IOC Report
DQxttu2Qrr.exe

loading gif

Files

File Path
Type
Category
Malicious
DQxttu2Qrr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\61312899942613011832.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\1000018002\avicapn32.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\1000019012\syncfiles.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\syncfiles[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\avicapn32[1].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\umciavi32[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\umciavi64[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\Emit64[1].exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\nppshell[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000017001\Emit64.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\advapi32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\jekppnay.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\1000020000\umciavi64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\1000021000\umciavi32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Locktime\RtkAudUService64.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\11164286057916229991747962
SQLite 3.x database, last written using SQLite version 3038005, file counter 17, database pages 7, 1st free page 5, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 17
dropped
C:\ProgramData\11693430970401306944494184
SQLite 3.x database, last written using SQLite version 3038005, file counter 7, database pages 36, 1st free page 10, free pages 1, cookie 0x29, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\14765269315554389947119608
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\17061304525933759500214796
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\44571614278734644827034568
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\48205952313381291261104955
SQLite 3.x database, last written using SQLite version 3038005, file counter 7, database pages 36, 1st free page 10, free pages 1, cookie 0x29, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\library[1].bin
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\resource[1].bin
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\minor[2].bin
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\853321935212
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fzpuqn5z.g0g.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yjjnzwnv.xjd.psm1
very short file (no magic)
dropped
\Device\ConDrv
ASCII text, with no line terminators
dropped
\Device\Mup\computer\PIPE\samr
GLS_BINARY_LSB_FIRST
dropped
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DQxttu2Qrr.exe
C:\Users\user\Desktop\DQxttu2Qrr.exe
malicious
C:\ProgramData\61312899942613011832.exe
"C:\ProgramData\61312899942613011832.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\user\Desktop\DQxttu2Qrr.exe" & exit
malicious
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
"C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe" /F
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\03bd543fce" /P "user:N"&&CACLS "..\03bd543fce" /P "user:R" /E&&Exit
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main
malicious
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
C:\Users\user\AppData\Local\Temp\03bd543fce\gntuud.exe
malicious
C:\Users\user\AppData\Local\Temp\1000017001\Emit64.exe
"C:\Users\user\AppData\Local\Temp\1000017001\Emit64.exe"
malicious
C:\Users\user\1000018002\avicapn32.exe
"C:\Users\user\1000018002\avicapn32.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
malicious
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-dc 0
malicious
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\1000019012\syncfiles.dll, rundll
malicious
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
malicious
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
malicious
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
malicious
C:\Windows\System32\reg.exe
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
malicious
C:\Users\user\AppData\Roaming\1000020000\umciavi64.exe
"C:\Users\user\AppData\Roaming\1000020000\umciavi64.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cacls.exe
CACLS "gntuud.exe" /P "user:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "gntuud.exe" /P "user:R" /E
C:\Windows\SysWOW64\cacls.exe
CACLS "..\03bd543fce" /P "user:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\03bd543fce" /P "user:R" /E
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qgoyddbo#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'RtkAudUService64.exe' /tr '''C:\Users\user\Locktime\RtkAudUService64.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Locktime\RtkAudUService64.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'RtkAudUService64.exe' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "RtkAudUService64.exe" /t REG_SZ /f /d 'C:\Users\user\Locktime\RtkAudUService64.exe' }
C:\Windows\System32\sc.exe
sc stop UsoSvc
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc stop WaaSMedicSvc
C:\Windows\System32\sc.exe
sc stop wuauserv
C:\Windows\System32\sc.exe
sc stop bits
C:\Windows\System32\sc.exe
sc stop dosvc
There are 32 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://65.21.119.56:80
malicious
85.209.135.109/jg94cVd30f/index.php
malicious
https://bitbucket.org/alfolod79597/advancedapi32/downloads/minor.bin
unknown
http://cjdlifvn3qkbi0ymi0ma.wclwox4jcqzsnqbjvs/)a
unknown
http://ocsp.sectigo.com0
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/minor.bin8
unknown
https://bbuseruploads.s3.amazonaws.com/f3ef24fc-08b2-408a-a2c5-1fad12572ea6/downloads/b803c041-f8b5-
unknown
https://contoso.com/License
unknown
http://ripple-wells-2022.net/
unknown
https://www.google.com/intl/en_uk/chrome/https://www.google.com/intl/en_uk/chrome/https://www.google
unknown
https://steamcommunity.com/profiles/76561199441933804
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/minor.binR
unknown
https://t.me/vmt001
http://cjdlifvn3qkbi0ymi0ma.wclwox4jcqzsnqbjvs/
unknown
http://65.21.119.56:80/update.zip
unknown
https://support.google.com/chrome/answer/6315198?product=
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.bin
unknown
https://d301sr5gafysq2.cloudfront.net;
unknown
https://support.google.com/chrome/answer/111996?visit_id=637962485686793996-3320600880&p=update_erro
unknown
https://www.google.com/intl/en_uk/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrows
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/resource.bin0c9c7142b75e/library.bin
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/resource.binn
unknown
https://www.google.com/intl/en_uk/chrome/
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/resource.bint
unknown
https://bitbucket.org/ww
unknown
http://65.21.119.56:80/update.zipb0dfc5b548762778904926-d06ed635-68f6-4e9a-955c-90ce-806e6f6e6963
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://bbuseruploads.s3.amazonaws.com/f3ef24fc-08b2-408a-a2c5-1fad12572ea6/downloads/b97f81fe-0ba4-
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/resource.bin
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/minor.bin6
unknown
https://support.google.com/chrome?p=update_error
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://65.21.119.56:80https://t.me/vmt001hello0;open_open
unknown
https://bbuseruploads.s3.amazonaws.com/E
unknown
https://bbuseruploads.s3.amazonaws.com/H
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/resource.bind
unknown
http://www.sqlite.org/copyright.html.
unknown
https://bbuseruploads.s3.amazonaws.com/l
unknown
https://bitbucket.org/
unknown
http://nuget.org/NuGet.exe
unknown
https://sectigo.com/CPS0
unknown
https://t.me/dishastahttps://steamcommunity.com/profiles/76561199441933804http://167.235.150.8:80dis
unknown
https://www.google.com/search?q=chrome&oq=chrome&aqs=chrome..69i57j0j5l3j69i60l3.2663j0j4&sourceid=c
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://bbuseruploads.s3.amazonaws.com/f3ef24fc-08b2-408a-a2c5-1fad12572ea6/down.
unknown
https://go.micro
unknown
https://bbuseruploads.s3.amazonaws.com/f3ef24fc-08b2-408a-a2c5-1fad12572ea6/downloads/cba79466-746d-
unknown
https://web-security-reports.services.atlassian.com/csp-report/bb-website
unknown
http://cjDliFVN3QKbi0ymi0MA.WclWOx4jCqZsNQbjvsAivMLJa9uT5DhrasATByTHQ5iENK14UsJkLrDsnRarngdZ7r0MiULb
unknown
https://contoso.com/Icon
unknown
https://bitbucket.org/versal
unknown
https://github.com/Pester/Pester
unknown
https://support.google.com/installer/?product=
unknown
http://167.235.150.8:80
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/resource.bin8
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.binIua2gnOxsYQNjWglYDZ3357MMJTmqF
unknown
https://bitbucket.org/alfolod79597
unknown
https://ion=v4.5
unknown
http://www.zlib.net/D
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://bitbucket.org/D
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/minor.binin
unknown
https://aui-cdn.atlassian.com
unknown
https://bbuseruploads.s3.amazonaws.com/
unknown
https://bitbucket.org/alfolod79597/advancedapi32/downloads/minor.binl
unknown
https://t.me/dishasta
unknown
There are 61 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
65.21.119.56
unknown
United States
malicious
89.22.236.225
unknown
Russian Federation
malicious
85.209.135.109
unknown
Germany
malicious
192.168.2.3
unknown
unknown
malicious
8.8.8.8
unknown
United States
104.192.141.1
unknown
United States
45.159.188.118
unknown
Netherlands
54.231.164.65
unknown
United States
88.119.169.157
unknown
Lithuania

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
syncfiles.dll
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
umciavi64.exe
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
umciavi32.exe
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3D1000
unkown
page execute read
malicious
10C5000
unkown
page readonly
malicious
F230000
trusted library allocation
page read and write
malicious
F0D2000
trusted library allocation
page execute and read and write
malicious
E00000
unkown
page readonly
malicious
F0D0000
trusted library allocation
page read and write
malicious
F2F1000
trusted library allocation
page read and write
malicious
1151000
unkown
page execute read
malicious
E00000
unkown
page readonly
malicious
1CB7000
heap
page read and write
1A095EF9000
trusted library allocation
page read and write
1A0ACB40000
trusted library allocation
page read and write
1111000
heap
page read and write
1D290DB0000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0AC726000
heap
page read and write
83C000
heap
page read and write
61EB4000
direct allocation
page read and write
6B4000
heap
page read and write
14030000
direct allocation
page read and write
1111000
heap
page read and write
684000
heap
page read and write
EF0E000
stack
page read and write
2FF1000
heap
page read and write
1BD28E40000
unkown
page readonly
61D8A7D000
stack
page read and write
316E000
stack
page read and write
4A11000
heap
page read and write
3851000
heap
page read and write
1A0AC75C000
heap
page read and write
82C000
heap
page read and write
1111000
heap
page read and write
790000
trusted library allocation
page read and write
1A0ACB61000
trusted library allocation
page read and write
2650AFF000
stack
page read and write
6B4000
heap
page read and write
1111000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
2359C666000
heap
page read and write
2359C661000
heap
page read and write
1C7D1C6A000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
18FB6C13000
heap
page read and write
7FFBAFD90000
trusted library allocation
page read and write
A19000
heap
page read and write
C1E73FF000
stack
page read and write
34FE000
stack
page read and write
9FD64F5000
stack
page read and write
7A4000
heap
page read and write
354DBFF000
stack
page read and write
1484000
heap
page read and write
2FF1000
heap
page read and write
FE0000
heap
page read and write
6B4000
heap
page read and write
2FF1000
heap
page read and write
1A094E79000
trusted library allocation
page read and write
4C2236C000
stack
page read and write
2FF1000
heap
page read and write
4BAE000
stack
page read and write
7DF4D4AE0000
trusted library allocation
page execute and read and write
1110000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0ACCB0000
trusted library allocation
page read and write
1A0ACB70000
trusted library allocation
page read and write
7FFBAFD20000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
2FAD000
stack
page read and write
26445AA5000
heap
page read and write
1A0AC6F5000
heap
page read and write
14CB000
unkown
page execute read
750000
trusted library allocation
page read and write
2FF1000
heap
page read and write
14008000
direct allocation
page read and write
7A4000
heap
page read and write
7A4000
heap
page read and write
156A000
heap
page read and write
7FFBAFE50000
trusted library allocation
page read and write
1830B155000
heap
page read and write
4971000
heap
page read and write
7FFBAF9B4000
trusted library allocation
page read and write
4A11000
heap
page read and write
6B4000
heap
page read and write
1A0958B2000
trusted library allocation
page read and write
684000
heap
page read and write
3851000
heap
page read and write
14048000
direct allocation
page read and write
7FFBAFBC0000
trusted library allocation
page read and write
C1E75FB000
stack
page read and write
1A0ACB70000
trusted library allocation
page read and write
7FFBAFBD0000
trusted library allocation
page read and write
1A0926DC000
heap
page read and write
1A0ACF20000
trusted library allocation
page read and write
1A0ACB70000
trusted library allocation
page read and write
7FFBAFA40000
trusted library allocation
page read and write
1111000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
F76000
unkown
page readonly
1A0ACAE6000
heap
page read and write
12DDA8D0000
heap
page read and write
6B4000
heap
page read and write
14245FF000
stack
page read and write
B9B000
stack
page read and write
CDD26FE000
stack
page read and write
2FF1000
heap
page read and write
1C64000
heap
page read and write
2359C560000
heap
page read and write
1A0ACCA0000
trusted library allocation
page read and write
1A0ACB68000
trusted library allocation
page read and write
1484000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
BC0000
heap
page read and write
6B4000
heap
page read and write
4C0E000
stack
page read and write
2359C658000
heap
page read and write
1484000
heap
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
7F0000
heap
page read and write
75A3B7F000
stack
page read and write
4A11000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
7FFBAFAB0000
trusted library allocation
page execute and read and write
1A0ACCA0000
trusted library allocation
page read and write
7FFBAF9BD000
trusted library allocation
page execute and read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
7FFBF20D0000
direct allocation
page execute read
29E3000
trusted library allocation
page execute and read and write
1484000
heap
page read and write
1A0ACA5D000
heap
page read and write
FDC000
stack
page read and write
7FFBAF9AB000
trusted library allocation
page read and write
1C20B205000
heap
page read and write
1A0ACCD0000
heap
page read and write
DD4000
heap
page read and write
1A095874000
trusted library allocation
page read and write
1A0ACB60000
trusted library allocation
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
4A11000
heap
page read and write
2359C662000
heap
page read and write
1A095656000
trusted library allocation
page read and write
1A0960F9000
trusted library allocation
page read and write
1484000
heap
page read and write
1A0A4632000
trusted library allocation
page read and write
684000
heap
page read and write
684000
heap
page read and write
2891000
heap
page read and write
465E000
trusted library allocation
page read and write
1A0A4617000
trusted library allocation
page read and write
13FB0000
direct allocation
page read and write
D6BF000
stack
page read and write
684000
heap
page read and write
1A0ACCA7000
trusted library allocation
page read and write
15921E00000
heap
page read and write
1A0957EB000
trusted library allocation
page read and write
18FB6C3C000
heap
page read and write
6B4000
heap
page read and write
7FF675FF8000
unkown
page execute read
1A0ACEE0000
heap
page read and write
1A0ACB62000
trusted library allocation
page read and write
1A0ACC80000
trusted library allocation
page read and write
1A0ACB60000
trusted library allocation
page read and write
1A0ACB40000
trusted library allocation
page read and write
27A7F000
trusted library allocation
page read and write
1830AE80000
heap
page read and write
C0F000
stack
page read and write
7ED000
unkown
page execute read
6B4000
heap
page read and write
DD4000
heap
page read and write
2FF1000
heap
page read and write
6B4000
heap
page read and write
1A094548000
trusted library allocation
page read and write
7FF6758A0000
unkown
page read and write
F0F0000
remote allocation
page read and write
1484000
heap
page read and write
27895000
trusted library allocation
page read and write
14247FF000
stack
page read and write
32E0000
heap
page read and write
1484000
heap
page read and write
6B4000
heap
page read and write
2FF1000
heap
page read and write
DA3F000
stack
page read and write
1A094188000
heap
page read and write
1A464FF000
stack
page read and write
35BE000
stack
page read and write
4A11000
heap
page read and write
13DAF000
stack
page read and write
1A0ACF30000
trusted library allocation
page read and write
840000
heap
page read and write
1550000
heap
page read and write
2ED7000
heap
page read and write
6B4000
heap
page read and write
27E9B3B0000
heap
page read and write
2FF1000
heap
page read and write
684000
heap
page read and write
27A78000
trusted library allocation
page read and write
1A0ACB60000
trusted library allocation
page read and write
6B4000
heap
page read and write
31B0000
trusted library allocation
page read and write
21501F70000
direct allocation
page execute and read and write
1A0AC732000
heap
page read and write
6B4000
heap
page read and write
27A76000
trusted library allocation
page read and write
1D28F42A000
heap
page read and write
1A0ACB20000
trusted library allocation
page read and write
1A0ACB40000
trusted library allocation
page read and write
27A76000
trusted library allocation
page read and write
1A0ACA0F000
heap
page read and write
1A0957BF000
trusted library allocation
page read and write
845000
heap
page read and write
1484000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
1A09570B000
trusted library allocation
page read and write
C1E72FC000
stack
page read and write
684000
heap
page read and write
9FD657F000
stack
page read and write
1A0ACC90000
trusted library allocation
page read and write
6B4000
heap
page read and write
840000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
7FFBAF994000
trusted library allocation
page read and write
BC1000
unkown
page execute read
684000
heap
page read and write
F1952FF000
stack
page read and write
1111000
heap
page read and write
287E000
stack
page read and write
1A42EDB0000
heap
page read and write
27A98000
trusted library allocation
page read and write
1550000
heap
page read and write
15921D90000
trusted library allocation
page read and write
7FFBAF9EC000
trusted library allocation
page execute and read and write
84A000
heap
page read and write
27AD0000
trusted library allocation
page read and write
DD4000
heap
page read and write
6B4000
heap
page read and write
7FFBAFDF0000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1111000
heap
page read and write
871000
heap
page read and write
20A7E480000
remote allocation
page execute and read and write
7DF4D4AD0000
trusted library allocation
page execute and read and write
1A0ACF60000
trusted library allocation
page read and write
27AD0000
trusted library allocation
page read and write
2891000
heap
page read and write
2359CE02000
trusted library allocation
page read and write
1A0ACB24000
trusted library allocation
page read and write
A90000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
1A0ACB60000
trusted library allocation
page read and write
9C357D000
stack
page read and write
2FF1000
heap
page read and write
1401A000
direct allocation
page read and write
BC0000
unkown
page readonly
E1E000
stack
page read and write
6B4000
heap
page read and write
1111000
heap
page read and write
7FF675890000
unkown
page readonly
1111000
heap
page read and write
3851000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
7FFBAFD10000
trusted library allocation
page read and write
2359C65E000
heap
page read and write
1D28F502000
heap
page read and write
2FF1000
heap
page read and write
2FF1000
heap
page read and write
1A0ACA6A000
heap
page read and write
1A0958C6000
trusted library allocation
page read and write
2891000
heap
page read and write
684000
heap
page read and write
82C000
heap
page read and write
1A0ACB00000
trusted library allocation
page read and write
14022000
direct allocation
page read and write
2D10000
heap
page read and write
684000
heap
page read and write
FEA000
heap
page read and write
684000
heap
page read and write
2359C66C000
heap
page read and write
3D7CEFE000
stack
page read and write
9FD69FD000
stack
page read and write
2FF1000
heap
page read and write
1A0940D0000
trusted library allocation
page read and write
303D000
stack
page read and write
3D7D27B000
stack
page read and write
155A000
heap
page read and write
1484000
heap
page read and write
7FF675C4D000
unkown
page execute read
684000
heap
page read and write
684000
heap
page read and write
4971000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
1111000
heap
page read and write
27A98000
trusted library allocation
page read and write
684000
heap
page read and write
13F74000
direct allocation
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
1A0ACCA0000
trusted library allocation
page read and write
1A0ACB60000
trusted library allocation
page read and write
7FFBAFD60000
trusted library allocation
page read and write
1A095159000
trusted library allocation
page read and write
1111000
heap
page read and write
1D28F400000
heap
page read and write
7FFBAFBA0000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0926E2000
heap
page read and write
6B4000
heap
page read and write
1A09278E000
heap
page read and write
3170000
trusted library allocation
page read and write
685000
heap
page read and write
2359C5D0000
heap
page read and write
1484000
heap
page read and write
21501F30000
remote allocation
page read and write
1A0ACC80000
trusted library allocation
page read and write
1A0ACB64000
trusted library allocation
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
684000
heap
page read and write
684000
heap
page read and write
228635B5000
heap
page read and write
6B4000
heap
page read and write
27AC2000
trusted library allocation
page read and write
1A0ACA53000
heap
page read and write
32E0000
trusted library allocation
page read and write
1A09565C000
trusted library allocation
page read and write
118E000
unkown
page execute read
12DDA850000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
89B000
heap
page read and write
2FF1000
heap
page read and write
1A0ACEE0000
trusted library allocation
page read and write
2F0C000
stack
page read and write
684000
heap
page read and write
1A0ACB20000
trusted library allocation
page read and write
684000
heap
page read and write
1A09571D000
trusted library allocation
page read and write
14010000
direct allocation
page read and write
155A000
heap
page read and write
27AD0000
trusted library allocation
page read and write
DB4EF3D000
stack
page read and write
2FF1000
heap
page read and write
6B4000
heap
page read and write
92C000
stack
page read and write
7FFBAFD70000
trusted library allocation
page read and write
7FFBAFC50000
trusted library allocation
page read and write
1A0ACF50000
trusted library allocation
page read and write
1A0ACB50000
trusted library allocation
page read and write
1A0ACC80000
trusted library allocation
page read and write
6B4000
heap
page read and write
7FFBAFCD0000
trusted library allocation
page read and write
6B4000
heap
page read and write
156D000
unkown
page execute read
340F000
stack
page read and write
28F9C000
stack
page read and write
1484000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
1A0ACAE4000
heap
page read and write
4FD000
stack
page read and write
1A0ACB60000
trusted library allocation
page read and write
2FF1000
heap
page read and write
2FF1000
heap
page read and write
1C64000
heap
page read and write
1150000
unkown
page readonly
684000
heap
page read and write
15921F00000
heap
page read and write
684000
heap
page read and write
685000
heap
page read and write
27AD0000
trusted library allocation
page read and write
684000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
1484000
heap
page read and write
1A0ACCA0000
trusted library allocation
page read and write
680000
heap
page read and write
6B4000
heap
page read and write
75A3AFF000
stack
page read and write
1A0ACB71000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
9D8000
heap
page read and write
2880000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
1A0ACCA0000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1CA0000
heap
page read and write
21501902000
heap
page read and write
20A7D8E2000
heap
page read and write
1A095176000
trusted library allocation
page read and write
966000
heap
page read and write
1A0ACA52000
heap
page read and write
1A09523F000
trusted library allocation
page read and write
4B5F000
trusted library allocation
page read and write
32B7000
heap
page read and write
4A11000
heap
page read and write
2891000
heap
page read and write
684000
heap
page read and write
845000
heap
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
1484000
heap
page read and write
16E8000
heap
page read and write
684000
heap
page read and write
47B000
stack
page read and write
32C3000
heap
page read and write
684000
heap
page read and write
2FF1000
heap
page read and write
7FFBAFD33000
trusted library allocation
page read and write
1484000
heap
page read and write
F172000
trusted library allocation
page execute and read and write
1420000
heap
page read and write
ED0000
trusted library allocation
page read and write
1A0ACB40000
trusted library allocation
page read and write
1D28F45A000
heap
page read and write
3850000
heap
page read and write
1A095298000
trusted library allocation
page read and write
429A000
heap
page read and write
13DEE000
stack
page read and write
2D07000
heap
page read and write
1A0AC763000
heap
page read and write
6B4000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
6B4000
heap
page read and write
FF4000
heap
page read and write
1A0957D9000
trusted library allocation
page read and write
27BB7000
trusted library allocation
page read and write
1830B120000
unkown
page read and write
7FFBAFD50000
trusted library allocation
page read and write
1111000
heap
page read and write
10EA000
unkown
page execute read
6B4000
heap
page read and write
9CF000
heap
page read and write
6ECAEFD000
stack
page read and write
684000
heap
page read and write
4C25000
heap
page read and write
2891000
heap
page read and write
9C8000
heap
page read and write
1A0ACCA0000
trusted library allocation
page read and write
2FF1000
heap
page read and write
27992580000
heap
page read and write
7A0000
heap
page read and write
684000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
1A0928C0000
trusted library allocation
page read and write
2891000
heap
page read and write
2FF1000
heap
page read and write
684000
heap
page read and write
14044000
direct allocation
page read and write
1A0ACCB0000
trusted library allocation
page read and write
1A095457000
trusted library allocation
page read and write
6B4000
heap
page read and write
F70000
trusted library allocation
page read and write
1A0ACC80000
trusted library allocation
page read and write
6B4000
heap
page read and write
7A4000
heap
page read and write
1A095EDE000
trusted library allocation
page read and write
1117000
unkown
page execute read
1A0ACB80000
heap
page read and write
1C7D2402000
trusted library allocation
page read and write
1D28F458000
heap
page read and write
1A0ACF80000
trusted library allocation
page read and write
2359C702000
heap
page read and write
9FD798C000
stack
page read and write
6B4000
heap
page read and write
1A0AC90C000
heap
page read and write
684000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
14014000
direct allocation
page read and write
1A0AC755000
heap
page read and write
684000
heap
page read and write
4D9000
stack
page read and write
1D291000000
trusted library allocation
page read and write
684000
heap
page read and write
1D2914B5000
direct allocation
page execute and read and write
6B4000
heap
page read and write
7FFBAFCA0000
trusted library allocation
page read and write
1A0942E7000
heap
page execute and read and write
7A4000
heap
page read and write
1A0ACA97000
heap
page read and write
6B4000
heap
page read and write
9BA000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
EE0A000
stack
page read and write
1A0AC768000
heap
page read and write
22B8CC49000
heap
page read and write
27A28000
trusted library allocation
page read and write
18FB7402000
trusted library allocation
page read and write
16F0000
heap
page read and write
54E0000
direct allocation
page read and write
2891000
heap
page read and write
CDD29FE000
stack
page read and write
2FF1000
heap
page read and write
1111000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
D5E000
unkown
page readonly
1484000
heap
page read and write
7FFBAFD57000
trusted library allocation
page read and write
28AD0000
trusted library allocation
page read and write
1A0ACCA0000
trusted library allocation
page read and write
EE5000
unkown
page readonly
1D290E02000
trusted library allocation
page read and write
2FF1000
heap
page read and write
343F000
stack
page read and write
2359CD30000
trusted library allocation
page read and write
1A0ACCB0000
trusted library allocation
page read and write
35B7000
heap
page read and write
15921E28000
heap
page read and write
1484000
heap
page read and write
F80000
heap
page read and write
28B1D000
trusted library allocation
page read and write
1A0ACCA0000
trusted library allocation
page read and write
1A0ACABD000
heap
page read and write
1707000
heap
page read and write
1FD2AD55000
heap
page read and write
1A0ACB6E000
trusted library allocation
page read and write
2FF1000
heap
page read and write
684000
heap
page read and write
1111000
heap
page read and write
20A7D8BA000
heap
page read and write
F34F000
trusted library allocation
page read and write
684000
heap
page read and write
18FB6AA0000
heap
page read and write
1D28F459000
heap
page read and write
1A09525F000
trusted library allocation
page read and write
3851000
heap
page read and write
27992330000
heap
page read and write
1A42EEB0000
heap
page read and write
6B4000
heap
page read and write
2891000
heap
page read and write
6B4000
heap
page read and write
1017000
heap
page read and write
1C7D1C7F000
heap
page read and write
1A0ACCB0000
trusted library allocation
page read and write
684000
heap
page read and write
1340000
trusted library allocation
page read and write
2CAF000
stack
page read and write
684000
heap
page read and write
1A095821000
trusted library allocation
page read and write
1091000
unkown
page execute read
2891000
heap
page read and write
2891000
heap
page read and write
2FF1000
heap
page read and write
2A907880000
heap
page read and write
1484000
heap
page read and write
1484000
heap
page read and write
B3B000
stack
page read and write
2359C613000
heap
page read and write
B3F000
stack
page read and write
1400A000
direct allocation
page read and write
1E0654B000
stack
page read and write
7FFBAFB41000
trusted library allocation
page read and write
1A0ACB40000
trusted library allocation
page read and write
7FFBAF9BB000
trusted library allocation
page execute and read and write
1074000
unkown
page execute read
2150185C000
heap
page read and write
102A000
unkown
page read and write
6B4000
heap
page read and write
966000
heap
page read and write
6B4000
heap
page read and write
14050000
direct allocation
page read and write
1A42EEB7000
heap
page read and write
2FF1000
heap
page read and write
684000
heap
page read and write
1A095738000
trusted library allocation
page read and write
2821C000
stack
page read and write
1D28F484000
heap
page read and write
21501740000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
1061000
trusted library allocation
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
2FF1000
heap
page read and write
1A0AC739000
heap
page read and write
15921F13000
heap
page read and write
1A4647D000
stack
page read and write
1D290DE0000
remote allocation
page read and write
1A0ACCB0000
trusted library allocation
page read and write
684000
heap
page read and write
2FF1000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
18FB6C29000
heap
page read and write
2FF1000
heap
page read and write
684000
heap
page read and write
21501F30000
remote allocation
page read and write
15921E02000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
9FD6BBE000
stack
page read and write
832000
heap
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
2650B7F000
stack
page read and write
1A0ACB60000
trusted library allocation
page read and write
684000
heap
page read and write
4971000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
30EF000
stack
page read and write
F64000
heap
page read and write
FA4000
heap
page read and write
6B4000
heap
page read and write
6ECB07D000
stack
page read and write
14028000
direct allocation
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
10A1000
unkown
page execute read
87B000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
1A0ACF90000
trusted library allocation
page read and write
2891000
heap
page read and write
684000
heap
page read and write
13F2D000
stack
page read and write
3A70000
direct allocation
page read and write
1A0ACB40000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
1A095741000
trusted library allocation
page read and write
1A0ACEE0000
trusted library allocation
page read and write
A19000
heap
page read and write
1A095484000
trusted library allocation
page read and write
6ECACFF000
stack
page read and write
2DE0000
trusted library allocation
page read and write
F110000
trusted library allocation
page read and write
6B4000
heap
page read and write
9FD6E3E000
stack
page read and write
978000
heap
page read and write
1BD28880000
direct allocation
page execute and read and write
1830B0C0000
unkown
page read and write
7A4000
heap
page read and write
2359C65C000
heap
page read and write
6B0000
trusted library allocation
page read and write
1A0ACB70000
trusted library allocation
page read and write
D61D8BD000
stack
page read and write
6B4000
heap
page read and write
1C20AF6D000
heap
page read and write
9FD788E000
stack
page read and write
684000
heap
page read and write
F97000
heap
page read and write
1A0ACFC0000
trusted library allocation
page read and write
3150000
heap
page read and write
1A0A4574000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1111000
heap
page read and write
27DCD000
trusted library allocation
page read and write
4D1A000
trusted library allocation
page read and write
3D9000
stack
page read and write
6B4000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
6B4000
heap
page read and write
47B0000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
3A90000
direct allocation
page read and write
27AD0000
trusted library allocation
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
2359C640000
heap
page read and write
1A095227000
trusted library allocation
page read and write
1A0958A1000
trusted library allocation
page read and write
993000
heap
page read and write
684000
heap
page read and write
2FF1000
heap
page read and write
684000
heap
page read and write
2FF1000
heap
page read and write
5470000
trusted library allocation
page read and write
6ECAC7C000
stack
page read and write
4D31000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1C7D1AD0000
heap
page read and write
2FF1000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
750000
trusted library allocation
page read and write
10000000
unkown
page readonly
1A0ACA38000
heap
page read and write
15921D60000
heap
page read and write
1111000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
2891000
heap
page read and write
1111000
heap
page read and write
1FD2AE40000
heap
page read and write
1390000
heap
page read and write
6B4000
heap
page read and write
1A0ACA2B000
heap
page read and write
1A0ACCA0000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
1A0ACC8D000
trusted library allocation
page read and write
54D0000
heap
page read and write
1BD286D0000
heap
page read and write
684000
heap
page read and write
3851000
heap
page read and write
9C2CCB000
stack
page read and write
7A4000
heap
page read and write
92FEA7D000
stack
page read and write
3240000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
DAE000
stack
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
15921CF0000
heap
page read and write
1A0AC77E000
heap
page read and write
1A095898000
trusted library allocation
page read and write
684000
heap
page read and write
7FFBAFD80000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
7FF6769E7000
unkown
page write copy
1A0ACB40000
trusted library allocation
page read and write
684000
heap
page read and write
7FFBF20D0000
direct allocation
page execute read
1A096102000
trusted library allocation
page read and write
6B4000
heap
page read and write
F61000
heap
page read and write
684000
heap
page read and write
750000
trusted library allocation
page read and write
1A0ACB30000
trusted library allocation
page read and write
1A0ACB64000
trusted library allocation
page read and write
29DF20A0000
heap
page read and write
1830C900000
unkown
page read and write
D1E000
stack
page read and write
10F0000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
684000
heap
page read and write
1A09517F000
trusted library allocation
page read and write
20A7D823000
heap
page read and write
4971000
heap
page read and write
105E000
stack
page read and write
1A0958BE000
trusted library allocation
page read and write
1A095494000
trusted library allocation
page read and write
F12E000
stack
page read and write
2704503A000
heap
page read and write
1A094DB4000
trusted library allocation
page read and write
7A4000
heap
page read and write
92FEB7F000
stack
page read and write
2FF1000
heap
page read and write
2FF1000
heap
page read and write
1B6BA000
stack
page read and write
42A1000
trusted library allocation
page read and write
2650A7C000
stack
page read and write
A3F000
stack
page read and write
1A0ACCA0000
trusted library allocation
page read and write
1A0AC752000
heap
page read and write
840000
heap
page read and write
1111000
heap
page read and write
1484000
heap
page read and write
6B4000
heap
page read and write
F0F0000
remote allocation
page read and write
1A0ACC80000
trusted library allocation
page read and write
7FFBAFE20000
trusted library allocation
page read and write
110F000
stack
page read and write
20A7DE02000
heap
page read and write
20A7D813000
heap
page read and write
465E000
trusted library allocation
page read and write
47BA000
heap
page read and write
2359C683000
heap
page read and write
133CEFE000
stack
page read and write
684000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
20A7D5A0000
heap
page read and write
42A1000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
4A11000
heap
page read and write
684000
heap
page read and write
27992585000
heap
page read and write
E21000
heap
page read and write
1A0ACB48000
trusted library allocation
page read and write
1111000
heap
page read and write
24971D60000
heap
page read and write
1111000
heap
page read and write
B90000
trusted library allocation
page read and write
21501858000
heap
page read and write
EE5000
unkown
page readonly
57A0000
heap
page read and write
684000
heap
page read and write
1A09275D000
heap
page read and write
1026000
unkown
page read and write
1111000
heap
page read and write
1484000
heap
page read and write
1A09439B000
trusted library allocation
page read and write
14E0000
heap
page read and write
15922555000
direct allocation
page execute and read and write
15921E13000
heap
page read and write
1A0A462A000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
A28000
heap
page read and write
1484000
heap
page read and write
684000
heap
page read and write
1484000
heap
page read and write
6B4000
heap
page read and write
1A094EB9000
trusted library allocation
page read and write
29DF25E0000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
1D28F518000
heap
page read and write
684000
heap
page read and write
1A0ACEE9000
trusted library allocation
page read and write
F3F0000
trusted library allocation
page read and write
7FFBAFCC0000
trusted library allocation
page read and write
684000
heap
page read and write
22B8CC05000
heap
page read and write
4DC0000
heap
page read and write
6B4000
heap
page read and write
E20000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
21501F95000
direct allocation
page execute and read and write
2891000
heap
page read and write
312E000
stack
page read and write
1A0ACB74000
trusted library allocation
page read and write
7A4000
heap
page read and write
1111000
heap
page read and write
19F0000
trusted library allocation
page read and write
27A42000
trusted library allocation
page read and write
1A0AC744000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
2891000
heap
page read and write
6B4000
heap
page read and write
1FD2AC00000
heap
page read and write
6B4000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
1111000
heap
page read and write
A21000
heap
page read and write
2891000
heap
page read and write
C1E6E9C000
stack
page read and write
4820000
heap
page read and write
133D1FE000
stack
page read and write
7FFBAF9AD000
trusted library allocation
page execute and read and write
9C8000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
1A0958EF000
trusted library allocation
page read and write
22B8CC40000
heap
page read and write
1FD2AD80000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
2891000
heap
page read and write
1BD0000
unkown
page readonly
1A0ACB62000
trusted library allocation
page read and write
1A095730000
trusted library allocation
page read and write
1B8C6000
trusted library allocation
page read and write
109E000
unkown
page read and write
6B5000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
1484000
heap
page read and write
CDD277E000
stack
page read and write
1A0AD2F0000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1A09588F000
trusted library allocation
page read and write
1C20B200000
heap
page read and write
27AC2000
trusted library allocation
page read and write
2FC0000
heap
page read and write
6ECABFF000
stack
page read and write
1A0ACB60000
trusted library allocation
page read and write
2891000
heap
page read and write
1D28F48A000
heap
page read and write
C1E7B7F000
stack
page read and write
27E9B4F0000
heap
page read and write
2FF1000
heap
page read and write
6B4000
heap
page read and write
24971DD9000
heap
page read and write
1A0ACF30000
trusted library allocation
page read and write
1A0AC744000
heap
page read and write
10033000
unkown
page execute read
1A095250000
trusted library allocation
page read and write
6B4000
heap
page read and write
685000
heap
page read and write
20A7D800000
heap
page read and write
1A0ACB6D000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0ACB41000
trusted library allocation
page read and write
2891000
heap
page read and write
22B8CB50000
heap
page read and write
6B4000
heap
page read and write
1A0926FC000
heap
page read and write
6FE000
stack
page read and write
1A0ACF20000
trusted library allocation
page read and write
12DDA8DA000
heap
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
2359C600000
heap
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
1A0ACFB0000
trusted library allocation
page read and write
2FF1000
heap
page read and write
27A7F000
trusted library allocation
page read and write
6B4000
heap
page read and write
3851000
heap
page read and write
1111000
heap
page read and write
1484000
heap
page read and write
15921F02000
heap
page read and write
7FFBAFE30000
trusted library allocation
page execute and read and write
1591000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
2810C000
stack
page read and write
2C6E000
stack
page read and write
6B4000
heap
page read and write
1111000
heap
page read and write
9FD68F9000
stack
page read and write
1C7D1C6E000
heap
page read and write
61EB7000
direct allocation
page readonly
DA7D000
stack
page read and write
6B4000
heap
page read and write
1A0958AA000
trusted library allocation
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
1C20AD50000
heap
page read and write
1A094330000
heap
page read and write
21502002000
trusted library allocation
page read and write
6B4000
heap
page read and write
1402E000
direct allocation
page read and write
14CB000
unkown
page execute read
7DF4D4AC0000
trusted library allocation
page execute and read and write
1402A000
direct allocation
page read and write
1830C930000
unkown
page read and write
27E9B570000
heap
page read and write
1111000
heap
page read and write
1A096116000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0AC7F0000
trusted library allocation
page read and write
684000
heap
page read and write
1A0AC9CC000
heap
page read and write
1A0ACCB7000
trusted library allocation
page read and write
287CB000
trusted library allocation
page read and write
1A0ACF70000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
684000
heap
page read and write
2FF1000
heap
page read and write
1B9C0000
unclassified section
page read and write
6B4000
heap
page read and write
14035000
direct allocation
page read and write
6B4000
heap
page read and write
1C65000
unkown
page readonly
1A0ACCC0000
trusted library allocation
page read and write
D5E000
unkown
page readonly
180000
heap
page read and write
2FF1000
heap
page read and write
685000
heap
page read and write
1052000
unkown
page read and write
3851000
heap
page read and write
10CD000
stack
page read and write
324E000
stack
page read and write
15921DD0000
remote allocation
page execute and read and write
1A092789000
heap
page read and write
1A09274F000
heap
page read and write
14243CD000
stack
page read and write
1A0928E0000
trusted library allocation
page read and write
1A0ACB61000
trusted library allocation
page read and write
1BD288A5000
direct allocation
page execute and read and write
42A1000
trusted library allocation
page read and write
2359C64E000
heap
page read and write
27ACE000
trusted library allocation
page read and write
3851000
heap
page read and write
1111000
heap
page read and write
579000
stack
page read and write
6B4000
heap
page read and write
133CFFF000
stack
page read and write
1A0958E6000
trusted library allocation
page read and write
1A0AC6FB000
heap
page read and write
1C7D1C7A000
heap
page read and write
42A1000
trusted library allocation
page read and write
1A095714000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0ACCA0000
trusted library allocation
page read and write
4971000
heap
page read and write
1111000
heap
page read and write
2891000
heap
page read and write
16DF000
heap
page read and write
2359C63D000
heap
page read and write
FF3000
heap
page read and write
684000
heap
page read and write
1A095201000
trusted library allocation
page read and write
6B4000
heap
page read and write
20A7D902000
heap
page read and write
42A1000
trusted library allocation
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
1A0ACB61000
trusted library allocation
page read and write
790000
heap
page read and write
2A90788D000
heap
page read and write
684000
heap
page read and write
2359C676000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
22863320000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
3D0000
unkown
page readonly
7A4000
heap
page read and write
24971BB0000
heap
page read and write
82C000
heap
page read and write
1C20AE90000
heap
page read and write
6B4000
heap
page read and write
1001000
heap
page read and write
1A0ACF70000
trusted library allocation
page read and write
6B4000
heap
page read and write
83C000
heap
page read and write
1550000
heap
page read and write
105B000
unkown
page write copy
4290000
heap
page read and write
3290000
heap
page read and write
1A0ACCA0000
trusted library allocation
page read and write
684000
heap
page read and write
2FF1000
heap
page read and write
1A094E48000
trusted library allocation
page read and write
684000
heap
page read and write
14B0000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
1C4511C000
stack
page read and write
2FF1000
heap
page read and write
6B4000
heap
page read and write
1A0AC752000
heap
page read and write
1D28F2F0000
heap
page read and write
1C4547F000
stack
page read and write
1111000
heap
page read and write
2FF1000
heap
page read and write
6B4000
heap
page read and write
1A0AC748000
heap
page read and write
4C20000
heap
page read and write
1189000
unkown
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
684000
heap
page read and write
3D7D37F000
stack
page read and write
1A0ACB20000
trusted library allocation
page read and write
7FFBAFD68000
trusted library allocation
page read and write
1830AEC0000
trusted library allocation
page read and write
7FFBAF99D000
trusted library allocation
page execute and read and write
1A0ACC92000
trusted library allocation
page read and write
1484000
heap
page read and write
1484000
heap
page read and write
1E06B7F000
stack
page read and write
6B4000
heap
page read and write
2FF1000
heap
page read and write
61ED0000
direct allocation
page read and write
2FF1000
heap
page read and write
1C7D1C00000
heap
page read and write
1A095F02000
trusted library allocation
page read and write
39D0000
direct allocation
page read and write
61ED4000
direct allocation
page readonly
CCE5A7F000
stack
page read and write
2DDE000
stack
page read and write
DD4000
heap
page read and write
1A0ACC92000
trusted library allocation
page read and write
1090000
unkown
page readonly
2FF1000
heap
page read and write
4C20000
heap
page read and write
1A0ACB74000
trusted library allocation
page read and write
2359C679000
heap
page read and write
684000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
6B4000
heap
page read and write
43B000
unkown
page execute read
1D28F473000
heap
page read and write
105B000
unkown
page write copy
21501825000
heap
page read and write
1A095188000
trusted library allocation
page read and write
1A0ACB40000
trusted library allocation
page read and write
2FF1000
heap
page read and write
684000
heap
page read and write
1A0ACCA0000
trusted library allocation
page read and write
6B4000
heap
page read and write
3851000
heap
page read and write
27E9B510000
heap
page read and write
1484000
heap
page read and write
7FFBAFB30000
trusted library allocation
page read and write
F64000
heap
page read and write
1484000
heap
page read and write
1FD2AD50000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
7ED000
unkown
page execute read
14243DE000
stack
page read and write
1111000
heap
page read and write
7FFBAF9B0000
trusted library allocation
page read and write
4B5F000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
393F000
stack
page read and write
1A0ACC90000
trusted library allocation
page read and write
2FF1000
heap
page read and write
832000
heap
page read and write
6B4000
heap
page read and write
18FB7260000
trusted library allocation
page read and write
27CBE000
trusted library allocation
page read and write
1A0ACB70000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
6B4000
heap
page read and write
1484000
heap
page read and write
684000
heap
page read and write
684000
heap
page read and write
1D291040000
trusted library allocation
page read and write
685000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
92FEAFF000
stack
page read and write
DBA816D000
stack
page read and write
6B4000
heap
page read and write
1A0ACCB0000
trusted library allocation
page read and write
1A0ACB60000
trusted library allocation
page read and write
1111000
heap
page read and write
409000
unkown
page read and write
F64000
heap
page read and write
1A094160000
heap
page execute and read and write
2FF1000
heap
page read and write
1A0957AE000
trusted library allocation
page read and write
1A0ACCC0000
trusted library allocation
page read and write
21501F40000
remote allocation
page execute and read and write
6B4000
heap
page read and write
1BD288D0000
heap
page read and write
CDD28FF000
stack
page read and write
2A907887000
heap
page read and write
1A0928F0000
heap
page readonly
1A095EB6000
trusted library allocation
page read and write
684000
heap
page read and write
1111000
heap
page read and write
1A0ACACA000
heap
page read and write
6B4000
heap
page read and write
2891000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
28110000
heap
page read and write
7FFBAFCE0000
trusted library allocation
page read and write
7FFBAFC40000
trusted library allocation
page read and write
79A000
heap
page read and write
1560000
heap
page read and write
1A0AC77B000
heap
page read and write
6B4000
heap
page read and write
2FF1000
heap
page read and write
685000
heap
page read and write
10D4000
unkown
page read and write
228631E0000
heap
page read and write
1FD2AE49000
heap
page read and write
3E90000
heap
page read and write
4C0F000
stack
page read and write
6B4000
heap
page read and write
1484000
heap
page read and write
2FF1000
heap
page read and write
1A094E8A000
trusted library allocation
page read and write
C1E76FE000
stack
page read and write
1A095471000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
6B4000
heap
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
1D28F467000
heap
page read and write
6B4000
heap
page read and write
20A7D8CB000
heap
page read and write
684000
heap
page read and write
4A11000
heap
page read and write
307C000
stack
page read and write
2E60000
heap
page read and write
1A0ACCB0000
trusted library allocation
page read and write
1111000
heap
page read and write
7A4000
heap
page read and write
6B4000
heap
page read and write
1A0AC729000
heap
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
10005000
unkown
page read and write
D61D93F000
stack
page read and write
1A0ACB40000
trusted library allocation
page read and write
11BB000
unkown
page execute read
1A0ACB70000
trusted library allocation
page read and write
1A0ACB70000
trusted library allocation
page read and write
7FFBAFC90000
trusted library allocation
page read and write
1A0ACB40000
trusted library allocation
page read and write
17DE000
unkown
page readonly
1A0956F4000
trusted library allocation
page read and write
684000
heap
page read and write
1A0ACAE4000
heap
page read and write
684000
heap
page read and write
3851000
heap
page read and write
3AB0000
direct allocation
page read and write
27A29000
trusted library allocation
page read and write
684000
heap
page read and write
3A2D000
stack
page read and write
7FFBAFC00000
trusted library allocation
page read and write
4CC9000
trusted library allocation
page read and write
2891000
heap
page read and write
7FFBAFB90000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
133D0FA000
stack
page read and write
FFD000
unkown
page write copy
1A0ACC90000
trusted library allocation
page read and write
1484000
heap
page read and write
185FDDB0000
heap
page read and write
1111000
heap
page read and write
18FB6D13000
heap
page read and write
D93E000
stack
page read and write
1484000
heap
page read and write
264457F0000
heap
page read and write
684000
heap
page read and write
C1E777B000
stack
page read and write
7FFBAFB72000
trusted library allocation
page read and write
10033000
unkown
page execute read
1A0AC9A7000
heap
page read and write
21925000
trusted library allocation
page read and write
1484000
heap
page read and write
279923A0000
heap
page read and write
1C7D1C3D000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
7FFBAFD6C000
trusted library allocation
page read and write
762C67F000
stack
page read and write
1A0ACB70000
trusted library allocation
page read and write
1A0ACF40000
trusted library allocation
page read and write
109B000
unkown
page read and write
9C30FC000
stack
page read and write
1A095783000
trusted library allocation
page read and write
1A0A4341000
trusted library allocation
page read and write
1484000
heap
page read and write
109C000
unkown
page write copy
6B4000
heap
page read and write
61ED3000
direct allocation
page read and write
31AF000
stack
page read and write
1111000
heap
page read and write
7FFBF20D0000
direct allocation
page execute read
1A0ACA97000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
2359C65A000
heap
page read and write
10005000
unkown
page read and write
10001000
unkown
page execute read
14002000
direct allocation
page read and write
2823A000
heap
page read and write
684000
heap
page read and write
20A7DF32000
heap
page read and write
2359C648000
heap
page read and write
1111000
heap
page read and write
14018000
direct allocation
page read and write
2A907850000
heap
page read and write
1A0AC998000
heap
page read and write
684000
heap
page read and write
2644585B000
heap
page read and write
684000
heap
page read and write
AFC000
stack
page read and write
3851000
heap
page read and write
2FF1000
heap
page read and write
3851000
heap
page read and write
1830C9D0000
unkown
page read and write
1A0ACB70000
trusted library allocation
page read and write
1BD0000
unkown
page readonly
684000
heap
page read and write
1C64000
heap
page read and write
42A1000
trusted library allocation
page read and write
1A0ACB70000
trusted library allocation
page read and write
6B4000
heap
page read and write
26445AA0000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
1A0ACF60000
trusted library allocation
page read and write
6B4000
heap
page read and write
1484000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
F0F0000
remote allocation
page read and write
3308000
heap
page read and write
15921E3C000
heap
page read and write
1A0ACF90000
trusted library allocation
page read and write
1A0958D5000
trusted library allocation
page read and write
16B9000
heap
page read and write
42A1000
trusted library allocation
page read and write
2891000
heap
page read and write
7FFBAF993000
trusted library allocation
page execute and read and write
1111000
heap
page read and write
6B4000
heap
page read and write
1BD28850000
remote allocation
page execute and read and write
40E000
unkown
page execute read
3E8A000
heap
page read and write
4B5F000
trusted library allocation
page read and write
2359C570000
heap
page read and write
31E0000
heap
page read and write
1A0AC904000
heap
page read and write
684000
heap
page read and write
1A0ACF40000
trusted library allocation
page read and write
9FD6CBE000
stack
page read and write
7FF6769E7000
unkown
page write copy
7A4000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
1A092920000
heap
page read and write
1A0AC736000
heap
page read and write
157A000
heap
page read and write
1A0AC744000
heap
page read and write
2359C645000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
3D7D07E000
stack
page read and write
1A0ACB68000
trusted library allocation
page read and write
6B4000
heap
page read and write
18FB6C43000
heap
page read and write
1A0ACB50000
trusted library allocation
page read and write
1A0ACB60000
trusted library allocation
page read and write
156D000
unkown
page execute read
105C000
unkown
page readonly
1111000
heap
page read and write
435000
unkown
page read and write
2FF1000
heap
page read and write
1A0ACEF0000
trusted library allocation
page read and write
7A4000
heap
page read and write
10000000
unkown
page readonly
2C90000
heap
page read and write
1A0AC722000
heap
page read and write
279923AA000
heap
page read and write
22863359000
heap
page read and write
3851000
heap
page read and write
4C223EF000
stack
page read and write
1D28F402000
heap
page read and write
7FFBF20D0000
direct allocation
page execute read
2891000
heap
page read and write
1A0951CB000
trusted library allocation
page read and write
2FF1000
heap
page read and write
BC0000
unkown
page readonly
353E000
stack
page read and write
36BF000
stack
page read and write
7A4000
heap
page read and write
6B4000
heap
page read and write
2F40000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
1111000
heap
page read and write
C1E747E000
stack
page read and write
2FF1000
heap
page read and write
1484000
heap
page read and write
762C38F000
stack
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
685000
heap
page read and write
684000
heap
page read and write
C1E787D000
stack
page read and write
1111000
heap
page read and write
4B53000
trusted library allocation
page read and write
9389ADD000
stack
page read and write
7A4000
heap
page read and write
1111000
heap
page read and write
185FDE35000
heap
page read and write
1A0ACB67000
trusted library allocation
page read and write
684000
heap
page read and write
770000
heap
page read and write
684000
heap
page read and write
7FFBAFD00000
trusted library allocation
page read and write
15921E24000
heap
page read and write
2359C63A000
heap
page read and write
1A0ACB61000
trusted library allocation
page read and write
1A0942E0000
heap
page execute and read and write
1111000
heap
page read and write
6B4000
heap
page read and write
2891000
heap
page read and write
1A0ACCA0000
trusted library allocation
page read and write
3851000
heap
page read and write
1A0926DE000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
4A11000
heap
page read and write
1484000
heap
page read and write
684000
heap
page read and write
1A0ACA6A000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
1400C000
direct allocation
page read and write
F050000
trusted library allocation
page read and write
1A0ACB70000
trusted library allocation
page read and write
684000
heap
page read and write
3950000
trusted library allocation
page read and write
12DDAAA0000
heap
page read and write
684000
heap
page read and write
3A60000
heap
page read and write
7FFBAFD70000
trusted library allocation
page execute and read and write
BC0000
unkown
page readonly
1A09527F000
trusted library allocation
page read and write
32D0000
heap
page read and write
7FFBAF9A3000
trusted library allocation
page read and write
4971000
heap
page read and write
1590000
heap
page read and write
1484000
heap
page read and write
1E06E7E000
stack
page read and write
1A0ACF10000
trusted library allocation
page read and write
27AD2000
trusted library allocation
page read and write
3851000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
34BE000
stack
page read and write
1A092925000
heap
page read and write
4240000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
F0D0000
trusted library allocation
page execute and read and write
4971000
heap
page read and write
2DA0000
heap
page read and write
684000
heap
page read and write
1724000
heap
page read and write
1A0AC76D000
heap
page read and write
228635B0000
heap
page read and write
42A1000
trusted library allocation
page read and write
1A0AC77A000
heap
page read and write
684000
heap
page read and write
2FF1000
heap
page read and write
24971CF0000
heap
page read and write
3851000
heap
page read and write
9FD6DBF000
stack
page read and write
16B0000
heap
page read and write
1D28F440000
heap
page read and write
1A0AC771000
heap
page read and write
F9E000
stack
page read and write
F12E000
stack
page read and write
7FFBAFBC5000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
16BC000
heap
page read and write
1C7D1C60000
heap
page read and write
7A4000
heap
page read and write
6B4000
heap
page read and write
1D28F280000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
155A000
heap
page read and write
CCE578D000
stack
page read and write
2FF1000
heap
page read and write
98F000
stack
page read and write
6B4000
heap
page read and write
1A0ACB30000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
1A0ACB70000
trusted library allocation
page read and write
1A0ACB60000
trusted library allocation
page read and write
1484000
heap
page read and write
6B4000
heap
page read and write
7A4000
heap
page read and write
7FFBAFA76000
trusted library allocation
page execute and read and write
684000
heap
page read and write
1A0ACCBD000
trusted library allocation
page read and write
1A095703000
trusted library allocation
page read and write
EF4D000
stack
page read and write
6B4000
heap
page read and write
27992350000
heap
page read and write
424A000
heap
page read and write
1E06C7B000
stack
page read and write
9C327F000
stack
page read and write
6B4000
heap
page read and write
4B30000
heap
page read and write
14042000
direct allocation
page read and write
1111000
heap
page read and write
684000
heap
page read and write
2359C631000
heap
page read and write
BA0000
trusted library allocation
page read and write
1A42EC70000
heap
page read and write
DD4000
heap
page read and write
6B4000
heap
page read and write
22863450000
heap
page read and write
6B4000
heap
page read and write
18FB7280000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
27A9C000
trusted library allocation
page read and write
316E000
stack
page read and write
185FDE40000
heap
page read and write
12DDABD5000
heap
page read and write
1A092660000
heap
page read and write
1A0951F8000
trusted library allocation
page read and write
1A095107000
trusted library allocation
page read and write
1111000
heap
page read and write
24971D65000
heap
page read and write
7FFBAFC60000
trusted library allocation
page read and write
2FF1000
heap
page read and write
3D7D17E000
stack
page read and write
2891000
heap
page read and write
9FD6FBE000
stack
page read and write
1A0ACB40000
trusted library allocation
page read and write
1A0AC73E000
heap
page read and write
27045130000
heap
page read and write
54D5000
heap
page read and write
279D6000
trusted library allocation
page read and write
105C000
unkown
page readonly
1A0ACB70000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
2830000
heap
page read and write
1499000
unkown
page execute read
4B56000
trusted library allocation
page read and write
684000
heap
page read and write
10004000
unkown
page readonly
4B90000
heap
page read and write
1A0AC731000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
10006000
unkown
page execute read
1A0ACCB0000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1B4BF000
stack
page read and write
7A4000
heap
page read and write
7A4000
heap
page read and write
2891000
heap
page read and write
1A09610E000
trusted library allocation
page read and write
117F000
unkown
page readonly
684000
heap
page read and write
1027000
unkown
page write copy
1484000
heap
page read and write
B5C000
stack
page read and write
1C20AF6B000
heap
page read and write
684000
heap
page read and write
1CAA000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
3851000
heap
page read and write
1A0ACCA0000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0ACCC0000
trusted library allocation
page read and write
3460000
heap
page read and write
1A095F8B000
trusted library allocation
page read and write
28230000
heap
page read and write
20A7D829000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
6B4000
heap
page read and write
2FF1000
heap
page read and write
684000
heap
page read and write
1A0ACAD6000
heap
page read and write
1A0ACB20000
trusted library allocation
page read and write
1A094341000
trusted library allocation
page read and write
7A4000
heap
page read and write
2891000
heap
page read and write
1A09549E000
trusted library allocation
page read and write
1A0AC960000
heap
page read and write
1A0ACC91000
trusted library allocation
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
11B5000
unkown
page read and write
2A90788B000
heap
page read and write
42A1000
trusted library allocation
page read and write
1A0926A0000
heap
page read and write
1A42EDD0000
heap
page read and write
2359C602000
heap
page read and write
10434000
unkown
page execute read
1A0ACAB2000
heap
page read and write
7FFBAFE60000
trusted library allocation
page read and write
1A0926B3000
heap
page read and write
1D28F290000
heap
page read and write
2834000
heap
page read and write
2FF1000
heap
page read and write
1111000
heap
page read and write
22B8CB70000
heap
page read and write
1111000
heap
page read and write
1A095685000
trusted library allocation
page read and write
7DE000
stack
page read and write
3851000
heap
page read and write
42A1000
trusted library allocation
page read and write
1484000
heap
page read and write
2FF1000
heap
page read and write
2359C629000
heap
page read and write
DD4000
heap
page read and write
1484000
heap
page read and write
1A0AC701000
heap
page read and write
BA0000
trusted library allocation
page read and write
9FD6A7E000
stack
page read and write
1A0ACB50000
trusted library allocation
page read and write
1A0AC99F000
heap
page read and write
A19000
heap
page read and write
7A4000
heap
page read and write
42A1000
trusted library allocation
page read and write
26445810000
heap
page read and write
2FF1000
heap
page read and write
18FB6A90000
heap
page read and write
15921E57000
heap
page read and write
5480000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
83A000
heap
page read and write
1A0ACC91000
trusted library allocation
page read and write
1A0AC71C000
heap
page read and write
1BD28AA5000
heap
page read and write
1A09587D000
trusted library allocation
page read and write
7FF675C4A000
unkown
page read and write
6B4000
heap
page read and write
42A1000
trusted library allocation
page read and write
14004000
direct allocation
page read and write
4971000
heap
page read and write
32DE000
stack
page read and write
1C60000
heap
page read and write
1A094E82000
trusted library allocation
page read and write
2359C646000
heap
page read and write
1111000
unkown
page read and write
1A095230000
trusted library allocation
page read and write
1A0956E4000
trusted library allocation
page read and write
684000
heap
page read and write
1F0000
heap
page read and write
2FF1000
heap
page read and write
18FB6C02000
heap
page read and write
7A4000
heap
page read and write
24971DD0000
heap
page read and write
2359C657000
heap
page read and write
9FD6B3E000
stack
page read and write
9BA000
heap
page read and write
684000
heap
page read and write
1A0958FE000
trusted library allocation
page read and write
1B2BE000
stack
page read and write
159A000
heap
page read and write
6B4000
heap
page read and write
1A0AC70B000
heap
page read and write
354DE7E000
stack
page read and write
7FFBAFBE0000
trusted library allocation
page read and write
1111000
heap
page read and write
2891000
heap
page read and write
1210000
heap
page read and write
7F3000
heap
page read and write
7FFBAFB80000
trusted library allocation
page execute and read and write
3851000
heap
page read and write
1A0ACB20000
trusted library allocation
page read and write
7A4000
heap
page read and write
684000
heap
page read and write
F194FFD000
stack
page read and write
1A094176000
heap
page read and write
684000
heap
page read and write
15921E79000
heap
page read and write
6B4000
heap
page read and write
20A7D7D0000
trusted library allocation
page read and write
1A0AC6A4000
heap
page read and write
7A4000
heap
page read and write
30E0000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
1BD28AB0000
unkown
page readonly
684000
heap
page read and write
1550000
heap
page read and write
6B4000
heap
page read and write
185FDE30000
heap
page read and write
684000
heap
page read and write
5450000
heap
page read and write
3FF000
unkown
page readonly
15921E68000
heap
page read and write
1029000
unkown
page write copy
6B4000
heap
page read and write
9FD6AFC000
stack
page read and write
1484000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
18FB6C67000
heap
page read and write
29DF2200000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
27A97000
trusted library allocation
page read and write
15922530000
direct allocation
page execute and read and write
1A0AC9EB000
heap
page read and write
1484000
heap
page read and write
78E000
stack
page read and write
6B4000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
684000
heap
page read and write
42A1000
trusted library allocation
page read and write
1111000
heap
page read and write
2891000
heap
page read and write
32B0000
heap
page read and write
1111000
heap
page read and write
1002D000
unkown
page read and write
2891000
heap
page read and write
6B4000
heap
page read and write
18FB6C67000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
3EEA000
heap
page read and write
27ACD000
trusted library allocation
page read and write
27ACD000
trusted library allocation
page read and write
18FB6C00000
heap
page read and write
27A47000
trusted library allocation
page read and write
1A095267000
trusted library allocation
page read and write
B8E000
stack
page read and write
1A0AC6DA000
heap
page read and write
10004000
unkown
page readonly
1A0ACB40000
trusted library allocation
page read and write
3958000
direct allocation
page read and write
7A4000
heap
page read and write
1A0AC908000
heap
page read and write
FD0000
heap
page read and write
7FFBAFBB0000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1A0ACCB9000
trusted library allocation
page read and write
6B4000
heap
page read and write
10A1000
unkown
page execute read
1A0ACB20000
trusted library allocation
page read and write
4DF000
stack
page read and write
9FD65FF000
stack
page read and write
1A0ACEF0000
trusted library allocation
page read and write
7FFBAFCF5000
trusted library allocation
page read and write
1A0ACC80000
trusted library allocation
page read and write
6B4000
heap
page read and write
DD4000
heap
page read and write
4971000
heap
page read and write
1A0AC754000
heap
page read and write
6B4000
heap
page read and write
1A0ACC94000
trusted library allocation
page read and write
2DC000
stack
page read and write
1A0ACB60000
trusted library allocation
page read and write
482A000
heap
page read and write
1A092776000
heap
page read and write
684000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
142A000
heap
page read and write
3D7CE7D000
stack
page read and write
1BD28830000
heap
page read and write
DD0000
heap
page read and write
7DD000
stack
page read and write
6B4000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
982000
heap
page read and write
22B8CA10000
heap
page read and write
6B4000
heap
page read and write
1484000
heap
page read and write
82F000
heap
page read and write
6B4000
heap
page read and write
7A4000
heap
page read and write
8F0000
heap
page read and write
96A000
stack
page read and write
1A0ACA7A000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
1484000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
EE5000
unkown
page readonly
1484000
heap
page read and write
7A4000
heap
page read and write
2FF1000
heap
page read and write
14000000
direct allocation
page read and write
1A0ACB60000
trusted library allocation
page read and write
1A0ACF10000
trusted library allocation
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
28E9E000
stack
page read and write
4B52000
trusted library allocation
page read and write
1A0ACC80000
trusted library allocation
page read and write
684000
heap
page read and write
1A0AC73B000
heap
page read and write
1484000
heap
page read and write
684000
heap
page read and write
1591000
heap
page read and write
1A0AC900000
heap
page read and write
1111000
heap
page read and write
C1E797E000
stack
page read and write
684000
heap
page read and write
1220000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
14B4000
heap
page read and write
1D291490000
direct allocation
page execute and read and write
4B59000
trusted library allocation
page read and write
1C20AEB0000
heap
page read and write
1A0ACCC0000
trusted library allocation
page read and write
2891000
heap
page read and write
D5E000
stack
page read and write
1C20AF60000
heap
page read and write
2FF1000
heap
page read and write
10001000
unkown
page execute read
1A0ACA4D000
heap
page read and write
1570000
heap
page read and write
2FF1000
heap
page read and write
1A094DDC000
trusted library allocation
page read and write
750000
trusted library allocation
page read and write
684000
heap
page read and write
684000
heap
page read and write
20A7DF00000
heap
page read and write
94A000
heap
page read and write
1111000
heap
page read and write
101E000
stack
page read and write
133CB7E000
stack
page read and write
1A0ACB60000
trusted library allocation
page read and write
E21000
heap
page read and write
2FAE000
stack
page read and write
1A0ACB20000
trusted library allocation
page read and write
1A09577A000
trusted library allocation
page read and write
1A0ACB40000
trusted library allocation
page read and write
6B4000
heap
page read and write
2FF1000
heap
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
1A0926E6000
heap
page read and write
29CE000
stack
page read and write
DB4EFBE000
stack
page read and write
1484000
heap
page read and write
1A095FA4000
trusted library allocation
page read and write
1484000
heap
page read and write
1A0ACB40000
trusted library allocation
page read and write
47A3000
trusted library allocation
page read and write
1A0ACB67000
trusted library allocation
page read and write
1A0AC759000
heap
page read and write
684000
heap
page read and write
F60000
heap
page read and write
684000
heap
page read and write
7A4000
heap
page read and write
6B4000
heap
page read and write
1111000
heap
page read and write
7E0000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0ACA30000
heap
page read and write
2359C67D000
heap
page read and write
7A4000
heap
page read and write
3D7CBFB000
stack
page read and write
9B1000
heap
page read and write
2FF1000
heap
page read and write
199C000
stack
page read and write
1830C9C4000
heap
page read and write
1A095763000
trusted library allocation
page read and write
185FDEE9000
heap
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
1111000
heap
page read and write
F61000
heap
page read and write
FB0000
trusted library allocation
page read and write
1A0957B6000
trusted library allocation
page read and write
1A095EF0000
trusted library allocation
page read and write
F60000
heap
page read and write
1A09516E000
trusted library allocation
page read and write
1A0ACB40000
trusted library allocation
page read and write
20A7D843000
heap
page read and write
DABE000
stack
page read and write
27A42000
trusted library allocation
page read and write
1A0ACB30000
trusted library allocation
page read and write
684000
heap
page read and write
31E8000
heap
page read and write
15921D00000
heap
page read and write
1A0ACB67000
trusted library allocation
page read and write
6B4000
heap
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
685000
heap
page read and write
1A095EA2000
trusted library allocation
page read and write
24971D10000
heap
page read and write
2359C67A000
heap
page read and write
7FFBAFB4D000
trusted library allocation
page read and write
640000
trusted library allocation
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
7FFBAFE10000
trusted library allocation
page read and write
1A0951C3000
trusted library allocation
page read and write
1A0ACB24000
trusted library allocation
page read and write
1830B0A0000
heap
page read and write
1A0AC74B000
heap
page read and write
346A000
heap
page read and write
685000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
1111000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
A1A000
heap
page read and write
6B4000
heap
page read and write
21501802000
heap
page read and write
2150183C000
heap
page read and write
6B4000
heap
page read and write
1D28F459000
heap
page read and write
1A0AC698000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
1C7D1C02000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
22B8CC00000
heap
page read and write
328F000
stack
page read and write
1A0ACB70000
trusted library allocation
page read and write
4970000
heap
page read and write
CDD2AFE000
stack
page read and write
9C337E000
stack
page read and write
C1E757E000
stack
page read and write
9B1000
heap
page read and write
21501829000
heap
page read and write
6B4000
heap
page read and write
66E000
stack
page read and write
1830AEDB000
heap
page read and write
684000
heap
page read and write
2ED0000
heap
page read and write
1A0AC99D000
heap
page read and write
7FFBAFA46000
trusted library allocation
page read and write
6B4000
heap
page read and write
2891000
heap
page read and write
2650BFF000
stack
page read and write
28AF7000
trusted library allocation
page read and write
684000
heap
page read and write
1A42EEBD000
heap
page read and write
2891000
heap
page read and write
F2F1000
trusted library allocation
page read and write
684000
heap
page read and write
31C0000
heap
page read and write
2FF1000
heap
page read and write
1A092680000
heap
page read and write
6B4000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
7FF675C81000
unkown
page read and write
1A0AC734000
heap
page read and write
6B4000
heap
page read and write
1D28F513000
heap
page read and write
684000
heap
page read and write
1830B130000
unkown
page read and write
1A0926A9000
heap
page read and write
1111000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
F3F0000
trusted library allocation
page read and write
1A0AC9A9000
heap
page read and write
1A092781000
heap
page read and write
1A0ACB50000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
3851000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
7FFBAFE00000
trusted library allocation
page read and write
1A0AC771000
heap
page read and write
1A0ACEF7000
trusted library allocation
page read and write
21501827000
heap
page read and write
7FFBAFC70000
trusted library allocation
page read and write
A3C000
stack
page read and write
1A0ACB70000
trusted library allocation
page read and write
684000
heap
page read and write
29DF2300000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
1111000
heap
page read and write
1A095752000
trusted library allocation
page read and write
2FF1000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
A1A000
heap
page read and write
910000
heap
page execute and read and write
2890000
heap
page read and write
FA4000
heap
page read and write
21501800000
heap
page read and write
6B4000
heap
page read and write
DBA81EF000
stack
page read and write
27045260000
heap
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
97E000
heap
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
1C7D1BD0000
trusted library allocation
page read and write
27AB0000
trusted library allocation
page read and write
215017D0000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0ACA7A000
heap
page read and write
1A0ACCB1000
trusted library allocation
page read and write
82F000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
1A0ACB71000
trusted library allocation
page read and write
831000
heap
page read and write
21501F30000
remote allocation
page read and write
1A0AC932000
heap
page read and write
1830AEE0000
heap
page read and write
1A095818000
trusted library allocation
page read and write
684000
heap
page read and write
F50000
trusted library allocation
page read and write
1A092723000
heap
page read and write
7A4000
heap
page read and write
684000
heap
page read and write
79E000
stack
page read and write
3851000
heap
page read and write
6B4000
heap
page read and write
1400E000
direct allocation
page read and write
684000
heap
page read and write
7FF675C87000
unkown
page execute read
4A11000
heap
page read and write
7ED000
unkown
page execute read
2359C65F000
heap
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
14EA000
heap
page read and write
20A7D886000
heap
page read and write
7FFBAFE70000
trusted library allocation
page read and write
12DDAAC0000
heap
page read and write
20A7D913000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
1BD28810000
heap
page read and write
2FF1000
heap
page read and write
27045030000
heap
page read and write
270000
heap
page read and write
1A42EEBB000
heap
page read and write
7FFBAFDF3000
trusted library allocation
page read and write
3A7F000
stack
page read and write
6B4000
heap
page read and write
18FB6C43000
heap
page read and write
2359C66A000
heap
page read and write
1830C990000
unkown
page read and write
684000
heap
page read and write
9FD6EBB000
stack
page read and write
18FB6B00000
heap
page read and write
7A4000
heap
page read and write
F3F0000
trusted library allocation
page read and write
F5E000
stack
page read and write
1111000
heap
page read and write
FD0000
heap
page read and write
1A0AC74C000
heap
page read and write
1830AE10000
heap
page read and write
1A0ACC98000
trusted library allocation
page read and write
1A0ACCA0000
trusted library allocation
page read and write
F90000
heap
page read and write
7FFBAFCF0000
trusted library allocation
page read and write
7A4000
heap
page read and write
1A0ACEE0000
trusted library allocation
page read and write
4971000
heap
page read and write
1C7D1C2A000
heap
page read and write
FDA000
heap
page read and write
2D3C000
stack
page read and write
1A0ACB60000
trusted library allocation
page read and write
6B4000
heap
page read and write
1BD28AA0000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
4A11000
heap
page read and write
1A0ACC81000
trusted library allocation
page read and write
9389BDF000
stack
page read and write
1484000
heap
page read and write
1403C000
direct allocation
page read and write
6B4000
heap
page read and write
1A0ACA7A000
heap
page read and write
1A0951D9000
trusted library allocation
page read and write
2891000
heap
page read and write
1A4657F000
stack
page read and write
740000
heap
page read and write
1111000
heap
page read and write
1111000
heap
page read and write
D60000
unkown
page write copy
1A0ACC80000
trusted library allocation
page read and write
18FB6D18000
heap
page read and write
1A0AC707000
heap
page read and write
684000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
1A09579E000
trusted library allocation
page read and write
8C0000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
1C7D1A60000
heap
page read and write
9FD687E000
stack
page read and write
684000
heap
page read and write
383E000
stack
page read and write
7FF6769E6000
unkown
page readonly
1484000
heap
page read and write
7FFBAFC20000
trusted library allocation
page read and write
BC1000
unkown
page execute read
3EE0000
heap
page read and write
1032000
unkown
page read and write
1A0ACCA0000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
1A0ACCC0000
trusted library allocation
page read and write
133CAFE000
stack
page read and write
6B4000
heap
page read and write
2FF1000
heap
page read and write
2FF1000
heap
page read and write
1A0AC75A000
heap
page read and write
1028000
unkown
page read and write
1A0ACA23000
heap
page read and write
1B5BB000
stack
page read and write
1A0ACB70000
trusted library allocation
page read and write
264456B0000
heap
page read and write
20A7D600000
heap
page read and write
1484000
heap
page read and write
BC0000
unkown
page readonly
1A0ACCC0000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
1484000
heap
page read and write
1830B0F0000
unkown
page read and write
1A0ACB70000
trusted library allocation
page read and write
1484000
heap
page read and write
9C387C000
stack
page read and write
3D0000
unkown
page readonly
34C0000
heap
page read and write
2A907A50000
heap
page read and write
1499000
unkown
page execute read
1C7D1C5A000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
4B51000
trusted library allocation
page read and write
348F000
stack
page read and write
FA4000
heap
page read and write
6B4000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
1A0ACB70000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
1A09514D000
trusted library allocation
page read and write
6B4000
heap
page read and write
9C8000
heap
page read and write
29DF230B000
heap
page read and write
2FF1000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
3300000
heap
page read and write
1A0ACB40000
trusted library allocation
page read and write
2FF1000
heap
page read and write
2A907C25000
heap
page read and write
1A0ACCC0000
trusted library allocation
page read and write
61D8AFE000
stack
page read and write
3A72000
direct allocation
page read and write
215017A0000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
684000
heap
page read and write
4B57000
trusted library allocation
page read and write
6B4000
heap
page read and write
1074000
unkown
page execute read
2FB0000
trusted library allocation
page read and write
28240000
trusted library allocation
page read and write
1A094320000
trusted library allocation
page read and write
8A1000
heap
page read and write
6B4000
heap
page read and write
3950000
direct allocation
page read and write
6B4000
heap
page read and write
9C367C000
stack
page read and write
1BD288DB000
heap
page read and write
7FFBAFC30000
trusted library allocation
page read and write
6B4000
heap
page read and write
E21000
heap
page read and write
1A0ACF19000
trusted library allocation
page read and write
1A0ACB60000
trusted library allocation
page read and write
7FFBAFD54000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1830AED0000
heap
page read and write
397E000
stack
page read and write
6ECA79C000
stack
page read and write
D8FF000
stack
page read and write
1484000
heap
page read and write
684000
heap
page read and write
C1E7A7D000
stack
page read and write
61E01000
direct allocation
page execute read
684000
heap
page read and write
1A095772000
trusted library allocation
page read and write
27E9B57A000
heap
page read and write
1A094100000
trusted library allocation
page read and write
6B4000
heap
page read and write
13EEF000
stack
page read and write
1A0ACB00000
trusted library allocation
page read and write
1A0ACB60000
trusted library allocation
page read and write
1111000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
7FF6769E6000
unkown
page readonly
6B4000
heap
page read and write
27AD5000
trusted library allocation
page read and write
1A0ACB40000
trusted library allocation
page read and write
10006000
unkown
page execute read
F22F000
stack
page read and write
684000
heap
page read and write
7FFBAF990000
trusted library allocation
page read and write
2FF1000
heap
page read and write
6B4000
heap
page read and write
6B5000
heap
page read and write
F76000
unkown
page readonly
9C8000
heap
page read and write
1484000
heap
page read and write
9FD6C3A000
stack
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
1A0ACB22000
trusted library allocation
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
32D8000
heap
page read and write
6B4000
heap
page read and write
831000
heap
page read and write
1A0ACB64000
trusted library allocation
page read and write
9D8000
heap
page read and write
29D0000
heap
page read and write
279B0000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
762C30D000
stack
page read and write
6B4000
heap
page read and write
26445850000
heap
page read and write
1A092900000
trusted library allocation
page read and write
7A4000
heap
page read and write
7FFBAFC27000
trusted library allocation
page read and write
7FFBAF9A0000
trusted library allocation
page read and write
1A0AC8F0000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A095247000
trusted library allocation
page read and write
1A0959E9000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1A0ACF00000
trusted library allocation
page read and write
1A0AC74F000
heap
page read and write
684000
heap
page read and write
FF6000
unkown
page read and write
684000
heap
page read and write
7A4000
heap
page read and write
2FF1000
heap
page read and write
1484000
heap
page read and write
684000
heap
page read and write
1A094324000
trusted library allocation
page read and write
1111000
heap
page read and write
1A0ACA57000
heap
page read and write
15921E64000
heap
page read and write
1111000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
F3F0000
trusted library allocation
page read and write
7FFBAFD30000
trusted library allocation
page read and write
1A0ACCA0000
trusted library allocation
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
D60000
unkown
page read and write
6B4000
heap
page read and write
1111000
heap
page read and write
14012000
direct allocation
page read and write
6B4000
heap
page read and write
7A4000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
2A907C20000
heap
page read and write
2FF1000
heap
page read and write
684000
heap
page read and write
2FF1000
heap
page read and write
FA0000
trusted library allocation
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
2891000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
4A11000
heap
page read and write
9FD6D3E000
stack
page read and write
1A09548C000
trusted library allocation
page read and write
1A0A439D000
trusted library allocation
page read and write
1A09279E000
heap
page read and write
7A4000
heap
page read and write
1484000
heap
page read and write
2FF1000
heap
page read and write
1A0AC762000
heap
page read and write
1830C9C0000
heap
page read and write
7FF675FF8000
unkown
page execute read
680000
trusted library allocation
page read and write
1A092620000
heap
page read and write
1A0951F0000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A09527B000
trusted library allocation
page read and write
3EA0000
heap
page read and write
1A09575A000
trusted library allocation
page read and write
2891000
heap
page read and write
279921F0000
heap
page read and write
684000
heap
page read and write
2FF1000
heap
page read and write
BC1000
unkown
page execute read
3851000
heap
page read and write
2FF1000
heap
page read and write
684000
heap
page read and write
1B7BF000
stack
page read and write
1A0ACB44000
trusted library allocation
page read and write
2359C664000
heap
page read and write
14016000
direct allocation
page read and write
6B4000
heap
page read and write
1A0AC9EE000
heap
page read and write
3851000
heap
page read and write
1A0ACF50000
trusted library allocation
page read and write
1A42F100000
heap
page read and write
20A7E4D5000
direct allocation
page execute and read and write
1A0ACC80000
trusted library allocation
page read and write
1A095400000
trusted library allocation
page read and write
7FFBAFCB0000
trusted library allocation
page read and write
CDD2BFF000
stack
page read and write
1A095414000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
685000
heap
page read and write
3A30000
heap
page read and write
6B4000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
685000
heap
page read and write
2FF1000
heap
page read and write
2891000
heap
page read and write
978000
heap
page read and write
1A09510B000
trusted library allocation
page read and write
10434000
unkown
page execute read
1111000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
2FF1000
heap
page read and write
684000
heap
page read and write
2FF1000
heap
page read and write
1A0ACB40000
trusted library allocation
page read and write
1A0AC974000
heap
page read and write
685000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
18FB6D02000
heap
page read and write
4BC0000
heap
page read and write
27A78000
trusted library allocation
page read and write
6B4000
heap
page read and write
1830000
heap
page read and write
1BD288B0000
unkown
page readonly
1A0ACB60000
trusted library allocation
page read and write
320E000
stack
page read and write
6B4000
heap
page read and write
27A9C000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
1A0ACA03000
heap
page read and write
2D00000
heap
page read and write
1A0ACB50000
trusted library allocation
page read and write
1484000
heap
page read and write
4B5D000
trusted library allocation
page read and write
1A094F79000
trusted library allocation
page read and write
1E06A7B000
stack
page read and write
31BE000
stack
page read and write
684000
heap
page read and write
684000
heap
page read and write
328E000
stack
page read and write
684000
heap
page read and write
9C347E000
stack
page read and write
6B4000
heap
page read and write
FA0000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
1A0ACB00000
heap
page execute and read and write
1A0ACB60000
trusted library allocation
page read and write
1A095887000
trusted library allocation
page read and write
6B4000
heap
page read and write
6B0000
heap
page read and write
9FD6979000
stack
page read and write
2891000
heap
page read and write
6B4000
heap
page read and write
1C7D1D02000
heap
page read and write
2359C642000
heap
page read and write
133CA7B000
stack
page read and write
6B4000
heap
page read and write
12DDABD0000
heap
page read and write
684000
heap
page read and write
12FB000
stack
page read and write
F19527F000
stack
page read and write
4D57000
trusted library allocation
page read and write
1A0ACC98000
trusted library allocation
page read and write
1A0ACCC0000
trusted library allocation
page read and write
684000
heap
page read and write
7FF675891000
unkown
page execute read
1111000
heap
page read and write
2FF1000
heap
page read and write
2FF1000
heap
page read and write
7FFBAFBF0000
trusted library allocation
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
61E00000
direct allocation
page execute and read and write
1C7D1A70000
heap
page read and write
3311000
heap
page read and write
CCE5AFF000
stack
page read and write
1A0ACA5D000
heap
page read and write
1484000
heap
page read and write
74C000
heap
page read and write
6B4000
heap
page read and write
20A7D888000
heap
page read and write
7FFBAFB60000
trusted library allocation
page execute and read and write
1484000
heap
page read and write
27E9B6F0000
heap
page read and write
7A4000
heap
page read and write
3ABD000
stack
page read and write
1A0ACC80000
trusted library allocation
page read and write
36FE000
stack
page read and write
AF0000
heap
page read and write
18FB6D14000
heap
page read and write
F34A000
trusted library allocation
page read and write
83A000
heap
page read and write
6B4000
heap
page read and write
312D000
stack
page read and write
1D290DE0000
remote allocation
page read and write
14052000
direct allocation
page read and write
684000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
3851000
heap
page read and write
15D0000
trusted library allocation
page read and write
1A0ACB61000
trusted library allocation
page read and write
1A0ACCB0000
trusted library allocation
page read and write
F04A000
stack
page read and write
1A0ACAB1000
heap
page read and write
6B4000
heap
page read and write
1111000
heap
page read and write
15922602000
trusted library allocation
page read and write
7FFBAFC80000
trusted library allocation
page read and write
3D0000
unkown
page readonly
1484000
heap
page read and write
620000
trusted library allocation
page read and write
DBA847F000
stack
page read and write
1A0ACF00000
trusted library allocation
page read and write
1397000
heap
page read and write
21501813000
heap
page read and write
7FFBAFB32000
trusted library allocation
page read and write
1111000
heap
page read and write
684000
heap
page read and write
4C6F000
stack
page read and write
2FF1000
heap
page read and write
838000
heap
page read and write
1FD2AD60000
heap
page read and write
A28000
heap
page read and write
3851000
heap
page read and write
1002D000
unkown
page read and write
940000
heap
page read and write
2CFC000
stack
page read and write
1111000
heap
page read and write
6B5000
heap
page read and write
1A0ACB20000
trusted library allocation
page read and write
27A74000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0ACF80000
trusted library allocation
page read and write
37FF000
stack
page read and write
22863350000
heap
page read and write
7A4000
heap
page read and write
6B4000
heap
page read and write
1484000
heap
page read and write
1080000
trusted library allocation
page read and write
6B4000
heap
page read and write
1A0AC734000
heap
page read and write
4C2267F000
stack
page read and write
1D28F3F0000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
35B0000
heap
page read and write
BC1000
unkown
page execute read
27044EE0000
heap
page read and write
6B4000
heap
page read and write
1A0ACCB0000
trusted library allocation
page read and write
1484000
heap
page read and write
1484000
heap
page read and write
1720000
heap
page read and write
6B4000
heap
page read and write
3247000
heap
page read and write
1A0ACCB0000
trusted library allocation
page read and write
32F7000
heap
page read and write
1A0ACC90000
trusted library allocation
page read and write
FA4000
heap
page read and write
1A094170000
heap
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
3E9A000
heap
page read and write
1484000
heap
page read and write
1A094F65000
trusted library allocation
page read and write
2FF1000
heap
page read and write
1C80000
heap
page read and write
1484000
heap
page read and write
684000
heap
page read and write
1D28F448000
heap
page read and write
3540000
trusted library allocation
page read and write
1B3BF000
stack
page read and write
1A092793000
heap
page read and write
7FF675C45000
unkown
page readonly
684000
heap
page read and write
7A4000
heap
page read and write
1D28F500000
heap
page read and write
1484000
heap
page read and write
1A0ACB50000
trusted library allocation
page read and write
7FFBAFB75000
trusted library allocation
page read and write
1111000
heap
page read and write
1A0AC711000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
1A0A4626000
trusted library allocation
page read and write
4971000
heap
page read and write
1A0958DE000
trusted library allocation
page read and write
113D000
stack
page read and write
1090000
unkown
page readonly
6B4000
heap
page read and write
F050000
trusted library allocation
page read and write
1A0ACB70000
trusted library allocation
page read and write
6B4000
heap
page read and write
1830B0C0000
trusted library allocation
page read and write
6B4000
heap
page read and write
7FF675890000
unkown
page readonly
684000
heap
page read and write
1A0AC752000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
1380000
trusted library allocation
page read and write
2FF1000
heap
page read and write
27AC6000
trusted library allocation
page read and write
7A4000
heap
page read and write
18FB6D00000
heap
page read and write
28A0000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
2891000
heap
page read and write
82F000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
3A98000
direct allocation
page read and write
6B4000
heap
page read and write
21501730000
heap
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
750000
trusted library allocation
page read and write
1111000
heap
page read and write
807000
heap
page read and write
1C65000
unkown
page readonly
3E80000
heap
page read and write
684000
heap
page read and write
7A4000
heap
page read and write
6B4000
heap
page read and write
1A095F1C000
trusted library allocation
page read and write
9C377F000
stack
page read and write
1A092880000
heap
page read and write
1401C000
direct allocation
page read and write
1A0ACCA0000
trusted library allocation
page read and write
2FF1000
heap
page read and write
F2F0000
trusted library allocation
page read and write
3EAA000
heap
page read and write
34C7000
heap
page read and write
7FFBAFB78000
trusted library allocation
page read and write
684000
heap
page read and write
1D28F413000
heap
page read and write
2ECD000
stack
page read and write
1A0ACB61000
trusted library allocation
page read and write
838000
heap
page read and write
D7FE000
stack
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
A38000
heap
page read and write
1C7D1C13000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
1A092791000
heap
page read and write
1D290DE0000
remote allocation
page read and write
4B55000
trusted library allocation
page read and write
FF6000
unkown
page write copy
6ECB0FC000
stack
page read and write
9389B5F000
stack
page read and write
1830AEE0000
heap
page read and write
6B4000
heap
page read and write
354DB7D000
stack
page read and write
1A0ACAA3000
heap
page read and write
7FFBF20D0000
direct allocation
page execute read
1A095270000
trusted library allocation
page read and write
27045265000
heap
page read and write
1A0ACA36000
heap
page read and write
1A0ACB60000
trusted library allocation
page read and write
6B4000
heap
page read and write
1590000
heap
page read and write
2891000
heap
page read and write
6B4000
heap
page read and write
189C000
stack
page read and write
1A0ACB70000
trusted library allocation
page read and write
2891000
heap
page read and write
1A0ACC80000
trusted library allocation
page read and write
1111000
heap
page read and write
1A42F105000
heap
page read and write
1A0ACB40000
trusted library allocation
page read and write
1484000
heap
page read and write
2A9077E0000
heap
page read and write
20A7D86F000
heap
page read and write
684000
heap
page read and write
684000
heap
page read and write
155A000
heap
page read and write
17DE000
unkown
page readonly
F190000
trusted library allocation
page execute and read and write
1A0ACC90000
trusted library allocation
page read and write
CDD267B000
stack
page read and write
6B4000
heap
page read and write
2359C669000
heap
page read and write
1830C960000
unkown
page read and write
F70000
heap
page read and write
18FB6C5A000
heap
page read and write
6B4000
heap
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
3851000
heap
page read and write
1830B150000
heap
page read and write
13F6D000
stack
page read and write
185FDE60000
heap
page read and write
27045150000
heap
page read and write
14243EE000
stack
page read and write
1A0AC703000
heap
page read and write
20A7D590000
heap
page read and write
684000
heap
page read and write
684000
heap
page read and write
1150000
unkown
page readonly
3A81000
direct allocation
page read and write
6B4000
heap
page read and write
2FF1000
heap
page read and write
2644585D000
heap
page read and write
1A0AD2E0000
trusted library allocation
page read and write
32F0000
heap
page read and write
1830AEE0000
heap
page read and write
7A4000
heap
page read and write
3BBC000
stack
page read and write
684000
heap
page read and write
6B4000
heap
page read and write
14B4000
heap
page read and write
344E000
stack
page read and write
6B4000
heap
page read and write
6B4000
heap
page read and write
1A09521F000
trusted library allocation
page read and write
1D291460000
remote allocation
page execute and read and write
29DF25E5000
heap
page read and write
1036000
unkown
page read and write
1C7D1D13000
heap
page read and write
1111000
heap
page read and write
2FF1000
heap
page read and write
1E06D7E000
stack
page read and write
1401E000
direct allocation
page read and write
185FDEE0000
heap
page read and write
684000
heap
page read and write
1484000
heap
page read and write
1C64000
heap
page read and write
27A74000
trusted library allocation
page read and write
29DF21E0000
heap
page read and write
6B4000
heap
page read and write
2FEC000
stack
page read and write
7FFBAFA4C000
trusted library allocation
page execute and read and write
1706000
heap
page read and write
684000
heap
page read and write
1A0ACA09000
heap
page read and write
1A0ACFA0000
trusted library allocation
page read and write
75A3A7D000
stack
page read and write
569000
stack
page read and write
1A0AC762000
heap
page read and write
1A0ACB70000
trusted library allocation
page read and write
1D28F449000
heap
page read and write
1A0AC73F000
heap
page read and write
6B4000
heap
page read and write
4A10000
heap
page read and write
1C4519F000
stack
page read and write
1D28F449000
heap
page read and write
27E9B6F5000
heap
page read and write
1A0AC680000
heap
page read and write
685000
heap
page read and write
2891000
heap
page read and write
6B4000
heap
page read and write
18FB6C67000
heap
page read and write
4971000
heap
page read and write
6ECAF7E000
stack
page read and write
1C7D1C70000
heap
page read and write
2891000
heap
page read and write
20A7E4B0000
direct allocation
page execute and read and write
D7BF000
stack
page read and write
1111000
heap
page read and write
14243FC000
stack
page read and write
684000
heap
page read and write
2359C626000
heap
page read and write
6B4000
heap
page read and write
F50000
heap
page read and write
7FFBAFC10000
trusted library allocation
page read and write
6B4000
heap
page read and write
1830AEA0000
heap
page read and write
1EC000
stack
page read and write
1484000
heap
page read and write
27A2C000
trusted library allocation
page read and write
1A0ACC90000
trusted library allocation
page read and write
There are 2623 hidden memdumps, click here to show them.