IOC Report
BfwPdttqxH

loading gif

Files

File Path
Type
Category
Malicious
BfwPdttqxH.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BfwPdttqxH.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\tmp6E9F.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ZgolgcKGNozdg.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ZgolgcKGNozdg.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5dc33iso.2wh.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qidwwvk3.wko.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t3bd04b3.uye.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yxtn0rnf.2ib.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\tmpD691.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpE3E2.tmp.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Documents\20220805\PowerShell_transcript.216554.c1En_sl3.20220805202448.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\Documents\20220805\PowerShell_transcript.216554.v9r7NV+a.20220805202421.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BfwPdttqxH.exe
"C:\Users\user\Desktop\BfwPdttqxH.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZgolgcKGNozdg.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZgolgcKGNozdg" /XML "C:\Users\user\AppData\Local\Temp\tmp6E9F.tmp
malicious
C:\Users\user\Desktop\BfwPdttqxH.exe
C:\Users\user\Desktop\BfwPdttqxH.exe
malicious
C:\Users\user\Desktop\BfwPdttqxH.exe
C:\Users\user\Desktop\BfwPdttqxH.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "" /tr '"C:\Users\user\AppData\Roaming\.exe"'
malicious
C:\Users\user\AppData\Roaming\.exe
"C:\Users\user\AppData\Roaming\.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZgolgcKGNozdg.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZgolgcKGNozdg" /XML "C:\Users\user\AppData\Local\Temp\tmpD691.tmp
malicious
C:\Users\user\AppData\Roaming\.exe
C:\Users\user\AppData\Roaming\.exe
malicious
C:\Users\user\AppData\Roaming\.exe
C:\Users\user\AppData\Roaming\.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "" /tr '"C:\Users\user\AppData\Roaming\.exe"' & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpE3E2.tmp.bat""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 3
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 17 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
37.0.14.198
unknown
Netherlands

Memdumps

Base Address
Regiontype
Protect
Malicious
2931000
trusted library allocation
page read and write
malicious
28A9000
trusted library allocation
page read and write
malicious
28A7000
trusted library allocation
page read and write
malicious
2933000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
161E8971000
heap
page read and write
4FB9000
trusted library allocation
page read and write
1D311455000
heap
page read and write
A5AE000
stack
page read and write
1D30C1FE000
heap
page read and write
4FAD000
trusted library allocation
page read and write
2C687E4D000
heap
page read and write
1D311578000
heap
page read and write
4F93000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
8E0000
heap
page read and write
4FAF000
trusted library allocation
page read and write
1D3116FD000
heap
page read and write
4FAD000
trusted library allocation
page read and write
EFD207F000
stack
page read and write
A420000
trusted library allocation
page read and write
4CD9000
trusted library section
page readonly
4EB0000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
2D199A24000
trusted library allocation
page read and write
1D3116C9000
heap
page read and write
1D311556000
heap
page read and write
A420000
trusted library allocation
page read and write
D00000
heap
page read and write
4F9D000
trusted library allocation
page read and write
1D3116A5000
heap
page read and write
87A000
heap
page read and write
AC50000
trusted library allocation
page read and write
8FD000
heap
page read and write
1D30C1AF000
heap
page read and write
4F75000
trusted library allocation
page read and write
4FB9000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
8EA000
heap
page read and write
D63597C000
stack
page read and write
4FB1000
trusted library allocation
page read and write
4F9B000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
EFD17F7000
stack
page read and write
1D311741000
heap
page read and write
B18E000
stack
page read and write
4E40000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
1D31146A000
heap
page read and write
4FB5000
trusted library allocation
page read and write
1D311426000
heap
page read and write
2BB0000
unkown
page readonly
4FB0000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
A430000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
1D30B5D0000
trusted library allocation
page read and write
161E8069000
heap
page read and write
2690000
heap
page read and write
7000000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
2077F200000
heap
page read and write
4D80000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
2C687E2D000
heap
page read and write
5090000
trusted library allocation
page read and write
1D310F22000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
3ED1000
trusted library allocation
page read and write
5037000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
161E805C000
heap
page read and write
4FA3000
trusted library allocation
page read and write
D9F000
heap
page read and write
121EF602000
trusted library allocation
page read and write
AC70000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
4BCF000
trusted library allocation
page read and write
2D194380000
heap
page read and write
573E000
stack
page read and write
4FAF000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
4F9B000
trusted library allocation
page read and write
161E80EF000
heap
page read and write
4E10000
trusted library allocation
page read and write
AF9C000
stack
page read and write
4FA2000
trusted library allocation
page read and write
A489000
trusted library allocation
page read and write
B1D000
trusted library allocation
page execute and read and write
4F93000
trusted library allocation
page read and write
F70000
heap
page read and write
1D310F10000
trusted library allocation
page read and write
AD60000
trusted library allocation
page read and write
21ED3FB000
stack
page read and write
4F8B000
trusted library allocation
page read and write
1D3110E0000
trusted library allocation
page read and write
23A7F502000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
AE98000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
1FE357F000
stack
page read and write
161E8029000
heap
page read and write
161E8E00000
heap
page read and write
1D311643000
heap
page read and write
23A7F482000
heap
page read and write
EFD138C000
stack
page read and write
1D31154F000
heap
page read and write
1D3117AA000
heap
page read and write
1D30C1CE000
heap
page read and write
46C8000
trusted library allocation
page read and write
820000
remote allocation
page read and write
165C1DBF000
heap
page read and write
4EB0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
AB90000
trusted library section
page read and write
F03BE7E000
stack
page read and write
161E898A000
heap
page read and write
503F000
trusted library allocation
page read and write
468B35C000
stack
page read and write
1D311576000
heap
page read and write
B2CE000
stack
page read and write
27D0000
heap
page read and write
1D310EE2000
trusted library allocation
page read and write
4FBA000
trusted library allocation
page read and write
87E000
stack
page read and write
5060000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
1D30C1DC000
heap
page read and write
1D31155B000
heap
page read and write
4FB0000
trusted library allocation
page read and write
92A000
heap
page read and write
4F8B000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
1D310F1A000
trusted library allocation
page read and write
4F83000
trusted library allocation
page read and write
2D199B40000
trusted library allocation
page read and write
4C91000
trusted library allocation
page read and write
2C687E55000
heap
page read and write
4F60000
trusted library allocation
page read and write
825000
heap
page read and write
949000
heap
page read and write
5090000
trusted library allocation
page read and write
161E805D000
heap
page read and write
23A7F413000
heap
page read and write
4F8B000
trusted library allocation
page read and write
2165B513000
heap
page read and write
20916A70000
heap
page read and write
5ABE000
stack
page read and write
23A7F449000
heap
page read and write
AD70000
trusted library allocation
page read and write
1D3117B0000
heap
page read and write
2D194400000
heap
page read and write
3096000
heap
page read and write
51F0000
trusted library allocation
page read and write
4F84000
trusted library allocation
page read and write
1D30CCB0000
trusted library section
page readonly
4EB3000
trusted library allocation
page read and write
AC00000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
165C1C65000
heap
page read and write
A98E000
stack
page read and write
EFD1F7B000
stack
page read and write
1D3117B1000
heap
page read and write
AD40000
trusted library allocation
page read and write
F67000
trusted library allocation
page execute and read and write
1D3117BB000
heap
page read and write
4FB8000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
20916A7E000
heap
page read and write
7CBE000
stack
page read and write
2A31000
trusted library allocation
page read and write
121EEE6B000
heap
page read and write
AC46000
trusted library allocation
page read and write
A5A0000
trusted library allocation
page read and write
AC50000
trusted library allocation
page read and write
AC00000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
D63557C000
stack
page read and write
1D30C195000
heap
page read and write
1D311050000
trusted library allocation
page read and write
4F7C000
trusted library allocation
page read and write
5037000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
EFD247F000
stack
page read and write
5023000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
EFD19FA000
stack
page read and write
DD1327D000
stack
page read and write
1D311769000
heap
page read and write
AC20000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
1D311509000
heap
page read and write
AC00000
trusted library allocation
page read and write
924000
heap
page read and write
4FB8000
trusted library allocation
page read and write
F03C0FE000
stack
page read and write
4F9D000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
1D31168B000
heap
page read and write
161E8060000
heap
page read and write
4FB2000
trusted library allocation
page read and write
2D199C3F000
heap
page read and write
EFD18FA000
stack
page read and write
4F7E000
trusted library allocation
page read and write
914000
heap
page read and write
4FB4000
trusted library allocation
page read and write
2077F252000
heap
page read and write
4FA2000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
4FB1000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
92A000
heap
page read and write
1D30CD30000
trusted library allocation
page read and write
A580000
trusted library allocation
page read and write
4A9E000
stack
page read and write
4F8D000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
1D30C1D6000
heap
page read and write
161E80DC000
heap
page read and write
4FA3000
trusted library allocation
page read and write
405ED79000
stack
page read and write
4FB2000
trusted library allocation
page read and write
4F75000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
1D31142F000
heap
page read and write
1D30C1B6000
heap
page read and write
4D8D000
trusted library allocation
page read and write
B6D000
stack
page read and write
405FA7E000
stack
page read and write
468B7FE000
stack
page read and write
6799AFF000
stack
page read and write
4FB9000
trusted library allocation
page read and write
1D31173E000
heap
page read and write
AA0000
unkown
page readonly
1D30C01B000
heap
page read and write
1D311794000
heap
page read and write
AC00000
trusted library allocation
page read and write
4FBA000
trusted library allocation
page read and write
ADA0000
trusted library allocation
page read and write
4B31000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
165C1DA6000
heap
page read and write
1D30B629000
heap
page read and write
2E30000
heap
page read and write
1D311462000
heap
page read and write
165C1DD0000
heap
page read and write
2165B47E000
heap
page read and write
1D31173A000
heap
page read and write
4F8D000
trusted library allocation
page read and write
4F9A000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
9B0000
heap
page read and write
2A95000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
5023000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
1D30B66E000
heap
page read and write
92D000
heap
page read and write
4F90000
trusted library allocation
page read and write
161E803C000
heap
page read and write
4EB1000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
67998FF000
stack
page read and write
1D311767000
heap
page read and write
1D3117A9000
heap
page read and write
8EC000
heap
page read and write
4FB0000
trusted library allocation
page read and write
161E800B000
heap
page read and write
1D30B664000
heap
page read and write
2D1944FD000
heap
page read and write
4E45000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
2D199C00000
heap
page read and write
161E8068000
heap
page read and write
2B7E000
stack
page read and write
AE60000
trusted library allocation
page read and write
21EA2D08000
heap
page read and write
161E898A000
heap
page read and write
4FB5000
trusted library allocation
page read and write
8D9000
heap
page read and write
510E000
stack
page read and write
4F9D000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
AC20000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
BE2000
trusted library allocation
page read and write
4F95000
trusted library allocation
page read and write
AD50000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
1D31169F000
heap
page read and write
51EC000
heap
page read and write
A3F0000
trusted library allocation
page read and write
1D3116FA000
heap
page read and write
A650000
heap
page read and write
1D3117CB000
heap
page read and write
2D194BD0000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
161E8108000
heap
page read and write
4F82000
trusted library allocation
page read and write
8DF000
heap
page read and write
2C687C70000
heap
page read and write
AF9FB7E000
stack
page read and write
4FA5000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
8EE000
heap
page read and write
F03BB0C000
stack
page read and write
F6A000
trusted library allocation
page execute and read and write
4FB9000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
4F98000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
1D311576000
heap
page read and write
4F8B000
trusted library allocation
page read and write
46CD7B000
stack
page read and write
4F8F000
trusted library allocation
page read and write
925000
heap
page read and write
4CB0000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
2D194D00000
heap
page read and write
AC10000
trusted library allocation
page read and write
1D311060000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
161E8E44000
heap
page read and write
1D311698000
heap
page read and write
91E000
heap
page read and write
4F92000
trusted library allocation
page read and write
503F000
trusted library allocation
page read and write
121EED40000
heap
page read and write
4F8B000
trusted library allocation
page read and write
21EA2D02000
heap
page read and write
AC30000
trusted library allocation
page read and write
4FBA000
trusted library allocation
page read and write
1D311631000
heap
page read and write
1D30BF17000
heap
page read and write
A590000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
91E000
heap
page read and write
67993FD000
stack
page read and write
161E89CE000
heap
page read and write
4F7E000
trusted library allocation
page read and write
161E8730000
remote allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F98000
trusted library allocation
page read and write
AF9F59B000
stack
page read and write
1D30C143000
heap
page read and write
4BB0000
trusted library allocation
page execute and read and write
1D31145C000
heap
page read and write
1D3116E8000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4F77000
trusted library allocation
page read and write
4E20000
trusted library allocation
page execute and read and write
9C0000
unkown
page readonly
A420000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
AC40000
trusted library section
page read and write
4FAF000
trusted library allocation
page read and write
AE50000
trusted library allocation
page read and write
68B000
stack
page read and write
4F79000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D310F65000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
1D31144F000
heap
page read and write
D65000
heap
page read and write
A5B0000
trusted library allocation
page read and write
1D311438000
heap
page read and write
4F92000
trusted library allocation
page read and write
4B04000
trusted library allocation
page read and write
8E9000
heap
page read and write
1D30C1D5000
heap
page read and write
2165B400000
heap
page read and write
4F8F000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
20916A29000
heap
page read and write
4FB0000
trusted library allocation
page read and write
ADB0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
20916B13000
heap
page read and write
4E10000
trusted library allocation
page read and write
1D30C186000
heap
page read and write
1D310EE1000
trusted library allocation
page read and write
1D31151B000
heap
page read and write
4FA3000
trusted library allocation
page read and write
1D310EE0000
trusted library allocation
page read and write
1D31142F000
heap
page read and write
AE60000
trusted library allocation
page read and write
1D30C1CF000
heap
page read and write
4F90000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4F94000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
4B0B000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D310F05000
trusted library allocation
page read and write
2D194513000
heap
page read and write
4FAF000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
4B45000
trusted library allocation
page read and write
AF9FD7F000
stack
page read and write
4F7B000
trusted library allocation
page read and write
2D194D13000
heap
page read and write
91E000
heap
page read and write
AC00000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
4FB9000
trusted library allocation
page read and write
4F77000
trusted library allocation
page read and write
8D4000
heap
page read and write
4FAF000
trusted library allocation
page read and write
DD12E7C000
stack
page read and write
2820000
trusted library allocation
page read and write
2948000
trusted library allocation
page read and write
51D0000
heap
page read and write
161E89A1000
heap
page read and write
4FA6000
trusted library allocation
page read and write
1D30C988000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
1D30C156000
heap
page read and write
870000
heap
page read and write
4FB2000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
1D30C1E8000
heap
page read and write
4F8B000
trusted library allocation
page read and write
1D311502000
heap
page read and write
5060000
trusted library allocation
page read and write
1D310F1E000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
2165BC02000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
8F3000
heap
page read and write
4FA3000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
8E8000
heap
page read and write
1D311443000
heap
page read and write
4FB8000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
920000
heap
page read and write
2D199A04000
trusted library allocation
page read and write
1D31146A000
heap
page read and write
D77000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2E55000
heap
page read and write
4F7C000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
BD6000
trusted library allocation
page execute and read and write
121EEE28000
heap
page read and write
2E0E000
stack
page read and write
C00000
heap
page read and write
4F74000
trusted library allocation
page read and write
AD30000
trusted library allocation
page read and write
2BA0000
heap
page read and write
B14E000
stack
page read and write
4F93000
trusted library allocation
page read and write
AC3D000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
2D194D18000
heap
page read and write
268840E2000
heap
page read and write
4F8D000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
587E000
stack
page read and write
1D30BF2D000
heap
page read and write
50C0000
trusted library allocation
page read and write
1D311100000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
2B957FB000
stack
page read and write
A433000
trusted library allocation
page read and write
1D311661000
heap
page read and write
161E8986000
heap
page read and write
BAC000
stack
page read and write
AC0D000
stack
page read and write
D74000
heap
page read and write
4FA8000
trusted library allocation
page read and write
4F72000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
EFD1FFF000
stack
page read and write
AC30000
trusted library allocation
page read and write
4FAB000
trusted library allocation
page read and write
1D310F20000
trusted library allocation
page read and write
1D30C1E9000
heap
page read and write
4F9C000
trusted library allocation
page read and write
468BAFE000
stack
page read and write
4FB0000
trusted library allocation
page read and write
36CD000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D311462000
heap
page read and write
1D31175A000
heap
page read and write
3F1C000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F72000
trusted library allocation
page read and write
2C687E83000
heap
page read and write
2694000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F9A000
trusted library allocation
page read and write
978000
heap
page read and write
1D311070000
trusted library allocation
page read and write
8FE000
heap
page read and write
4F8B000
trusted library allocation
page read and write
67995FD000
stack
page read and write
DD133FC000
stack
page read and write
4FB8000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
D63514B000
stack
page read and write
1D31150C000
heap
page read and write
4D60000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
5023000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
A470000
trusted library allocation
page read and write
26884013000
heap
page read and write
1D311140000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
21ED87F000
stack
page read and write
4EB0000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
23A7F380000
trusted library allocation
page read and write
2D195860000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
EFD227A000
stack
page read and write
4F95000
trusted library allocation
page read and write
161E80F6000
heap
page read and write
AC00000
trusted library allocation
page read and write
8EE000
heap
page read and write
1D311502000
heap
page read and write
4FB6000
trusted library allocation
page read and write
4F75000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
8DB000
heap
page read and write
4FB8000
trusted library allocation
page read and write
1D3116A2000
heap
page read and write
B0DF000
stack
page read and write
4FA6000
trusted library allocation
page read and write
8E5000
heap
page read and write
1D311426000
heap
page read and write
2898000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
288E000
stack
page read and write
2D1944A6000
heap
page read and write
4FAF000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
AC00000
trusted library allocation
page execute and read and write
4FB0000
trusted library allocation
page read and write
1D31161B000
heap
page read and write
2077F040000
heap
page read and write
BD2000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
AC50000
trusted library allocation
page read and write
A94E000
stack
page read and write
208FCE90000
heap
page read and write
5061000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
1D310F16000
trusted library allocation
page read and write
1D310F00000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
91E000
heap
page read and write
4FB8000
trusted library allocation
page read and write
4FA3000
trusted library allocation
page read and write
861EFFA000
stack
page read and write
EFD1D7E000
stack
page read and write
1D311456000
heap
page read and write
4CB0000
trusted library allocation
page read and write
90C000
heap
page read and write
4FB1000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
1D30C1E8000
heap
page read and write
C05000
heap
page read and write
A400000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
1D30B643000
heap
page read and write
4FB8000
trusted library allocation
page read and write
2C687E4B000
heap
page read and write
2BC0000
unkown
page read and write
BDA000
trusted library allocation
page execute and read and write
4FB8000
trusted library allocation
page read and write
4FA4000
trusted library allocation
page read and write
1D3116D4000
heap
page read and write
A478000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
1D311502000
heap
page read and write
BBE000
stack
page read and write
1D3116A1000
heap
page read and write
AC30000
trusted library allocation
page read and write
165C1DB4000
heap
page read and write
1D30C000000
heap
page read and write
1D311773000
heap
page read and write
7ADC000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
8EE000
heap
page read and write
4FB4000
trusted library allocation
page read and write
A651000
heap
page read and write
B50E000
stack
page read and write
2B95A7F000
stack
page read and write
5080000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
2077F802000
trusted library allocation
page read and write
405F2FA000
stack
page read and write
1D311778000
heap
page read and write
1D31175D000
heap
page read and write
4FB8000
trusted library allocation
page read and write
4F72000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
1D30B690000
heap
page read and write
1D30C1AF000
heap
page read and write
9D0000
unkown
page readonly
D60000
heap
page read and write
8A1000
heap
page read and write
4F9D000
trusted library allocation
page read and write
AC20000
trusted library allocation
page read and write
4FBA000
trusted library allocation
page read and write
4F10000
heap
page read and write
405F57B000
stack
page read and write
4FB1000
trusted library allocation
page read and write
1D3116F9000
heap
page read and write
4FAF000
trusted library allocation
page read and write
92A000
heap
page read and write
1D311060000
trusted library allocation
page read and write
597E000
stack
page read and write
1D311462000
heap
page read and write
1D311380000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
468BCFD000
stack
page read and write
4F93000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
ADD0000
trusted library allocation
page execute and read and write
4FB7000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
21EA2C29000
heap
page read and write
4FB2000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
ADAE000
stack
page read and write
5023000
trusted library allocation
page read and write
A560000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
A3D0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
165C1D90000
heap
page read and write
4FB6000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
AC3B000
trusted library allocation
page read and write
268E000
trusted library allocation
page read and write
20916A5A000
heap
page read and write
5023000
trusted library allocation
page read and write
1D31142D000
heap
page read and write
1D31107C000
trusted library allocation
page read and write
3020000
heap
page read and write
4FA2000
trusted library allocation
page read and write
A6C0000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
BB4000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
1D311596000
heap
page read and write
4F7F000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
AC30000
trusted library allocation
page read and write
1D310DC0000
trusted library allocation
page read and write
8F7000
heap
page read and write
2D1998D0000
trusted library allocation
page read and write
1D3110B0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D30C1F9000
heap
page read and write
7000000
trusted library allocation
page read and write
161E8113000
heap
page read and write
AC20000
trusted library allocation
page read and write
1D311505000
heap
page read and write
1D311780000
heap
page read and write
161E805F000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
1D311390000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
2165B500000
heap
page read and write
208FD102000
heap
page read and write
1D310F10000
trusted library allocation
page read and write
2B95977000
stack
page read and write
208FD03D000
heap
page read and write
4FB3000
trusted library allocation
page read and write
4F73000
trusted library allocation
page read and write
ABF0000
trusted library allocation
page read and write
5037000
trusted library allocation
page read and write
26884081000
heap
page read and write
4F9D000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
100F000
stack
page read and write
2680000
trusted library allocation
page read and write
2165B48A000
heap
page read and write
8A0000
heap
page read and write
27C0000
trusted library allocation
page read and write
161E805A000
heap
page read and write
AF9FC77000
stack
page read and write
1D311074000
trusted library allocation
page read and write
1D311631000
heap
page read and write
936000
heap
page read and write
EFD1CFF000
stack
page read and write
4F7B000
trusted library allocation
page read and write
7B16000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
1D311686000
heap
page read and write
2D194BB1000
trusted library allocation
page read and write
5039000
trusted library allocation
page read and write
A420000
trusted library allocation
page read and write
1FE34F9000
stack
page read and write
933000
heap
page read and write
2AF0000
unkown
page readonly
2165B456000
heap
page read and write
983000
heap
page read and write
1D30B684000
heap
page read and write
1D311631000
heap
page read and write
1D3116FD000
heap
page read and write
1D31177C000
heap
page read and write
D85000
heap
page read and write
924000
heap
page read and write
20916840000
heap
page read and write
A400000
trusted library allocation
page read and write
51D1000
heap
page read and write
4FAF000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
1D311702000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
1D3116CE000
heap
page read and write
4FB5000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
2D195500000
trusted library section
page readonly
1D311517000
heap
page read and write
4FAD000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
EFD1AFF000
stack
page read and write
4FB8000
trusted library allocation
page read and write
4C83000
heap
page read and write
1077000
heap
page read and write
1D30C17D000
heap
page read and write
4F8B000
trusted library allocation
page read and write
D0E000
stack
page read and write
1D311448000
heap
page read and write
996000
heap
page read and write
1D311426000
heap
page read and write
2D199B20000
trusted library allocation
page read and write
2B9532F000
stack
page read and write
4EB0000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
503F000
trusted library allocation
page read and write
1D310F1E000
trusted library allocation
page read and write
161E80B6000
heap
page read and write
A450000
trusted library allocation
page read and write
A56E000
stack
page read and write
1D3112F0000
remote allocation
page read and write
1D30BF1D000
heap
page read and write
BC0000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4E1E000
stack
page read and write
4FB9000
trusted library allocation
page read and write
1D310F10000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
1D31142F000
heap
page read and write
468B87E000
stack
page read and write
AC33000
trusted library allocation
page read and write
8E1000
heap
page read and write
1D311631000
heap
page read and write
A54E000
trusted library allocation
page read and write
4BD1000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
AA0000
unkown
page readonly
4E41000
trusted library allocation
page read and write
4FA7000
trusted library allocation
page read and write
161E8730000
remote allocation
page read and write
4FAF000
trusted library allocation
page read and write
36C1000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
2D199A10000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
4CD0000
trusted library section
page readonly
EA0000
heap
page read and write
4D60000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D311714000
heap
page read and write
1D312010000
heap
page read and write
AC10000
trusted library allocation
page read and write
1D311631000
heap
page read and write
4FB0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
209167D0000
heap
page read and write
161E8084000
heap
page read and write
2077F237000
heap
page read and write
4FB9000
trusted library allocation
page read and write
1D3117BA000
heap
page read and write
4CB0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4BE5000
trusted library allocation
page read and write
268840CF000
heap
page read and write
161E8961000
heap
page read and write
4F8B000
trusted library allocation
page read and write
1D311500000
heap
page read and write
4FB8000
trusted library allocation
page read and write
1D30C1B8000
heap
page read and write
E9E000
stack
page read and write
1D31174C000
heap
page read and write
4F9D000
trusted library allocation
page read and write
405EF7A000
stack
page read and write
1D3116AC000
heap
page read and write
329F000
stack
page read and write
4FB7000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
D72000
heap
page read and write
1D310F05000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
5095000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
380000
heap
page read and write
4F93000
trusted library allocation
page read and write
4FB9000
trusted library allocation
page read and write
1D31107C000
trusted library allocation
page read and write
3ED1000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D311180000
trusted library allocation
page read and write
2D199D02000
heap
page read and write
4FB0000
trusted library allocation
page read and write
2C687E76000
heap
page read and write
4FAD000
trusted library allocation
page read and write
5AFE000
stack
page read and write
4FAD000
trusted library allocation
page read and write
21ECFBD000
stack
page read and write
A656000
trusted library allocation
page read and write
2165B47E000
heap
page read and write
A550000
trusted library allocation
page read and write
4BAB000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
E27000
trusted library allocation
page execute and read and write
4C20000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
A3DD000
trusted library allocation
page read and write
1D311060000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
8F0000
heap
page read and write
4FB5000
trusted library allocation
page read and write
2AAD000
trusted library allocation
page read and write
4E50000
heap
page read and write
27C5000
trusted library allocation
page read and write
AC60000
trusted library allocation
page read and write
ABCE000
stack
page read and write
7AF0000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
2D194C15000
heap
page read and write
4FB0000
trusted library allocation
page read and write
A656000
trusted library allocation
page read and write
992000
heap
page read and write
23F7000
trusted library allocation
page execute and read and write
4FB4000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
26884113000
heap
page read and write
D84000
heap
page read and write
B40000
heap
page read and write
4FB4000
trusted library allocation
page read and write
26A0000
trusted library allocation
page read and write
1D311771000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
21ED8FF000
unkown
page read and write
26AE000
trusted library allocation
page read and write
1D3115B7000
heap
page read and write
4BB0000
trusted library allocation
page read and write
161E8061000
heap
page read and write
2B952AB000
stack
page read and write
4FB8000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
2D194BF0000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
161E8E02000
heap
page read and write
4FA3000
trusted library allocation
page read and write
1D311426000
heap
page read and write
A450000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
1D311693000
heap
page read and write
1D31107C000
trusted library allocation
page read and write
8F2000
heap
page read and write
4F9F000
trusted library allocation
page read and write
B00000
heap
page read and write
8F0000
heap
page read and write
4F72000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
26884000000
heap
page read and write
D6D000
heap
page read and write
4EB0000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
A370000
trusted library allocation
page read and write
405F775000
stack
page read and write
A6B0000
trusted library allocation
page read and write
2E7E000
stack
page read and write
2C687E5F000
heap
page read and write
1D310F14000
trusted library allocation
page read and write
2165B460000
heap
page read and write
1D31177A000
heap
page read and write
8F7000
heap
page read and write
161E8986000
heap
page read and write
8EE000
heap
page read and write
AA97000
trusted library allocation
page read and write
1D30C1CD000
heap
page read and write
4C80000
heap
page read and write
9AE000
stack
page read and write
4F93000
trusted library allocation
page read and write
4BC6000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
2D194C02000
heap
page read and write
4FC3000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
8DF000
heap
page read and write
4FB0000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
D0A000
heap
page read and write
4FB9000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
AC50000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
121EEE02000
heap
page read and write
1D311460000
heap
page read and write
5037000
trusted library allocation
page read and write
2E3E000
stack
page read and write
6FB0000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
1D311576000
heap
page read and write
1D310F12000
trusted library allocation
page read and write
FCE000
stack
page read and write
1D31142F000
heap
page read and write
4F80000
trusted library allocation
page read and write
4FA3000
trusted library allocation
page read and write
AD70000
trusted library allocation
page read and write
AC2F000
trusted library allocation
page read and write
8AB000
heap
page read and write
23A7F44E000
heap
page read and write
4FB9000
trusted library allocation
page read and write
C4E000
stack
page read and write
4FB1000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
23A7F429000
heap
page read and write
4C50000
trusted library allocation
page read and write
DD1317C000
stack
page read and write
4F7A000
trusted library allocation
page read and write
2C687E00000
heap
page read and write
4FB4000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D30C1CF000
heap
page read and write
1D31170C000
heap
page read and write
2077F23E000
heap
page read and write
4FB8000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
401E000
trusted library allocation
page read and write
1D311074000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
161E8065000
heap
page read and write
4DE6000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
2F4F000
stack
page read and write
161E898A000
heap
page read and write
8E4000
heap
page read and write
405E75E000
stack
page read and write
4F78000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
121EEE00000
heap
page read and write
6EE8000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
D35000
heap
page read and write
165C1C60000
heap
page read and write
2BFF000
stack
page read and write
4FB0000
trusted library allocation
page read and write
4FA4000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
84BE000
stack
page read and write
4FB3000
trusted library allocation
page read and write
1D311600000
heap
page read and write
AC30000
trusted library allocation
page read and write
1D3117BD000
heap
page read and write
AED0000
trusted library allocation
page read and write
208FD029000
heap
page read and write
1D30CCE0000
trusted library section
page readonly
21EA2B60000
heap
page read and write
4F7A000
trusted library allocation
page read and write
1D311621000
heap
page read and write
4FB8000
trusted library allocation
page read and write
2B9587F000
stack
page read and write
6E40000
trusted library allocation
page read and write
AC40000
trusted library allocation
page read and write
67B2000
trusted library allocation
page read and write
AC00000
trusted library allocation
page read and write
1D31143F000
heap
page read and write
1D31142F000
heap
page read and write
2C687E45000
heap
page read and write
1D3117B1000
heap
page read and write
485C000
stack
page read and write
4FB7000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
59BE000
stack
page read and write
4F9D000
trusted library allocation
page read and write
4F98000
trusted library allocation
page read and write
1D3115F8000
heap
page read and write
4F91000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
1D310F0C000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D31170A000
heap
page read and write
1D30C14D000
heap
page read and write
4EC2000
trusted library allocation
page read and write
1D30CD11000
trusted library allocation
page read and write
21EA2B90000
trusted library allocation
page read and write
4BBD000
trusted library allocation
page read and write
1D311070000
trusted library allocation
page read and write
AF9F8FE000
stack
page read and write
405F67D000
stack
page read and write
A658000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
208FD680000
remote allocation
page read and write
4F74000
trusted library allocation
page read and write
4DE7000
trusted library allocation
page read and write
1D311503000
heap
page read and write
A447000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
1FE35FE000
stack
page read and write
2C687E6C000
heap
page read and write
23F2000
trusted library allocation
page read and write
AC00000
trusted library allocation
page read and write
161E8950000
heap
page read and write
AF9F87E000
stack
page read and write
1D31154B000
heap
page read and write
4FB6000
trusted library allocation
page read and write
8FE000
heap
page read and write
4B25000
trusted library allocation
page read and write
1D3111A0000
trusted library allocation
page read and write
2077EFE0000
heap
page read and write
A430000
trusted library allocation
page read and write
A40B000
trusted library allocation
page read and write
AEB0000
trusted library allocation
page read and write
1D311458000
heap
page read and write
7020000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
AD30000
trusted library allocation
page read and write
2D199B30000
trusted library allocation
page read and write
1D31176C000
heap
page read and write
2D194413000
heap
page read and write
4F77000
trusted library allocation
page read and write
1D311150000
trusted library allocation
page read and write
23A7F513000
heap
page read and write
1D311074000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
1D3116A9000
heap
page read and write
A420000
trusted library allocation
page read and write
1D31164D000
heap
page read and write
DD136FF000
stack
page read and write
4FB0000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
B32000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
1D30C990000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
2AF0000
heap
page read and write
2A9D000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
AC60000
trusted library allocation
page read and write
A230000
trusted library allocation
page read and write
1D311510000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D30C1DC000
heap
page read and write
4FB0000
trusted library allocation
page read and write
4C70000
heap
page execute and read and write
302F000
stack
page read and write
D6351CF000
stack
page read and write
2E56000
heap
page read and write
1D31153B000
heap
page read and write
4FAF000
trusted library allocation
page read and write
1D311731000
heap
page read and write
91E000
heap
page read and write
4F9D000
trusted library allocation
page read and write
91E000
heap
page read and write
620000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
1D3116AC000
heap
page read and write
1D310F4A000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
1D311502000
heap
page read and write
1D30BFCA000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
208FD002000
heap
page read and write
28DE000
stack
page read and write
4FB5000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
1D311641000
heap
page read and write
4FA2000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
1D311434000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
2D195510000
trusted library section
page readonly
8CC000
heap
page read and write
4FA6000
trusted library allocation
page read and write
2077F239000
heap
page read and write
B4D000
heap
page read and write
1D31168A000
heap
page read and write
2C0000
unkown
page readonly
3EB000
stack
page read and write
4F75000
trusted library allocation
page read and write
1D30B7C2000
heap
page read and write
4FB8000
trusted library allocation
page read and write
21EA2D13000
heap
page read and write
67994FE000
stack
page read and write
4E10000
trusted library allocation
page read and write
EFD1E7F000
stack
page read and write
4F7E000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4FB9000
trusted library allocation
page read and write
1D310F10000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
21EA2C7C000
heap
page read and write
4FB5000
trusted library allocation
page read and write
A42B000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
1D311752000
heap
page read and write
4FB8000
trusted library allocation
page read and write
2A82000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
1D31164F000
heap
page read and write
A6E0000
trusted library allocation
page read and write
2C2000
unkown
page readonly
4F9D000
trusted library allocation
page read and write
2B956FB000
stack
page read and write
3220000
heap
page read and write
AD4E000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
2D199A10000
trusted library allocation
page read and write
AE73000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
1D311519000
heap
page read and write
4FA5000
trusted library allocation
page read and write
4F89000
trusted library allocation
page read and write
4BB3000
trusted library allocation
page read and write
1D310F00000
trusted library allocation
page read and write
A560000
trusted library allocation
page read and write
2D194424000
heap
page read and write
1D310F00000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
1D311462000
heap
page read and write
534E000
stack
page read and write
4F8E000
trusted library allocation
page read and write
1D30B470000
heap
page read and write
8DA000
heap
page read and write
121EEE7C000
heap
page read and write
4BCC000
trusted library allocation
page read and write
8F0000
heap
page read and write
4F7B000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
8E0000
heap
page read and write
278E000
stack
page read and write
161E7F10000
heap
page read and write
4F9C000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4D61000
trusted library allocation
page read and write
2D199B00000
trusted library allocation
page read and write
165C1EB0000
heap
page read and write
7B0000
heap
page read and write
F3D000
stack
page read and write
1D311764000
heap
page read and write
300F000
stack
page read and write
4FA1000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
AF30000
trusted library allocation
page read and write
21EA2B00000
heap
page read and write
8E1000
heap
page read and write
2165B462000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4FB9000
trusted library allocation
page read and write
E2A000
trusted library allocation
page execute and read and write
4FB8000
trusted library allocation
page read and write
2C687C10000
heap
page read and write
4B81000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4B2C000
trusted library allocation
page read and write
AACE000
stack
page read and write
4FB8000
trusted library allocation
page read and write
924000
heap
page read and write
2C80000
trusted library allocation
page read and write
A415000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
2D199A20000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D3117A9000
heap
page read and write
1D310F22000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
161E8102000
heap
page read and write
4F7A000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
A9A000
stack
page read and write
4F8B000
trusted library allocation
page read and write
911000
heap
page read and write
1D311785000
heap
page read and write
4FB9000
trusted library allocation
page read and write
AC00000
trusted library allocation
page read and write
4FBA000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
4F5E000
stack
page read and write
4FAD000
trusted library allocation
page read and write
1D310F4E000
trusted library allocation
page read and write
1D311729000
heap
page read and write
91E000
heap
page read and write
468BA7E000
stack
page read and write
B14000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
AC10000
trusted library allocation
page read and write
208FCEF0000
heap
page read and write
4FB8000
trusted library allocation
page read and write
E0D000
trusted library allocation
page execute and read and write
2D1954D0000
trusted library section
page readonly
4FB0000
trusted library allocation
page read and write
4CF3000
heap
page read and write
4F93000
trusted library allocation
page read and write
D60000
heap
page read and write
AF20000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
AD60000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
268840C5000
heap
page read and write
4FB4000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
4079000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
1D310F18000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4F75000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
2D199B10000
trusted library allocation
page read and write
67996FE000
stack
page read and write
4F8D000
trusted library allocation
page read and write
20917002000
trusted library allocation
page read and write
67992FE000
stack
page read and write
1D311110000
trusted library allocation
page read and write
4FA6000
trusted library allocation
page read and write
1D30C1CE000
heap
page read and write
4F9D000
trusted library allocation
page read and write
9C5000
heap
page read and write
4F93000
trusted library allocation
page read and write
4F77000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
2790000
trusted library allocation
page execute and read and write
1D311531000
heap
page read and write
D63547E000
stack
page read and write
26883E80000
heap
page read and write
4F78000
trusted library allocation
page read and write
1D312010000
heap
page read and write
1D311713000
heap
page read and write
6FC0000
trusted library allocation
page read and write
AD40000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D311750000
heap
page read and write
4F7F000
trusted library allocation
page read and write
1D311426000
heap
page read and write
4B70000
trusted library allocation
page read and write
2D1943C0000
trusted library section
page read and write
9C0000
unkown
page readonly
4FB4000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
908000
heap
page read and write
4F8E000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
1D311642000
heap
page read and write
4F85000
trusted library allocation
page read and write
861E98B000
stack
page read and write
2A20000
heap
page read and write
AA8E000
stack
page read and write
2C687E46000
heap
page read and write
A543000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
4FA1000
trusted library allocation
page read and write
4F73000
trusted library allocation
page read and write
AC85000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
2D199A00000
trusted library allocation
page read and write
1D30BF27000
heap
page read and write
4FB3000
trusted library allocation
page read and write
1D311564000
heap
page read and write
1D30C1D5000
heap
page read and write
1D311400000
heap
page read and write
1D30C154000
heap
page read and write
4FA5000
trusted library allocation
page read and write
20916FA0000
trusted library allocation
page read and write
5BFF000
stack
page read and write
4FB6000
trusted library allocation
page read and write
24FE000
stack
page read and write
121EEF13000
heap
page read and write
4F9E000
trusted library allocation
page read and write
1D310F00000
trusted library allocation
page read and write
679917A000
stack
page read and write
4EB0000
trusted library allocation
page read and write
1D3116C3000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
910000
heap
page read and write
4FB2000
trusted library allocation
page read and write
90F000
heap
page read and write
4FAD000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
23A7F2F0000
heap
page read and write
5060000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
161E8670000
trusted library allocation
page read and write
B629000
heap
page read and write
8F9000
stack
page read and write
4F9D000
trusted library allocation
page read and write
2CB0000
heap
page read and write
4C14000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
4FB9000
trusted library allocation
page read and write
1D310EE0000
trusted library allocation
page read and write
1D3116A7000
heap
page read and write
9BB000
stack
page read and write
4F8B000
trusted library allocation
page read and write
1FE3678000
stack
page read and write
4FB0000
trusted library allocation
page read and write
2F60000
heap
page read and write
30B1000
trusted library allocation
page read and write
A463000
trusted library allocation
page read and write
2510000
trusted library allocation
page read and write
4FBA000
trusted library allocation
page read and write
A40A000
trusted library allocation
page read and write
9C0000
unkown
page readonly
91E000
heap
page read and write
4F9D000
trusted library allocation
page read and write
AC00000
trusted library allocation
page read and write
1D30BF2F000
heap
page read and write
51D1000
heap
page read and write
4EB0000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
1D311402000
heap
page read and write
4C50000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
298E000
stack
page read and write
1D3115A9000
heap
page read and write
1D30BFC4000
heap
page read and write
4FA2000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
23A7F400000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
1D30BFE2000
heap
page read and write
4E10000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
4F7A000
trusted library allocation
page read and write
8CC000
heap
page read and write
4F9B000
trusted library allocation
page read and write
1D30BFB0000
heap
page read and write
161E8998000
heap
page read and write
4E11000
trusted library allocation
page read and write
2D199C87000
heap
page read and write
7B1B000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
1D31150E000
heap
page read and write
A660000
trusted library allocation
page read and write
208FD058000
heap
page read and write
2500000
trusted library allocation
page execute and read and write
26C1000
trusted library allocation
page read and write
161E8067000
heap
page read and write
4F8E000
trusted library allocation
page read and write
2D194310000
heap
page read and write
4FB6000
trusted library allocation
page read and write
1D30C1CB000
heap
page read and write
993000
heap
page read and write
4C50000
trusted library allocation
page read and write
1D310F00000
trusted library allocation
page read and write
1D311692000
heap
page read and write
2C687F02000
heap
page read and write
2D1944A2000
heap
page read and write
BBD000
trusted library allocation
page execute and read and write
2D199C63000
heap
page read and write
4FB0000
trusted library allocation
page read and write
AEA0000
trusted library allocation
page read and write
2B953AE000
stack
page read and write
E37000
trusted library allocation
page execute and read and write
26C1000
trusted library allocation
page read and write
1D3117AC000
heap
page read and write
2FCE000
stack
page read and write
AA0000
unkown
page readonly
4FB8000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
2AC2000
trusted library allocation
page read and write
1D31142F000
heap
page read and write
1D311724000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4BB7000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
1D311080000
trusted library allocation
page read and write
F2E000
stack
page read and write
2D19448C000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4E40000
trusted library section
page read and write
9D0000
unkown
page readonly
4FB8000
trusted library allocation
page read and write
5023000
trusted library allocation
page read and write
1D310EFC000
trusted library allocation
page read and write
A650000
trusted library allocation
page read and write
A580000
trusted library allocation
page read and write
1D31169D000
heap
page read and write
1D30BE15000
heap
page read and write
4F9D000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
1D30C998000
trusted library allocation
page read and write
2D1999E0000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
4FB9000
trusted library allocation
page read and write
2D194479000
heap
page read and write
B3CF000
stack
page read and write
4F9D000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
A405000
trusted library allocation
page read and write
21ED4F7000
stack
page read and write
AC30000
trusted library allocation
page read and write
1D31146A000
heap
page read and write
4CF0000
heap
page read and write
21EA2C3C000
heap
page read and write
2B95B7E000
stack
page read and write
AF10000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
2D199A01000
trusted library allocation
page read and write
1D310F0E000
trusted library allocation
page read and write
4FB1000
trusted library allocation
page read and write
4F89000
trusted library allocation
page read and write
911000
heap
page read and write
5023000
trusted library allocation
page read and write
2C687E44000
heap
page read and write
50B0000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
A43D000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
93E000
heap
page read and write
1D311634000
heap
page read and write
4EB0000
heap
page execute and read and write
4F9C000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D31175B000
heap
page read and write
7020000
trusted library allocation
page read and write
50A0000
heap
page read and write
4F93000
trusted library allocation
page read and write
21ECF3E000
stack
page read and write
1D30C680000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
21ED5FF000
stack
page read and write
1D30C1DC000
heap
page read and write
1D3116C0000
heap
page read and write
1D30C1CE000
heap
page read and write
2688408C000
heap
page read and write
26884102000
heap
page read and write
20916A75000
heap
page read and write
AEE0000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
92A000
heap
page read and write
4F7B000
trusted library allocation
page read and write
36CD000
trusted library allocation
page read and write
4BD0000
heap
page execute and read and write
1D311598000
heap
page read and write
4B70000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
1D3116BC000
heap
page read and write
4DE0000
trusted library allocation
page read and write
9E0000
unkown
page read and write
4FAD000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
AEED000
trusted library allocation
page read and write
AD6E000
trusted library allocation
page read and write
2D194502000
heap
page read and write
4FB6000
trusted library allocation
page read and write
A6E2000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
46CF7E000
stack
page read and write
23FB000
trusted library allocation
page execute and read and write
4F72000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
2C687E7D000
heap
page read and write
2E3B000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
924000
heap
page read and write
AC00000
trusted library allocation
page read and write
2B00000
unkown
page read and write
1D311426000
heap
page read and write
B89C000
stack
page read and write
4C50000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
2D199B40000
remote allocation
page read and write
4FBA000
trusted library allocation
page read and write
161E8900000
heap
page read and write
4F9D000
trusted library allocation
page read and write
AF9FE7F000
stack
page read and write
4FB2000
trusted library allocation
page read and write
503F000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
1D30BFCE000
heap
page read and write
4FB8000
trusted library allocation
page read and write
2C687E40000
heap
page read and write
2D19A000000
heap
page read and write
925000
heap
page read and write
2D194C00000
heap
page read and write
4F9A000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
161E8996000
heap
page read and write
1FE347F000
stack
page read and write
4FAF000
trusted library allocation
page read and write
925000
heap
page read and write
A460000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
93F000
heap
page read and write
4F75000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
A710000
trusted library allocation
page read and write
2165B502000
heap
page read and write
1D30B63C000
heap
page read and write
3A55000
trusted library allocation
page read and write
6ECD000
trusted library allocation
page read and write
B36000
trusted library allocation
page execute and read and write
4F95000
trusted library allocation
page read and write
922000
heap
page read and write
4FB1000
trusted library allocation
page read and write
1D30C1D7000
heap
page read and write
2BC0000
unkown
page read and write
4F73000
trusted library allocation
page read and write
AE8D000
stack
page read and write
4FAD000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
1D31156C000
heap
page read and write
4F7A000
trusted library allocation
page read and write
1D3116FD000
heap
page read and write
5065000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
2E65000
heap
page read and write
4FAD000
trusted library allocation
page read and write
1D3110D0000
trusted library allocation
page read and write
861EEFE000
stack
page read and write
A410000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
9F0000
heap
page read and write
1D311641000
heap
page read and write
4FB9000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D311676000
heap
page read and write
4B90000
trusted library allocation
page read and write
161E8059000
heap
page read and write
1D30B460000
heap
page read and write
6FC0000
trusted library allocation
page read and write
2165B413000
heap
page read and write
8DD000
heap
page read and write
7AFC000
trusted library allocation
page read and write
AF40000
trusted library allocation
page read and write
DD134FE000
stack
page read and write
4FA7000
trusted library allocation
page read and write
E04000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
1D30C1CE000
heap
page read and write
A42F000
trusted library allocation
page read and write
2D199B40000
remote allocation
page read and write
2C687E4E000
heap
page read and write
4F93000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
CB0000
heap
page read and write
4F92000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
AC50000
trusted library allocation
page read and write
1D311613000
heap
page read and write
4FA4000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
AC50000
trusted library allocation
page read and write
950000
heap
page read and write
4FB0000
trusted library allocation
page read and write
2530000
heap
page read and write
4FB8000
trusted library allocation
page read and write
A3FD000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
4F98000
trusted library allocation
page read and write
2D19447B000
heap
page read and write
4F9D000
trusted library allocation
page read and write
1D3112F0000
remote allocation
page read and write
A410000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
2B00000
unkown
page read and write
4F9D000
trusted library allocation
page read and write
4FA6000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
1D30B600000
heap
page read and write
1D3115F6000
heap
page read and write
1D3115A5000
heap
page read and write
1D311502000
heap
page read and write
51EE000
stack
page read and write
4F9D000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
2D1954C0000
trusted library section
page readonly
26B0000
heap
page execute and read and write
161E8063000
heap
page read and write
4FB6000
trusted library allocation
page read and write
BE0000
heap
page read and write
2E55000
heap
page read and write
1D30C00A000
heap
page read and write
4E10000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
1D310F1C000
trusted library allocation
page read and write
F03C2FE000
stack
page read and write
4FAF000
trusted library allocation
page read and write
908000
heap
page read and write
4F74000
trusted library allocation
page read and write
1D3116E4000
heap
page read and write
4FB4000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
165C1DD0000
heap
page read and write
23A7F470000
heap
page read and write
161E8E86000
heap
page read and write
1D311434000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
1D30CD40000
trusted library allocation
page read and write
3090000
heap
page read and write
1D311599000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4FA3000
trusted library allocation
page read and write
1D310F10000
trusted library allocation
page read and write
20916A02000
heap
page read and write
23A7F44C000
heap
page read and write
2AF0000
unkown
page readonly
1D31143F000
heap
page read and write
4FB3000
trusted library allocation
page read and write
4FA7000
trusted library allocation
page read and write
1D30BFC7000
heap
page read and write
B99E000
stack
page read and write
4FAD000
trusted library allocation
page read and write
23A7F508000
heap
page read and write
21EA2D00000
heap
page read and write
B9E000
stack
page read and write
3FC2000
trusted library allocation
page read and write
669C000
trusted library allocation
page read and write
820000
heap
page read and write
4FB9000
trusted library allocation
page read and write
2A8A000
trusted library allocation
page read and write
26883FE0000
trusted library allocation
page read and write
8EE000
heap
page read and write
A410000
trusted library allocation
page execute and read and write
A430000
trusted library allocation
page read and write
2D194320000
heap
page read and write
4F84000
trusted library allocation
page read and write
AC00000
trusted library allocation
page read and write
508E000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
2165B43C000
heap
page read and write
4F9D000
trusted library allocation
page read and write
161E80AC000
heap
page read and write
1D311675000
heap
page read and write
165C1DD0000
heap
page read and write
4F93000
trusted library allocation
page read and write
1D30BE02000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4F98000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
1D30BF2D000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
208FD013000
heap
page read and write
1D310F12000
trusted library allocation
page read and write
A424000
trusted library allocation
page read and write
ADC0000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
67999FE000
stack
page read and write
1D311653000
heap
page read and write
4F73000
trusted library allocation
page read and write
1D3116E5000
heap
page read and write
405F97E000
stack
page read and write
A400000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
A5A0000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
2D199AB0000
trusted library allocation
page read and write
4FBA000
trusted library allocation
page read and write
A740000
trusted library allocation
page read and write
AC00000
trusted library allocation
page read and write
2D199C91000
heap
page read and write
468B6FF000
stack
page read and write
ADA0000
trusted library allocation
page read and write
161E80EF000
heap
page read and write
1D3115C7000
heap
page read and write
BE7000
trusted library allocation
page execute and read and write
3096000
heap
page read and write
A677000
trusted library allocation
page read and write
4FBA000
trusted library allocation
page read and write
1D311795000
heap
page read and write
51F0000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
1D30C17A000
heap
page read and write
165C1DD1000
heap
page read and write
4DA0000
trusted library allocation
page read and write
1D3115AA000
heap
page read and write
A5D000
stack
page read and write
1D30C1B1000
heap
page read and write
E03000
trusted library allocation
page execute and read and write
165C1DBF000
heap
page read and write
90D000
heap
page read and write
1D311450000
heap
page read and write
EFD1BFB000
stack
page read and write
AEC0000
trusted library allocation
page read and write
1D3112F0000
remote allocation
page read and write
4FB9000
trusted library allocation
page read and write
1D30C002000
heap
page read and write
4FB1000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
2D199CF5000
heap
page read and write
4F7B000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
4FC3000
trusted library allocation
page read and write
4F7C000
trusted library allocation
page read and write
21EA2C8A000
heap
page read and write
2165B3E0000
trusted library allocation
page read and write
F6F000
stack
page read and write
4FB8000
trusted library allocation
page read and write
A680000
trusted library allocation
page read and write
1D311070000
trusted library allocation
page read and write
D88000
heap
page read and write
4E40000
trusted library allocation
page read and write
2E65000
heap
page read and write
4F73000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
1D30CCD0000
trusted library section
page readonly
4FB5000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
405EE7A000
stack
page read and write
1D30B643000
heap
page read and write
908000
heap
page read and write
4F7D000
trusted library allocation
page read and write
2C687E47000
heap
page read and write
2500000
heap
page read and write
973000
heap
page read and write
4F80000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
2077F213000
heap
page read and write
4FB2000
trusted library allocation
page read and write
405F07E000
stack
page read and write
1D31150A000
heap
page read and write
4F98000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
1D30BFF3000
heap
page read and write
2D199C9F000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
2D199C4C000
heap
page read and write
4FB7000
trusted library allocation
page read and write
A480000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
1D30B671000
heap
page read and write
1D311717000
heap
page read and write
4FB8000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
4DE0000
trusted library section
page readonly
161E8730000
remote allocation
page read and write
1D31146A000
heap
page read and write
4BB0000
trusted library allocation
page read and write
7AD4000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
55FE000
stack
page read and write
4F9D000
trusted library allocation
page read and write
4F8C000
trusted library allocation
page read and write
4CBD000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
AD80000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
4FB1000
trusted library allocation
page read and write
468BBFD000
stack
page read and write
9C0000
heap
page read and write
4E9C000
stack
page read and write
21ED6F7000
stack
page read and write
4FB6000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D311074000
trusted library allocation
page read and write
1D311648000
heap
page read and write
2C687E48000
heap
page read and write
21EA2C00000
heap
page read and write
A400000
trusted library allocation
page read and write
1D31176F000
heap
page read and write
A720000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
1D31107C000
trusted library allocation
page read and write
1D31172D000
heap
page read and write
A69F000
trusted library allocation
page read and write
91E000
heap
page read and write
4F9C000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
4FB9000
trusted library allocation
page read and write
AE70000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
914000
heap
page read and write
4FB5000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
1D311453000
heap
page read and write
4FAD000
trusted library allocation
page read and write
A6F0000
trusted library allocation
page read and write
4F77000
trusted library allocation
page read and write
1D311543000
heap
page read and write
5006000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
5037000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
1D30BF00000
heap
page read and write
AC30000
trusted library allocation
page read and write
91E000
heap
page read and write
2D194476000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
2D1999E0000
trusted library allocation
page read and write
1D311502000
heap
page read and write
EFF000
stack
page read and write
1D311651000
heap
page read and write
26884912000
heap
page read and write
503F000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
4FA6000
trusted library allocation
page read and write
1D30C1B6000
heap
page read and write
1D30B658000
heap
page read and write
4F7C000
trusted library allocation
page read and write
2C687E2E000
heap
page read and write
4F90000
trusted library allocation
page read and write
1D311687000
heap
page read and write
AC76000
trusted library allocation
page read and write
4FBB000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
266C000
stack
page read and write
4FAF000
trusted library allocation
page read and write
2D199CEE000
heap
page read and write
A246000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
2165B280000
heap
page read and write
4BB0000
trusted library allocation
page read and write
3901000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
D7F000
heap
page read and write
1D311447000
heap
page read and write
1D311657000
heap
page read and write
4EC0000
trusted library allocation
page execute and read and write
4F93000
trusted library allocation
page read and write
4F99000
trusted library allocation
page read and write
8D9000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
DD132FB000
stack
page read and write
4FB8000
trusted library allocation
page read and write
23A7F44B000
heap
page read and write
2077F202000
heap
page read and write
AC10000
trusted library allocation
page execute and read and write
4FB8000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D30C1B6000
heap
page read and write
4F7B000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
161E8976000
heap
page read and write
8E0000
heap
page read and write
4F82000
trusted library allocation
page read and write
1D311657000
heap
page read and write
F03BFFE000
stack
page read and write
2A8F000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
4FA6000
trusted library allocation
page read and write
4F72000
trusted library allocation
page read and write
1D30B713000
heap
page read and write
4FB6000
trusted library allocation
page read and write
4F75000
trusted library allocation
page read and write
161E8941000
heap
page read and write
1D310F08000
trusted library allocation
page read and write
2D199C9D000
heap
page read and write
5080000
trusted library allocation
page read and write
924000
heap
page read and write
165C1DA6000
heap
page read and write
1D311554000
heap
page read and write
8E0000
heap
page read and write
1D31163D000
heap
page read and write
AF9FAFB000
stack
page read and write
4F9D000
trusted library allocation
page read and write
1D30CCC0000
trusted library section
page readonly
4FAF000
trusted library allocation
page read and write
21EA2C66000
heap
page read and write
A84E000
stack
page read and write
4FB3000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
1D310EE0000
trusted library allocation
page read and write
405E6DB000
stack
page read and write
4FB0000
trusted library allocation
page read and write
1D311789000
heap
page read and write
1D311631000
heap
page read and write
4FAF000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
2165B480000
heap
page read and write
F62000
trusted library allocation
page read and write
911000
heap
page read and write
F44000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D311513000
heap
page read and write
4F9D000
trusted library allocation
page read and write
1D310F1C000
trusted library allocation
page read and write
4FB9000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
1D310F1C000
trusted library allocation
page read and write
1D311617000
heap
page read and write
1D311070000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
1D3116D7000
heap
page read and write
A650000
trusted library allocation
page read and write
4FBA000
trusted library allocation
page read and write
6F7000
stack
page read and write
4F9D000
trusted library allocation
page read and write
F43000
trusted library allocation
page execute and read and write
4FB8000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
161E80AE000
heap
page read and write
A400000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
700000
remote allocation
page read and write
4F74000
trusted library allocation
page read and write
8E1000
heap
page read and write
4F95000
trusted library allocation
page read and write
E3B000
trusted library allocation
page execute and read and write
4FBA000
trusted library allocation
page read and write
2165B270000
heap
page read and write
4FB0000
trusted library allocation
page read and write
A530000
trusted library allocation
page read and write
503F000
trusted library allocation
page read and write
A530000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
A440000
trusted library allocation
page read and write
D635777000
stack
page read and write
4FBA000
trusted library allocation
page read and write
4F7A000
trusted library allocation
page read and write
1D310F8C000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
4FDE000
stack
page read and write
2D194493000
heap
page read and write
4F92000
trusted library allocation
page read and write
2C687E31000
heap
page read and write
4FAD000
trusted library allocation
page read and write
1D311437000
heap
page read and write
ABF000
stack
page read and write
914000
heap
page read and write
1D30C1D5000
heap
page read and write
DD130FE000
stack
page read and write
A440000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
268840E8000
heap
page read and write
4F9D000
trusted library allocation
page read and write
A450000
trusted library allocation
page read and write
1D3115A9000
heap
page read and write
4FB8000
trusted library allocation
page read and write
AFD000
stack
page read and write
707D000
trusted library allocation
page read and write
1D3117A9000
heap
page read and write
919000
heap
page read and write
4FB4000
trusted library allocation
page read and write
AC50000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
1D30B690000
heap
page read and write
1D30BE00000
heap
page read and write
4FBA000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
161E805B000
heap
page read and write
1D311514000
heap
page read and write
AC00000
trusted library allocation
page read and write
8FD000
heap
page read and write
4FAA000
trusted library allocation
page read and write
1D30CBD0000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
268840BE000
heap
page read and write
4BF0000
trusted library allocation
page read and write
A6ED000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
161E8013000
heap
page read and write
4FB5000
trusted library allocation
page read and write
2077F229000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
1D310F80000
trusted library allocation
page read and write
4F78000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
4E30000
heap
page read and write
4F8B000
trusted library allocation
page read and write
890000
heap
page read and write
161E8987000
heap
page read and write
2077F302000
heap
page read and write
21EA3402000
trusted library allocation
page read and write
2D199C20000
heap
page read and write
4F92000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
262E000
stack
page read and write
A440000
trusted library allocation
page read and write
D32000
heap
page read and write
2D194471000
heap
page read and write
1D311070000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
26883E70000
heap
page read and write
4F74000
trusted library allocation
page read and write
AE56000
trusted library allocation
page read and write
A400000
trusted library allocation
page execute and read and write
9E0000
unkown
page read and write
1D31146A000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
D6A000
heap
page read and write
4FAF000
trusted library allocation
page read and write
5023000
trusted library allocation
page read and write
AE9A000
trusted library allocation
page read and write
2680000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
6798D5B000
stack
page read and write
2C687E66000
heap
page read and write
4FAF000
trusted library allocation
page read and write
2077F7A0000
trusted library allocation
page read and write
1D31174E000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
4FA2000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
1D310F00000
trusted library allocation
page read and write
4F7A000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
1D3116A0000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4FB9000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
26884802000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
1D311040000
trusted library allocation
page read and write
5037000
trusted library allocation
page read and write
161E89CD000
heap
page read and write
A540000
trusted library allocation
page read and write
A670000
trusted library allocation
page read and write
850000
heap
page read and write
4F9F000
trusted library allocation
page read and write
2BB0000
heap
page read and write
908000
heap
page read and write
ADB0000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
1D30C058000
heap
page read and write
928000
heap
page read and write
1D311777000
heap
page read and write
4F8B000
trusted library allocation
page read and write
D63587F000
stack
page read and write
4FB9000
trusted library allocation
page read and write
8E3000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
21EA2C5E000
heap
page read and write
4F9D000
trusted library allocation
page read and write
3096000
heap
page read and write
165C1DBF000
heap
page read and write
945000
heap
page read and write
2165B45B000
heap
page read and write
4F8B000
trusted library allocation
page read and write
1D30C19F000
heap
page read and write
2077EFF0000
heap
page read and write
4AC0000
heap
page read and write
2D1998C0000
trusted library allocation
page read and write
1D30C1D5000
heap
page read and write
503F000
trusted library allocation
page read and write
2BA0000
unkown
page readonly
1D31169A000
heap
page read and write
4F91000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
1D311645000
heap
page read and write
165C1DB7000
heap
page read and write
165C1DA1000
heap
page read and write
36C9000
trusted library allocation
page read and write
AC40000
trusted library allocation
page read and write
2D199D02000
heap
page read and write
2077F23C000
heap
page read and write
4F9D000
trusted library allocation
page read and write
8D1000
heap
page read and write
4FB1000
trusted library allocation
page read and write
2C687E61000
heap
page read and write
2F0E000
stack
page read and write
291A000
trusted library allocation
page read and write
405EA7F000
stack
page read and write
121EEE3D000
heap
page read and write
1D311413000
heap
page read and write
1D311761000
heap
page read and write
DA0000
heap
page read and write
4FBA000
trusted library allocation
page read and write
20916A00000
heap
page read and write
BCD000
trusted library allocation
page execute and read and write
1D30B613000
heap
page read and write
4FA9000
trusted library allocation
page read and write
161E8802000
heap
page read and write
208FD000000
heap
page read and write
1D310EFC000
trusted library allocation
page read and write
405EBFF000
stack
page read and write
4FAF000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
2D1954E0000
trusted library section
page readonly
4F72000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
20916A13000
heap
page read and write
46C77B000
stack
page read and write
4FAD000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
DA7000
heap
page read and write
4BA0000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
B04E000
stack
page read and write
2BB0000
unkown
page readonly
96A000
heap
page read and write
4F85000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
2C687E79000
heap
page read and write
AC60000
trusted library allocation
page read and write
1D3116E2000
heap
page read and write
59C000
stack
page read and write
4F93000
trusted library allocation
page read and write
A540000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
1D311426000
heap
page read and write
4EB0000
trusted library allocation
page read and write
1D30C1AC000
heap
page read and write
161E8000000
heap
page read and write
AE80000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
1D3115D4000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
4F84000
trusted library allocation
page read and write
1D30BF1D000
heap
page read and write
2A15000
trusted library allocation
page read and write
1D311788000
heap
page read and write
2C687C00000
heap
page read and write
4F8F000
trusted library allocation
page read and write
BB3000
trusted library allocation
page execute and read and write
405FB7C000
stack
page read and write
67997FE000
stack
page read and write
165C1DD2000
heap
page read and write
2E65000
heap
page read and write
AEF0000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
1D311641000
heap
page read and write
161E806A000
heap
page read and write
4F7B000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
AE56000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4F9B000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
161E8989000
heap
page read and write
209167E0000
heap
page read and write
4F7B000
trusted library allocation
page read and write
1D311760000
heap
page read and write
2C687E49000
heap
page read and write
3F66000
trusted library allocation
page read and write
21ECEBC000
stack
page read and write
1D311656000
heap
page read and write
2BA0000
unkown
page readonly
4FB8000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
AC80000
trusted library allocation
page read and write
9D0000
unkown
page readonly
5023000
trusted library allocation
page read and write
4FBA000
trusted library allocation
page read and write
208FD680000
remote allocation
page read and write
4FA4000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
1D3115AF000
heap
page read and write
1D310F18000
trusted library allocation
page read and write
8EE000
heap
page read and write
1D30C1DC000
heap
page read and write
5060000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
6EE5000
trusted library allocation
page read and write
3A31000
trusted library allocation
page read and write
405ECFB000
stack
page read and write
1D30C1D1000
heap
page read and write
4F72000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
905000
heap
page read and write
161E8980000
heap
page read and write
787000
stack
page read and write
161E898E000
heap
page read and write
2C687E31000
heap
page read and write
1D310FA0000
trusted library allocation
page read and write
5023000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
4F83000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
4C21000
trusted library allocation
page read and write
268840CC000
heap
page read and write
1D31142F000
heap
page read and write
1D30BC60000
trusted library allocation
page read and write
21ED9FB000
stack
page read and write
1D31107C000
trusted library allocation
page read and write
4F73000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
F03BB8E000
stack
page read and write
4FAF000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
26B0000
heap
page execute and read and write
4FB8000
trusted library allocation
page read and write
1D311060000
trusted library allocation
page read and write
AD0E000
stack
page read and write
1D311686000
heap
page read and write
4F7E000
trusted library allocation
page read and write
23A7F48C000
heap
page read and write
4FB8000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
121EECE0000
heap
page read and write
1D310F0E000
trusted library allocation
page read and write
AC50000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
26884073000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
AC57000
trusted library allocation
page read and write
4F75000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
1D30B68D000
heap
page read and write
4FB0000
trusted library allocation
page read and write
4F72000
trusted library allocation
page read and write
1D30C980000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
1D311462000
heap
page read and write
8B0000
heap
page read and write
4FB4000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
1D311559000
heap
page read and write
21EA2C02000
heap
page read and write
1D311462000
heap
page read and write
4FB3000
trusted library allocation
page read and write
21EA2AF0000
heap
page read and write
1D30B65B000
heap
page read and write
4FAD000
trusted library allocation
page read and write
2C687E30000
heap
page read and write
1D311726000
heap
page read and write
4F9C000
trusted library allocation
page read and write
161E80E4000
heap
page read and write
1D310D50000
trusted library allocation
page read and write
1D310D40000
trusted library allocation
page read and write
D63567B000
stack
page read and write
4F86000
trusted library allocation
page read and write
1D30C1B1000
heap
page read and write
4F75000
trusted library allocation
page read and write
4F72000
trusted library allocation
page read and write
924000
heap
page read and write
21EA2C5C000
heap
page read and write
1D3115A9000
heap
page read and write
1D311558000
heap
page read and write
4FAF000
trusted library allocation
page read and write
36C9000
trusted library allocation
page read and write
4F8A000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
405F37F000
stack
page read and write
4F7E000
trusted library allocation
page read and write
BEB000
trusted library allocation
page execute and read and write
5037000
trusted library allocation
page read and write
2C687D70000
trusted library allocation
page read and write
1D310F4E000
trusted library allocation
page read and write
2C688602000
trusted library allocation
page read and write
161E80C7000
heap
page read and write
8BD000
stack
page read and write
8EE000
heap
page read and write
161E8998000
heap
page read and write
4F76000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
524E000
stack
page read and write
4FAF000
trusted library allocation
page read and write
1D30C17B000
heap
page read and write
A3F9000
trusted library allocation
page read and write
1D30B78E000
heap
page read and write
1D311462000
heap
page read and write
1D311735000
heap
page read and write
40E000
remote allocation
page execute and read and write
4FB6000
trusted library allocation
page read and write
1D30BF02000
heap
page read and write
9E0000
unkown
page read and write
4C10000
trusted library allocation
page read and write
1D31173C000
heap
page read and write
4FAD000
trusted library allocation
page read and write
5E7C000
stack
page read and write
4DE0000
trusted library allocation
page read and write
1D311502000
heap
page read and write
2D194429000
heap
page read and write
1D310F14000
trusted library allocation
page read and write
A730000
trusted library allocation
page read and write
46CE7B000
stack
page read and write
4F92000
trusted library allocation
page read and write
2165B45D000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
2C687E02000
heap
page read and write
B620000
heap
page read and write
4F74000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D30B689000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4F84000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
1D310F65000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
900000
heap
page read and write
4FB8000
trusted library allocation
page read and write
1D3115C7000
heap
page read and write
2D194BE0000
trusted library allocation
page read and write
4FBA000
trusted library allocation
page read and write
2744000
trusted library allocation
page read and write
530000
heap
page read and write
273E000
trusted library allocation
page read and write
AFDE000
stack
page read and write
4F9D000
trusted library allocation
page read and write
1D310F00000
trusted library allocation
page read and write
1D3117AE000
heap
page read and write
23A7F452000
heap
page read and write
21EA2C5A000
heap
page read and write
1D3116C6000
heap
page read and write
4FAD000
trusted library allocation
page read and write
2D199C2D000
heap
page read and write
1D311074000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
1D310F16000
trusted library allocation
page read and write
DD135FD000
stack
page read and write
D7F000
heap
page read and write
4F73000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
4FAB000
trusted library allocation
page read and write
AE90000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
121EEE13000
heap
page read and write
4FB9000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
4B17000
trusted library allocation
page read and write
A460000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
36C1000
trusted library allocation
page read and write
267C000
stack
page read and write
161E8998000
heap
page read and write
2C687E41000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
4FB9000
trusted library allocation
page read and write
AC00000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
2C687E6A000
heap
page read and write
2BC0000
unkown
page read and write
EFD217D000
stack
page read and write
4F8F000
trusted library allocation
page read and write
3A83000
trusted library allocation
page read and write
1D311193000
trusted library allocation
page read and write
C00000
heap
page read and write
AC50000
trusted library allocation
page read and write
AD6E000
stack
page read and write
1D3115E0000
heap
page read and write
161E8E02000
heap
page read and write
4F7A000
trusted library allocation
page read and write
2C687E4F000
heap
page read and write
A45B000
trusted library allocation
page read and write
1D31146A000
heap
page read and write
2901000
trusted library allocation
page read and write
AC50000
trusted library allocation
page read and write
28F0000
heap
page execute and read and write
4F70000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
1D31144D000
heap
page read and write
A450000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
121EECD0000
heap
page read and write
2E55000
heap
page read and write
2468000
trusted library allocation
page read and write
4FA7000
trusted library allocation
page read and write
AD90000
trusted library allocation
page read and write
2165B429000
heap
page read and write
A460000
trusted library allocation
page read and write
405F87E000
stack
page read and write
A550000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page read and write
46CC7B000
stack
page read and write
907000
heap
page read and write
4F8E000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D31142F000
heap
page read and write
1D310F08000
trusted library allocation
page read and write
2B5D000
stack
page read and write
4F7A000
trusted library allocation
page read and write
F70000
heap
page read and write
7010000
trusted library allocation
page read and write
2D199AF0000
trusted library allocation
page read and write
1D30BFF1000
heap
page read and write
AC71000
trusted library allocation
page read and write
A410000
trusted library allocation
page read and write
161E8913000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4F9A000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
2077F22F000
heap
page read and write
1D3116B7000
heap
page read and write
1D30BF27000
heap
page read and write
208FD680000
remote allocation
page read and write
20916B02000
heap
page read and write
8F7000
heap
page read and write
8E4000
heap
page read and write
AC00000
trusted library allocation
page read and write
4E35000
heap
page read and write
400000
remote allocation
page execute and read and write
4FAD000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
8FD000
heap
page read and write
920000
heap
page read and write
2165B508000
heap
page read and write
21EA2C13000
heap
page read and write
1D30CCF0000
trusted library section
page readonly
7010000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
1D310F1A000
trusted library allocation
page read and write
E18000
trusted library allocation
page read and write
4BCE000
stack
page read and write
1D31165F000
heap
page read and write
4FA6000
trusted library allocation
page read and write
161E8116000
heap
page read and write
4F7D000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
952000
heap
page read and write
1D31178B000
heap
page read and write
4DDC000
stack
page read and write
4FB8000
trusted library allocation
page read and write
DCE000
heap
page read and write
83E000
stack
page read and write
121EED70000
trusted library allocation
page read and write
2A4A000
trusted library allocation
page read and write
4F75000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
2827000
trusted library allocation
page execute and read and write
121EEF02000
heap
page read and write
4F91000
trusted library allocation
page read and write
B47000
heap
page read and write
1D30C700000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
F03C1FE000
stack
page read and write
1D310F4A000
trusted library allocation
page read and write
AC30000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
675D000
trusted library allocation
page read and write
2D1999E8000
trusted library allocation
page read and write
4FA3000
trusted library allocation
page read and write
161E8064000
heap
page read and write
AC00000
trusted library allocation
page read and write
4BB5000
trusted library allocation
page read and write
1D310F14000
trusted library allocation
page read and write
2D1944B0000
heap
page read and write
B39000
stack
page read and write
A400000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
A400000
trusted library allocation
page read and write
1D311190000
trusted library allocation
page read and write
91E000
heap
page read and write
4FB5000
trusted library allocation
page read and write
8DC000
heap
page read and write
4FAF000
trusted library allocation
page read and write
2D194BD3000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
23A7F450000
heap
page read and write
B28E000
stack
page read and write
1D311746000
heap
page read and write
B13000
trusted library allocation
page execute and read and write
4EA0000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
1D31165C000
heap
page read and write
B79E000
stack
page read and write
4F7B000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
1D310F0C000
trusted library allocation
page read and write
2990000
trusted library allocation
page execute and read and write
20916A3D000
heap
page read and write
165C1E90000
heap
page read and write
4FAF000
trusted library allocation
page read and write
1D31146A000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4FA4000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
B40E000
stack
page read and write
2DCE000
stack
page read and write
2AA8000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
1D311130000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
1D311100000
trusted library allocation
page read and write
1070000
heap
page read and write
4FB9000
trusted library allocation
page read and write
1D311591000
heap
page read and write
1D31142C000
heap
page read and write
4FAD000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
4F78000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
1D30B7EB000
heap
page read and write
2D194D02000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
4F75000
trusted library allocation
page read and write
1D311426000
heap
page read and write
50A5000
heap
page read and write
4BAF000
trusted library allocation
page read and write
2670000
trusted library allocation
page execute and read and write
1D3116CB000
heap
page read and write
4FB2000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
1D311774000
heap
page read and write
4F7E000
trusted library allocation
page read and write
2C687E3D000
heap
page read and write
4D70000
trusted library allocation
page read and write
1D311621000
heap
page read and write
26883EE0000
heap
page read and write
342000
unkown
page readonly
AD80000
trusted library allocation
page read and write
282B000
trusted library allocation
page execute and read and write
121EEF00000
heap
page read and write
6FFE000
stack
page read and write
4FB2000
trusted library allocation
page read and write
2D1943B0000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
1D311060000
trusted library allocation
page read and write
208FD802000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
4F98000
trusted library allocation
page read and write
107F000
stack
page read and write
4F9D000
trusted library allocation
page read and write
897000
heap
page read and write
4F84000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
2F68000
heap
page read and write
4FA4000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
4F84000
trusted library allocation
page read and write
9C7000
heap
page read and write
1D30C100000
heap
page read and write
1D310DD0000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
1D31145F000
heap
page read and write
92E000
heap
page read and write
5070000
trusted library allocation
page execute and read and write
4F89000
trusted library allocation
page read and write
1D3115DD000
heap
page read and write
1D30BF6D000
heap
page read and write
ADC0000
trusted library allocation
page read and write
1D30B667000
heap
page read and write
827000
heap
page read and write
1D31107C000
trusted library allocation
page read and write
161E89D9000
heap
page read and write
161E898C000
heap
page read and write
4F9F000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
501A000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F95000
trusted library allocation
page read and write
1D311632000
heap
page read and write
A400000
trusted library allocation
page read and write
F4D000
trusted library allocation
page execute and read and write
4FB5000
trusted library allocation
page read and write
2D1999EE000
trusted library allocation
page read and write
A56E000
trusted library allocation
page read and write
161E80C1000
heap
page read and write
4FB9000
trusted library allocation
page read and write
4F87000
trusted library allocation
page read and write
2D199CFB000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
2C687E62000
heap
page read and write
1D311426000
heap
page read and write
1D3115C1000
heap
page read and write
1D31142D000
heap
page read and write
4FB9000
trusted library allocation
page read and write
29EE000
stack
page read and write
920000
heap
page read and write
29A0000
heap
page execute and read and write
AC30000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
1D31145B000
heap
page read and write
A402000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
DD12FFF000
stack
page read and write
4FAD000
trusted library allocation
page read and write
4E5E000
stack
page read and write
4F9D000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
1D30C18E000
heap
page read and write
405F47F000
stack
page read and write
4F9D000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
161E898E000
heap
page read and write
1D311747000
heap
page read and write
4CB0000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
AB30000
trusted library allocation
page read and write
21EA2C61000
heap
page read and write
4E10000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
A3D000
stack
page read and write
2520000
heap
page read and write
1FE31DE000
stack
page read and write
4BC0000
trusted library allocation
page read and write
1D3115AA000
heap
page read and write
4F9D000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
8EE000
heap
page read and write
2B00000
unkown
page read and write
4F9D000
trusted library allocation
page read and write
165C1C50000
heap
page read and write
AC25000
trusted library allocation
page read and write
2696000
trusted library allocation
page read and write
7030000
trusted library allocation
page read and write
AC40000
trusted library allocation
page read and write
23A7F350000
heap
page read and write
2410000
trusted library allocation
page read and write
1D30C1B6000
heap
page read and write
2AF0000
unkown
page readonly
A5D0000
trusted library allocation
page execute and read and write
23A7F44F000
heap
page read and write
2BA0000
unkown
page readonly
2D199B40000
remote allocation
page read and write
A698000
trusted library allocation
page read and write
4F80000
heap
page execute and read and write
1D3116EC000
heap
page read and write
4FB8000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
1D311551000
heap
page read and write
2D199D00000
heap
page read and write
B2D000
trusted library allocation
page execute and read and write
4FAD000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
1D30CD00000
trusted library section
page readonly
4F9D000
trusted library allocation
page read and write
23A7F2E0000
heap
page read and write
6FD0000
trusted library allocation
page read and write
AD90000
trusted library allocation
page read and write
273E000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
2D1953E0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
2D194456000
heap
page read and write
A673000
trusted library allocation
page read and write
1D30C1AB000
heap
page read and write
2D194D18000
heap
page read and write
2BB0000
unkown
page readonly
23A7F48E000
heap
page read and write
4FA4000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
1D311070000
trusted library allocation
page read and write
A570000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
2C687E64000
heap
page read and write
DD12C7C000
stack
page read and write
4BB0000
trusted library allocation
page read and write
161E7EB0000
heap
page read and write
1D311693000
heap
page read and write
4F92000
trusted library allocation
page read and write
4FA7000
trusted library allocation
page read and write
1D311502000
heap
page read and write
4F93000
trusted library allocation
page read and write
121EEE52000
heap
page read and write
1D311060000
trusted library allocation
page read and write
1D311074000
trusted library allocation
page read and write
1D30B4D0000
heap
page read and write
4D80000
trusted library allocation
page read and write
4F9A000
trusted library allocation
page read and write
B3A000
trusted library allocation
page execute and read and write
5070000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
208FCE80000
heap
page read and write
4F9D000
trusted library allocation
page read and write
1D31172F000
heap
page read and write
4F78000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
2EB0000
heap
page read and write
4FAD000
trusted library allocation
page read and write
2E55000
heap
page read and write
4FAF000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
AC82000
trusted library allocation
page read and write
2C687E7A000
heap
page read and write
861F0FE000
stack
page read and write
2D199D04000
heap
page read and write
4F8D000
trusted library allocation
page read and write
92C000
heap
page read and write
2C687E13000
heap
page read and write
4E10000
trusted library allocation
page read and write
4FB1000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
26884044000
heap
page read and write
A400000
trusted library allocation
page read and write
26884900000
heap
page read and write
4FAB000
trusted library allocation
page read and write
AC60000
trusted library allocation
page read and write
2C687E39000
heap
page read and write
468B97E000
stack
page read and write
4F9D000
trusted library allocation
page read and write
1D311050000
trusted library allocation
page read and write
4B1D000
trusted library allocation
page read and write
26884029000
heap
page read and write
161E8E44000
heap
page read and write
4FB0000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
D72000
heap
page read and write
5070000
trusted library allocation
page read and write
4F72000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
583E000
stack
page read and write
161E7EA0000
heap
page read and write
4ED0000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
161E8980000
heap
page read and write
165C1DB8000
heap
page read and write
4F8B000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
23A7F44A000
heap
page read and write
1D31159B000
heap
page read and write
23A7F500000
heap
page read and write
51D1000
heap
page read and write
4FB2000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
1D311030000
trusted library allocation
page read and write
23A7FC02000
trusted library allocation
page read and write
1D30C1DC000
heap
page read and write
1FE315A000
stack
page read and write
4F8B000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
2D19443D000
heap
page read and write
5D7D000
stack
page read and write
1D31169B000
heap
page read and write
1D30C170000
heap
page read and write
4F8E000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
21ED2FB000
stack
page read and write
6E50000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4F72000
trusted library allocation
page read and write
289A000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
2165B2E0000
heap
page read and write
4FB9000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
263E000
stack
page read and write
1D30BF18000
heap
page read and write
4F9D000
trusted library allocation
page read and write
A3E0000
trusted library allocation
page read and write
2AA6000
trusted library allocation
page read and write
47BC000
stack
page read and write
4F7A000
trusted library allocation
page read and write
6EEA000
trusted library allocation
page read and write
4BB1000
trusted library allocation
page read and write
4C50000
trusted library allocation
page execute and read and write
92C000
heap
page read and write
21ED7FC000
stack
page read and write
4F80000
trusted library allocation
page read and write
2D1954F0000
trusted library section
page readonly
2C687E29000
heap
page read and write
8D9000
heap
page read and write
1D311502000
heap
page read and write
2520000
trusted library allocation
page read and write
405F1FF000
stack
page read and write
4FB8000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
AD50000
trusted library allocation
page read and write
1D31172C000
heap
page read and write
960000
heap
page read and write
2690000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
2C687E3A000
heap
page read and write
1D30BF90000
heap
page read and write
1D30C023000
heap
page read and write
AC5B000
trusted library allocation
page read and write
2C687E42000
heap
page read and write
1D3110C0000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
1D311738000
heap
page read and write
1D311648000
heap
page read and write
4F8B000
trusted library allocation
page read and write
245E000
stack
page read and write
1D3116EF000
heap
page read and write
AC20000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
1D3116C7000
heap
page read and write
2B9A000
stack
page read and write
4F74000
trusted library allocation
page read and write
23A7F43C000
heap
page read and write
165C1DB2000
heap
page read and write
1D310F20000
trusted library allocation
page read and write
AC60000
trusted library allocation
page read and write
405F17A000
stack
page read and write
7080000
trusted library allocation
page read and write
1D311070000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
8E3000
heap
page read and write
4F9D000
trusted library allocation
page read and write
917000
heap
page read and write
4FAF000
trusted library allocation
page read and write
208FCFF0000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
4F7C000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
7010000
trusted library section
page read and write
6FB0000
trusted library allocation
page execute and read and write
4FB0000
trusted library allocation
page read and write
1D3117DC000
heap
page read and write
4F90000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
1D3112B0000
trusted library allocation
page read and write
4FA2000
trusted library allocation
page read and write
1D3117AA000
heap
page read and write
4FB0000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
951000
heap
page read and write
4FAF000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
1D311502000
heap
page read and write
4FB2000
trusted library allocation
page read and write
1D3116F0000
heap
page read and write
4F9B000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
1D30C05A000
heap
page read and write
8F0000
heap
page read and write
3028000
heap
page read and write
AC10000
trusted library allocation
page read and write
2C687E69000
heap
page read and write
4FB4000
trusted library allocation
page read and write
4F9D000
trusted library allocation
page read and write
4BA4000
trusted library allocation
page read and write
1D30B686000
heap
page read and write
4F76000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
5630000
heap
page read and write
A590000
trusted library allocation
page read and write
1D3116AB000
heap
page read and write
AE9E000
stack
page read and write
4F9D000
trusted library allocation
page read and write
4F83000
trusted library allocation
page read and write
EFD1C7F000
stack
page read and write
21EA2C54000
heap
page read and write
4FB2000
trusted library allocation
page read and write
1D311700000
heap
page read and write
4FB9000
trusted library allocation
page read and write
2D199C85000
heap
page read and write
4EB0000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
1D30BF54000
heap
page read and write
405F3FE000
stack
page read and write
4FB3000
trusted library allocation
page read and write
4F8B000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
939000
heap
page read and write
4C20000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
AE50000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
AC10000
trusted library allocation
page read and write
E22000
trusted library allocation
page read and write
A471000
trusted library allocation
page read and write
There are 3099 hidden memdumps, click here to show them.