IOC Report
Ki8WlC0ddA.exe

loading gif

Files

File Path
Type
Category
Malicious
Ki8WlC0ddA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ki8WlC0ddA.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\tmp39F4.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Non-ISO extended-ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\nbbxvA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\nbbxvA.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e5mvax22.jet.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r1la5k4g.tlc.ps1
very short file (no magic)
dropped
C:\Users\user\Documents\20220510\PowerShell_transcript.849224.GF_mjD2U.20220510202227.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Ki8WlC0ddA.exe
"C:\Users\user\Desktop\Ki8WlC0ddA.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nbbxvA.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nbbxvA" /XML "C:\Users\user\AppData\Local\Temp\tmp39F4.tmp
malicious
C:\Users\user\Desktop\Ki8WlC0ddA.exe
C:\Users\user\Desktop\Ki8WlC0ddA.exe
malicious
C:\Users\user\Desktop\Ki8WlC0ddA.exe
C:\Users\user\Desktop\Ki8WlC0ddA.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
malicious
91.193.75.221
malicious
http://www.carterandcone.compor
unknown
http://www.sandoll.co.krttp://w
unknown
http://www.fontbureau.com/designers
unknown
http://www.sajatypeworks.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.jiyu-kobo.co.jp/:
unknown
http://www.fontbureau.comgrita
unknown
http://www.carterandcone.comUI
unknown
http://www.jiyu-kobo.co.jp/3
unknown
http://www.founder.com.cn/cn/a
unknown
http://www.fontbureau.comalsv
unknown
http://www.sajatypeworks.comaK
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.jiyu-kobo.co.jp/Y0
unknown
http://www.ascendercorp.com/typedesigners.html
unknown
http://www.jiyu-kobo.co.jp/(
unknown
http://www.urwpp.deDPlease
unknown
http://www.goodfont.co.krm
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.fontbureau.comC
unknown
http://www.zhongyicts.com.cn-s
unknown
http://www.fontbureau.comicv
unknown
http://www.jiyu-kobo.co.jp/Lodi
unknown
http://www.galapagosdesign.com/
unknown
http://www.fontbureau.comonyF(
unknown
http://www.agfamonotype.Y
unknown
http://www.fontbureau.com.TTFY
unknown
http://www.carterandcone.com.t
unknown
http://www.jiyu-kobo.co.jp/C
unknown
http://www.sandoll.co.krc
unknown
http://en.w
unknown
http://www.goodfont.co.krF
unknown
http://www.carterandcone.coml
unknown
http://www.founder.com.cn/cn/
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
http://www.carterandcone.como.2
unknown
http://www.jiyu-kobo.co.jp/t
unknown
http://www.jiyu-kobo.co.jp/r
unknown
http://www.jiyu-kobo.co.jp/iv
unknown
http://www.sajatypeworks.comt;
unknown
http://www.founder.com.cn/cnicr
unknown
http://www.carterandcone.com-s
unknown
http://www.fontbureau.comok
unknown
http://www.zhongyicts.com.cnG
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.jiyu-kobo.co.jp/jp/C
unknown
http://www.fontbureau.comitudC
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.founder.com.cn/cnM
unknown
http://www.fontbureau.com/designers?
unknown
http://www.zhongyicts.com.cnUI
unknown
http://www.tiro.com
unknown
http://www.jiyu-kobo.co.jp/jp/3
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.com
unknown
http://www.founder.com.cn/cnF
unknown
http://www.zhongyicts.com.cn%
unknown
http://www.carterandcone.como.v
unknown
http://www.fontbureau.comiono(
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cnn
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://fontfabrik.comu
unknown
http://www.founder.com.cn/cnl
unknown
http://www.sandoll.co.krFo
unknown
http://www.fontbureau.com/designersw
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.sakkal.com
unknown
http://www.fontbureau.com/designerso
unknown
http://www.fontbureau.com/designersn
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.comF
unknown
http://www.carterandcone.comTC
unknown
http://www.fontbureau.comL.TTF
unknown
http://www.jiyu-kobo.co.jp/jp/
unknown
http://www.fontbureau.comd
unknown
http://www.fontbureau.comce2
unknown
http://www.jiyu-kobo.co.jp/k-s
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.galapagosdesign.com/.
unknown
http://www.carterandcone.comTCy
unknown
http://www.carterandcone.comorm
unknown
http://www.monotype.
unknown
http://www.carterandcone.comue~
unknown
http://www.fontbureau.comm
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.como
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fontbureau.comdC
unknown
http://www.sandoll.co.krn-u
unknown
http://www.fontbureau.comlic3
unknown
http://www.fontbureau.com/designers/
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
91.193.75.221
unknown
Serbia
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
24C1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
39B9000
trusted library allocation
page read and write
malicious
36A5000
trusted library allocation
page read and write
malicious
53B0000
trusted library section
page read and write
malicious
4CDF000
stack
page read and write
536F000
stack
page read and write
26941FE000
unkown
page read and write
54B3000
trusted library allocation
page read and write
54EF000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
D0B000
heap
page read and write
14B7357E000
heap
page read and write
4E90000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
3766A7E000
stack
page read and write
D0E000
heap
page read and write
6B40000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
54E7000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
1FBF9049000
heap
page read and write
54D0000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
14B7356F000
heap
page read and write
54CB000
trusted library allocation
page read and write
67DE000
stack
page read and write
54EE000
trusted library allocation
page read and write
668000
heap
page read and write
54CE000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
13339FB000
stack
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
7806E7C000
stack
page read and write
549D000
stack
page read and write
7D0000
heap
page read and write
133407F000
stack
page read and write
6CE0000
trusted library allocation
page execute and read and write
54EE000
trusted library allocation
page read and write
A00000
remote allocation
page read and write
990000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
CE3000
heap
page read and write
6C70000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
CDD000
heap
page read and write
669D000
stack
page read and write
86C0000
trusted library allocation
page read and write
8720000
trusted library allocation
page read and write
61ED000
stack
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54DF000
trusted library allocation
page read and write
19AB2BC0000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
254C4A6E000
heap
page read and write
13336FE000
stack
page read and write
7806F7E000
stack
page read and write
54B2000
trusted library allocation
page read and write
1B9BC45C000
heap
page read and write
54EE000
trusted library allocation
page read and write
CDB000
heap
page read and write
1B9BC400000
heap
page read and write
54C4000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54E6000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
79A000
heap
page read and write
54E3000
trusted library allocation
page read and write
4E35000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
1D6CC670000
trusted library allocation
page read and write
54DC000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4EC0000
heap
page read and write
54CB000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
C70000
heap
page read and write
6BA3000
trusted library allocation
page read and write
660000
heap
page read and write
54EE000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
9C0000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
14B72AC3000
heap
page read and write
54F0000
trusted library allocation
page read and write
B7E000
stack
page read and write
B35000
heap
page read and write
4F60000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5A2000
unkown
page readonly
400000
remote allocation
page execute and read and write
19AB2A88000
trusted library allocation
page read and write
1D6CC4E4000
heap
page read and write
600000
unkown
page readonly
54D2000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
658C000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
1B9BCC02000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
19AB2AA1000
trusted library allocation
page read and write
254C4890000
heap
page read and write
54EE000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
19AADD18000
heap
page read and write
54C3000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
25B64D03000
heap
page read and write
6BA0000
trusted library allocation
page read and write
19AB2CCD000
heap
page read and write
54E7000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
897F000
stack
page read and write
25B64D13000
heap
page read and write
54EE000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
76F000
heap
page read and write
19AAE560000
trusted library section
page readonly
CDB000
heap
page read and write
19AAD2E0000
heap
page read and write
54B2000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
68DF000
stack
page read and write
4E40000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
110000
unkown
page readonly
1D6CC350000
trusted library allocation
page read and write
2A59000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
1D6CD400000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
9A2000
trusted library allocation
page read and write
430000
unkown
page readonly
430000
unkown
page readonly
54CB000
trusted library allocation
page read and write
14B73A03000
heap
page read and write
6B40000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
53AD000
stack
page read and write
1FBF9070000
heap
page read and write
6B40000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
7C0000
heap
page read and write
54B2000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54D1000
trusted library allocation
page read and write
1FBF9100000
heap
page read and write
54EE000
trusted library allocation
page read and write
8307000
trusted library allocation
page read and write
4EC3000
heap
page read and write
4EB0000
trusted library allocation
page read and write
432000
unkown
page readonly
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
1B9BC45A000
heap
page read and write
54D3000
trusted library allocation
page read and write
6CF2000
trusted library allocation
page read and write
6560000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
54CB000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
14B73576000
heap
page read and write
54E3000
trusted library allocation
page read and write
79D000
heap
page read and write
7BC000
heap
page read and write
54CB000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
514D000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
79D000
heap
page read and write
54EE000
trusted library allocation
page read and write
810000
heap
page read and write
14B735D3000
heap
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
19AB2CF4000
heap
page read and write
54CB000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
8325000
trusted library allocation
page read and write
8710000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
92E000
stack
page read and write
6B40000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
79A000
heap
page read and write
54CB000
trusted library allocation
page read and write
10A96FF000
stack
page read and write
4F4A000
trusted library allocation
page read and write
19AAD270000
heap
page read and write
54CB000
trusted library allocation
page read and write
1FBF8F00000
heap
page read and write
54E3000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5BD5000
trusted library allocation
page read and write
86DD000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
1D6CC4E4000
heap
page read and write
54CB000
trusted library allocation
page read and write
19AAE550000
trusted library section
page readonly
54EE000
trusted library allocation
page read and write
19AB2C3B000
heap
page read and write
54EE000
trusted library allocation
page read and write
904E5FE000
stack
page read and write
54E3000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54CE000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
14B73A02000
heap
page read and write
54B2000
trusted library allocation
page read and write
C27000
trusted library allocation
page execute and read and write
54BA000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
14B7357F000
heap
page read and write
4F40000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
14B7357F000
heap
page read and write
5134000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
D0A000
heap
page read and write
4F60000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
54DF000
trusted library allocation
page read and write
8ECE000
stack
page read and write
6B40000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
14B73583000
heap
page read and write
54CB000
trusted library allocation
page read and write
883F000
stack
page read and write
54E3000
trusted library allocation
page read and write
CDB000
heap
page read and write
19AADC00000
heap
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
86B0000
trusted library allocation
page read and write
25B64D08000
heap
page read and write
6561000
trusted library allocation
page read and write
C16000
trusted library allocation
page execute and read and write
54B2000
trusted library allocation
page read and write
28BE000
stack
page read and write
54F0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
14B7357A000
heap
page read and write
82DC000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
904E07E000
stack
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
6EEE000
stack
page read and write
432000
unkown
page readonly
25B64D0F000
heap
page read and write
CD7000
heap
page read and write
4EB0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
66C2000
trusted library allocation
page read and write
28C8000
trusted library allocation
page read and write
54CE000
trusted library allocation
page read and write
54D4000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
CED000
heap
page read and write
54F0000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
CD1000
heap
page read and write
54DF000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
794000
heap
page read and write
54EE000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
9DC000
heap
page read and write
10A94FB000
stack
page read and write
14B72960000
trusted library allocation
page read and write
65BC000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
14B7357E000
heap
page read and write
54D3000
trusted library allocation
page read and write
24B0000
heap
page execute and read and write
4E60000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
14B7357F000
heap
page read and write
54F0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
1D6CC630000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
4E81000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
CE0000
heap
page read and write
CED000
heap
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
79F000
heap
page read and write
54EE000
trusted library allocation
page read and write
14B73580000
heap
page read and write
90DE000
stack
page read and write
54CB000
trusted library allocation
page read and write
14B72AE9000
heap
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
14B73592000
heap
page read and write
1B9BC461000
heap
page read and write
54CB000
trusted library allocation
page read and write
22FC000
stack
page read and write
6B40000
trusted library allocation
page read and write
254C4B02000
heap
page read and write
4F40000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
4E15000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54D1000
trusted library allocation
page read and write
133417C000
stack
page read and write
400000
remote allocation
page execute and read and write
6BA0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
14B72A00000
heap
page read and write
54BA000
trusted library allocation
page read and write
1FBF902C000
heap
page read and write
54EE000
trusted library allocation
page read and write
7A4000
heap
page read and write
54DC000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CD000
trusted library allocation
page read and write
14B72A5D000
heap
page read and write
54D1000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54CD000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
14B72A82000
heap
page read and write
54CB000
trusted library allocation
page read and write
86E0000
trusted library allocation
page read and write
19AB2BD0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
14B73A02000
heap
page read and write
4F50000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CD000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
3766AFE000
stack
page read and write
91DE000
stack
page read and write
19AB2CD4000
heap
page read and write
54CB000
trusted library allocation
page read and write
864D000
trusted library allocation
page read and write
7AD000
heap
page read and write
54CB000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6B96000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
25B64CA0000
heap
page read and write
4F10000
trusted library allocation
page read and write
1010000
heap
page read and write
670000
heap
page read and write
54EE000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4E50000
heap
page read and write
14B7357E000
heap
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
14B73581000
heap
page read and write
54EE000
trusted library allocation
page read and write
4BBC000
stack
page read and write
4EF1000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
1B9BC45E000
heap
page read and write
54E3000
trusted library allocation
page read and write
19AB2C00000
heap
page read and write
54E3000
trusted library allocation
page read and write
7C0000
heap
page read and write
14B72AE3000
heap
page read and write
432000
unkown
page readonly
54CD000
trusted library allocation
page read and write
E6E000
stack
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
54D1000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
4E0D000
trusted library allocation
page read and write
A00000
remote allocation
page read and write
65BC000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54C3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
19AAE540000
trusted library section
page readonly
54CB000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
19AB2D02000
heap
page read and write
54D8000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
14B735A3000
heap
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
7A9000
heap
page read and write
54BA000
trusted library allocation
page read and write
19AB2C1B000
heap
page read and write
1B9BC210000
heap
page read and write
5BC0000
trusted library allocation
page read and write
14B72ACA000
heap
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
814000
heap
page read and write
54D4000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
1D6CC490000
heap
page read and write
54CC000
trusted library allocation
page read and write
D0B000
heap
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
19AB2B90000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
8AFE000
stack
page read and write
54CB000
trusted library allocation
page read and write
610000
unkown
page read and write
3F0000
unkown
page readonly
658F000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
14B728C0000
heap
page read and write
4E80000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
14B73586000
heap
page read and write
1FBF9013000
heap
page read and write
84D0000
heap
page read and write
254C4B00000
heap
page read and write
5F50000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
5A2000
unkown
page readonly
980000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
1FBF9113000
heap
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
3EA000
stack
page read and write
54EE000
trusted library allocation
page read and write
610000
unkown
page read and write
54CB000
trusted library allocation
page read and write
19AAE520000
trusted library section
page readonly
632E000
stack
page read and write
6F50000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
242E000
stack
page read and write
54CB000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
14B73A02000
heap
page read and write
54E3000
trusted library allocation
page read and write
19AAD4AC000
heap
page read and write
6B40000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
8BFE000
stack
page read and write
6BA0000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
CD5000
heap
page read and write
14B73586000
heap
page read and write
6B40000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
3AD000
stack
page read and write
6F6E000
stack
page read and write
19AB28F0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
1FBF9102000
heap
page read and write
100E000
stack
page read and write
19AAD456000
heap
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
25B64D13000
heap
page read and write
50B0000
trusted library allocation
page read and write
14B72A61000
heap
page read and write
4B50000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
19AB2CDF000
heap
page read and write
4E40000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
5A2000
unkown
page readonly
7C2000
heap
page read and write
5BD0000
trusted library allocation
page read and write
14B72A5E000
heap
page read and write
54B2000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
14B72AA6000
heap
page read and write
54E3000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
14B73592000
heap
page read and write
1333CFF000
stack
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
89BE000
stack
page read and write
54EE000
trusted library allocation
page read and write
110000
unkown
page readonly
700000
heap
page read and write
54DE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
19AB2AC0000
trusted library allocation
page read and write
19AB2B50000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54DF000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
25B64D0F000
heap
page read and write
E80000
trusted library allocation
page read and write
2693B7E000
stack
page read and write
54A0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
254C4B13000
heap
page read and write
54CB000
trusted library allocation
page read and write
4337EFF000
stack
page read and write
54CB000
trusted library allocation
page read and write
7F500000
trusted library allocation
page execute and read and write
5D07000
trusted library allocation
page read and write
658C000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
3766E77000
stack
page read and write
54CB000
trusted library allocation
page read and write
5A2000
unkown
page readonly
4E40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
19AAD488000
heap
page read and write
54E3000
trusted library allocation
page read and write
1FBF9065000
heap
page read and write
5BC0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
8680000
trusted library allocation
page read and write
5150000
heap
page execute and read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
19AADF01000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54DA000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
C6C000
trusted library allocation
page read and write
86CE000
stack
page read and write
CDB000
heap
page read and write
54B2000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
5A0000
unkown
page readonly
54EE000
trusted library allocation
page read and write
14B73575000
heap
page read and write
B10000
trusted library allocation
page read and write
54C3000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
5A2000
unkown
page readonly
54F0000
trusted library allocation
page read and write
27A2000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
4242000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
254C4A00000
heap
page read and write
54CB000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
14B7357F000
heap
page read and write
54CB000
trusted library allocation
page read and write
8EF000
stack
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
7BA000
heap
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
19AAD413000
heap
page read and write
1B9BC508000
heap
page read and write
14B7357F000
heap
page read and write
4B30000
trusted library allocation
page read and write
4E0A000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
54DE000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
CD1000
heap
page read and write
5130000
trusted library section
page read and write
2320000
heap
page read and write
14B7351B000
heap
page read and write
54DC000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
54CD000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
1FBF904C000
heap
page read and write
92E000
stack
page read and write
C50000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
2693A7B000
stack
page read and write
14B7357E000
heap
page read and write
8640000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5A0000
unkown
page readonly
54E3000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
D11000
heap
page read and write
BF3000
trusted library allocation
page execute and read and write
658F000
trusted library allocation
page read and write
133427F000
stack
page read and write
679E000
stack
page read and write
4F60000
trusted library allocation
page read and write
1B9BC513000
heap
page read and write
54D3000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
19AAE570000
trusted library section
page readonly
54E3000
trusted library allocation
page read and write
4F65000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
14B72AB1000
heap
page read and write
54F0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
14B73580000
heap
page read and write
6BA0000
unkown
page read and write
54CD000
trusted library allocation
page read and write
19AAD502000
heap
page read and write
99A000
trusted library allocation
page execute and read and write
6561000
trusted library allocation
page read and write
CEC000
heap
page read and write
6B40000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
A00000
remote allocation
page read and write
54D3000
trusted library allocation
page read and write
14B73290000
remote allocation
page read and write
54B5000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
5BBE000
stack
page read and write
6B40000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
54C3000
trusted library allocation
page read and write
14B72AAD000
heap
page read and write
54D8000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
CD5000
heap
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
1FBF904F000
heap
page read and write
54CB000
trusted library allocation
page read and write
2693D77000
stack
page read and write
6B90000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CD000
trusted library allocation
page read and write
6C5C000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
5D01000
heap
page read and write
658D000
trusted library allocation
page read and write
82D4000
trusted library allocation
page read and write
2495000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
610000
unkown
page read and write
54B2000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
14B72A58000
heap
page read and write
5130000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
44C8000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
2463000
heap
page read and write
14B72B13000
heap
page read and write
54CB000
trusted library allocation
page read and write
622D000
stack
page read and write
54EE000
trusted library allocation
page read and write
254C4A02000
heap
page read and write
720000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
870E000
stack
page read and write
54E3000
trusted library allocation
page read and write
19AAD491000
heap
page read and write
19AAD48C000
heap
page read and write
4DFB000
trusted library allocation
page read and write
254C4A57000
heap
page read and write
4E40000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5CFD000
stack
page read and write
2693F7F000
stack
page read and write
54CB000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
7EB000
heap
page read and write
10A97FF000
stack
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
CC6000
heap
page read and write
54F0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
9A7000
trusted library allocation
page execute and read and write
54EE000
trusted library allocation
page read and write
356C000
trusted library allocation
page read and write
14B73402000
heap
page read and write
6B40000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
19AB2AB0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
19AAD475000
heap
page read and write
4B10000
trusted library allocation
page read and write
8665000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
19AB2AA0000
trusted library allocation
page read and write
996000
trusted library allocation
page execute and read and write
2474000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
8693000
trusted library allocation
page read and write
14B72A60000
heap
page read and write
5F60000
trusted library allocation
page read and write
254C5202000
trusted library allocation
page read and write
25B64FA0000
heap
page read and write
6B40000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
4E70000
trusted library section
page read and write
54EE000
trusted library allocation
page read and write
1D6CC669000
heap
page read and write
5D00000
trusted library allocation
page read and write
25B64CF2000
heap
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
2960000
heap
page execute and read and write
5F50000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54DE000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
739000
heap
page read and write
25B64D05000
heap
page read and write
422000
remote allocation
page execute and read and write
54EE000
trusted library allocation
page read and write
6DE000
stack
page read and write
54EE000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
14B735A3000
heap
page read and write
54EE000
trusted library allocation
page read and write
54E6000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
5D10000
heap
page read and write
8325000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
97D000
trusted library allocation
page execute and read and write
5140000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5F4F000
stack
page read and write
14B72A64000
heap
page read and write
6B80000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
14B73575000
heap
page read and write
54EB000
trusted library allocation
page read and write
54C3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
254C4A63000
heap
page read and write
54CB000
trusted library allocation
page read and write
2490000
trusted library allocation
page read and write
19AAE8C1000
trusted library allocation
page read and write
CD9000
heap
page read and write
54E7000
trusted library allocation
page read and write
557000
stack
page read and write
658F000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
19AB2BB0000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
79A000
heap
page read and write
19AAD43F000
heap
page read and write
1B9BC413000
heap
page read and write
4B10000
trusted library allocation
page execute and read and write
BFD000
trusted library allocation
page execute and read and write
54D1000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
1B9BC466000
heap
page read and write
1B9BC43C000
heap
page read and write
54CB000
trusted library allocation
page read and write
54CD000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
19AAD478000
heap
page read and write
1B9BC500000
heap
page read and write
54BA000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
84D1000
heap
page read and write
54CB000
trusted library allocation
page read and write
D12000
heap
page read and write
54EE000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
19AB2C9C000
heap
page read and write
7A0000
heap
page read and write
14B73584000
heap
page read and write
49F0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6EE2000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
A00000
remote allocation
page read and write
54B2000
trusted library allocation
page read and write
14B73A02000
heap
page read and write
6CF0000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
CD1000
heap
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
14B728D0000
heap
page read and write
13338FA000
stack
page read and write
5140000
trusted library allocation
page read and write
14B73590000
heap
page read and write
14B73592000
heap
page read and write
54F0000
trusted library allocation
page read and write
A00000
remote allocation
page read and write
4F40000
trusted library allocation
page read and write
254C4A28000
heap
page read and write
54E3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
14B7357E000
heap
page read and write
5F50000
trusted library allocation
page read and write
B30000
heap
page read and write
54CB000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
1333BFB000
stack
page read and write
658F000
trusted library allocation
page read and write
5D3E000
heap
page read and write
54D0000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
13333CB000
stack
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
19AADC15000
heap
page read and write
1FBF907F000
heap
page read and write
465C000
stack
page read and write
6B40000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
C22000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
254C48A0000
heap
page read and write
5A2000
unkown
page readonly
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
A00000
remote allocation
page read and write
14B73576000
heap
page read and write
54F0000
trusted library allocation
page read and write
249C000
trusted library allocation
page read and write
19AB2BE0000
remote allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
19AADD13000
heap
page read and write
7D5000
stack
page read and write
54CB000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
82F2000
trusted library allocation
page read and write
14B73582000
heap
page read and write
19AB2C29000
heap
page read and write
14B73592000
heap
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
4AAE000
stack
page read and write
4E04000
trusted library allocation
page read and write
65BC000
trusted library allocation
page read and write
4F61000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
133367E000
stack
page read and write
C00000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
14B735B9000
heap
page read and write
54E3000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
1B9BC486000
heap
page read and write
3F0000
unkown
page readonly
4E40000
trusted library allocation
page read and write
4E21000
trusted library allocation
page read and write
14B72B16000
heap
page read and write
54EE000
trusted library allocation
page read and write
14B73A00000
heap
page read and write
54E5000
trusted library allocation
page read and write
3F0000
unkown
page readonly
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
795000
heap
page read and write
8698000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
19AAE440000
trusted library allocation
page read and write
CD1000
heap
page read and write
4A31000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
1FBF903C000
heap
page read and write
54E3000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
5BFD000
stack
page read and write
3766F7F000
stack
page read and write
1FBF8F60000
heap
page read and write
658F000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
4E41000
trusted library allocation
page read and write
22BE000
stack
page read and write
6B40000
trusted library allocation
page read and write
14B73594000
heap
page read and write
54E3000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
29ED000
trusted library allocation
page read and write
1FBF904B000
heap
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
14B72A82000
heap
page read and write
54D7000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54C3000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
1FBF9051000
heap
page read and write
5A0000
unkown
page readonly
54E3000
trusted library allocation
page read and write
512E000
stack
page read and write
6C90000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
5B7D000
stack
page read and write
CC6000
heap
page read and write
54E3000
trusted library allocation
page read and write
54EF000
trusted library allocation
page read and write
25B64D0F000
heap
page read and write
54EE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
49B5000
trusted library allocation
page read and write
14B72B02000
heap
page read and write
54E3000
trusted library allocation
page read and write
19AB2C48000
heap
page read and write
4E40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
5F60000
trusted library allocation
page execute and read and write
54CB000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page execute and read and write
4F40000
trusted library allocation
page read and write
1333F7E000
stack
page read and write
54D8000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
359D000
trusted library allocation
page read and write
E97000
heap
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
7A5000
heap
page read and write
54B2000
trusted library allocation
page read and write
4E50000
heap
page read and write
658F000
trusted library allocation
page read and write
1333DFE000
stack
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
19AAD4FA000
heap
page read and write
54E7000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
19AAD470000
heap
page read and write
54CB000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
19AB2970000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
6B7A000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
5145000
trusted library allocation
page read and write
254C4A3E000
heap
page read and write
4F40000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
14B72A5C000
heap
page read and write
54D0000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
14B72AB5000
heap
page read and write
6F00000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
14B735C4000
heap
page read and write
54EF000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54EF000
trusted library allocation
page read and write
5C0000
heap
page read and write
54E3000
trusted library allocation
page read and write
10A927E000
stack
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
9D7000
heap
page read and write
6B60000
trusted library allocation
page read and write
4337F79000
stack
page read and write
54E3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
14B7357A000
heap
page read and write
658D000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5A0000
unkown
page readonly
658F000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
432000
unkown
page readonly
14B735A3000
heap
page read and write
54CB000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4E07000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
19AAD429000
heap
page read and write
4F60000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
79E000
stack
page read and write
6561000
trusted library allocation
page read and write
794000
heap
page read and write
6BA0000
trusted library allocation
page read and write
8640000
trusted library section
page read and write
8FCC000
stack
page read and write
54CC000
trusted library allocation
page read and write
1FBF908B000
heap
page read and write
54EE000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
82E0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
1D6CD450000
trusted library allocation
page read and write
8C3E000
stack
page read and write
54F0000
trusted library allocation
page read and write
5C5000
heap
page read and write
34C1000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
19AB2A80000
trusted library allocation
page read and write
14B73575000
heap
page read and write
54D7000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
14B73586000
heap
page read and write
4B10000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
19AB2C0F000
heap
page read and write
658F000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
19AB2BE0000
remote allocation
page read and write
13337F7000
stack
page read and write
1333EFC000
stack
page read and write
84E1000
heap
page read and write
4E60000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
5320000
heap
page read and write
247B000
trusted library allocation
page read and write
2DCE000
trusted library allocation
page read and write
5ACB000
stack
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
19AAE8E0000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
14B72A65000
heap
page read and write
2694079000
stack
page read and write
54CB000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
248D000
trusted library allocation
page read and write
6F12000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
14B7356F000
heap
page read and write
658D000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
19AAD3E0000
trusted library allocation
page read and write
992000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
14B735A3000
heap
page read and write
54DB000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
8ABE000
stack
page read and write
1333D7E000
stack
page read and write
54F0000
trusted library allocation
page read and write
14B73592000
heap
page read and write
4B30000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
19AB2C60000
heap
page read and write
1B9BC45F000
heap
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
19AB2BA0000
trusted library allocation
page read and write
14B735A3000
heap
page read and write
6561000
trusted library allocation
page read and write
3979000
trusted library allocation
page read and write
14B72A29000
heap
page read and write
600000
unkown
page readonly
19AB2C9E000
heap
page read and write
19AAE530000
trusted library section
page readonly
1FBF9002000
heap
page read and write
54E3000
trusted library allocation
page read and write
5A0000
unkown
page readonly
5E4D000
stack
page read and write
6F00000
trusted library allocation
page read and write
14B73592000
heap
page read and write
14B73591000
heap
page read and write
7CA000
heap
page read and write
904E2FB000
stack
page read and write
1FBF8EF0000
heap
page read and write
54B3000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
84D1000
heap
page read and write
54E3000
trusted library allocation
page read and write
19AB2AA4000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54DC000
trusted library allocation
page read and write
1FBF9021000
heap
page read and write
7CF000
heap
page read and write
4E60000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
14B735B9000
heap
page read and write
1B9BC220000
heap
page read and write
54E3000
trusted library allocation
page read and write
14B73592000
heap
page read and write
54E3000
trusted library allocation
page read and write
54DC000
trusted library allocation
page read and write
9D0000
heap
page read and write
E90000
heap
page read and write
14B735B4000
heap
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CD000
trusted library allocation
page read and write
54CD000
trusted library allocation
page read and write
CC6000
heap
page read and write
54EE000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
ADE000
stack
page read and write
54F0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
1B9BC424000
heap
page read and write
54EE000
trusted library allocation
page read and write
2460000
heap
page read and write
4B10000
trusted library allocation
page read and write
82B000
heap
page read and write
82D0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
2D23000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
254C4A13000
heap
page read and write
54CB000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
7806B7E000
stack
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6E00000
trusted library section
page read and write
54CB000
trusted library allocation
page read and write
1B9BC467000
heap
page read and write
6B40000
trusted library allocation
page read and write
5A0000
unkown
page readonly
6B50000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
5A0000
unkown
page readonly
54EE000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
76C000
heap
page read and write
8660000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
86D0000
trusted library allocation
page read and write
8670000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
10A8FBB000
stack
page read and write
6B40000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
25B64B50000
heap
page read and write
5D3C000
heap
page read and write
658F000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
2487000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
19AB2BE0000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
4B31000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
14B73582000
heap
page read and write
887E000
stack
page read and write
5FAE000
stack
page read and write
5F50000
trusted library allocation
page read and write
6B30000
trusted library allocation
page execute and read and write
14B73500000
heap
page read and write
54EE000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
1333C7E000
stack
page read and write
CD1000
heap
page read and write
54CD000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
14B73578000
heap
page read and write
650000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
CC6000
heap
page read and write
54EE000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5A2000
unkown
page readonly
E85000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
19AB2AB0000
trusted library allocation
page read and write
590000
remote allocation
page read and write
54CB000
trusted library allocation
page read and write
14B735A7000
heap
page read and write
14B7357E000
heap
page read and write
658F000
trusted library allocation
page read and write
54CE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
14B7357F000
heap
page read and write
54BA000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
112000
unkown
page readonly
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
8FD0000
trusted library allocation
page execute and read and write
54BA000
trusted library allocation
page read and write
4337FFA000
stack
page read and write
6EC0000
trusted library allocation
page read and write
CCB000
heap
page read and write
54CB000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
5B0000
trusted library allocation
page read and write
14B72AEC000
heap
page read and write
54F0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
7C0000
heap
page read and write
6B80000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
19AADBF3000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
6B41000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54CD000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
D30000
heap
page read and write
6BA0000
unkown
page read and write
1D6CC665000
heap
page read and write
4F10000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
19AAD3F0000
trusted library section
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
4BC0000
trusted library section
page readonly
19AB2AC4000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
4337D7F000
stack
page read and write
1D6CC497000
heap
page read and write
54EE000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
25B64D20000
heap
page read and write
E70000
trusted library allocation
page execute and read and write
19AB2960000
trusted library allocation
page read and write
19AADD00000
heap
page read and write
54D0000
trusted library allocation
page read and write
1D6CC590000
heap
page read and write
CEC000
heap
page read and write
54DC000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6BA0000
unkown
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4E3F000
trusted library allocation
page read and write
54DA000
trusted library allocation
page read and write
54D2000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
43379DC000
stack
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
14B7356F000
heap
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
1B9BC45D000
heap
page read and write
54CB000
trusted library allocation
page read and write
14B73290000
remote allocation
page read and write
3766CFB000
stack
page read and write
6B80000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
430000
unkown
page readonly
7806EF9000
stack
page read and write
6B40000
trusted library allocation
page read and write
1FBF9000000
heap
page read and write
25B64CE0000
heap
page read and write
54E3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
904E4FB000
stack
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
7A5000
heap
page read and write
54C3000
trusted library allocation
page read and write
904E3FB000
stack
page read and write
5BD0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
14B72AED000
heap
page read and write
54CB000
trusted library allocation
page read and write
CA3000
heap
page read and write
54EE000
trusted library allocation
page read and write
7B9000
heap
page read and write
112000
unkown
page readonly
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
54EF000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4F50000
trusted library allocation
page execute and read and write
54E3000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
1FBF9A02000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
14B735C7000
heap
page read and write
6B40000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
4F6D000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
45B000
stack
page read and write
4B50000
trusted library allocation
page read and write
59CC000
stack
page read and write
6B40000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
C79000
heap
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
430000
unkown
page readonly
54CB000
trusted library allocation
page read and write
14B73290000
remote allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
5A0000
unkown
page readonly
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6BA0000
unkown
page read and write
54EE000
trusted library allocation
page read and write
24A1000
trusted library allocation
page read and write
4BD0000
heap
page execute and read and write
54D4000
trusted library allocation
page read and write
25B64D13000
heap
page read and write
14B7357A000
heap
page read and write
54C3000
trusted library allocation
page read and write
7AB000
heap
page read and write
54EE000
trusted library allocation
page read and write
19AB2D00000
heap
page read and write
54CB000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
14B72A13000
heap
page read and write
54CB000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
14B73575000
heap
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
6B99000
trusted library allocation
page read and write
54ED000
trusted library allocation
page read and write
14B73519000
heap
page read and write
54B4000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54DC000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
96E000
stack
page read and write
4F60000
trusted library allocation
page read and write
1B9BC458000
heap
page read and write
5A2000
unkown
page readonly
1FBF9029000
heap
page read and write
400000
remote allocation
page execute and read and write
25B64C80000
heap
page read and write
54CB000
trusted library allocation
page read and write
1B9BC462000
heap
page read and write
54EE000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
4337DF9000
stack
page read and write
6B40000
trusted library allocation
page read and write
19AADBF0000
trusted library allocation
page read and write
7C0000
heap
page read and write
6BA0000
unkown
page read and write
54B2000
trusted library allocation
page read and write
54E7000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
14B72A3C000
heap
page read and write
54EB000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
792000
heap
page read and write
54B4000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
54DE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
1B9BC380000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
792000
heap
page read and write
54EE000
trusted library allocation
page read and write
7A1000
heap
page read and write
14B73A02000
heap
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
7806FFC000
stack
page read and write
28C0000
trusted library allocation
page read and write
4EF1000
trusted library allocation
page read and write
14B7357E000
heap
page read and write
6BA0000
trusted library allocation
page read and write
2310000
trusted library allocation
page read and write
D09000
heap
page read and write
54CB000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
7D2000
heap
page read and write
54D1000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
5A2000
unkown
page readonly
6EC6000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
1D6CC660000
heap
page read and write
590000
remote allocation
page read and write
54E3000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
19AADD02000
heap
page read and write
658F000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
1B9BC459000
heap
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5D00000
heap
page read and write
C2B000
trusted library allocation
page execute and read and write
54CB000
trusted library allocation
page read and write
54E7000
trusted library allocation
page read and write
2694179000
stack
page read and write
6E90000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
973000
trusted library allocation
page execute and read and write
54EE000
trusted library allocation
page read and write
1D6CC650000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
C0D000
trusted library allocation
page execute and read and write
6B40000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
4E1C000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
14B72A6A000
heap
page read and write
54E3000
trusted library allocation
page read and write
54DF000
trusted library allocation
page read and write
7806AFA000
stack
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
14B72AD6000
heap
page read and write
CF3000
heap
page read and write
54CB000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
1D6CC340000
heap
page read and write
54EE000
trusted library allocation
page read and write
6EE6000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
25B64FA5000
heap
page read and write
6CA0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
1D6CD3F0000
trusted library allocation
page read and write
10A95F7000
stack
page read and write
254C4900000
heap
page read and write
54D8000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
84CD000
stack
page read and write
10A92FF000
stack
page read and write
79D000
heap
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
974000
trusted library allocation
page read and write
4337E79000
stack
page read and write
25B64CEB000
heap
page read and write
54D0000
trusted library allocation
page read and write
D0A000
heap
page read and write
2430000
heap
page read and write
54B2000
trusted library allocation
page read and write
14B735D5000
heap
page read and write
658F000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
7BB000
heap
page read and write
54E3000
trusted library allocation
page read and write
4E55000
heap
page read and write
54E3000
trusted library allocation
page read and write
5D16000
trusted library allocation
page read and write
A00000
remote allocation
page read and write
7CF000
heap
page read and write
19AB2BE0000
remote allocation
page read and write
54EE000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
A00000
remote allocation
page read and write
2693E77000
stack
page read and write
19AB2A8E000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
19AB2CE5000
heap
page read and write
49AE000
stack
page read and write
54EE000
trusted library allocation
page read and write
14B73552000
heap
page read and write
6BA0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
340000
heap
page read and write
54EE000
trusted library allocation
page read and write
19AB2CED000
heap
page read and write
4E60000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
19AB2C53000
heap
page read and write
7C0000
heap
page read and write
54D3000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
376679B000
stack
page read and write
4E60000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
54E7000
trusted library allocation
page read and write
1B9BC464000
heap
page read and write
6B40000
trusted library allocation
page read and write
CDD000
heap
page read and write
60EE000
stack
page read and write
6B40000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
BF4000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
14B73582000
heap
page read and write
1D6CC5B0000
heap
page read and write
54F0000
trusted library allocation
page read and write
4E40000
trusted library allocation
page execute and read and write
54CB000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
14B73A02000
heap
page read and write
54EF000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
796000
heap
page read and write
A50000
heap
page read and write
2300000
trusted library allocation
page execute and read and write
65A0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
1FBF904A000
heap
page read and write
658D000
trusted library allocation
page read and write
2450000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
7A1000
heap
page read and write
1FBF9065000
heap
page read and write
25B64D1F000
heap
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
1FBF8F90000
trusted library allocation
page read and write
4A1E000
stack
page read and write
54E3000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
96F000
stack
page read and write
54C3000
trusted library allocation
page read and write
CC9000
heap
page read and write
4337CFE000
stack
page read and write
82F0000
trusted library allocation
page read and write
14B73A02000
heap
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54E9000
trusted library allocation
page read and write
761000
heap
page read and write
4E70000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
14B73575000
heap
page read and write
54E3000
trusted library allocation
page read and write
CE4000
heap
page read and write
D21000
heap
page read and write
54EE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
14B73A21000
heap
page read and write
54D3000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54CD000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
7806BFE000
stack
page read and write
254C51A0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
1D6CC610000
trusted library allocation
page read and write
EC0000
heap
page read and write
6B40000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
14B73522000
heap
page read and write
54EE000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
98D000
trusted library allocation
page execute and read and write
430000
unkown
page readonly
6B90000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6F5D000
trusted library allocation
page read and write
7A8000
heap
page read and write
4B00000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5A0000
unkown
page readonly
54EE000
trusted library allocation
page read and write
5E00000
trusted library section
page read and write
25B64D07000
heap
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
CDB000
heap
page read and write
7BA000
heap
page read and write
6F90000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
54E6000
trusted library allocation
page read and write
1B9BC452000
heap
page read and write
54CB000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
14B72930000
heap
page read and write
54CB000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54D1000
trusted library allocation
page read and write
54DA000
trusted library allocation
page read and write
376707F000
stack
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6F16000
trusted library allocation
page read and write
14B72A8A000
heap
page read and write
5140000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
19AB28E0000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page execute and read and write
5140000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
4B70000
heap
page read and write
6B40000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6DA000
stack
page read and write
5140000
trusted library allocation
page read and write
D2C000
heap
page read and write
19AADD59000
heap
page read and write
6B40000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
3766D7E000
stack
page read and write
54F0000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
1D6CC4C7000
heap
page read and write
54CB000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
84E0000
heap
page read and write
658F000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
1E0000
heap
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
50EE000
stack
page read and write
7CA000
heap
page read and write
54CB000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
1B9BC502000
heap
page read and write
54EE000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
658F000
trusted library allocation
page read and write
1333AFE000
stack
page read and write
54EE000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
5A0000
unkown
page readonly
658D000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
14B72A6B000
heap
page read and write
9AB000
trusted library allocation
page execute and read and write
19AAD513000
heap
page read and write
1FBF904E000
heap
page read and write
14B735A3000
heap
page read and write
1D6CD3E0000
heap
page readonly
14B72A67000
heap
page read and write
CEA000
heap
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
658D000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
1333FFF000
stack
page read and write
D12000
heap
page read and write
19AADC02000
heap
page read and write
54F0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
14B73596000
heap
page read and write
54CB000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
54BD000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
14B73575000
heap
page read and write
2971000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
3766BFB000
stack
page read and write
6F30000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
600000
unkown
page readonly
54CB000
trusted library allocation
page read and write
CC9000
heap
page read and write
54CB000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
19AADD59000
heap
page read and write
54CD000
trusted library allocation
page read and write
904DDDB000
stack
page read and write
65BC000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
6BA5000
trusted library allocation
page read and write
25B64CF7000
heap
page read and write
54E7000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
730000
heap
page read and write
19AB2CE9000
heap
page read and write
1D6CC4E4000
heap
page read and write
6B40000
trusted library allocation
page read and write
54E7000
trusted library allocation
page read and write
7C9000
heap
page read and write
54E3000
trusted library allocation
page read and write
5A2000
unkown
page readonly
54BA000
trusted library allocation
page read and write
2693AFF000
stack
page read and write
54EE000
trusted library allocation
page read and write
14B73575000
heap
page read and write
54CB000
trusted library allocation
page read and write
19AAD400000
heap
page read and write
54EE000
trusted library allocation
page read and write
54FC000
trusted library allocation
page read and write
14B7358C000
heap
page read and write
54E3000
trusted library allocation
page read and write
C1A000
trusted library allocation
page execute and read and write
14B72AFC000
heap
page read and write
54CB000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
CFB000
heap
page read and write
14B73594000
heap
page read and write
7A1000
heap
page read and write
3971000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
590000
remote allocation
page read and write
54D0000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
432000
unkown
page readonly
7A8000
heap
page read and write
54D3000
trusted library allocation
page read and write
14B73594000
heap
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
6F19000
trusted library allocation
page read and write
19AAD49E000
heap
page read and write
54DA000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
3A11000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54C3000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
8650000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
1FBF9108000
heap
page read and write
54EE000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
2D5A000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
14B73A02000
heap
page read and write
1D6CC620000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
C6F000
trusted library allocation
page read and write
14B73592000
heap
page read and write
19AADD18000
heap
page read and write
53B0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
8D3E000
stack
page read and write
14B73592000
heap
page read and write
6B40000
trusted library allocation
page read and write
86A0000
trusted library allocation
page read and write
49AE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
14B72B08000
heap
page read and write
6B40000
trusted library allocation
page read and write
54E6000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
60AF000
stack
page read and write
1B9BC280000
heap
page read and write
54EE000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
4E65000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
1D6CD1B0000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
19AB2A80000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
1D6CC4DC000
heap
page read and write
54CB000
trusted library allocation
page read and write
19AAD280000
heap
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
25B64CF7000
heap
page read and write
658F000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
There are 2320 hidden memdumps, click here to show them.