEAF800000
heap
page read and write
20D2AB02000
heap
page read and write
6A82578000
stack
page read and write
3224000
trusted library allocation
page read and write
8080000
trusted library allocation
page read and write
17B000
stack
page read and write
4B80000
trusted library allocation
page read and write
B38000
trusted library allocation
page read and write
130F000
unkown
page readonly
240A000
trusted library allocation
page read and write
655000
heap
page read and write
4CA0000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
2B179C60000
heap
page read and write
7D61000
trusted library allocation
page read and write
AB1000
trusted library allocation
page read and write
AD8000
heap
page read and write
2B179C13000
heap
page read and write
227D000
trusted library allocation
page read and write
2918000
trusted library allocation
page read and write
1BF0000
heap
page read and write
505000
heap
page read and write
2DAB000
trusted library allocation
page read and write
20D2B352000
heap
page read and write
D10000
heap
page read and write
2330000
trusted library allocation
page read and write
654000
heap
page read and write
650000
trusted library allocation
page read and write
A50000
heap
page read and write
215BA829000
heap
page read and write
1DEB00E0000
trusted library section
page readonly
7C70000
trusted library allocation
page read and write
2E0A000
trusted library allocation
page read and write
5B5000
heap
page read and write
20D2B38E000
heap
page read and write
240E000
trusted library allocation
page read and write
82EF000
stack
page read and write
F80000
heap
page read and write
2E31000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
241B000
trusted library allocation
page read and write
B15000
trusted library allocation
page read and write
9FD000
heap
page read and write
9D000
stack
page read and write
560000
trusted library allocation
page read and write
794F000
stack
page read and write
7C80000
trusted library allocation
page read and write
261E000
stack
page read and write
31D5000
trusted library allocation
page read and write
868000
heap
page read and write
228B000
trusted library allocation
page read and write
AC4000
heap
page read and write
7BF000
stack
page read and write
9D000
stack
page read and write
3207000
trusted library allocation
page read and write
3790000
direct allocation
page execute and read and write
B02000
heap
page read and write
843000
heap
page read and write
DB5587A000
stack
page read and write
872000
heap
page read and write
220E000
trusted library allocation
page read and write
3229000
trusted library allocation
page read and write
1DEAFB01000
trusted library allocation
page read and write
A55000
heap
page read and write
316A000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
20D2A930000
heap
page read and write
227E000
trusted library allocation
page read and write
530000
trusted library allocation
page read and write
B2E000
trusted library allocation
page read and write
2203000
trusted library allocation
page read and write
8E0000
heap
page read and write
654000
heap
page read and write
20D2B3A0000
heap
page read and write
3540000
trusted library allocation
page read and write
7DC000
stack
page read and write
AEF000
heap
page read and write
20D2B38A000
heap
page read and write
2D9B000
trusted library allocation
page read and write
5B5000
heap
page read and write
2B179B20000
heap
page read and write
5F4000
heap
page read and write
700000
heap
page read and write
1C0000
remote allocation
page read and write
B0D80DC000
stack
page read and write
1C0000
remote allocation
page read and write
275B000
trusted library allocation
page read and write
A3E000
heap
page read and write
B1F000
trusted library allocation
page read and write
980000
heap
page read and write
1C0000
remote allocation
page read and write
A71000
trusted library allocation
page read and write
B2F000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
5F4000
heap
page read and write
2358000
trusted library allocation
page read and write
18F3EC90000
heap
page read and write
1C0000
remote allocation
page read and write
20D2AB13000
heap
page read and write
B2F000
trusted library allocation
page read and write
B87000
heap
page read and write
400000
remote allocation
page execute and read and write
2421000
trusted library allocation
page read and write
741C000
stack
page read and write
21D1000
trusted library allocation
page read and write
BA0000
heap
page read and write
B22000
heap
page read and write
2033DF32000
heap
page read and write
1C0000
remote allocation
page read and write
1C0000
remote allocation
page read and write
7C70000
trusted library allocation
page read and write
8CD000
heap
page read and write
23F9000
trusted library allocation
page read and write
5F4000
heap
page read and write
B25000
trusted library allocation
page read and write
31FC000
trusted library allocation
page read and write
5B4000
heap
page read and write
20D2B300000
heap
page read and write
419000
remote allocation
page execute and read and write
DFB547D000
stack
page read and write
843000
heap
page read and write
1C0000
remote allocation
page read and write
20D2B38E000
heap
page read and write
504000
heap
page read and write
654000
heap
page read and write
226A000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
18F3ED13000
heap
page read and write
2631000
heap
page read and write
2DFA0843000
heap
page read and write
2DD5000
trusted library allocation
page read and write
2731000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
149F8DF0000
remote allocation
page read and write
215D000
trusted library allocation
page read and write
1DEB480F000
heap
page read and write
1280000
unkown
page readonly
215BA6E0000
heap
page read and write
7AE000
stack
page read and write
28D8000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
A06000
trusted library allocation
page read and write
2214000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
B1A000
trusted library allocation
page read and write
1024000
heap
page read and write
484000
heap
page read and write
9FE000
trusted library allocation
page read and write
31D3000
trusted library allocation
page read and write
B1F000
trusted library allocation
page read and write
20D2B391000
heap
page read and write
20D2A940000
heap
page read and write
25E1000
heap
page read and write
2DED000
trusted library allocation
page read and write
D9E000
stack
page read and write
B0D897E000
stack
page read and write
2671000
heap
page read and write
2288000
trusted library allocation
page read and write
5F5000
heap
page read and write
7D61000
trusted library allocation
page read and write
21F1000
trusted library allocation
page read and write
E02000
trusted library allocation
page read and write
4C90000
trusted library allocation
page execute and read and write
AC0000
heap
page read and write
2DAF000
trusted library allocation
page read and write
2871000
trusted library allocation
page read and write
20D2B3AD000
heap
page read and write
1C0000
remote allocation
page read and write
E7E000
unkown
page write copy
8070000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
327E000
trusted library allocation
page read and write
B80000
remote allocation
page read and write
1C0000
remote allocation
page read and write
B2F000
trusted library allocation
page read and write
1BE000
stack
page read and write
20D2A9A0000
heap
page read and write
1C0000
remote allocation
page read and write
220F000
trusted library allocation
page read and write
2731000
trusted library allocation
page read and write
2253000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
7FF0000
trusted library allocation
page execute and read and write
9DF000
stack
page read and write
5F5000
heap
page read and write
2D91000
trusted library allocation
page read and write
4D1E000
stack
page read and write
225E000
trusted library allocation
page read and write
220F000
trusted library allocation
page read and write
A61000
trusted library allocation
page read and write
8A6097F000
stack
page read and write
B2B000
heap
page read and write
AE0000
heap
page read and write
2DF4000
trusted library allocation
page read and write
1DEB4654000
trusted library allocation
page read and write
595000
heap
page read and write
2288000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
20D2B38A000
heap
page read and write
2033DF00000
heap
page read and write
2DFA0829000
heap
page read and write
2DFA0862000
heap
page read and write
2800000
trusted library allocation
page read and write
5B4000
heap
page read and write
2033D560000
trusted library allocation
page read and write
29D0000
heap
page execute and read and write
454000
remote allocation
page execute and read and write
225E000
trusted library allocation
page read and write
196D87E000
stack
page read and write
2DFA085D000
heap
page read and write
AF7D67C000
stack
page read and write
989000
heap
page read and write
654000
heap
page read and write
1C0000
remote allocation
page read and write
AE2000
heap
page read and write
769E000
stack
page read and write
2B179B80000
heap
page read and write
22BFAA7C000
heap
page read and write
8CD000
heap
page read and write
81B0000
trusted library allocation
page read and write
A40000
heap
page read and write
2255000
trusted library allocation
page read and write
580000
remote allocation
page read and write
9D0000
trusted library allocation
page read and write
B1F000
trusted library allocation
page read and write
710000
heap
page read and write
F50000
trusted library allocation
page read and write
7FC000
stack
page read and write
195000
stack
page read and write
20D2B802000
heap
page read and write
3271000
trusted library allocation
page read and write
504000
heap
page read and write
47C000
heap
page read and write
F40000
trusted library allocation
page read and write
220E000
trusted library allocation
page read and write
98B000
heap
page read and write
400000
remote allocation
page execute and read and write
278F1E26000
heap
page read and write
20D2B802000
heap
page read and write
C2603FE000
stack
page read and write
7E8000
heap
page read and write
20DB1400000
heap
page read and write
1DEB4630000
trusted library allocation
page read and write
2DD7000
trusted library allocation
page read and write
650000
trusted library allocation
page read and write
5F4000
heap
page read and write
1072000
heap
page read and write
419000
remote allocation
page execute and read and write
B19000
trusted library allocation
page read and write
87B000
heap
page read and write
1C0000
remote allocation
page read and write
20D2B3A4000
heap
page read and write
20D2B800000
heap
page read and write
B1E000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
A81000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
1DEAF913000
heap
page read and write
4D4000
heap
page read and write
2771000
trusted library allocation
page read and write
20D2B397000
heap
page read and write
849000
heap
page read and write
654000
heap
page read and write
2DA4000
trusted library allocation
page read and write
7AC000
stack
page read and write
195000
stack
page read and write
ACC000
heap
page read and write
31E4000
trusted library allocation
page read and write
20D2B3A2000
heap
page read and write
45B217D000
stack
page read and write
DFB567D000
stack
page read and write
5B5000
heap
page read and write
1DEB4790000
remote allocation
page read and write
3213000
trusted library allocation
page read and write
2203000
trusted library allocation
page read and write
6A81D7E000
stack
page read and write
215BA859000
heap
page read and write
2033D689000
heap
page read and write
2DD9000
trusted library allocation
page read and write
594000
heap
page read and write
31B4000
trusted library allocation
page read and write
215BA85D000
heap
page read and write
2955000
trusted library allocation
page read and write
B34000
trusted library allocation
page read and write
504000
heap
page read and write
1C0000
remote allocation
page read and write
1DEAEF60000
heap
page read and write
B5F000
heap
page read and write
8EF000
stack
page read and write
B1F000
trusted library allocation
page read and write
B1F000
trusted library allocation
page read and write
B34000
trusted library allocation
page read and write
B5A000
heap
page read and write
2151000
trusted library allocation
page read and write
DC0000
unkown
page readonly
2271000
trusted library allocation
page read and write
7AF000
stack
page read and write
1C0000
remote allocation
page read and write
AEF000
heap
page read and write
2808000
trusted library allocation
page read and write
894000
heap
page read and write
AF6000
heap
page read and write
5B4000
heap
page read and write
B1F000
trusted library allocation
page read and write
There are 2167 hidden memdumps, click here to show them.