IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\7zS2607.tmp\Install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7zS2D0C.tmp\Install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\VXAfcxyYiTQKMOERw\efplSHrLkKviaSK\pdyDoIJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System32\GroupPolicy\gpt.ini
ASCII text
dropped
malicious
C:\Windows\Temp\aoRCsjFoxFbwPJxK\MeXzroudxpEgwUW\RFYnzaH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7zS332F.tmp\Install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7zS3C09.tmp\Install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\VXAfcxyYiTQKMOERw\efplSHrLkKviaSK\pJKKXsE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\aoRCsjFoxFbwPJxK\MeXzroudxpEgwUW\GaSURYx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\7zS2607.tmp\__data__\config.txt
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ambua3bc.cdi.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ctvry2t3.t3r.psm1
very short file (no magic)
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\System32\GroupPolicy\Machine\Registry.pol
RAGE Package Format (RPF),
dropped
C:\Windows\Tasks\bbsSMGQQDZvgelOgpL.job
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_22rgx3dy.2p3.psm1
very short file (no magic)
dropped
C:\Windows\Temp\__PSScriptPolicyTest_umumzqbx.1yl.ps1
very short file (no magic)
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
C:\Users\user\AppData\Local\Temp\7zS332F.tmp\__data__\config.txt
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qj1olx5r.ljl.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wuyq3oxm.drj.psm1
very short file (no magic)
dropped
C:\Windows\Temp\__PSScriptPolicyTest_axhrt4ac.t0b.psm1
very short file (no magic)
dropped
C:\Windows\Temp\__PSScriptPolicyTest_nwf0dec5.oqg.ps1
very short file (no magic)
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Users\user\AppData\Local\Temp\7zS2607.tmp\Install.exe
.\Install.exe
malicious
C:\Users\user\AppData\Local\Temp\7zS2D0C.tmp\Install.exe
.\Install.exe /S /site_id "525403"
malicious
C:\Windows\SysWOW64\cmd.exe
/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
malicious
C:\Windows\SysWOW64\cmd.exe
/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "gbyyEslRl" /SC once /ST 15:13:59 /F /RU "user" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /run /I /tn "gbyyEslRl"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "gbyyEslRl"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "bbsSMGQQDZvgelOgpL" /SC once /ST 19:16:00 /RU "SYSTEM" /TR "\"C:\Users\user\AppData\Local\Temp\VXAfcxyYiTQKMOERw\efplSHrLkKviaSK\pdyDoIJ.exe\" DC /site_id 525403 /S" /V1 /F
malicious
C:\Users\user\AppData\Local\Temp\VXAfcxyYiTQKMOERw\efplSHrLkKviaSK\pdyDoIJ.exe
C:\Users\user\AppData\Local\Temp\VXAfcxyYiTQKMOERw\efplSHrLkKviaSK\pdyDoIJ.exe DC /site_id 525403 /S
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
malicious
C:\Users\user\AppData\Local\Temp\7zS332F.tmp\Install.exe
.\Install.exe
malicious
C:\Users\user\AppData\Local\Temp\7zS3C09.tmp\Install.exe
.\Install.exe /S /site_id "525403"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "gAhELFxgt" /SC once /ST 12:43:49 /F /RU "user" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /run /I /tn "gAhELFxgt"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "gAhELFxgt"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "bbsSMGQQDZvgelOgpL" /SC once /ST 19:05:00 /RU "SYSTEM" /TR "\"C:\Users\user\AppData\Local\Temp\VXAfcxyYiTQKMOERw\efplSHrLkKviaSK\pJKKXsE.exe\" DC /site_id 525403 /S" /V1 /F
malicious
C:\Users\user\AppData\Local\Temp\VXAfcxyYiTQKMOERw\efplSHrLkKviaSK\pJKKXsE.exe
C:\Users\user\AppData\Local\Temp\VXAfcxyYiTQKMOERw\efplSHrLkKviaSK\pJKKXsE.exe DC /site_id 525403 /S
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\forfiles.exe
C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\forfiles.exe
C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\gpupdate.exe
"C:\Windows\system32\gpupdate.exe" /force
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\gpscript.exe
gpscript.exe /RefreshSystemParam
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 42 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://go.microsoft.co
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://oneget.orgformat.ps1xmlagement.dll2040.missionsand
unknown
http://crl.micr
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
service-domain.xyz
3.80.150.121
malicious
clients.l.google.com
142.250.203.110
clients2.google.com
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions
exe
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet
SpyNetReporting
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
225451
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
256596
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
242872
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147749373
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147807942
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147735735
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147737010
There are 1 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1950000
heap
page read and write
61F0000
trusted library allocation
page read and write
5FA000
heap
page read and write
68D0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
264D9C98000
heap
page read and write
541E000
stack
page read and write
68D0000
trusted library allocation
page read and write
24D0E25B000
heap
page read and write
58A7000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
613B000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
21341DD0000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
2726000
trusted library allocation
page read and write
6C2E000
stack
page read and write
2F50000
heap
page read and write
5570000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
2F1F000
stack
page read and write
34C27E000
stack
page read and write
6255000
trusted library allocation
page read and write
60FE000
trusted library allocation
page read and write
2229408A000
heap
page read and write
2A9BF054000
heap
page read and write
5520000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
273993F0000
heap
page read and write
C440E7A000
stack
page read and write
27399430000
heap
page read and write
2FF0000
heap
page read and write
84C93FE000
stack
page read and write
6933000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
6141000
trusted library allocation
page read and write
264D9CA0000
heap
page read and write
3CA277C000
stack
page read and write
302F000
stack
page read and write
AAD000
unkown
page read and write
2E40000
unkown
page read and write
69E0000
trusted library allocation
page read and write
616B000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
CB0000
unkown
page readonly
5A03000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
31C3000
trusted library allocation
page read and write
6A378FE000
stack
page read and write
68D0000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
2890000
heap
page read and write
6AC0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
2E3E000
stack
page read and write
59D0000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
3144000
trusted library allocation
page read and write
24D0E247000
heap
page read and write
59F0000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
2739943F000
heap
page read and write
6940000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
22294113000
heap
page read and write
1A8803FC000
trusted library allocation
page read and write
2D4CFD60000
heap
page read and write
264D9D6A000
heap
page read and write
67B0000
trusted library allocation
page read and write
2F29000
heap
page read and write
84C8D9B000
stack
page read and write
59F0000
trusted library allocation
page read and write
61E0000
unkown
page read and write
5A50000
trusted library allocation
page read and write
699B000
trusted library allocation
page read and write
1F49AEBB000
heap
page read and write
2ABC000
stack
page read and write
2E20000
unkown
page readonly
7364579000
stack
page read and write
67B0000
trusted library allocation
page read and write
3200000
heap
page read and write
540000
heap
page read and write
24D0E273000
heap
page read and write
264D9C8E000
heap
page read and write
29B0000
heap
page read and write
2A9BF113000
heap
page read and write
264DA502000
heap
page read and write
5580000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
1BC60A10000
heap
page read and write
22294055000
heap
page read and write
5A56000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
6D74000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
1F49AE43000
heap
page read and write
6220000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
264D9C9E000
heap
page read and write
24443A02000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
24D0E010000
heap
page read and write
1A8F993B000
heap
page read and write
6AB0000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
2DFF000
stack
page read and write
222949D2000
heap
page read and write
68D0000
trusted library allocation
page read and write
2D6E000
stack
page read and write
67F0000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
1A880001000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
34AF1FD000
stack
page read and write
61D0000
trusted library allocation
page read and write
264D9CC1000
heap
page read and write
58E0000
trusted library allocation
page read and write
293C000
stack
page read and write
26011002000
trusted library allocation
page read and write
2A7D000
stack
page read and write
CA0000
unkown
page readonly
F32E67E000
stack
page read and write
24D0E26D000
heap
page read and write
68D0000
trusted library allocation
page read and write
2E40000
unkown
page read and write
624E000
stack
page read and write
60F4000
trusted library allocation
page read and write
68F0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
1A882755000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
2FFF000
unkown
page read and write
264D9CF2000
heap
page read and write
264D9D79000
heap
page read and write
1A8826F0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
264D9D3C000
heap
page read and write
58C0000
trusted library allocation
page read and write
264DA545000
heap
page read and write
1A8F9890000
trusted library allocation
page read and write
26010802000
heap
page read and write
1A8F98C0000
heap
page execute and read and write
19F9000
heap
page read and write
CC0000
unkown
page read and write
6770000
trusted library allocation
page read and write
1A882730000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
1A8F9BB0000
heap
page read and write
68D0000
trusted library allocation
page read and write
34AEFFB000
stack
page read and write
2EBE000
stack
page read and write
7FFBAD4F0000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
3336000
heap
page read and write
3332000
heap
page read and write
1D20000
heap
page read and write
5558000
trusted library allocation
page read and write
2AE0000
remote allocation
page read and write
5580000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
232E000
stack
page read and write
264DA513000
heap
page read and write
264D9D38000
heap
page read and write
24D0E239000
heap
page read and write
24443200000
heap
page read and write
264D9CEE000
heap
page read and write
6AC0000
trusted library allocation
page read and write
1DEB0D60000
trusted library allocation
page read and write
314D000
trusted library allocation
page read and write
6127000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
22294954000
heap
page read and write
B157F7F000
stack
page read and write
264D9D4E000
heap
page read and write
58E0000
trusted library allocation
page read and write
2000000
trusted library allocation
page read and write
5A50000
unkown
page read and write
69E0000
trusted library allocation
page read and write
41B000
unkown
page readonly
22294900000
heap
page read and write
1F49AE65000
heap
page read and write
5555000
trusted library allocation
page read and write
264D9CBB000
heap
page read and write
1DEB0C10000
heap
page read and write
5920000
trusted library allocation
page read and write
264D9DD0000
heap
page read and write
2729000
trusted library allocation
page read and write
67CA000
trusted library allocation
page read and write
1F49B602000
heap
page read and write
6179000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
1A8F9926000
heap
page read and write
61E8000
trusted library allocation
page read and write
264D9C88000
heap
page read and write
264DA55E000
heap
page read and write
1BC60C3D000
heap
page read and write
1DEB2802000
trusted library allocation
page read and write
2D4CF900000
remote allocation
page read and write
27399B50000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
1A8F9759000
heap
page read and write
61E0000
trusted library allocation
page read and write
264D9CD8000
heap
page read and write
A91000
unkown
page read and write
30F0000
heap
page read and write
3260000
heap
page read and write
264D9D4B000
heap
page read and write
6770000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
2739943C000
heap
page read and write
61E0000
trusted library allocation
page read and write
568C000
stack
page read and write
6A00000
trusted library allocation
page read and write
22294076000
heap
page read and write
3140000
heap
page read and write
61D7000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
FCE000
stack
page read and write
3138000
trusted library allocation
page read and write
1BC60B80000
trusted library allocation
page read and write
1A8813F4000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
264D9CD5000
heap
page read and write
6A50000
trusted library allocation
page read and write
2001000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
3020000
heap
page read and write
34AF2FE000
stack
page read and write
58C5000
trusted library allocation
page read and write
C5E000
unkown
page read and write
264D9D68000
heap
page read and write
6930000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page read and write
2A3C000
heap
page read and write
6A40000
trusted library allocation
page read and write
6149000
trusted library allocation
page read and write
6960000
trusted library allocation
page read and write
67A5000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page execute and read and write
6250000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
264D9CD3000
heap
page read and write
264D9CA8000
heap
page read and write
EA0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
2E40000
trusted library allocation
page execute and read and write
67B0000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
24443150000
heap
page read and write
C441079000
stack
page read and write
5A50000
trusted library allocation
page read and write
44CF000
trusted library allocation
page read and write
2A3C000
heap
page read and write
6250000
trusted library allocation
page read and write
264D9CDE000
heap
page read and write
C440F7F000
stack
page read and write
264D9C83000
heap
page read and write
5530000
trusted library allocation
page read and write
26010800000
heap
page read and write
61E0000
trusted library allocation
page read and write
264D9C79000
heap
page read and write
1A8F7998000
heap
page read and write
5A60000
trusted library allocation
page read and write
34BDEE000
stack
page read and write
5A50000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
1A881399000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
6A3730B000
stack
page read and write
58C0000
trusted library allocation
page read and write
69C0000
trusted library allocation
page read and write
1A8F93A0000
heap
page read and write
27399446000
heap
page read and write
264D9C84000
heap
page read and write
6780000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
61D0000
unkown
page read and write
68D0000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
34C07F000
stack
page read and write
61E0000
trusted library allocation
page read and write
34C2F9000
stack
page read and write
58C0000
trusted library allocation
page read and write
1A8F9880000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
3317000
trusted library allocation
page read and write
287E000
heap
page read and write
61E5000
trusted library allocation
page read and write
264D9D48000
heap
page read and write
4F1000
unkown
page write copy
69D0000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
58E5000
trusted library allocation
page read and write
284C000
heap
page read and write
6142000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
58C9000
trusted library allocation
page read and write
394D000
stack
page read and write
6A40000
trusted library allocation
page read and write
264DA554000
heap
page read and write
5550000
trusted library allocation
page read and write
24D0E230000
heap
page read and write
68E0000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
264D9CE7000
heap
page read and write
264DA608000
heap
page read and write
2B20000
heap
page read and write
6A70000
trusted library allocation
page read and write
422000
unkown
page write copy
61E6000
trusted library allocation
page read and write
22294A23000
heap
page read and write
617D000
trusted library allocation
page read and write
2AE0000
remote allocation
page read and write
61E0000
trusted library allocation
page read and write
3500000
heap
page read and write
61E7000
trusted library allocation
page read and write
69A0000
trusted library allocation
page read and write
264D9D1B000
heap
page read and write
32CD000
trusted library allocation
page read and write
1A8F9BD2000
heap
page read and write
264D9DEF000
heap
page read and write
2713000
trusted library allocation
page execute and read and write
6A30000
trusted library allocation
page read and write
9F0000
heap
page read and write
5550000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
32B7000
heap
page read and write
67B0000
trusted library allocation
page read and write
2F18000
heap
page read and write
61E6000
trusted library allocation
page read and write
6790000
trusted library allocation
page execute and read and write
68E0000
trusted library allocation
page read and write
2E3C000
stack
page read and write
61E0000
unkown
page read and write
5A56000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
33D5000
trusted library allocation
page read and write
24D0E225000
heap
page read and write
6A40000
trusted library allocation
page read and write
264DA605000
heap
page read and write
4EF000
unkown
page write copy
B157FFC000
stack
page read and write
3197000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
264D9D8E000
heap
page read and write
264D9CDA000
heap
page read and write
6930000
trusted library allocation
page read and write
3CA1FFD000
stack
page read and write
2F10000
heap
page read and write
67B0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
1A8F7940000
trusted library allocation
page read and write
1A8F9923000
heap
page read and write
1A8813D5000
trusted library allocation
page read and write
22294A27000
heap
page read and write
5920000
trusted library allocation
page read and write
5555000
trusted library allocation
page read and write
3270000
heap
page read and write
2D20000
heap
page read and write
4F272FF000
stack
page read and write
6770000
trusted library allocation
page read and write
264D9D87000
heap
page read and write
3164000
trusted library allocation
page read and write
32A5000
trusted library allocation
page read and write
30000
heap
page read and write
1A8F9870000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
1A0000
remote allocation
page read and write
69F0000
trusted library allocation
page read and write
6257000
trusted library allocation
page read and write
401000
unkown
page execute read
2D90000
remote allocation
page read and write
1DEB0F02000
heap
page read and write
195A000
heap
page read and write
6790000
trusted library allocation
page read and write
2D40000
heap
page read and write
6B50000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
6136000
trusted library allocation
page read and write
264D9D43000
heap
page read and write
24D0E27E000
heap
page read and write
34C1FE000
stack
page read and write
6940000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
1DEB0E4C000
heap
page read and write
5A50000
trusted library allocation
page read and write
36CF000
stack
page read and write
CA0000
unkown
page readonly
6770000
trusted library allocation
page read and write
3570000
heap
page read and write
7FFBAD580000
trusted library allocation
page read and write
2DFD000
stack
page read and write
11D0000
heap
page read and write
6910000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
264D9DFF000
heap
page read and write
6A10000
trusted library allocation
page read and write
61D5000
unkown
page read and write
6930000
trusted library allocation
page read and write
351E000
stack
page read and write
11191000
direct allocation
page readonly
1BC60C39000
heap
page read and write
67C0000
trusted library allocation
page read and write
267D000
stack
page read and write
1A8F7A18000
heap
page read and write
19E5000
heap
page read and write
15E0000
trusted library allocation
page read and write
1A8817B9000
trusted library allocation
page read and write
2220000
remote allocation
page read and write
5550000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
1A0C000
heap
page read and write
69F0000
trusted library allocation
page read and write
616A000
trusted library allocation
page read and write
264D9DAC000
heap
page read and write
264D9DA0000
heap
page read and write
1C4B5670000
heap
page read and write
67F0000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
50000
heap
page read and write
61EA000
trusted library allocation
page read and write
5A58000
trusted library allocation
page read and write
24443240000
heap
page read and write
32E4000
trusted library allocation
page read and write
34AF6FF000
stack
page read and write
59F0000
trusted library allocation
page read and write
24D0E258000
heap
page read and write
30D9000
trusted library allocation
page read and write
BFC000
stack
page read and write
1650000
heap
page read and write
3140000
heap
page read and write
3F1000
unkown
page execute read
264D9D3A000
heap
page read and write
6A30000
trusted library allocation
page read and write
2FDA000
stack
page read and write
1A88156F000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
264DA620000
heap
page read and write
69F0000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
FC000
stack
page read and write
61E0000
trusted library allocation
page read and write
34AF3FE000
stack
page read and write
6144000
trusted library allocation
page read and write
264D9C93000
heap
page read and write
61E0000
unkown
page read and write
68D0000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
67C9000
trusted library allocation
page read and write
1A882A3A000
trusted library allocation
page read and write
1A8F9994000
heap
page read and write
3221000
trusted library allocation
page read and write
24D0E245000
heap
page read and write
405F000
stack
page read and write
1DEB0E75000
heap
page read and write
69F0000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
264D9CA9000
heap
page read and write
6910000
trusted library allocation
page read and write
264D9B90000
heap
page read and write
22294A13000
heap
page read and write
7FFBAD5C0000
trusted library allocation
page read and write
264D9CB0000
heap
page read and write
180A000
heap
page read and write
6164000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
264D9CA2000
heap
page read and write
1A8F93C1000
trusted library allocation
page read and write
2890000
heap
page read and write
264D9CFE000
heap
page read and write
61D8000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
11192000
direct allocation
page read and write
6250000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
6260000
trusted library allocation
page execute and read and write
59D0000
trusted library allocation
page read and write
3350000
heap
page read and write
B1580FD000
stack
page read and write
6770000
trusted library allocation
page read and write
2BA0000
unkown
page readonly
6AF0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
61D5000
trusted library allocation
page read and write
22294922000
heap
page read and write
2BB0000
unkown
page readonly
2A30000
heap
page read and write
6960000
trusted library allocation
page read and write
30E7000
heap
page read and write
2FF0000
unkown
page readonly
58E0000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
1A8813C7000
trusted library allocation
page read and write
222949D4000
heap
page read and write
6A10000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
2D7D000
stack
page read and write
CC0000
unkown
page read and write
2E90000
trusted library allocation
page read and write
264D9CE4000
heap
page read and write
6930000
trusted library allocation
page read and write
1DEB0E41000
heap
page read and write
324B000
heap
page read and write
6BB0000
trusted library allocation
page read and write
264D9DFA000
heap
page read and write
24D0E261000
heap
page read and write
27F0000
heap
page read and write
3298000
trusted library allocation
page read and write
67B5000
trusted library allocation
page read and write
BC0000
unkown
page readonly
7FFBAD560000
trusted library allocation
page read and write
2DBF000
stack
page read and write
222949C8000
heap
page read and write
61E0000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
1A8F92D7000
heap
page execute and read and write
5A50000
trusted library allocation
page read and write
264DA562000
heap
page read and write
2F29000
heap
page read and write
6940000
trusted library allocation
page execute and read and write
2220000
remote allocation
page read and write
1A90000
heap
page read and write
61E0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
306E000
stack
page read and write
10001000
direct allocation
page execute read
264D9D52000
heap
page read and write
1DEB0E4B000
heap
page read and write
120000
remote allocation
page read and write
6A50000
trusted library allocation
page read and write
3310000
heap
page read and write
69E0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
264D9D70000
heap
page read and write
264D9C77000
heap
page read and write
61E7000
trusted library allocation
page read and write
107C000
stack
page read and write
264D9CA3000
heap
page read and write
2F70000
heap
page read and write
58E0000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
2A9BF602000
trusted library allocation
page read and write
2F4F000
stack
page read and write
58E0000
trusted library allocation
page read and write
18F9000
stack
page read and write
264D9C9D000
heap
page read and write
27399400000
heap
page read and write
59D6000
trusted library allocation
page read and write
26010790000
heap
page read and write
C440C7C000
stack
page read and write
2C7F000
stack
page read and write
67B0000
trusted library allocation
page read and write
C44147F000
stack
page read and write
B7C000
stack
page read and write
61E0000
trusted library allocation
page read and write
1BC60D02000
heap
page read and write
1A881416000
trusted library allocation
page read and write
7FFBAD492000
trusted library allocation
page read and write
264DA549000
heap
page read and write
67B0000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
69E4000
trusted library allocation
page read and write
61E0000
unkown
page read and write
531E000
stack
page read and write
75D000
unkown
page read and write
29DE000
stack
page read and write
68D0000
trusted library allocation
page read and write
7FFBAD4D0000
trusted library allocation
page read and write
55CE000
stack
page read and write
6250000
unkown
page read and write
68D0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
22294943000
heap
page read and write
30AE000
stack
page read and write
6255000
trusted library allocation
page read and write
B10000
heap
page read and write
3376000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
22293E70000
heap
page read and write
1A11000
heap
page read and write
6930000
trusted library allocation
page read and write
68F4000
trusted library allocation
page read and write
1DEB0E00000
heap
page read and write
69F0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
1A8F98D0000
heap
page read and write
6176000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
1DEB0E67000
heap
page read and write
6250000
trusted library allocation
page read and write
1A882A4C000
trusted library allocation
page read and write
6220000
trusted library allocation
page read and write
2C20000
remote allocation
page read and write
22294092000
heap
page read and write
2444325C000
heap
page read and write
59BE000
stack
page read and write
6980000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
6168000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
6103000
trusted library allocation
page read and write
1A8F79D5000
heap
page read and write
6770000
trusted library allocation
page read and write
264D9D28000
heap
page read and write
539E000
stack
page read and write
69E0000
trusted library allocation
page read and write
5A50000
unkown
page read and write
5900000
trusted library allocation
page read and write
6A20000
trusted library allocation
page execute and read and write
264D9D85000
heap
page read and write
1BC60C42000
heap
page read and write
2EE0000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
264D9DB4000
heap
page read and write
2FB0000
trusted library allocation
page read and write
264D9C8B000
heap
page read and write
6850000
trusted library allocation
page read and write
2F49000
trusted library allocation
page read and write
2297000
stack
page read and write
2BC0000
unkown
page read and write
32B8000
trusted library allocation
page read and write
28D0000
heap
page read and write
7FFBAD370000
trusted library allocation
page execute and read and write
67B0000
trusted library allocation
page read and write
26E7000
heap
page read and write
58E0000
trusted library allocation
page read and write
5A55000
trusted library allocation
page read and write
2710000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
54CD000
stack
page read and write
5A60000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
2747000
heap
page read and write
6940000
trusted library allocation
page read and write
6941000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
6837D7F000
stack
page read and write
5910000
trusted library allocation
page read and write
198A000
heap
page read and write
6990000
trusted library allocation
page read and write
34D10B000
stack
page read and write
5510000
trusted library allocation
page read and write
337F000
stack
page read and write
68E0000
trusted library allocation
page read and write
1A1000
unkown
page write copy
6770000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
427000
unkown
page readonly
68E0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
1F49AE29000
heap
page read and write
120000
remote allocation
page read and write
229C000
stack
page read and write
5510000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
3F0000
unkown
page readonly
61D0000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
309A000
trusted library allocation
page read and write
1A8F9881000
trusted library allocation
page read and write
32DF000
unkown
page read and write
69E0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
152D000
stack
page read and write
2A9BF079000
heap
page read and write
5420000
trusted library allocation
page read and write
264D9D41000
heap
page read and write
59F0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
1DEB0BA0000
heap
page read and write
2BA0000
remote allocation
page read and write
24D0E24F000
heap
page read and write
264D9B80000
heap
page read and write
6A37AFE000
stack
page read and write
6176000
trusted library allocation
page read and write
2180000
heap
page read and write
6153000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
32AD000
trusted library allocation
page read and write
1F49AE6E000
heap
page read and write
22294029000
heap
page read and write
1857000
heap
page read and write
1739000
trusted library allocation
page read and write
1A1A000
heap
page read and write
7FFBAD5E0000
trusted library allocation
page read and write
222949D8000
heap
page read and write
B15837E000
stack
page read and write
32CB000
heap
page read and write
6166000
trusted library allocation
page read and write
2F67000
heap
page read and write
61E0000
trusted library allocation
page read and write
264D9C3E000
heap
page read and write
1986000
heap
page read and write
59F0000
trusted library allocation
page read and write
264D9CB4000
heap
page read and write
1196000
unkown
page readonly
24D0E260000
heap
page read and write
5A30000
trusted library allocation
page execute and read and write
6770000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
273993A0000
heap
page read and write
225C000
stack
page read and write
2E3E000
unkown
page read and write
264D9DAB000
heap
page read and write
2C3E000
stack
page read and write
58D0000
trusted library allocation
page read and write
1807000
heap
page read and write
5910000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
264D9D17000
heap
page read and write
59D0000
trusted library allocation
page read and write
44C1000
trusted library allocation
page read and write
5A55000
trusted library allocation
page read and write
616A000
trusted library allocation
page read and write
1A8F9C43000
heap
page read and write
59F0000
trusted library allocation
page execute and read and write
264D9D61000
heap
page read and write
5A60000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
2B9E000
stack
page read and write
2B3D000
stack
page read and write
1A8F79EC000
heap
page read and write
5A55000
trusted library allocation
page read and write
185D000
heap
page read and write
1A882A27000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
1A8F9BC0000
heap
page read and write
264D9D5F000
heap
page read and write
73643FE000
stack
page read and write
67E0000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
1A881529000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
CCA000
heap
page read and write
5A58000
unkown
page read and write
6A17000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
45FC000
stack
page read and write
6930000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
680F000
trusted library allocation
page read and write
29FE000
stack
page read and write
22294086000
heap
page read and write
5A00000
trusted library allocation
page read and write
264DA572000
heap
page read and write
68E0000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
11191000
direct allocation
page readonly
61E5000
trusted library allocation
page read and write
31A3000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
7FFBAD366000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
27A0000
heap
page read and write
5900000
trusted library allocation
page read and write
5A56000
trusted library allocation
page read and write
564E000
stack
page read and write
24D0E266000
heap
page read and write
32D8000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
244431B0000
remote allocation
page read and write
2F30000
heap
page read and write
2740000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
264D9CE9000
heap
page read and write
6A10000
trusted library allocation
page read and write
264D9C96000
heap
page read and write
84C92FD000
stack
page read and write
6250000
trusted library allocation
page read and write
57D1000
heap
page read and write
59D2000
trusted library allocation
page read and write
30DE000
stack
page read and write
2C20000
remote allocation
page read and write
D9D000
stack
page read and write
158C000
stack
page read and write
420000
unkown
page write copy
67B0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
264D9CA6000
heap
page read and write
6770000
trusted library allocation
page read and write
1A8827DB000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
264DA556000
heap
page read and write
68D0000
trusted library allocation
page read and write
264D9DB0000
heap
page read and write
67B0000
trusted library allocation
page read and write
1A8821BD000
trusted library allocation
page read and write
69E5000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
1981000
heap
page read and write
264DA522000
heap
page read and write
264D9C5D000
heap
page read and write
6250000
trusted library allocation
page read and write
7FFBAD2B0000
trusted library allocation
page read and write
24D0E248000
heap
page read and write
1A880270000
trusted library allocation
page read and write
C5D000
stack
page read and write
68D0000
trusted library allocation
page read and write
2C30000
heap
page read and write
15D000
stack
page read and write
69F0000
trusted library allocation
page read and write
19FC000
heap
page read and write
1A95000
heap
page read and write
7FFBAD2C0000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
264D9C13000
heap
page read and write
264DA524000
heap
page read and write
6110000
trusted library allocation
page read and write
264D9C67000
heap
page read and write
59D0000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
264D9D42000
heap
page read and write
6770000
trusted library allocation
page read and write
3125000
trusted library allocation
page read and write
9D000
stack
page read and write
69E0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
400000
unkown
page readonly
264D9C6B000
heap
page read and write
2EF7000
heap
page read and write
2CD0000
heap
page read and write
5A50000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
1BC60C13000
heap
page read and write
264DA614000
heap
page read and write
59F0000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
2A9BF100000
heap
page read and write
34C43B000
stack
page read and write
30EE000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
19C000
stack
page read and write
1FE6000
trusted library allocation
page read and write
1A8F9880000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
264DA55A000
heap
page read and write
58C0000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
1BC60A80000
heap
page read and write
185C000
heap
page read and write
264D9CC2000
heap
page read and write
68D0000
trusted library allocation
page read and write
400000
unkown
page readonly
1A1000
unkown
page write copy
5A60000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
2CC7000
heap
page read and write
423000
unkown
page read and write
58A0000
trusted library allocation
page read and write
2E9E000
stack
page read and write
67B0000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
22294013000
heap
page read and write
A1000
unkown
page execute read
264D9DF7000
heap
page read and write
68E0000
trusted library allocation
page read and write
26010902000
heap
page read and write
5530000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
31A0000
heap
page read and write
1F49AEC2000
heap
page read and write
59D0000
trusted library allocation
page read and write
18FC000
stack
page read and write
1A8F7925000
heap
page read and write
61E0000
trusted library allocation
page read and write
2E3F000
stack
page read and write
22294040000
heap
page read and write
7FFBAD500000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
2A3A000
heap
page read and write
19FC000
heap
page read and write
6152000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
2D4E000
stack
page read and write
1A8F9880000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
6A00000
trusted library allocation
page execute and read and write
6770000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
1A882A5D000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
329E000
unkown
page read and write
5560000
trusted library allocation
page read and write
264D9C90000
heap
page read and write
2E40000
remote allocation
page read and write
69E0000
trusted library allocation
page read and write
2BA0000
unkown
page readonly
250D000
stack
page read and write
6ABD000
trusted library allocation
page read and write
B15817B000
stack
page read and write
1A8901A2000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
34BCE7000
stack
page read and write
24D0E278000
heap
page read and write
6A40000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
6250000
unkown
page read and write
2F50000
heap
page read and write
6BC0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
7FFBAD4C0000
trusted library allocation
page read and write
CA0000
unkown
page readonly
5560000
trusted library allocation
page read and write
2E3B000
stack
page read and write
7FFBAD46C000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
1A8F7A45000
heap
page read and write
5A50000
trusted library allocation
page read and write
1DEB0DE0000
remote allocation
page read and write
68F0000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
5516000
trusted library allocation
page read and write
2EDE000
stack
page read and write
61E0000
trusted library allocation
page read and write
31D6000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
17DA000
heap
page read and write
2FE0000
unkown
page readonly
1DEB0E13000
heap
page read and write
6AD0000
trusted library allocation
page read and write
61E0000
unkown
page read and write
58A0000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
3158000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
1A882A0D000
trusted library allocation
page read and write
10000000
direct allocation
page read and write
A0000
unkown
page readonly
5530000
trusted library allocation
page read and write
7FFBAD4B0000
trusted library allocation
page read and write
3184000
trusted library allocation
page read and write
84C907E000
stack
page read and write
2E40000
unkown
page read and write
24D0E265000
heap
page read and write
59F0000
trusted library allocation
page read and write
1A8F9870000
trusted library allocation
page read and write
264DA603000
heap
page read and write
19C000
stack
page read and write
61D0000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
264D9D99000
heap
page read and write
6770000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
1A1A000
heap
page read and write
264D9CA7000
heap
page read and write
6255000
trusted library allocation
page read and write
22293EE0000
heap
page read and write
32C0000
heap
page read and write
1BC61402000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
1A8F9405000
heap
page read and write
2D10000
heap
page read and write
61E0000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
182E000
heap
page read and write
68D0000
trusted library allocation
page read and write
1A8F79CC000
heap
page read and write
264D9C73000
heap
page read and write
2A3E000
heap
page read and write
264D9D81000
heap
page read and write
21341E5B000
heap
page read and write
67B7000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
24D0E284000
heap
page read and write
1A41000
heap
page read and write
6770000
trusted library allocation
page read and write
61D0000
unkown
page read and write
69E0000
trusted library allocation
page read and write
BC0000
unkown
page readonly
5A20000
trusted library allocation
page read and write
264D9D34000
heap
page read and write
68E0000
trusted library allocation
page read and write
1A38000
heap
page read and write
237E000
stack
page read and write
FF93A8C000
stack
page read and write
6A40000
trusted library allocation
page read and write
264D9D2B000
heap
page read and write
61B0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
264D9C29000
heap
page read and write
5920000
trusted library allocation
page read and write
2229406E000
heap
page read and write
6250000
trusted library allocation
page read and write
5A58000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
7FFBAD570000
trusted library allocation
page read and write
6138000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
31CB000
trusted library allocation
page read and write
1DEB0E5B000
heap
page read and write
5A50000
trusted library allocation
page read and write
264D9DB8000
heap
page read and write
742000
unkown
page write copy
3390000
heap
page read and write
24443229000
heap
page read and write
422000
unkown
page write copy
5515000
trusted library allocation
page read and write
264DA506000
heap
page read and write
26FE000
stack
page read and write
68E0000
trusted library allocation
page read and write
2F01000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
18E0000
stack
page read and write
58C0000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
3323000
trusted library allocation
page read and write
264DA52A000
heap
page read and write
2AE0000
remote allocation
page read and write
5570000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
2D90000
remote allocation
page read and write
2CC0000
heap
page read and write
68D0000
trusted library allocation
page read and write
24D0E264000
heap
page read and write
5F0000
heap
page read and write
6250000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
2B70000
heap
page read and write
3CA1BCB000
stack
page read and write
6155000
trusted library allocation
page read and write
677E000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
1F49AF02000
heap
page read and write
320C000
trusted library allocation
page read and write
7FFBAD5F0000
trusted library allocation
page read and write
21341F13000
heap
page read and write
774000
heap
page read and write
2700000
trusted library allocation
page read and write
1F49ADF0000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
264D9C8D000
heap
page read and write
6900000
trusted library allocation
page execute and read and write
34C4B7000
stack
page read and write
69E0000
trusted library allocation
page read and write
2AD0000
heap
page read and write
4EF000
unkown
page read and write
5560000
trusted library allocation
page read and write
299F000
stack
page read and write
5A55000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
264D9D65000
heap
page read and write
2E5F000
stack
page read and write
68D0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
27A0000
heap
page read and write
2A9BF028000
heap
page read and write
6930000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
264D9DFD000
heap
page read and write
61E0000
trusted library allocation
page read and write
264DA602000
heap
page read and write
2130000
heap
page read and write
5D0000
heap
page read and write
6176000
trusted library allocation
page read and write
264D9D2F000
heap
page read and write
2DB0000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
264D9C68000
heap
page read and write
67B9000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
2788000
trusted library allocation
page read and write
264D9D0E000
heap
page read and write
CB0000
unkown
page readonly
264D9D51000
heap
page read and write
6770000
trusted library allocation
page read and write
264D9CC0000
heap
page read and write
29E0000
trusted library allocation
page read and write
17F4000
heap
page read and write
58D0000
trusted library allocation
page read and write
61D8000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
264DA55F000
heap
page read and write
1A11000
heap
page read and write
61D0000
trusted library allocation
page read and write
264DA627000
heap
page read and write
1A0000
trusted library allocation
page read and write
CC0000
unkown
page read and write
264DA57F000
heap
page read and write
EB0000
heap
page read and write
98A64FE000
stack
page read and write
1A8F78D0000
heap
page read and write
1DEB0DA0000
trusted library allocation
page read and write
553D000
trusted library allocation
page read and write
2F10000
heap
page read and write
31F6000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
264D9D7D000
heap
page read and write
1DEB0E2A000
heap
page read and write
6930000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
8B0000
heap
page read and write
264D9DFC000
heap
page read and write
6A17000
trusted library allocation
page read and write
1A8F9C11000
heap
page read and write
264D9DC8000
heap
page read and write
58C0000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
5A55000
trusted library allocation
page read and write
33C2000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
6837EFE000
stack
page read and write
24D0E276000
heap
page read and write
264D9DF4000
heap
page read and write
69E0000
trusted library allocation
page read and write
84C90FE000
stack
page read and write
400000
unkown
page readonly
61E0000
trusted library allocation
page read and write
59F3000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
264DA60E000
heap
page read and write
264D9CBC000
heap
page read and write
264D9CFB000
heap
page read and write
264D9CF5000
heap
page read and write
264D9DFB000
heap
page read and write
2C38000
heap
page read and write
1A8F997C000
heap
page read and write
67B0000
trusted library allocation
page read and write
5A02000
trusted library allocation
page read and write
5A58000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
24D0E242000
heap
page read and write
59D0000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
6910000
trusted library allocation
page execute and read and write
24D0E27F000
heap
page read and write
2FE0000
unkown
page readonly
6800000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
6143000
trusted library allocation
page read and write
264D9DB2000
heap
page read and write
264D9C82000
heap
page read and write
67B0000
trusted library allocation
page read and write
2E60000
remote allocation
page read and write
67A0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
1C4B567B000
heap
page read and write
58C0000
trusted library allocation
page read and write
264D9D26000
heap
page read and write
30E0000
heap
page read and write
1DEB0E77000
heap
page read and write
23C8000
heap
page read and write
BD000
stack
page read and write
2F29000
heap
page read and write
1A8F9880000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
6225000
trusted library allocation
page read and write
1A8F7A53000
heap
page read and write
68E5000
trusted library allocation
page read and write
73399BC000
stack
page read and write
CEC000
heap
page read and write
69E0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
2DF0000
heap
page read and write
6CA0000
trusted library allocation
page read and write
19E000
stack
page read and write
1A890010000
trusted library allocation
page read and write
331F000
stack
page read and write
1A8F9884000
trusted library allocation
page read and write
5556000
trusted library allocation
page read and write
264D9D71000
heap
page read and write
571B000
stack
page read and write
3147000
heap
page read and write
5A50000
trusted library allocation
page read and write
1A8804C5000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
2745000
trusted library allocation
page execute and read and write
5510000
trusted library allocation
page read and write
31EF000
stack
page read and write
2E30000
unkown
page readonly
6176000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
3F63000
trusted library allocation
page read and write
264DA61F000
heap
page read and write
222949EA000
heap
page read and write
9D000
stack
page read and write
264D9CE7000
heap
page read and write
2BE0000
heap
page read and write
264D9C99000
heap
page read and write
264D9CEE000
heap
page read and write
24D0E200000
heap
page read and write
264DA565000
heap
page read and write
6870000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
61E0000
unkown
page read and write
CC0000
heap
page read and write
7FFBAD36C000
trusted library allocation
page execute and read and write
B90000
heap
page read and write
3396000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
1A880203000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
616F000
trusted library allocation
page read and write
5A55000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
264D9CE8000
heap
page read and write
22294079000
heap
page read and write
17FE000
heap
page read and write
260107D0000
remote allocation
page read and write
1A8F7740000
heap
page read and write
6BD0000
trusted library allocation
page read and write
264D9DC0000
heap
page read and write
27D9000
heap
page read and write
3363000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
24D0E22C000
heap
page read and write
6B90000
trusted library allocation
page read and write
6770000
unkown
page read and write
67BA000
trusted library allocation
page read and write
7FFBAD2B4000
trusted library allocation
page read and write
6257000
trusted library allocation
page read and write
5735000
trusted library allocation
page read and write
370E000
stack
page read and write
6930000
trusted library allocation
page read and write
264D9CF7000
heap
page read and write
6A98000
trusted library allocation
page read and write
15DE000
stack
page read and write
676C000
stack
page read and write
61E0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
260107C0000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
5A50000
unkown
page read and write
6A50000
trusted library allocation
page read and write
1A8F7960000
trusted library allocation
page read and write
32B0000
heap
page read and write
57D1000
heap
page read and write
69E0000
trusted library allocation
page read and write
BE0000
unkown
page read and write
3337000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
5922000
trusted library allocation
page read and write
6837BFC000
stack
page read and write
61E0000
trusted library allocation
page read and write
6776000
trusted library allocation
page read and write
5511000
trusted library allocation
page read and write
264D9D24000
heap
page read and write
103C000
stack
page read and write
59E0000
trusted library allocation
page read and write
27A7000
heap
page read and write
68E0000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
264DA587000
heap
page read and write
6770000
trusted library allocation
page read and write
264DA550000
heap
page read and write
6143000
trusted library allocation
page read and write
24D0E274000
heap
page read and write
264D9D6B000
heap
page read and write
222941B9000
heap
page read and write
3357000
trusted library allocation
page read and write
6775000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
68E8000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
3F0000
unkown
page readonly
44E6000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
264D9D11000
heap
page read and write
33CA000
trusted library allocation
page read and write
34C17E000
stack
page read and write
98A61FB000
stack
page read and write
2E5E000
unkown
page read and write
5920000
trusted library allocation
page read and write
264D9D6F000
heap
page read and write
6CD0000
trusted library allocation
page read and write
19FC000
heap
page read and write
6930000
trusted library allocation
page read and write
264D9D91000
heap
page read and write
264D9D29000
heap
page read and write
5530000
trusted library allocation
page read and write
1A49000
heap
page read and write
61E0000
trusted library allocation
page read and write
3336000
heap
page read and write
6250000
trusted library allocation
page read and write
7339EFE000
stack
page read and write
2F2E000
stack
page read and write
6930000
trusted library allocation
page read and write
264D9D96000
heap
page read and write
21341F02000
heap
page read and write
67D0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
19E5000
heap
page read and write
58C0000
trusted library allocation
page read and write
24D0E27C000
heap
page read and write
6A20000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
1A882739000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
69A0000
trusted library allocation
page read and write
264D9DD3000
heap
page read and write
68F0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
2CD8000
heap
page read and write
7FFBAD452000
trusted library allocation
page read and write
263E000
stack
page read and write
59E0000
trusted library allocation
page read and write
1A8817BD000
trusted library allocation
page read and write
2E5D000
stack
page read and write
271D000
trusted library allocation
page execute and read and write
5920000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
FF942FE000
stack
page read and write
1BC60C2F000
heap
page read and write
1C4B5650000
heap
page read and write
6770000
trusted library allocation
page read and write
334C000
trusted library allocation
page read and write
5911000
trusted library allocation
page read and write
32E0000
heap
page read and write
30CE000
trusted library allocation
page read and write
264D9C85000
heap
page read and write
69E0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
7FFBAD520000
trusted library allocation
page read and write
24D0E27A000
heap
page read and write
59E0000
trusted library allocation
page read and write
68F0000
trusted library allocation
page read and write
4F2727F000
stack
page read and write
61D0000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
5514000
trusted library allocation
page read and write
3240000
heap
page read and write
264D9C6E000
heap
page read and write
61E0000
trusted library allocation
page read and write
26BE000
stack
page read and write
5580000
trusted library allocation
page read and write
1F49AE8A000
heap
page read and write
2950000
heap
page read and write
264D9C72000
heap
page read and write
7339FFE000
stack
page read and write
264DACA0000
remote allocation
page read and write
6770000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
21341C60000
heap
page read and write
5520000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
264D9D9F000
heap
page read and write
B15827D000
stack
page read and write
19F000
unkown
page read and write
10001000
direct allocation
page execute read
264D9CE3000
heap
page read and write
67B0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
17FA000
heap
page read and write
2D4CF900000
remote allocation
page read and write
3CA237F000
stack
page read and write
3000000
heap
page read and write
2FE0000
heap
page read and write
19C4000
heap
page read and write
30000
heap
page read and write
61E5000
unkown
page read and write
1F49AE00000
heap
page read and write
7FFBAD3D0000
trusted library allocation
page execute and read and write
69F0000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
264DA547000
heap
page read and write
6940000
trusted library allocation
page read and write
1F49B700000
heap
page read and write
3CA247D000
stack
page read and write
5560000
trusted library allocation
page read and write
A1000
unkown
page execute read
24D0E227000
heap
page read and write
264D9DFF000
heap
page read and write
264D9CCC000
heap
page read and write
69E0000
trusted library allocation
page read and write
264D9D8A000
heap
page read and write
61E8000
unkown
page read and write
61E0000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
BD0000
unkown
page readonly
58F0000
trusted library allocation
page read and write
6255000
trusted library allocation
page read and write
264D9CAD000
heap
page read and write
1ED0000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
7FFBAD461000
trusted library allocation
page read and write
2BA0000
remote allocation
page read and write
57E1000
heap
page read and write
5A57000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
1A8F9BF3000
heap
page read and write
69E0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
84C947E000
stack
page read and write
264D9DC5000
heap
page read and write
613A000
trusted library allocation
page read and write
1A4B000
heap
page read and write
1BC60C29000
heap
page read and write
61A0000
trusted library allocation
page read and write
309E000
stack
page read and write
1A8F79F2000
heap
page read and write
264D9CC9000
heap
page read and write
736427C000
stack
page read and write
67B0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
C4413FE000
stack
page read and write
233E000
stack
page read and write
67B0000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
23FE000
stack
page read and write
61E0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
302F000
stack
page read and write
44C0000
trusted library allocation
page read and write
5A50000
unkown
page read and write
61E5000
trusted library allocation
page read and write
7FFBAD4A0000
trusted library allocation
page execute and read and write
180D000
heap
page read and write
61E0000
trusted library allocation
page read and write
6148000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
34AE97C000
stack
page read and write
1A37000
heap
page read and write
1997000
heap
page read and write
7FFBAD360000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
616F000
trusted library allocation
page read and write
4E60000
heap
page read and write
264D9CC9000
heap
page read and write
3304000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
2D4CFD65000
heap
page read and write
264D9DFD000
heap
page read and write
264D9D94000
heap
page read and write
5900000
trusted library allocation
page read and write
427000
unkown
page readonly
6770000
trusted library allocation
page read and write
264DA558000
heap
page read and write
5A50000
unkown
page read and write
5580000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
332C000
trusted library allocation
page read and write
1A88144A000
trusted library allocation
page read and write
7FFBAD620000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
1BC60C00000
heap
page read and write
30AF000
trusted library allocation
page read and write
F32E6FE000
stack
page read and write
69E0000
trusted library allocation
page execute and read and write
59F0000
trusted library allocation
page read and write
7FFBAD600000
trusted library allocation
page read and write
34C6BB000
stack
page read and write
100F000
stack
page read and write
2A9BEFE0000
trusted library allocation
page read and write
27399429000
heap
page read and write
6A10000
trusted library allocation
page read and write
24443302000
heap
page read and write
5920000
trusted library allocation
page read and write
2FFE000
stack
page read and write
264D9D20000
heap
page read and write
5A40000
trusted library allocation
page read and write
22294902000
heap
page read and write
67B0000
trusted library allocation
page read and write
3280000
heap
page read and write
69E0000
trusted library allocation
page read and write
23C7000
heap
page read and write
260107D0000
remote allocation
page read and write
C44157E000
stack
page read and write
67B0000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
30EF000
stack
page read and write
307A000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
B15847C000
stack
page read and write
61E5000
trusted library allocation
page read and write
1A8F7A16000
heap
page read and write
3401000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
264D9CB5000
heap
page read and write
68D0000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
264D9DA6000
heap
page read and write
6250000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
31B7000
trusted library allocation
page read and write
24D0E25D000
heap
page read and write
5550000
trusted library allocation
page read and write
625E000
trusted library allocation
page read and write
3250000
heap
page read and write
2710000
heap
page read and write
6A10000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
264D9D4D000
heap
page read and write
420000
unkown
page read and write
510000
trusted library allocation
page read and write
264D9D8C000
heap
page read and write
338B000
trusted library allocation
page read and write
551F000
trusted library allocation
page read and write
1A880EC5000
trusted library allocation
page read and write
264D9CC3000
heap
page read and write
264D9D86000
heap
page read and write
68D0000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
69E2000
trusted library allocation
page read and write
66EE000
stack
page read and write
2F5F000
stack
page read and write
31DF000
unkown
page read and write
597E000
stack
page read and write
2EDE000
stack
page read and write
67B0000
trusted library allocation
page read and write
32BE000
stack
page read and write
69E0000
trusted library allocation
page read and write
422000
unkown
page write copy
59D0000
trusted library allocation
page read and write
2A9BEE10000
heap
page read and write
34C63E000
stack
page read and write
68E0000
trusted library allocation
page read and write
1EE3000
trusted library allocation
page read and write
312D000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
B15857F000
stack
page read and write
3030000
heap
page read and write
22294063000
heap
page read and write
6250000
trusted library allocation
page read and write
5A04000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
5555000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
C9F000
unkown
page read and write
68E0000
trusted library allocation
page read and write
264D9D31000
heap
page read and write
6250000
trusted library allocation
page read and write
21341E60000
heap
page read and write
359F000
stack
page read and write
61E0000
unkown
page read and write
1A8F940A000
heap
page read and write
6770000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
264D9CAA000
heap
page read and write
68D0000
trusted library allocation
page read and write
2A9BEDA0000
heap
page read and write
67C0000
trusted library allocation
page read and write
264D9D78000
heap
page read and write
61E0000
unkown
page read and write
5D8000
heap
page read and write
318C000
trusted library allocation
page read and write
6980000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
34AF5FF000
stack
page read and write
1DEB0F18000
heap
page read and write
264D9DD5000
heap
page read and write
2EB0000
remote allocation
page read and write
264D9C92000
heap
page read and write
69E0000
trusted library allocation
page read and write
24D0DFA0000
heap
page read and write
24D0E246000
heap
page read and write
264DA61B000
heap
page read and write
6790000
trusted library allocation
page read and write
264D9D1E000
heap
page read and write
69F0000
trusted library allocation
page read and write
6166000
trusted library allocation
page read and write
24D0DFB0000
heap
page read and write
1533000
stack
page read and write
5920000
trusted library allocation
page read and write
1DEB0F13000
heap
page read and write
1A11000
heap
page read and write
7FFBAD2CC000
trusted library allocation
page read and write
264D9CCD000
heap
page read and write
61E0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
1859000
heap
page read and write
313D000
stack
page read and write
6CB0000
trusted library allocation
page read and write
7FFBAD2B3000
trusted library allocation
page execute and read and write
6940000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
11192000
direct allocation
page read and write
3CCC000
stack
page read and write
67B0000
trusted library allocation
page read and write
1A8F9880000
trusted library allocation
page read and write
427000
unkown
page readonly
61C0000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
6770000
unkown
page read and write
6920000
trusted library allocation
page read and write
264DA559000
heap
page read and write
67B0000
trusted library allocation
page read and write
2A9BF013000
heap
page read and write
520000
heap
page read and write
2A9BF000000
heap
page read and write
34C3B7000
stack
page read and write
264D9D9E000
heap
page read and write
2F9D000
stack
page read and write
61E0000
trusted library allocation
page read and write
5430000
heap
page execute and read and write
611C000
trusted library allocation
page read and write
2722000
trusted library allocation
page read and write
31EB000
trusted library allocation
page read and write
7FFBAD5A0000
trusted library allocation
page read and write
3086000
trusted library allocation
page read and write
1F49AF13000
heap
page read and write
6250000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
264DA578000
heap
page read and write
264D9DAD000
heap
page read and write
5A50000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
264D9DD9000
heap
page read and write
6776000
trusted library allocation
page read and write
56DE000
stack
page read and write
6A30000
trusted library allocation
page execute and read and write
6A40000
trusted library allocation
page read and write
1A8F93E0000
trusted library allocation
page read and write
3F5A000
trusted library allocation
page read and write
22C0000
remote allocation
page read and write
1A8F79D7000
heap
page read and write
33EA000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
57A1000
heap
page read and write
A0000
unkown
page readonly
199D000
heap
page read and write
23C0000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
30E5000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
264D9C69000
heap
page read and write
264D9CA7000
heap
page read and write
67A0000
trusted library allocation
page read and write
264D9DCC000
heap
page read and write
6930000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
264D9CF0000
heap
page read and write
1982000
heap
page read and write
264D9CEB000
heap
page read and write
264D9C8C000
heap
page read and write
1DEB0E02000
heap
page read and write
5550000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
6C40000
trusted library allocation
page read and write
1A882A32000
trusted library allocation
page read and write
19F9000
heap
page read and write
6250000
trusted library allocation
page read and write
222949B0000
heap
page read and write
264D9D88000
heap
page read and write
5510000
trusted library allocation
page read and write
61E0000
unkown
page read and write
244430F0000
heap
page read and write
32F8000
trusted library allocation
page read and write
1A8F994F000
heap
page read and write
61E8000
trusted library allocation
page read and write
34AEEFE000
stack
page read and write
264D9D7A000
heap
page read and write
384E000
stack
page read and write
6250000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
22C0000
remote allocation
page read and write
30E0000
heap
page read and write
2F9F000
stack
page read and write
58D0000
trusted library allocation
page read and write
2A9BF068000
heap
page read and write
6173000
trusted library allocation
page read and write
264D9CDD000
heap
page read and write
1F49AEE2000
heap
page read and write
264D9C62000
heap
page read and write
6776000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
264D9C86000
heap
page read and write
6250000
trusted library allocation
page read and write
6107000
trusted library allocation
page read and write
59D3000
trusted library allocation
page read and write
30F7000
heap
page read and write
34BD6F000
stack
page read and write
6141000
trusted library allocation
page read and write
3178000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page read and write
264DA55B000
heap
page read and write
3343000
trusted library allocation
page read and write
1D26000
heap
page read and write
264D9DA9000
heap
page read and write
6AC5000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
264D9DAA000
heap
page read and write
59D0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
33F5000
trusted library allocation
page read and write
33B6000
trusted library allocation
page read and write
336B000
trusted library allocation
page read and write
264D9D33000
heap
page read and write
1A8F93C4000
trusted library allocation
page read and write
612A000
trusted library allocation
page read and write
1A890060000
trusted library allocation
page read and write
1DEB0D10000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
2229402D000
heap
page read and write
2E30000
unkown
page readonly
30AF000
stack
page read and write
264D9CEE000
heap
page read and write
6250000
unkown
page read and write
68D0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
736497C000
stack
page read and write
6A40000
trusted library allocation
page read and write
2BC0000
unkown
page read and write
316D000
trusted library allocation
page read and write
1A8813BE000
trusted library allocation
page read and write
2229496D000
heap
page read and write
264D9D9B000
heap
page read and write
5A50000
trusted library allocation
page read and write
24D0E22A000
heap
page read and write
69E0000
trusted library allocation
page read and write
2DAF000
stack
page read and write
1F49AEC9000
heap
page read and write
2D4CF9E0000
heap
page read and write
2FF0000
unkown
page readonly
2A10000
heap
page read and write
264DA522000
heap
page read and write
67B0000
trusted library allocation
page read and write
2FBE000
unkown
page read and write
2E90000
heap
page read and write
6250000
trusted library allocation
page read and write
6A5E000
trusted library allocation
page read and write
44C1000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
2184000
heap
page read and write
6250000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
264D9DDE000
heap
page read and write
264D9BF0000
heap
page read and write
6790000
trusted library allocation
page read and write
24A0000
heap
page read and write
6230000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
68E1000
trusted library allocation
page read and write
2B7C000
stack
page read and write
295E000
stack
page read and write
61E5000
trusted library allocation
page read and write
3200000
unkown
page read and write
5950000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
5515000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
264D9C00000
heap
page read and write
69E0000
trusted library allocation
page read and write
5A55000
trusted library allocation
page read and write
29FC000
stack
page read and write
1C4B6F10000
heap
page read and write
553F000
trusted library allocation
page read and write
264DA350000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
264D9DD7000
heap
page read and write
3E1C000
stack
page read and write
68D0000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
61E0000
unkown
page read and write
69F0000
trusted library allocation
page read and write
330C000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
6182000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
347F000
stack
page read and write
69E0000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
264D9CCB000
heap
page read and write
68D0000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
7FFBAD5B0000
trusted library allocation
page read and write
264D9D47000
heap
page read and write
6250000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
1A8826DB000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
264D9DC9000
heap
page read and write
182E000
heap
page read and write
28FD000
stack
page read and write
264D9C7A000
heap
page read and write
24D0E275000
heap
page read and write
6CF0000
trusted library allocation
page read and write
1A8F93D0000
trusted library allocation
page read and write
1A8F9260000
trusted library allocation
page read and write
6776000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
6270000
trusted library allocation
page execute and read and write
67C0000
trusted library allocation
page read and write
2714000
trusted library allocation
page read and write
F32E77E000
stack
page read and write
59D0000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
683817F000
stack
page read and write
5A20000
trusted library allocation
page read and write
2D6C000
stack
page read and write
59D0000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
1017B000
direct allocation
page read and write
61E0000
trusted library allocation
page read and write
7FFBAD510000
trusted library allocation
page read and write
312E000
stack
page read and write
2A9BF002000
heap
page read and write
5550000
trusted library allocation
page read and write
3336000
heap
page read and write
2C7F000
stack
page read and write
264DA576000
heap
page read and write
6A10000
trusted library allocation
page read and write
6837C7E000
stack
page read and write
2CA0000
heap
page read and write
1118E000
direct allocation
page read and write
1988000
heap
page read and write
3F1D000
stack
page read and write
61E5000
unkown
page read and write
264D9D56000
heap
page read and write
7FFBAD550000
trusted library allocation
page read and write
7FFBAD5D0000
trusted library allocation
page read and write
1F49B713000
heap
page read and write
5A00000
trusted library allocation
page read and write
B157CFC000
stack
page read and write
22C0000
remote allocation
page read and write
3037000
heap
page read and write
6770000
trusted library allocation
page read and write
264D9DB3000
heap
page read and write
10000000
direct allocation
page read and write
264D9C5E000
heap
page read and write
2C20000
remote allocation
page read and write
68E0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
264D9CEE000
heap
page read and write
6770000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
5A58000
trusted library allocation
page read and write
F0000
heap
page read and write
69F0000
trusted library allocation
page read and write
14E4000
unkown
page read and write
5A50000
trusted library allocation
page read and write
6778000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
2A80000
heap
page read and write
318E000
stack
page read and write
61D0000
trusted library allocation
page read and write
264D9D75000
heap
page read and write
222949EA000
heap
page read and write
693A000
trusted library allocation
page read and write
316E000
stack
page read and write
6930000
trusted library allocation
page read and write
FF940FB000
stack
page read and write
264DA54E000
heap
page read and write
68E0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
17D0000
heap
page read and write
6127000
trusted library allocation
page read and write
2BDD000
stack
page read and write
68D0000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
2739946A000
heap
page read and write
6930000
trusted library allocation
page read and write
1910000
heap
page read and write
6A60000
trusted library allocation
page read and write
22294A30000
heap
page read and write
6770000
trusted library allocation
page read and write
264D9D16000
heap
page read and write
1DEB0E5C000
heap
page read and write
67B0000
trusted library allocation
page execute and read and write
32C4000
trusted library allocation
page read and write
17F3000
heap
page read and write
BE0000
unkown
page read and write
4EF000
unkown
page write copy
68D0000
trusted library allocation
page read and write
BBA000
stack
page read and write
1DEB0DE0000
remote allocation
page read and write
244430E0000
heap
page read and write
1A88154A000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
1520000
stack
page read and write
19F000
unkown
page write copy
6164000
trusted library allocation
page read and write
B157E7F000
stack
page read and write
2E7E000
stack
page read and write
2B5F000
stack
page read and write
61D0000
trusted library allocation
page read and write
98A63FC000
stack
page read and write
6250000
trusted library allocation
page read and write
61D9000
unkown
page read and write
60F8000
trusted library allocation
page read and write
264D9CFF000
heap
page read and write
24D0E302000
heap
page read and write
6BEE000
stack
page read and write
611C000
trusted library allocation
page read and write
1F49ACF0000
heap
page read and write
68D0000
trusted library allocation
page read and write
17EF000
heap
page read and write
264D9C53000
heap
page read and write
264D9D59000
heap
page read and write
422000
unkown
page write copy
67A0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
2FA0000
heap
page read and write
380F000
stack
page read and write
264DA500000
heap
page read and write
264D9CAE000
heap
page read and write
1BC60C25000
heap
page read and write
3CA227E000
stack
page read and write
67E0000
trusted library allocation
page read and write
264D9D36000
heap
page read and write
6A3767E000
stack
page read and write
25F0000
trusted library allocation
page read and write
254C000
stack
page read and write
21341E70000
heap
page read and write
6770000
trusted library allocation
page read and write
264D9D73000
heap
page read and write
298C000
stack
page read and write
2F60000
heap
page read and write
1A88151F000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
5A50000
unkown
page read and write
1A4B000
heap
page read and write
F32E3DC000
stack
page read and write
6250000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
850000
heap
page read and write
61E0000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
264DA60C000
heap
page read and write
23C0000
heap
page read and write
28E0000
heap
page read and write
21341C70000
heap
page read and write
61E0000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
1A8F9860000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
264D9C74000
heap
page read and write
614E000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
1A8F9860000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
24D0E262000
heap
page read and write
264DA54D000
heap
page read and write
61E0000
trusted library allocation
page read and write
264D9D00000
heap
page read and write
19CF000
stack
page read and write
5A30000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
264DA610000
heap
page read and write
1C4B5510000
heap
page read and write
59F0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
1A0C000
heap
page read and write
2F60000
heap
page read and write
264D9DA8000
heap
page read and write
1A8816F4000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
2A88000
heap
page read and write
6780000
trusted library allocation
page read and write
3CA217F000
stack
page read and write
264D9C97000
heap
page read and write
1A8F78A0000
heap
page read and write
6254000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
264D9C87000
heap
page read and write
1DEB0E5D000
heap
page read and write
672E000
stack
page read and write
5A52000
trusted library allocation
page read and write
264D9CB9000
heap
page read and write
264D9C9B000
heap
page read and write
BD0000
unkown
page readonly
6770000
trusted library allocation
page read and write
3020000
heap
page read and write
21341E13000
heap
page read and write
5550000
trusted library allocation
page read and write
6A50000
trusted library allocation
page execute and read and write
310E000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
264D9CB1000
heap
page read and write
1A88140E000
trusted library allocation
page read and write
21341E5F000
heap
page read and write
182E000
heap
page read and write
34C0FD000
stack
page read and write
264D9D58000
heap
page read and write
68F0000
trusted library allocation
page read and write
1A882A66000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
34D08E000
stack
page read and write
1FD0000
heap
page read and write
2A9BEDB0000
heap
page read and write
7FFBAD4E0000
trusted library allocation
page read and write
264DA524000
heap
page read and write
6910000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
68F0000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
264D9D49000
heap
page read and write
67B0000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
E3C000
stack
page read and write
5A40000
trusted library allocation
page read and write
14E6000
unkown
page readonly
6930000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
27399C02000
trusted library allocation
page read and write
21341E00000
heap
page read and write
5730000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
34C33E000
stack
page read and write
69C0000
trusted library allocation
page read and write
2F9E000
stack
page read and write
613F000
trusted library allocation
page read and write
C4410F9000
stack
page read and write
6770000
trusted library allocation
page read and write
264DA56F000
heap
page read and write
264D9D62000
heap
page read and write
7FFBAD4F5000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
5A0E000
trusted library allocation
page read and write
67BD000
trusted library allocation
page read and write
1017B000
direct allocation
page read and write
2EF0000
heap
page read and write
264D9DC2000
heap
page read and write
67A0000
trusted library allocation
page read and write
2EF0000
heap
page read and write
61E7000
trusted library allocation
page read and write
264D9C81000
heap
page read and write
5556000
trusted library allocation
page read and write
6A379FE000
stack
page read and write
21341E02000
heap
page read and write
27399390000
heap
page read and write
6250000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
24D0E213000
heap
page read and write
6A3738E000
stack
page read and write
5A50000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
22294A00000
heap
page read and write
24D0E25A000
heap
page read and write
1F49B73A000
heap
page read and write
6860000
trusted library allocation
page read and write
264D9DDA000
heap
page read and write
58E0000
trusted library allocation
page read and write
33FE000
stack
page read and write
A1000
unkown
page execute read
22294000000
heap
page read and write
24D0E802000
trusted library allocation
page read and write
2229405F000
heap
page read and write
29BD000
stack
page read and write
4C0000
heap
page read and write
BE0000
unkown
page read and write
26E0000
heap
page read and write
6920000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
610B000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
733A0FC000
stack
page read and write
61E0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
35CE000
stack
page read and write
58E0000
trusted library allocation
page read and write
67D7000
trusted library allocation
page read and write
264DA613000
heap
page read and write
6940000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
2D90000
remote allocation
page read and write
2FF0000
unkown
page readonly
264D9D5A000
heap
page read and write
267F000
stack
page read and write
2FDE000
stack
page read and write
6770000
trusted library allocation
page read and write
3550000
heap
page read and write
1BC60A20000
heap
page read and write
5A60000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
614A000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
264D9DF1000
heap
page read and write
23B0000
heap
page read and write
3030000
heap
page read and write
264D9D21000
heap
page read and write
67B0000
trusted library allocation
page read and write
BC0000
unkown
page readonly
6770000
trusted library allocation
page read and write
19F5000
heap
page read and write
68D0000
trusted library allocation
page read and write
236E000
stack
page read and write
2A9BF064000
heap
page read and write
210C000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
7FFBAD396000
trusted library allocation
page execute and read and write
32ED000
trusted library allocation
page read and write
264D9D6C000
heap
page read and write
6166000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
264DA566000
heap
page read and write
264D9D6D000
heap
page read and write
41B000
unkown
page readonly
7FFBAD480000
trusted library allocation
page execute and read and write
26010720000
heap
page read and write
6B00000
trusted library allocation
page read and write
260107D0000
remote allocation
page read and write
222941E5000
heap
page read and write
7FFBAD2C3000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
264D9C80000
heap
page read and write
264DA617000
heap
page read and write
6250000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
6779000
trusted library allocation
page read and write
22294093000
heap
page read and write
61E0000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
264D9CF9000
heap
page read and write
57A0000
heap
page read and write
6250000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
6776000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
108F000
stack
page read and write
6250000
trusted library allocation
page read and write
26010841000
heap
page read and write
1F0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
2A9BF03C000
heap
page read and write
244431B0000
remote allocation
page read and write
3F5E000
stack
page read and write
6AB9000
trusted library allocation
page read and write
1A8F93E0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
24D0E259000
heap
page read and write
264D9CDF000
heap
page read and write
264DA60A000
heap
page read and write
61E5000
trusted library allocation
page read and write
6AB2000
trusted library allocation
page read and write
1A1A000
heap
page read and write
2E3D000
stack
page read and write
6CE0000
trusted library allocation
page read and write
7FFBAD590000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
52DE000
stack
page read and write
5556000
trusted library allocation
page read and write
741000
unkown
page read and write
18ED000
stack
page read and write
3208000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
2D27000
heap
page read and write
2BFD000
stack
page read and write
5555000
trusted library allocation
page read and write
6255000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
120000
remote allocation
page read and write
1DEB0D30000
trusted library allocation
page read and write
3233000
trusted library allocation
page read and write
328B000
heap
page read and write
264D9CB3000
heap
page read and write
264D9D07000
heap
page read and write
61E0000
trusted library allocation
page read and write
264D9C7E000
heap
page read and write
343E000
stack
page read and write
24D0E27B000
heap
page read and write
22294660000
trusted library allocation
page read and write
B1578DB000
stack
page read and write
69F0000
trusted library allocation
page read and write
68F2000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
6240000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
264D9CB6000
heap
page read and write
24D0E1E0000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
23D0000
heap
page read and write
401000
unkown
page execute read
6A10000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
6AC2000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
5A50000
unkown
page read and write
264D9C69000
heap
page read and write
5915000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
5528000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
61E7000
unkown
page read and write
2FC0000
heap
page read and write
264D9D8D000
heap
page read and write
150000
heap
page read and write
6770000
trusted library allocation
page read and write
A92000
unkown
page write copy
67B0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
60AA000
trusted library allocation
page read and write
24D0E263000
heap
page read and write
1F49AC80000
heap
page read and write
264D9D40000
heap
page read and write
6930000
trusted library allocation
page read and write
264D9CE0000
heap
page read and write
5A56000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
264D9CFC000
heap
page read and write
264D9DCB000
heap
page read and write
3DCA000
stack
page read and write
5A56000
trusted library allocation
page read and write
60A4000
trusted library allocation
page read and write
31E3000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
264D9CA5000
heap
page read and write
5560000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
6AB4000
trusted library allocation
page read and write
264D9CCD000
heap
page read and write
1196000
unkown
page readonly
98A62F9000
stack
page read and write
4742000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
222949E7000
heap
page read and write
6166000
trusted library allocation
page read and write
5930000
trusted library allocation
page execute and read and write
2E9F000
unkown
page read and write
61EE000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
1A8F7A1B000
heap
page read and write
264DA615000
heap
page read and write
5550000
trusted library allocation
page read and write
1C4B7060000
heap
page read and write
24443264000
heap
page read and write
68E0000
trusted library allocation
page read and write
30BA000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
1A8F7910000
trusted library allocation
page read and write
2C3E000
stack
page read and write
5550000
trusted library allocation
page read and write
28FD000
stack
page read and write
29F0000
trusted library allocation
page read and write
26010813000
heap
page read and write
264D9DBE000
heap
page read and write
2D70000
heap
page read and write
2740000
heap
page read and write
34C5BE000
stack
page read and write
61E0000
trusted library allocation
page read and write
19C000
stack
page read and write
53DE000
stack
page read and write
C9C000
stack
page read and write
6770000
trusted library allocation
page read and write
6136000
trusted library allocation
page read and write
67BC000
trusted library allocation
page read and write
6778000
unkown
page read and write
2EB0000
remote allocation
page read and write
6930000
trusted library allocation
page read and write
27399450000
heap
page read and write
59F5000
trusted library allocation
page read and write
1194000
unkown
page read and write
2A30000
heap
page read and write
294D000
stack
page read and write
6810000
trusted library allocation
page read and write
1A8F9BD5000
heap
page read and write
264D9C7F000
heap
page read and write
31AA000
heap
page read and write
21341E41000
heap
page read and write
98A5DCB000
stack
page read and write
19F4000
heap
page read and write
264D9D13000
heap
page read and write
69EA000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
FF93FFB000
stack
page read and write
6934000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
6775000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
3160000
heap
page read and write
7FFBAD540000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
61E5000
unkown
page read and write
2BC0000
unkown
page read and write
19E5000
heap
page read and write
DDC000
stack
page read and write
677C000
trusted library allocation
page read and write
314E000
stack
page read and write
1A8F9BE2000
heap
page read and write
143C000
stack
page read and write
61D0000
trusted library allocation
page read and write
264D9D7B000
heap
page read and write
6820000
trusted library allocation
page read and write
BD0000
unkown
page readonly
225D000
stack
page read and write
264D9D66000
heap
page read and write
69F0000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
3330000
heap
page read and write
5550000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
22294922000
heap
page read and write
264DA54A000
heap
page read and write
264D9DC3000
heap
page read and write
1A8F9973000
heap
page read and write
30C6000
trusted library allocation
page read and write
1A881566000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
264DACA0000
remote allocation
page read and write
6A40000
trusted library allocation
page read and write
263D000
stack
page read and write
2229403C000
heap
page read and write
68D0000
trusted library allocation
page read and write
2E30000
unkown
page readonly
60F1000
trusted library allocation
page read and write
5580000
unkown
page read and write
5A56000
unkown
page read and write
24443202000
heap
page read and write
3200000
unkown
page read and write
2E50000
heap
page execute and read and write
69E0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
6256000
trusted library allocation
page read and write
75D000
unkown
page read and write
2CBE000
stack
page read and write
6770000
trusted library allocation
page read and write
610D000
trusted library allocation
page read and write
305E000
stack
page read and write
31AE000
stack
page read and write
2A9BF102000
heap
page read and write
61D0000
trusted library allocation
page read and write
1A0C000
heap
page read and write
2FF5000
heap
page read and write
3119000
trusted library allocation
page read and write
2D4CFA78000
heap
page read and write
61E0000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
26BE000
stack
page read and write
61E0000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
736487B000
stack
page read and write
535E000
stack
page read and write
6250000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
24443213000
heap
page read and write
3382000
trusted library allocation
page read and write
1A8804C1000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
22293FE0000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
24D0E241000
heap
page read and write
264D9D7F000
heap
page read and write
293C000
stack
page read and write
736467E000
stack
page read and write
291E000
stack
page read and write
264D9D45000
heap
page read and write
61E0000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
1F49AE13000
heap
page read and write
67E0000
trusted library allocation
page read and write
264D9DDD000
heap
page read and write
2720000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
31F4000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
61E0000
unkown
page read and write
6770000
trusted library allocation
page read and write
23BE000
stack
page read and write
69F0000
trusted library allocation
page read and write
1A8F7950000
heap
page readonly
61E0000
unkown
page read and write
610D000
trusted library allocation
page read and write
1ED1000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
6A05000
trusted library allocation
page read and write
323E000
stack
page read and write
401000
unkown
page execute read
190000
heap
page read and write
C4411FE000
stack
page read and write
61E0000
trusted library allocation
page read and write
2F0E000
stack
page read and write
3105000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
17F7000
heap
page read and write
58A0000
trusted library allocation
page read and write
25EE000
stack
page read and write
264DA402000
heap
page read and write
58E0000
trusted library allocation
page read and write
264D9C23000
heap
page read and write
264D9DCF000
heap
page read and write
6880000
trusted library allocation
page read and write
17F0000
heap
page read and write
264D9D68000
heap
page read and write
61E4000
trusted library allocation
page read and write
21342602000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
6837E7D000
stack
page read and write
30F9000
trusted library allocation
page read and write
6975000
trusted library allocation
page read and write
5516000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
264D9C7C000
heap
page read and write
2108000
trusted library allocation
page read and write
2330000
heap
page read and write
423000
unkown
page read and write
6E00000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
1118E000
direct allocation
page read and write
59D0000
trusted library allocation
page read and write
2A9D000
stack
page read and write
1A8F9860000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
7FFBAD530000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
264D9DB9000
heap
page read and write
61E0000
trusted library allocation
page read and write
6161000
trusted library allocation
page read and write
6837FFD000
stack
page read and write
1A88155D000
trusted library allocation
page read and write
1F49AE67000
heap
page read and write
264D9C76000
heap
page read and write
1A8F9400000
heap
page read and write
2229418E000
heap
page read and write
6770000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
677F000
trusted library allocation
page read and write
264D9D84000
heap
page read and write
68E0000
trusted library allocation
page read and write
60E1000
trusted library allocation
page read and write
6136000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
22294802000
heap
page read and write
68D0000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
21341E6A000
heap
page read and write
6770000
trusted library allocation
page read and write
1DEB0F00000
heap
page read and write
6770000
trusted library allocation
page read and write
68DB000
trusted library allocation
page read and write
1C4B6F35000
heap
page read and write
67B3000
trusted library allocation
page read and write
1A890001000
trusted library allocation
page read and write
7FFBAD547000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
264DA552000
heap
page read and write
2E00000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
1520000
heap
page read and write
61E5000
trusted library allocation
page read and write
2BB0000
unkown
page readonly
6112000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
1920000
heap
page read and write
61E0000
trusted library allocation
page read and write
33A2000
trusted library allocation
page read and write
222949BC000
heap
page read and write
58C0000
trusted library allocation
page read and write
222949E7000
heap
page read and write
14E6000
unkown
page readonly
34AED7B000
stack
page read and write
41B000
unkown
page readonly
264D9D7C000
heap
page read and write
58D0000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
264D9C9C000
heap
page read and write
68D0000
trusted library allocation
page read and write
1F49AECC000
heap
page read and write
6A10000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
1A8F92D0000
heap
page execute and read and write
2DBC000
stack
page read and write
6A10000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
2BA0000
unkown
page readonly
68D0000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
420000
unkown
page write copy
58E0000
trusted library allocation
page read and write
2B90000
heap
page read and write
2EC0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
2EB0000
remote allocation
page read and write
46FC000
stack
page read and write
68D0000
trusted library allocation
page read and write
DC0000
heap
page read and write
264D9CA4000
heap
page read and write
5530000
trusted library allocation
page read and write
6259000
unkown
page read and write
264D9CD1000
heap
page read and write
1A882A68000
trusted library allocation
page read and write
68F0000
trusted library allocation
page read and write
303D000
trusted library allocation
page read and write
2D4CFA70000
heap
page read and write
5920000
trusted library allocation
page read and write
401000
unkown
page execute read
5609000
stack
page read and write
5A50000
trusted library allocation
page read and write
C4412FA000
stack
page read and write
61E0000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
400000
unkown
page readonly
264DA600000
heap
page read and write
2E60000
heap
page read and write
68D0000
trusted library allocation
page read and write
264D9CC5000
heap
page read and write
61E0000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
1A88005B000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
33C0000
heap
page read and write
3F01000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
23A0000
trusted library allocation
page read and write
2D4CFA00000
heap
page read and write
6790000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
264D9C9F000
heap
page read and write
69E0000
trusted library allocation
page read and write
264D9D5C000
heap
page read and write
420000
unkown
page read and write
5550000
unkown
page read and write
5510000
trusted library allocation
page read and write
264DA55E000
heap
page read and write
27399402000
heap
page read and write
440000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
5A50000
unkown
page read and write
27AA000
heap
page read and write
2E60000
remote allocation
page read and write
264D9C89000
heap
page read and write
683776B000
stack
page read and write
6A70000
trusted library allocation
page read and write
264D9DA2000
heap
page read and write
264D9C70000
heap
page read and write
27399455000
heap
page read and write
1A40000
heap
page read and write
19C4000
heap
page read and write
5A50000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
244431B0000
remote allocation
page read and write
2E60000
remote allocation
page read and write
6260000
trusted library allocation
page read and write
22294066000
heap
page read and write
2E20000
unkown
page readonly
5910000
trusted library allocation
page read and write
22294A02000
heap
page read and write
5510000
trusted library allocation
page read and write
1D00000
trusted library allocation
page read and write
27399502000
heap
page read and write
5555000
trusted library allocation
page read and write
6200000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
264D9D23000
heap
page read and write
264D9DBC000
heap
page read and write
3200000
unkown
page read and write
61E0000
trusted library allocation
page read and write
2E20000
unkown
page readonly
6250000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
264D9C5B000
heap
page read and write
552C000
trusted library allocation
page read and write
306F000
trusted library allocation
page read and write
615D000
trusted library allocation
page read and write
2BA0000
remote allocation
page read and write
27399413000
heap
page read and write
61E0000
trusted library allocation
page read and write
264D9C94000
heap
page read and write
1A8F93E0000
heap
page execute and read and write
264D9CE3000
heap
page read and write
6A10000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
1C4B6F30000
heap
page read and write
5A10000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
198D000
heap
page read and write
6127000
trusted library allocation
page read and write
2EDF000
stack
page read and write
6780000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
5A60000
unkown
page read and write
264D9C5D000
heap
page read and write
306E000
stack
page read and write
6780000
trusted library allocation
page read and write
6ACB000
trusted library allocation
page read and write
2FE0000
unkown
page readonly
1A8F7880000
heap
page read and write
264D9C7B000
heap
page read and write
61E0000
unkown
page read and write
264D9CB2000
heap
page read and write
24D0E269000
heap
page read and write
5A58000
trusted library allocation
page read and write
331A000
heap
page read and write
7FFBAD610000
trusted library allocation
page read and write
2220000
remote allocation
page read and write
21341E29000
heap
page read and write
5560000
trusted library allocation
page read and write
264D9CEA000
heap
page read and write
6920000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
264D9CBF000
heap
page read and write
27399459000
heap
page read and write
6A10000
trusted library allocation
page read and write
26010829000
heap
page read and write
736477E000
stack
page read and write
59C0000
trusted library allocation
page execute and read and write
19C4000
heap
page read and write
61E6000
unkown
page read and write
6770000
trusted library allocation
page read and write
264DA5A7000
heap
page read and write
69F0000
trusted library allocation
page read and write
2E40000
remote allocation
page read and write
5556000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
2EBE000
stack
page read and write
1A8F9880000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
264D9DF3000
heap
page read and write
6ABF000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
7FFBAD2BD000
trusted library allocation
page execute and read and write
22293E80000
heap
page read and write
2FAE000
stack
page read and write
1DEB0DE0000
remote allocation
page read and write
264D9DD1000
heap
page read and write
1BC60C02000
heap
page read and write
6250000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
3F1000
unkown
page execute read
1DEB0E4D000
heap
page read and write
327F000
stack
page read and write
5A30000
trusted library allocation
page read and write
2E7E000
stack
page read and write
5510000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
6AC7000
trusted library allocation
page read and write
264D9D19000
heap
page read and write
58E0000
trusted library allocation
page execute and read and write
264DA561000
heap
page read and write
1F0000
trusted library allocation
page read and write
2D4CF8A0000
heap
page read and write
550A000
stack
page read and write
30A6000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
2F18000
heap
page read and write
24D0E22E000
heap
page read and write
6CC0000
trusted library allocation
page read and write
104E000
stack
page read and write
5570000
trusted library allocation
page read and write
264D9CCF000
heap
page read and write
34C53E000
stack
page read and write
68D0000
trusted library allocation
page read and write
2840000
heap
page read and write
1A8F9860000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
1A881420000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
264DA535000
heap
page read and write
264D9DB7000
heap
page read and write
1F49AC90000
heap
page read and write
264D9D3D000
heap
page read and write
770000
heap
page read and write
34D0000
heap
page read and write
6D50000
trusted library allocation
page read and write
26FE000
stack
page read and write
26010730000
heap
page read and write
1A8F7920000
heap
page read and write
1A40000
heap
page read and write
C4414FF000
stack
page read and write
6900000
trusted library allocation
page read and write
1A8F7990000
heap
page read and write
2E90000
heap
page read and write
24D0E23C000
heap
page read and write
60FB000
trusted library allocation
page read and write
264DA60F000
heap
page read and write
736447F000
stack
page read and write
1A8F9880000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
3CA257C000
stack
page read and write
6920000
trusted library allocation
page read and write
22294994000
heap
page read and write
6D80000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
264D9CBD000
heap
page read and write
69E0000
trusted library allocation
page read and write
CB0000
unkown
page readonly
1A882A54000
trusted library allocation
page read and write
2350000
heap
page read and write
6920000
trusted library allocation
page read and write
153C000
stack
page read and write
5A50000
trusted library allocation
page read and write
3CA267F000
stack
page read and write
6250000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
61D0000
unkown
page read and write
6785000
trusted library allocation
page read and write
19F9000
heap
page read and write
6259000
trusted library allocation
page read and write
24D0E243000
heap
page read and write
6137000
trusted library allocation
page read and write
1A8F7A89000
heap
page read and write
5910000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
264DACA0000
remote allocation
page read and write
2E40000
remote allocation
page read and write
264D9CB7000
heap
page read and write
308F000
trusted library allocation
page read and write
23AF000
stack
page read and write
3F29000
trusted library allocation
page read and write
1990000
heap
page read and write
264D9D66000
heap
page read and write
61E0000
trusted library allocation
page read and write
264D9D4F000
heap
page read and write
34AF4FF000
stack
page read and write
6A30000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
6AC4000
trusted library allocation
page read and write
1A882728000
trusted library allocation
page read and write
239F000
stack
page read and write
2CF0000
heap
page read and write
264D9D54000
heap
page read and write
6800000
trusted library allocation
page read and write
4F26FFC000
stack
page read and write
264D9CBE000
heap
page read and write
58E0000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
5526000
trusted library allocation
page read and write
24443180000
trusted library allocation
page read and write
6AB6000
trusted library allocation
page read and write
2D2D000
stack
page read and write
2BB0000
unkown
page readonly
FF941FB000
stack
page read and write
68D0000
trusted library allocation
page read and write
2770000
trusted library allocation
page readonly
427000
unkown
page readonly
61D0000
trusted library allocation
page read and write
61E0000
unkown
page read and write
41B000
unkown
page readonly
2CC0000
heap
page read and write
6920000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
264D9DF9000
heap
page read and write
5560000
trusted library allocation
page read and write
6A377FE000
stack
page read and write
264DA520000
heap
page read and write
1DEB0BB0000
heap
page read and write
5910000
trusted library allocation
page read and write
1A8F9880000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
612D000
trusted library allocation
page read and write
44CB000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
68E8000
trusted library allocation
page read and write
21341CD0000
heap
page read and write
6D00000
trusted library allocation
page read and write
2E9B000
stack
page read and write
67D0000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
1A89006C000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
D30000
heap
page read and write
67D0000
trusted library allocation
page read and write
7DF4EA460000
trusted library allocation
page execute and read and write
69B0000
trusted library allocation
page read and write
There are 2972 hidden memdumps, click here to show them.