IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\1.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\MicrosoftSystem\Wmiic.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\MicrosoftSystem\svchosl.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\1.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\migrate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\123.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\mig.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\_MEI65122\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\_MEI65122\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\_MEI65122\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\_MEI65122\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\_MEI65122\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\_MEI65122\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\_MEI65122\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\_MEI65122\python38.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\_MEI65122\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\_MEI65122\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\MicrosoftSystem\run.bat
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\ru.bat
ASCII text, with no line terminators
dropped
C:\ProgramData\st.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1orde5j2.5yv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_40vkucij.1eh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ja3cjwh.kuf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4pxrftie.hiw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5tsbqb45.5bu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c35mik4z.baa.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ddmww0n4.0us.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dmfzswj5.yza.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eta3ash4.ckq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gxkmw1an.sbw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hmxx1dbh.b1p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m4ivireg.spw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qvycfni2.emz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sxxugq0d.zra.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_urlj3qpn.v05.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vk5me24y.leq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xytjxc1v.q2q.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yk5sohev.11m.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1RP6NC5ZVAE0UB0IE4GN.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5HO0R4POADYFPLYNWCYD.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZDBZ68V37LF7O92WKXK7.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF50a255.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF50a8fc.TMP (copy)
data
dropped
C:\Windows\Temp\_MEI65122\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\_MEI65122\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Windows\Temp\_MEI65122\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Temp\_MEI65122\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
There are 41 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\programdata\MicrosoftSystem\run.bat" "
malicious
C:\ProgramData\MicrosoftSystem\Wmiic.exe
"C:\programdata\MicrosoftSystem\wmiic.exe" install MicrosoftESS svchosl.exe
malicious
C:\ProgramData\MicrosoftSystem\Wmiic.exe
"C:\programdata\MicrosoftSystem\wmiic" start MicrosoftESS
malicious
C:\ProgramData\MicrosoftSystem\Wmiic.exe
C:\programdata\MicrosoftSystem\Wmiic.exe
malicious
C:\ProgramData\MicrosoftSystem\svchosl.exe
"svchosl.exe"
malicious
C:\ProgramData\MicrosoftSystem\svchosl.exe
"svchosl.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Users\mig.exe
"C:\users\mig.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $True
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath c:\
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand 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
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /f /im migrate.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /f /im IntelConfigService.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /f /im MSTask.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /f /im Superfetch.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /f /im Wmiic.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /f /im Wrap.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c takeown /F c:\windows\tasks
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\system32\schtasks.exe" /delete /tn WindowsUpdate /F
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c takeown /F C:\ProgramData\migrate.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c del /F /Q C:\ProgramData\migrate.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v2.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v3.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im ape_modul_v1.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im full_rdp_modul_v1.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\programdata\ru.bat" "
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /K "c:\programdata\st.bat"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im rdp.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im rdp.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im wrm_modul_v4.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im nl.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im nl.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im WerFault.exe
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im WerFault.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell Set-MpPreference -DisableRealtimeMonitoring $True
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell Set-MpPreference -ExclusionPath c:\
malicious
C:\Users\123.exe
"C:\users\123.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
TIMEOUT /T 1 /NOBREAK
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
TIMEOUT /T 2 /NOBREAK
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net.exe
net start MicrosoftESS
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 start MicrosoftESS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net.exe
"C:\Windows\system32\net.exe" stop wmservice
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 stop wmservice
C:\Windows\SysWOW64\takeown.exe
takeown /F c:\windows\tasks
C:\Windows\SysWOW64\takeown.exe
takeown /F C:\ProgramData\migrate.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\tasklist.exe
tasklist /FI "IMAGENAME eq Superfetch.exe"
C:\Windows\SysWOW64\find.exe
find /I /N "Superfetch.exe"
C:\Windows\SysWOW64\takeown.exe
takeown /f c:\windows\tasks
C:\Windows\SysWOW64\timeout.exe
TIMEOUT /T 3 /NOBREAK
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Tasks" /inheritance:e /grant "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Tasks" /inheritance:e /grant "SYSTEM:(R,REA,RA,RD)"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Tasks" /inheritance:e /grant "Administrators:(R,REA,RA,RD)"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Tasks" /inheritance:e /grant "Users:(R,REA,RA,RD)"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Tasks" /inheritance:e /grant "user:(R,REA,RA,RD)"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Tasks" /inheritance:e /grant "user:(R,REA,RA,RD)"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Tasks" /inheritance:e /grant "EVERYONE:(R,REA,RA,RD)"
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 144 hidden processes, click here to show them.

URLs

Name
IP
Malicious
147.45.78.229:43674
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://purl.oen6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://crl.mic;
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
https://mahler:8092/site-updates.py
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://bitbucket.org/techtonik/python-wget/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://tempuri.org/Entity/Id13Response
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://tempuri.org/Entity/Id12ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://tempuri.org/Entity/Id7ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Entity/Id4ResponseD
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
http://tempuri.org/Entity/Id22Response
unknown
http://tempuri.org/Entity/Id22ResponseD
unknown
http://tempuri.org/Entity/Id16ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
unknown
http://tempuri.org/Entity/Id19ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc
unknown
http://tempuri.org/Entity/Id18Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
unknown
https://www.openssl.org/H
unknown
http://tempuri.org/Entity/Id3Response
unknown
http://greenbytes.de/tech/tc2231/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
147.45.78.229
unknown
Russian Federation
malicious
77.221.149.185
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\NSSM
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\NSSM
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MicrosoftESS\Parameters
Application
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MicrosoftESS\Parameters
AppParameters
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MicrosoftESS\Parameters
AppDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MicrosoftESS\Parameters\AppExit
NULL

Memdumps

Base Address
Regiontype
Protect
Malicious
45AC000
heap
page read and write
malicious
4800000
trusted library section
page read and write
malicious
7590000
trusted library section
page read and write
malicious
7379000
heap
page read and write
malicious
6D61000
heap
page read and write
malicious
65FE0FB000
stack
page read and write
8540000
trusted library allocation
page read and write
47BE000
stack
page read and write
867000
heap
page read and write
7D10000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
443000
heap
page read and write
7C20000
trusted library allocation
page read and write
6BA000
heap
page read and write
8530000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
435000
unkown
page read and write
8BB0000
heap
page read and write
7CE0000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
184D31E0000
heap
page read and write
1C37C02D000
heap
page read and write
1800A6C0000
heap
page read and write
7C30000
trusted library allocation
page read and write
7534000
trusted library allocation
page read and write
885000
heap
page read and write
7DD000
stack
page read and write
8CF0000
trusted library allocation
page read and write
7FF77B34B000
unkown
page readonly
84F0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
276D8D80000
heap
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
21DAA430000
heap
page read and write
1AA5E850000
heap
page read and write
8540000
trusted library allocation
page read and write
8627000
trusted library allocation
page read and write
82F000
stack
page read and write
84F0000
trusted library allocation
page read and write
9930000
heap
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7FF8A8A01000
unkown
page execute read
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2769F3B0000
heap
page read and write
8590000
trusted library allocation
page read and write
73F000
stack
page read and write
8530000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
4ACE000
trusted library allocation
page read and write
26209F80000
heap
page read and write
7324000
heap
page read and write
7C10000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
869000
heap
page read and write
1B0000
heap
page read and write
8540000
trusted library allocation
page read and write
69E000
stack
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
7FF8A8AD9000
unkown
page readonly
8540000
trusted library allocation
page read and write
1FD6F4BB000
heap
page read and write
8540000
trusted library allocation
page read and write
9E48000
heap
page read and write
D57BCFF000
stack
page read and write
8580000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
7FF8B93C0000
unkown
page readonly
7302000
heap
page read and write
8540000
trusted library allocation
page read and write
30A0000
heap
page read and write
89FC000
heap
page read and write
2EA48780000
heap
page read and write
5B50000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
69C1000
heap
page read and write
D30000
heap
page read and write
94F0000
trusted library allocation
page read and write
5B40D3C000
stack
page read and write
6D80000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
213065F1000
heap
page read and write
84D0000
trusted library allocation
page read and write
992C000
stack
page read and write
900000
heap
page read and write
2B90000
heap
page readonly
19D8EA25000
heap
page read and write
184D32E0000
heap
page read and write
6E1B000
heap
page read and write
190DE320000
heap
page read and write
7D10000
trusted library allocation
page read and write
2A57000
heap
page read and write
26F31CD0000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
22D77FF000
unkown
page read and write
7D10000
trusted library allocation
page read and write
48C0000
heap
page readonly
8EB0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
4870000
heap
page read and write
4965000
trusted library allocation
page read and write
7CE000
unkown
page read and write
56CA4FF000
unkown
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
6FEF000
stack
page read and write
8540000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2B43000
heap
page read and write
8D9E9FF000
unkown
page read and write
7D10000
trusted library allocation
page read and write
12DCD42D000
heap
page read and write
8540000
trusted library allocation
page read and write
62E000
stack
page read and write
84F0000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
C83000
heap
page read and write
8540000
trusted library allocation
page read and write
26F31BDD000
heap
page read and write
8540000
trusted library allocation
page read and write
85F0000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
2130588E000
heap
page read and write
8590000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
8B94000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
7B53000
trusted library allocation
page read and write
87BA000
heap
page read and write
28D5000
heap
page read and write
780000
heap
page read and write
4440000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
6FF2000
heap
page read and write
F60000
heap
page read and write
34AA000
heap
page read and write
8590000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7FF8B9090000
unkown
page readonly
8500000
trusted library allocation
page read and write
21DAA49B000
heap
page read and write
8590000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
49E6000
trusted library allocation
page read and write
140026000
unkown
page readonly
8590000
trusted library allocation
page read and write
A39000
heap
page read and write
85C0000
trusted library allocation
page read and write
2B3D000
stack
page read and write
79D000
stack
page read and write
8590000
trusted library allocation
page read and write
850000
heap
page read and write
491B000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
7FF77B321000
unkown
page execute read
5CD000
unkown
page read and write
8B60000
heap
page read and write
184D3485000
heap
page read and write
8540000
trusted library allocation
page read and write
190000
heap
page readonly
73CE000
stack
page read and write
B30000
heap
page read and write
7CC6000
trusted library allocation
page read and write
5A6E000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
3280000
heap
page read and write
8520000
trusted library allocation
page read and write
6AD000
heap
page read and write
1F1DECE0000
heap
page read and write
452000
unkown
page read and write
52DF000
stack
page read and write
8540000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
6FF1000
heap
page read and write
9870000
trusted library allocation
page read and write
9791000
heap
page read and write
76E000
unkown
page read and write
8540000
trusted library allocation
page read and write
5A26000
trusted library allocation
page read and write
7B10000
trusted library allocation
page read and write
9853000
heap
page read and write
6A91000
heap
page read and write
2426CAE5000
heap
page read and write
8540000
trusted library allocation
page read and write
311E000
stack
page read and write
2A08000
direct allocation
page execute and read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
31D1000
heap
page read and write
28280FE000
unkown
page read and write
BE0000
heap
page read and write
5A62000
trusted library allocation
page read and write
836A5FF000
stack
page read and write
8540000
trusted library allocation
page read and write
4F0000
heap
page read and write
2F70000
heap
page read and write
8540000
trusted library allocation
page read and write
21DAA660000
heap
page read and write
4D97000
trusted library allocation
page read and write
E111FFF000
unkown
page read and write
251833B5000
heap
page read and write
8540000
trusted library allocation
page read and write
4DC000
heap
page read and write
58B4000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
753B000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
3431000
heap
page read and write
8540000
trusted library allocation
page read and write
8A13000
heap
page read and write
85C0000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
7FF8B909C000
unkown
page readonly
2B02000
heap
page read and write
9510000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
2426CC90000
heap
page read and write
8520000
trusted library allocation
page read and write
21306608000
heap
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
BF0000
heap
page read and write
2C223C20000
heap
page read and write
98CF5FF000
stack
page read and write
8590000
trusted library allocation
page read and write
781F000
stack
page read and write
7D10000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7FF77B35E000
unkown
page read and write
8B0000
heap
page read and write
2FEE000
stack
page read and write
8520000
trusted library allocation
page read and write
9ECE000
stack
page read and write
7D10000
trusted library allocation
page read and write
6A1C000
stack
page read and write
8540000
trusted library allocation
page read and write
2DF0000
heap
page read and write
7D10000
trusted library allocation
page read and write
345F000
stack
page read and write
18DD6E70000
heap
page read and write
19D8EA0D000
heap
page read and write
8540000
trusted library allocation
page read and write
5BA6000
trusted library allocation
page read and write
DE0000
heap
page read and write
190791D0000
heap
page read and write
7FF8A8DFD000
unkown
page readonly
7431000
heap
page read and write
33E0000
heap
page read and write
84D0000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
26209F8D000
heap
page read and write
1A1F6CA0000
heap
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
836A4FF000
unkown
page read and write
4E6B000
stack
page read and write
140000000
unkown
page readonly
22AE22E0000
heap
page read and write
1AA5E8A4000
heap
page read and write
888000
heap
page read and write
213058B3000
heap
page read and write
31EF000
unkown
page read and write
54E89BF000
stack
page read and write
8580000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
4F26000
trusted library allocation
page read and write
D6E000
stack
page read and write
116000
stack
page read and write
8510000
trusted library allocation
page read and write
89E000
stack
page read and write
881000
heap
page read and write
2CB8000
heap
page read and write
8530000
trusted library allocation
page read and write
73BA000
heap
page read and write
9700000
trusted library allocation
page read and write
1D2D85E0000
heap
page read and write
9700000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
7FF77B34B000
unkown
page readonly
8540000
trusted library allocation
page read and write
21691B95000
heap
page read and write
8540000
trusted library allocation
page read and write
216A6756000
heap
page read and write
251835A0000
heap
page read and write
5C0A000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
4A1E000
trusted library allocation
page read and write
58C6000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
1E19AAF0000
heap
page read and write
7FF8A8AD2000
unkown
page read and write
7580000
trusted library allocation
page read and write
328E000
stack
page read and write
8970000
trusted library allocation
page read and write
DED000
heap
page read and write
84D0000
trusted library allocation
page read and write
7C87000
trusted library allocation
page read and write
98CE000
stack
page read and write
84F0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
2CDA000
heap
page read and write
4E50000
heap
page read and write
7C40000
trusted library allocation
page execute and read and write
8DF000
stack
page read and write
7D10000
trusted library allocation
page read and write
19D8E8F0000
heap
page read and write
5BF6000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
7AEA000
trusted library allocation
page read and write
2F49000
heap
page read and write
25183398000
heap
page read and write
2A8E000
heap
page read and write
8520000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
F45000
heap
page read and write
5C21000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
42E000
unkown
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2C5C11A7000
heap
page read and write
8540000
trusted library allocation
page read and write
89B8000
heap
page read and write
7FF8BFAB1000
unkown
page execute read
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
EEE000
unkown
page write copy
21305871000
heap
page read and write
2EAB000
heap
page read and write
18DD6EC0000
heap
page read and write
7FF8B984A000
unkown
page readonly
830000
heap
page read and write
84F0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
4D91000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
1ECF01C0000
heap
page read and write
82E000
stack
page read and write
34BA000
heap
page read and write
7023000
heap
page read and write
2130584E000
heap
page read and write
3440000
heap
page read and write
8B90000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
B6F000
stack
page read and write
84D0000
trusted library allocation
page read and write
2DFE000
stack
page read and write
8530000
trusted library allocation
page read and write
4490000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
6D60000
heap
page read and write
8590000
trusted library allocation
page read and write
799E000
stack
page read and write
2CDA000
heap
page read and write
8A34000
heap
page read and write
2D60000
heap
page read and write
140000000
unkown
page readonly
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
2426CD30000
heap
page read and write
F70000
heap
page read and write
580000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
F2C000
stack
page read and write
22AE22F7000
heap
page read and write
7D10000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
714E000
stack
page read and write
84D0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
9430000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8AC7000
heap
page read and write
8540000
trusted library allocation
page read and write
450E000
stack
page read and write
E50000
heap
page read and write
B91155B000
stack
page read and write
8510000
trusted library allocation
page read and write
17DB390B000
heap
page read and write
7328000
heap
page read and write
D0492FF000
stack
page read and write
7C30000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
7FF8B9841000
unkown
page execute read
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
2C223CBD000
heap
page read and write
4A1C000
heap
page read and write
8501000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
7FF8A884A000
unkown
page execute read
8510000
trusted library allocation
page read and write
4570000
heap
page read and write
709A000
stack
page read and write
8B90000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
18DD6ECB000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2D0E000
heap
page read and write
17DB3926000
heap
page read and write
7FF8A8AD1000
unkown
page write copy
8520000
trusted library allocation
page read and write
7084000
heap
page read and write
2C223CB0000
heap
page read and write
76C0000
trusted library allocation
page read and write
25E75A60000
heap
page read and write
8590000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
4F112FB000
stack
page read and write
DAF000
stack
page read and write
8540000
trusted library allocation
page read and write
D60000
heap
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
1AA5EBD5000
heap
page read and write
550000
heap
page read and write
1EC08C80000
heap
page read and write
4892000
trusted library allocation
page read and write
7C90000
trusted library allocation
page read and write
1E9D7730000
heap
page read and write
8580000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
2A8A000
heap
page read and write
8540000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
9E30000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
21305879000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
1F1DF020000
heap
page read and write
22AE22F0000
heap
page read and write
8BC0000
trusted library allocation
page read and write
9853000
heap
page read and write
1B92F1AD000
heap
page read and write
84F0000
trusted library allocation
page read and write
341A000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8AD5000
heap
page read and write
85D000
stack
page read and write
8500000
trusted library allocation
page read and write
7CE0000
trusted library allocation
page read and write
89B0000
heap
page read and write
94DF000
stack
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7B7EAFB000
stack
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
25E75870000
heap
page read and write
2A60000
heap
page read and write
8D9E8FC000
stack
page read and write
8540000
trusted library allocation
page read and write
3318000
heap
page read and write
1B92F150000
heap
page read and write
8540000
trusted library allocation
page read and write
276D89D0000
heap
page read and write
85A0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
1D2D842C000
heap
page read and write
2426CAB0000
heap
page read and write
84F0000
trusted library allocation
page read and write
88E000
heap
page read and write
84F0000
trusted library allocation
page read and write
2C80000
heap
page read and write
2EA488F0000
heap
page read and write
896C000
stack
page read and write
8540000
trusted library allocation
page read and write
69F2000
heap
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
140001000
unkown
page execute read
8500000
trusted library allocation
page read and write
7FF8BA249000
unkown
page readonly
8A9E000
heap
page read and write
8540000
trusted library allocation
page read and write
4CE000
stack
page read and write
17DB3CC5000
heap
page read and write
2C5C1180000
heap
page read and write
8B90000
trusted library allocation
page read and write
75B000
heap
page read and write
8590000
trusted library allocation
page read and write
4BAE000
stack
page read and write
486D000
trusted library allocation
page execute and read and write
8CB0000
trusted library allocation
page read and write
87B000
heap
page read and write
21306608000
heap
page read and write
9E40000
trusted library allocation
page read and write
3412000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
1A1F6F30000
heap
page read and write
8500000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
C84000
heap
page read and write
232D2700000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
733B000
heap
page read and write
8540000
trusted library allocation
page read and write
18DD7170000
heap
page read and write
96E000
unkown
page read and write
1ECF01E5000
heap
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
96A0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
232D2980000
heap
page read and write
4860000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2BCE000
stack
page read and write
E1E000
heap
page read and write
84F0000
trusted library allocation
page read and write
190DE565000
heap
page read and write
2769F2D6000
heap
page read and write
8530000
trusted library allocation
page read and write
535F000
stack
page read and write
8500000
trusted library allocation
page read and write
4A9B000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
7346000
heap
page read and write
7C20000
trusted library allocation
page read and write
1F1DEDE0000
heap
page read and write
2061D9B8000
heap
page read and write
1F31CBC0000
heap
page read and write
30F0000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
29D7000
heap
page read and write
6DC1000
heap
page read and write
8540000
trusted library allocation
page read and write
21306BC0000
direct allocation
page read and write
84F0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
18471190000
heap
page read and write
8970000
trusted library allocation
page read and write
81B0000
trusted library allocation
page read and write
21305E50000
heap
page read and write
3200000
heap
page read and write
4DEF000
stack
page read and write
400000
heap
page read and write
95D000
stack
page read and write
8540000
trusted library allocation
page read and write
24119170000
heap
page read and write
7C10000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
AE6E000
stack
page read and write
BF0000
heap
page read and write
8520000
trusted library allocation
page read and write
8972000
trusted library allocation
page read and write
8997000
heap
page read and write
49CE000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
216A66D0000
heap
page read and write
8540000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
D7F000
stack
page read and write
8540000
trusted library allocation
page read and write
2521EFE000
unkown
page read and write
34AB000
heap
page read and write
EBC000
stack
page read and write
1ED1069D000
heap
page read and write
D57BAFB000
stack
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
4D01000
trusted library allocation
page read and write
213058A8000
heap
page read and write
8540000
trusted library allocation
page read and write
3C990FE000
stack
page read and write
1F1DEE40000
heap
page read and write
47FF000
stack
page read and write
94E0000
trusted library allocation
page read and write
44C3000
heap
page read and write
7C60000
trusted library allocation
page read and write
1D2D8446000
heap
page read and write
8540000
trusted library allocation
page read and write
21306930000
direct allocation
page read and write
7D10000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
18DD6E90000
heap
page read and write
8540000
trusted library allocation
page read and write
6A9000
heap
page read and write
3480000
heap
page read and write
8540000
trusted library allocation
page read and write
30A0000
heap
page read and write
8590000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
8B90000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
CAD000
stack
page read and write
87A000
heap
page read and write
8570000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
9410000
trusted library allocation
page read and write
75EE000
trusted library section
page read and write
8520000
trusted library allocation
page read and write
C71000
heap
page read and write
8520000
trusted library allocation
page read and write
17DB38C0000
heap
page read and write
8540000
trusted library allocation
page read and write
4560000
heap
page read and write
8590000
trusted library allocation
page read and write
7FF8BA523000
unkown
page readonly
8590000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
2B59000
heap
page read and write
8590000
trusted library allocation
page read and write
51355FB000
stack
page read and write
3285000
heap
page read and write
7C75000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
4443000
trusted library allocation
page execute and read and write
8570000
trusted library allocation
page read and write
C7A000
heap
page read and write
8530000
trusted library allocation
page read and write
18BC4B00000
heap
page read and write
8540000
trusted library allocation
page read and write
731F000
heap
page read and write
2C223BF0000
heap
page read and write
61E000
stack
page read and write
7DBA000
heap
page read and write
4870000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
C93000
heap
page read and write
21305855000
heap
page read and write
CF0000
heap
page read and write
9870000
trusted library allocation
page read and write
29E0000
direct allocation
page execute and read and write
2EA48660000
heap
page read and write
6A54000
heap
page read and write
84D0000
trusted library allocation
page read and write
67C000
stack
page read and write
8540000
trusted library allocation
page read and write
307E000
stack
page read and write
2FF0000
heap
page read and write
5953000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
24A7E080000
heap
page read and write
72D3000
heap
page read and write
18BC4B20000
heap
page read and write
1F0000
heap
page read and write
51358FF000
unkown
page read and write
1B0000
heap
page read and write
3290000
heap
page read and write
47D000
stack
page read and write
5A50000
trusted library allocation
page read and write
949E000
stack
page read and write
1F1DF025000
heap
page read and write
D2B35FF000
unkown
page read and write
7D10000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
505000
heap
page read and write
4F0D000
trusted library allocation
page read and write
1E9D783B000
heap
page read and write
190DE280000
heap
page read and write
25E7577B000
heap
page read and write
320B000
heap
page read and write
8AB4000
heap
page read and write
73C000
heap
page read and write
2D2E000
heap
page read and write
8590000
trusted library allocation
page read and write
93D9000
trusted library allocation
page read and write
F621EFF000
stack
page read and write
84D0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
37A5000
heap
page read and write
8540000
trusted library allocation
page read and write
687000
heap
page read and write
DE3000
heap
page read and write
3310000
heap
page read and write
8A00000
heap
page read and write
8500000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2210000
heap
page read and write
8540000
trusted library allocation
page read and write
283E000
unkown
page read and write
7FF8B807A000
unkown
page read and write
8530000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
5AAB000
trusted library allocation
page read and write
881000
heap
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
C13C7FF000
unkown
page read and write
4462000
trusted library allocation
page read and write
213065A0000
direct allocation
page read and write
8500000
trusted library allocation
page read and write
2C5C11A5000
heap
page read and write
9870000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8A4E000
heap
page read and write
5A4D000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
89CF000
heap
page read and write
9860000
trusted library allocation
page read and write
93EA000
trusted library allocation
page read and write
21DAA4B6000
heap
page read and write
21306B70000
direct allocation
page read and write
670000
heap
page read and write
2130588F000
heap
page read and write
7790000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
4EE1000
trusted library allocation
page read and write
9D5000
heap
page read and write
8590000
trusted library allocation
page read and write
9F0000
heap
page read and write
4D8C000
trusted library allocation
page read and write
7FF8B7FE0000
unkown
page readonly
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
670000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8B60000
heap
page read and write
487F000
stack
page read and write
76D4000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8F0000
heap
page read and write
8530000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
C00000
heap
page read and write
A30F000
stack
page read and write
A00000
heap
page read and write
1A1F6C20000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
1A1F6C10000
heap
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
27F0000
heap
page read and write
454C000
stack
page read and write
84F0000
trusted library allocation
page read and write
54E85DF000
stack
page read and write
8500000
trusted library allocation
page read and write
4ED21FF000
unkown
page read and write
232D27E0000
heap
page read and write
6FCB000
heap
page read and write
8E0000
heap
page read and write
B375CFE000
stack
page read and write
346E000
stack
page read and write
7D10000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
561000
heap
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
453000
unkown
page readonly
50D2000
trusted library allocation
page read and write
342B000
heap
page read and write
310D000
stack
page read and write
8540000
trusted library allocation
page read and write
7D73FF000
stack
page read and write
3497000
heap
page read and write
21305874000
heap
page read and write
97C0000
heap
page read and write
5E2C000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
216A673D000
heap
page read and write
84F0000
trusted library allocation
page read and write
8550000
trusted library allocation
page read and write
35A0000
heap
page read and write
8500000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
996B000
heap
page read and write
8540000
trusted library allocation
page read and write
2B00000
stack
page read and write
6990000
heap
page read and write
8590000
trusted library allocation
page read and write
7CD2000
trusted library allocation
page read and write
213059C0000
heap
page read and write
4E05000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
27C0000
heap
page read and write
8A06000
heap
page read and write
85A0000
trusted library allocation
page read and write
D5E000
stack
page read and write
8540000
trusted library allocation
page read and write
3170000
heap
page read and write
303F000
unkown
page read and write
4CA1000
trusted library allocation
page read and write
19D8EA00000
heap
page read and write
8540000
trusted library allocation
page read and write
9710000
trusted library allocation
page execute and read and write
8590000
trusted library allocation
page read and write
2D196400000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7FF8A8850000
unkown
page execute read
2C5C0FB0000
heap
page read and write
25183490000
heap
page read and write
8570000
trusted library allocation
page read and write
5390000
heap
page read and write
7FF77B35E000
unkown
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
737B000
heap
page read and write
8540000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
340E000
stack
page read and write
835F7FF000
unkown
page read and write
1ED105D0000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
478000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
6FB0000
heap
page read and write
7D10000
trusted library allocation
page read and write
5BEC000
trusted library allocation
page read and write
7FF8A8A5F000
unkown
page readonly
21305852000
heap
page read and write
4EA5000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
140000000
unkown
page readonly
7720000
trusted library allocation
page read and write
6AC2000
heap
page read and write
184D32EE000
heap
page read and write
8530000
trusted library allocation
page read and write
3497000
heap
page read and write
1DE000
stack
page read and write
84F0000
trusted library allocation
page read and write
7FF8BFAB3000
unkown
page readonly
E90000
heap
page read and write
7FF8B93DC000
unkown
page readonly
8500000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
48BE000
stack
page read and write
85D0000
trusted library allocation
page read and write
58CB000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
34C2000
heap
page read and write
21306800000
direct allocation
page read and write
84F0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2D1963F0000
heap
page read and write
8500000
trusted library allocation
page read and write
1B92F560000
heap
page read and write
8540000
trusted library allocation
page read and write
2061D9CD000
heap
page read and write
3480000
heap
page read and write
7022000
heap
page read and write
84F0000
trusted library allocation
page read and write
4420000
direct allocation
page read and write
7FF8A8B11000
unkown
page execute read
B9E000
stack
page read and write
3C98AFE000
stack
page read and write
84F0000
trusted library allocation
page read and write
2EC4000
heap
page read and write
981D000
stack
page read and write
7D10000
trusted library allocation
page read and write
CD0000
heap
page read and write
8A0B000
heap
page read and write
84F0000
trusted library allocation
page read and write
BFF000
stack
page read and write
9400000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
CA6B6FF000
stack
page read and write
2130587E000
heap
page read and write
4DF000
heap
page read and write
3C991FE000
unkown
page readonly
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
20B86DD0000
heap
page read and write
8590000
trusted library allocation
page read and write
8AAD000
heap
page read and write
8540000
trusted library allocation
page read and write
4A4E000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
292E01C0000
heap
page read and write
38DCCFC000
stack
page read and write
8530000
trusted library allocation
page read and write
2130587B000
heap
page read and write
1B92F1A0000
heap
page read and write
6E9000
heap
page read and write
8540000
trusted library allocation
page read and write
423000
unkown
page readonly
7D10000
trusted library allocation
page read and write
1F31CB10000
heap
page read and write
21305883000
heap
page read and write
7D10000
trusted library allocation
page read and write
7084000
heap
page read and write
87A000
heap
page read and write
8500000
trusted library allocation
page read and write
21691B7D000
heap
page read and write
6F7F000
stack
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
72FF000
heap
page read and write
49C8000
trusted library allocation
page read and write
2061D9BF000
heap
page read and write
2061D9D9000
heap
page read and write
7C60000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
25E7577D000
heap
page read and write
8540000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
F7E000
stack
page read and write
292E0200000
heap
page read and write
598B000
trusted library allocation
page read and write
87F000
heap
page read and write
9F10000
heap
page read and write
25E75797000
heap
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
25E756D0000
heap
page read and write
8540000
trusted library allocation
page read and write
2061D9CD000
heap
page read and write
8540000
trusted library allocation
page read and write
7C40000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
BFF000
stack
page read and write
7FF8BFAD9000
unkown
page readonly
73A000
heap
page read and write
7FF8A8AF9000
unkown
page readonly
7D10000
trusted library allocation
page read and write
49D4000
trusted library allocation
page read and write
5B64000
trusted library allocation
page read and write
877000
heap
page read and write
84E0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7FF8A87C0000
unkown
page readonly
1EC08F65000
heap
page read and write
34BA000
heap
page read and write
F0D000
unkown
page read and write
8540000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
D0491FF000
unkown
page read and write
762000
heap
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
34AA000
heap
page read and write
8540000
trusted library allocation
page read and write
A8E000
unkown
page read and write
8520000
trusted library allocation
page read and write
8A05000
heap
page read and write
8540000
trusted library allocation
page read and write
2B3A000
stack
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
140030000
unkown
page write copy
6BF000
heap
page read and write
7FF8A8839000
unkown
page execute read
84D0000
trusted library allocation
page read and write
7BAB000
trusted library allocation
page read and write
2130586F000
heap
page read and write
1E0000
heap
page read and write
1E19AD30000
heap
page read and write
34A3000
heap
page read and write
99136FC000
stack
page read and write
4FFF000
stack
page read and write
2D196150000
heap
page read and write
84F0000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
1A26D775000
heap
page read and write
1E19ABF0000
heap
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
470000
heap
page read and write
21305885000
heap
page read and write
EB1000
unkown
page execute read
94D000
stack
page read and write
DEE000
stack
page read and write
8500000
trusted library allocation
page read and write
20B870E0000
heap
page read and write
6AC1000
heap
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8BC000
heap
page read and write
7D10000
trusted library allocation
page read and write
8560000
trusted library allocation
page read and write
EEE000
unkown
page read and write
AC0000
heap
page read and write
9700000
trusted library allocation
page read and write
492000
heap
page read and write
4BE000
stack
page read and write
8540000
trusted library allocation
page read and write
21305F00000
direct allocation
page read and write
9D0000
heap
page read and write
D80000
heap
page read and write
22AE22D0000
heap
page read and write
8540000
trusted library allocation
page read and write
3491FFF000
stack
page read and write
23AF000
stack
page read and write
2E00000
heap
page read and write
7FF8B9F61000
unkown
page execute read
4453000
trusted library allocation
page read and write
2B7B000
heap
page read and write
8500000
trusted library allocation
page read and write
8541000
trusted library allocation
page read and write
3170000
heap
page read and write
1F31CA10000
heap
page read and write
18471385000
heap
page read and write
8540000
trusted library allocation
page read and write
EF5000
unkown
page read and write
7C80000
trusted library allocation
page read and write
251835A5000
heap
page read and write
85FC000
stack
page read and write
8540000
trusted library allocation
page read and write
24119040000
heap
page read and write
8540000
trusted library allocation
page read and write
CD2772C000
stack
page read and write
8530000
trusted library allocation
page read and write
34DF000
stack
page read and write
4CE7000
trusted library allocation
page read and write
5A56000
trusted library allocation
page read and write
4E4E000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
2521FFE000
stack
page read and write
12DCD42B000
heap
page read and write
84F0000
trusted library allocation
page read and write
7CE000
stack
page read and write
2C5C1280000
heap
page read and write
24081750000
heap
page read and write
21306983000
heap
page read and write
35E8000
heap
page read and write
8530000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
213057E8000
heap
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
5902000
trusted library allocation
page read and write
6A23000
heap
page read and write
6E60000
trusted library allocation
page read and write
1DE8ECB0000
heap
page read and write
840000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
97F2000
heap
page read and write
724E000
stack
page read and write
8ACC000
heap
page read and write
21DAA4B8000
heap
page read and write
1ECF01CD000
heap
page read and write
84E0000
trusted library allocation
page read and write
7FF8A8ECB000
unkown
page write copy
84F0000
trusted library allocation
page read and write
2B39000
heap
page read and write
20B870D0000
heap
page read and write
8970000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
A4E000
stack
page read and write
8540000
trusted library allocation
page read and write
288F000
unkown
page read and write
6679000
heap
page read and write
94E4000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
52BF000
stack
page read and write
7D10000
trusted library allocation
page read and write
5EC4000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
75FE000
stack
page read and write
84F0000
trusted library allocation
page read and write
3310000
heap
page read and write
4A10000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
529E000
stack
page read and write
B20000
heap
page read and write
34AE000
heap
page read and write
1A26D5E0000
heap
page read and write
51FE000
stack
page read and write
485F000
trusted library section
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
530000
heap
page read and write
4FA000
heap
page read and write
850000
heap
page read and write
7CE9D5C000
stack
page read and write
19D8ECE5000
heap
page read and write
453000
unkown
page write copy
8570000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
29DF000
stack
page read and write
8540000
trusted library allocation
page read and write
4897000
trusted library allocation
page execute and read and write
73B000
heap
page read and write
6D80000
heap
page read and write
5BB1000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
292D0E06000
heap
page read and write
84D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
483E000
stack
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
1ED106B5000
heap
page read and write
E604BFF000
stack
page read and write
213058B3000
heap
page read and write
8510000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
49F0000
heap
page read and write
84D0000
trusted library allocation
page read and write
7053000
heap
page read and write
8500000
trusted library allocation
page read and write
2CBC000
heap
page read and write
5ACD000
trusted library allocation
page read and write
31C0000
heap
page read and write
7551000
trusted library allocation
page read and write
180000
heap
page read and write
1EC08CD0000
heap
page read and write
447B000
trusted library allocation
page execute and read and write
473E000
stack
page read and write
7D10000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
18DD6E60000
heap
page read and write
3428000
heap
page read and write
9450000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
5E51000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
180000
heap
page read and write
8520000
trusted library allocation
page read and write
6A5000
heap
page read and write
72F7000
heap
page read and write
2AEC000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4864000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2620A190000
heap
page read and write
21305E80000
direct allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
12D1EC30000
heap
page read and write
7FF8A8AF5000
unkown
page readonly
B20000
heap
page read and write
7530000
trusted library allocation
page read and write
1C37BFB0000
heap
page read and write
84F0000
trusted library allocation
page read and write
7FF77B34B000
unkown
page readonly
8540000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
14C000
stack
page read and write
94E0000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
2BD8000
heap
page read and write
8510000
trusted library allocation
page read and write
84C000
heap
page read and write
8540000
trusted library allocation
page read and write
1B92F120000
heap
page read and write
3491B8C000
stack
page read and write
767E000
stack
page read and write
E1C000
heap
page read and write
7D10000
trusted library allocation
page read and write
94E5000
trusted library allocation
page read and write
8A1C000
heap
page read and write
8540000
trusted library allocation
page read and write
34A8000
heap
page read and write
75C000
stack
page read and write
2C224050000
heap
page read and write
71A000
heap
page read and write
89C2000
heap
page read and write
43A000
unkown
page execute and read and write
1A26D3E0000
heap
page read and write
10906FE000
stack
page read and write
8540000
trusted library allocation
page read and write
34A7000
heap
page read and write
8540000
trusted library allocation
page read and write
539F000
stack
page read and write
2E60000
heap
page read and write
12DCD340000
heap
page read and write
33DE000
stack
page read and write
84D0000
trusted library allocation
page read and write
1F31CEB5000
heap
page read and write
91BA000
heap
page read and write
EBC5B7C000
stack
page read and write
8540000
trusted library allocation
page read and write
7FF8B9060000
unkown
page readonly
2061D9CD000
heap
page read and write
A030000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
5908000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
9790000
heap
page read and write
8530000
trusted library allocation
page read and write
7FF8B9F74000
unkown
page readonly
1A26D410000
heap
page read and write
8540000
trusted library allocation
page read and write
51C000
stack
page read and write
8B9A000
trusted library allocation
page read and write
9F929FF000
unkown
page read and write
5B46000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
3C98DFE000
unkown
page readonly
8590000
trusted library allocation
page read and write
323C000
stack
page read and write
C8F000
heap
page read and write
8590000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
75B0000
heap
page execute and read and write
8540000
trusted library allocation
page read and write
216A66E0000
heap
page read and write
7D10000
trusted library allocation
page read and write
2061D9D9000
heap
page read and write
59FF000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
264E000
stack
page read and write
8540000
trusted library allocation
page read and write
276D89F5000
heap
page read and write
325F000
stack
page read and write
85AA000
trusted library allocation
page read and write
7084000
heap
page read and write
8590000
trusted library allocation
page read and write
34B0000
heap
page read and write
8590000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
5B73000
trusted library allocation
page read and write
24A7E310000
heap
page read and write
1C37C2F0000
heap
page read and write
4D7B000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
5E3D000
trusted library allocation
page read and write
1E9D7902000
heap
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
9680000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
17DB3CC0000
heap
page read and write
84F0000
trusted library allocation
page read and write
24A7E14D000
heap
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
4A65000
trusted library allocation
page read and write
57E000
stack
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
2840000
heap
page read and write
2B0D000
stack
page read and write
4D87000
trusted library allocation
page read and write
190DE346000
heap
page read and write
8540000
trusted library allocation
page read and write
5B98000
trusted library allocation
page read and write
184D3305000
heap
page read and write
84E0000
trusted library allocation
page read and write
1AA5E860000
heap
page read and write
8520000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4A1D000
heap
page read and write
35E0000
heap
page read and write
859F000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
5C0000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
140065000
unkown
page readonly
7D40000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4E0E000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
26209E00000
heap
page read and write
8500000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
2EA4868D000
heap
page read and write
21305FD0000
heap
page read and write
17DB3890000
heap
page read and write
2EC3000
heap
page read and write
8540000
trusted library allocation
page read and write
4A4E000
stack
page read and write
7D10000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
22483FF000
stack
page read and write
8540000
trusted library allocation
page read and write
F12000
unkown
page read and write
65C000
stack
page read and write
2CB9000
heap
page read and write
525F000
stack
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
AF30000
heap
page read and write
682A1FE000
unkown
page read and write
5BD7000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
835F8FF000
stack
page read and write
84F0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
1D2D83D0000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
5A88000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7CF5000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
AEBE000
stack
page read and write
22AE24E0000
heap
page read and write
72CA000
heap
page read and write
6C9000
heap
page read and write
C02000
heap
page read and write
8530000
trusted library allocation
page read and write
1E9D7813000
heap
page read and write
8540000
trusted library allocation
page read and write
89BF000
heap
page read and write
8540000
trusted library allocation
page read and write
16D000
stack
page read and write
1DE8EC00000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
5AE3000
trusted library allocation
page read and write
2D2E000
heap
page read and write
718A000
stack
page read and write
7B00000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
58E5000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
DFB000
heap
page read and write
89A9000
heap
page read and write
66F000
stack
page read and write
8500000
trusted library allocation
page read and write
2426CCB0000
heap
page read and write
521E000
stack
page read and write
1DE8EBF0000
heap
page read and write
7FF8B93D9000
unkown
page write copy
8540000
trusted library allocation
page read and write
336F000
stack
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
444D000
trusted library allocation
page execute and read and write
8CD4BAC000
stack
page read and write
2061D9CD000
heap
page read and write
71B000
stack
page read and write
84D0000
trusted library allocation
page read and write
7084000
heap
page read and write
7FF8B7FE1000
unkown
page execute read
7290000
heap
page read and write
34BA000
heap
page read and write
51DF000
stack
page read and write
8500000
trusted library allocation
page read and write
21305F80000
direct allocation
page read and write
75D000
stack
page read and write
EBC5FFF000
stack
page read and write
21306985000
heap
page read and write
8540000
trusted library allocation
page read and write
7FF8A8D0A000
unkown
page readonly
640000
heap
page read and write
F621DFE000
unkown
page read and write
E1F000
heap
page read and write
19D8EA27000
heap
page read and write
8530000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
4CEF000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
7FF8B807B000
unkown
page readonly
7D10000
trusted library allocation
page read and write
6A53000
heap
page read and write
A02E000
stack
page read and write
7CC0000
trusted library allocation
page read and write
1FD6F4D7000
heap
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8510000
trusted library allocation
page execute and read and write
12DCD320000
heap
page read and write
19D8E9D0000
heap
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
2D196226000
heap
page read and write
8540000
trusted library allocation
page read and write
9690000
trusted library allocation
page read and write
71F000
stack
page read and write
EE3000
unkown
page readonly
48FF000
stack
page read and write
2130587B000
heap
page read and write
540000
heap
page read and write
84D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
93F5000
trusted library allocation
page read and write
4444000
trusted library allocation
page read and write
2F0000
heap
page read and write
8590000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
47FF000
stack
page read and write
84D0000
trusted library allocation
page read and write
2FEE000
unkown
page read and write
184D3308000
heap
page read and write
28CE000
stack
page read and write
8530000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
1FD6F4D5000
heap
page read and write
8540000
trusted library allocation
page read and write
A3E000
stack
page read and write
6E9000
heap
page read and write
8540000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
292D0DED000
heap
page read and write
5893000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2518339E000
heap
page read and write
4DFB000
trusted library allocation
page read and write
7FF8A8A85000
unkown
page readonly
8ADD000
heap
page read and write
8540000
trusted library allocation
page read and write
37A0000
heap
page read and write
277D000
stack
page read and write
7FF8B8051000
unkown
page execute read
33CE000
stack
page read and write
2CBD000
heap
page read and write
8540000
trusted library allocation
page read and write
3433000
heap
page read and write
8BAC000
trusted library allocation
page read and write
1A1F6C40000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
E70000
heap
page read and write
8500000
trusted library allocation
page read and write
5AA6000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
2130587E000
heap
page read and write
8540000
trusted library allocation
page read and write
6E0B000
heap
page read and write
910000
heap
page read and write
8630000
heap
page read and write
213058B4000
heap
page read and write
4BBA000
trusted library allocation
page read and write
1F4A30F0000
heap
page read and write
2769F220000
heap
page read and write
7FF8A8EA3000
unkown
page read and write
7C89000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8D8000
heap
page read and write
7A9F000
stack
page read and write
5BD0000
trusted library allocation
page read and write
1ED105C0000
heap
page read and write
7B01000
trusted library allocation
page read and write
A20E000
unkown
page read and write
27D0000
heap
page read and write
84F0000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
276D8990000
heap
page read and write
8510000
trusted library allocation
page read and write
2620A195000
heap
page read and write
7C20000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
3491EFE000
unkown
page read and write
8590000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7C90000
trusted library allocation
page read and write
42E000
unkown
page write copy
66A000
trusted library allocation
page read and write
2F30000
heap
page read and write
7CB0000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
76BD000
stack
page read and write
7590000
trusted library allocation
page read and write
4EB2000
trusted library allocation
page read and write
216A6965000
heap
page read and write
CA6B5FF000
unkown
page read and write
477E000
stack
page read and write
8540000
trusted library allocation
page read and write
5B71000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
7CBB000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
12DCD420000
heap
page read and write
8501000
trusted library allocation
page read and write
7B40000
trusted library allocation
page read and write
595F000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7C30000
heap
page read and write
8540000
trusted library allocation
page read and write
1ED10A15000
heap
page read and write
6D63000
heap
page read and write
8540000
trusted library allocation
page read and write
ACD000
stack
page read and write
1B92F1C5000
heap
page read and write
9700000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
4BC2000
trusted library allocation
page read and write
AD0000
heap
page read and write
8590000
trusted library allocation
page read and write
9823000
heap
page read and write
8540000
trusted library allocation
page read and write
E111EFC000
stack
page read and write
8520000
trusted library allocation
page read and write
1ECF0410000
heap
page read and write
49D000
stack
page read and write
8590000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
292E01F5000
heap
page read and write
8540000
trusted library allocation
page read and write
1F1DEDC0000
heap
page read and write
3178000
heap
page read and write
6DE000
stack
page read and write
5910000
trusted library allocation
page read and write
232D2A90000
heap
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2EBE000
stack
page read and write
7CEA0FE000
unkown
page read and write
8540000
trusted library allocation
page read and write
213066E9000
heap
page read and write
8530000
trusted library allocation
page read and write
1C37C2F5000
heap
page read and write
2061D9CD000
heap
page read and write
3460000
heap
page read and write
213068B0000
direct allocation
page read and write
7556000
trusted library allocation
page read and write
29D0000
heap
page read and write
7C20000
trusted library allocation
page read and write
69C2000
heap
page read and write
26BC000
stack
page read and write
1800AA05000
heap
page read and write
2B25000
stack
page read and write
886000
heap
page read and write
7B23000
trusted library allocation
page read and write
4477000
trusted library allocation
page execute and read and write
9880000
trusted library allocation
page read and write
F13000
unkown
page readonly
6FF1000
heap
page read and write
B70000
heap
page read and write
8540000
trusted library allocation
page read and write
330E000
stack
page read and write
A1CF000
stack
page read and write
292D0D70000
heap
page read and write
8500000
trusted library allocation
page read and write
232D2800000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7FF8B9845000
unkown
page readonly
25183390000
heap
page read and write
93EF000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
6FF0000
heap
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
267D000
stack
page read and write
56CA11C000
stack
page read and write
1A1F6CC5000
heap
page read and write
8B0000
heap
page read and write
26209FA7000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
440000
heap
page read and write
7D50000
trusted library allocation
page read and write
D10000
heap
page read and write
8570000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
ACE000
stack
page read and write
8540000
trusted library allocation
page read and write
4F2F000
trusted library allocation
page read and write
140026000
unkown
page readonly
8550000
trusted library allocation
page read and write
22D76FC000
stack
page read and write
7D10000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
7FF8BFAB0000
unkown
page readonly
5BE1000
trusted library allocation
page read and write
4EBD000
trusted library allocation
page read and write
88CEFFF000
unkown
page read and write
726B000
stack
page read and write
5C0D000
trusted library allocation
page read and write
80EDEFE000
unkown
page read and write
6E80000
heap
page read and write
763E000
stack
page read and write
2D10000
heap
page read and write
2DBE000
stack
page read and write
299D000
stack
page read and write
9690000
trusted library allocation
page read and write
9460000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
C0A80FC000
stack
page read and write
9870000
trusted library allocation
page read and write
4466000
trusted library allocation
page execute and read and write
8CD4EFF000
unkown
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2A80000
heap
page read and write
311B000
heap
page read and write
8500000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
184D33E0000
heap
page read and write
30CE6FF000
unkown
page read and write
8570000
trusted library allocation
page read and write
46EE000
stack
page read and write
8540000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
5B36000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
240814E6000
heap
page read and write
7FF8BA50C000
unkown
page readonly
58BF000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
12D000
stack
page read and write
4B9C000
trusted library allocation
page read and write
1F1DEE65000
heap
page read and write
3070000
heap
page read and write
3580000
heap
page read and write
7FF77B321000
unkown
page execute read
7FDF0000
trusted library allocation
page execute and read and write
84D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4D0000
heap
page read and write
4ED20FC000
stack
page read and write
C91000
heap
page read and write
85B0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
967C000
stack
page read and write
17DB38A0000
heap
page read and write
736C000
stack
page read and write
7D10000
trusted library allocation
page read and write
232D2880000
heap
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
21305893000
heap
page read and write
5A37000
trusted library allocation
page read and write
88CEEFC000
stack
page read and write
2A70000
trusted library section
page read and write
6154000
heap
page read and write
20E4000
heap
page read and write
84F0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
213057D0000
heap
page read and write
2CD5000
heap
page read and write
84D0000
trusted library allocation
page read and write
2B70000
heap
page read and write
85E0000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
8501000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
140000000
unkown
page readonly
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
6FAE000
stack
page read and write
2CAB000
heap
page read and write
8540000
trusted library allocation
page read and write
C0A81FE000
unkown
page read and write
1B0000
heap
page read and write
8580000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
24119096000
heap
page read and write
8590000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
1ECF0415000
heap
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
5946000
trusted library allocation
page read and write
2B09000
stack
page read and write
8560000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2AA1000
heap
page execute and read and write
2FFE000
stack
page read and write
8540000
trusted library allocation
page read and write
79D000
stack
page read and write
17DB3928000
heap
page read and write
5A3D000
trusted library allocation
page read and write
4EFE000
stack
page read and write
276D89F7000
heap
page read and write
58EC000
trusted library allocation
page read and write
BBE000
stack
page read and write
8500000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
C6D000
stack
page read and write
8540000
trusted library allocation
page read and write
7FF8A8F0F000
unkown
page readonly
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
98CF1EC000
stack
page read and write
3C98CFE000
stack
page read and write
2521BBC000
stack
page read and write
84F0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
216A6730000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
702E000
stack
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
46F000
unkown
page execute and read and write
8530000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
8501000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
914000
heap
page read and write
3432000
heap
page read and write
8530000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
73A000
heap
page read and write
8540000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
728E000
stack
page read and write
85A0000
trusted library allocation
page read and write
213065F1000
heap
page read and write
7378000
heap
page read and write
350000
heap
page read and write
2130669C000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
2247F9B000
stack
page read and write
8530000
trusted library allocation
page read and write
8990000
heap
page read and write
292D0D65000
heap
page read and write
7D10000
trusted library allocation
page read and write
760000
heap
page read and write
8540000
trusted library allocation
page read and write
81A0000
trusted library allocation
page execute and read and write
8BB1000
heap
page read and write
347C000
heap
page read and write
EFC000
stack
page read and write
12D1EAD5000
heap
page read and write
8590000
trusted library allocation
page read and write
213058B3000
heap
page read and write
8AA9000
heap
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
487F000
stack
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
9E8E000
stack
page read and write
7CEF000
trusted library allocation
page read and write
C47000
heap
page read and write
28D7000
heap
page read and write
B8E000
stack
page read and write
8540000
trusted library allocation
page read and write
2061D9CD000
heap
page read and write
DF0000
heap
page read and write
DD0000
heap
page read and write
7D10000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
4472000
trusted library allocation
page read and write
4A3D000
trusted library allocation
page read and write
9E30000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
292D0D40000
heap
page read and write
8540000
trusted library allocation
page read and write
2DDD000
stack
page read and write
25183300000
heap
page read and write
1DE8ECBC000
heap
page read and write
26F31B30000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
21305879000
heap
page read and write
527E000
stack
page read and write
8A11000
heap
page read and write
8590000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
340E000
heap
page read and write
8590000
trusted library allocation
page read and write
2E0B000
heap
page read and write
8540000
trusted library allocation
page read and write
2EFD000
stack
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
20B86EF5000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
1F4A32C0000
heap
page read and write
B0D000
stack
page read and write
21305885000
heap
page read and write
8540000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
140001000
unkown
page execute read
140001000
unkown
page execute read
4895000
trusted library allocation
page execute and read and write
339E000
stack
page read and write
8500000
trusted library allocation
page read and write
3110000
heap
page read and write
140026000
unkown
page readonly
8540000
trusted library allocation
page read and write
A7D000
stack
page read and write
8540000
trusted library allocation
page read and write
9E30000
trusted library allocation
page read and write
18BC4910000
heap
page read and write
140030000
unkown
page write copy
8500000
trusted library allocation
page read and write
347C000
heap
page read and write
12D1EA40000
heap
page read and write
8540000
trusted library allocation
page read and write
2D4E000
stack
page read and write
C7A000
heap
page read and write
4E1A000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
795F000
stack
page read and write
8500000
trusted library allocation
page read and write
5120000
heap
page read and write
327D000
stack
page read and write
8540000
trusted library allocation
page read and write
85F0000
trusted library allocation
page read and write
21306970000
heap
page read and write
9389000
heap
page read and write
5B411FE000
stack
page read and write
7D10000
trusted library allocation
page read and write
CB0000
heap
page read and write
14C000
stack
page read and write
8490000
trusted library allocation
page read and write
531E000
stack
page read and write
28DE000
stack
page read and write
241192C5000
heap
page read and write
464C000
heap
page read and write
8980000
trusted library allocation
page execute and read and write
8500000
trusted library allocation
page read and write
30E0000
heap
page read and write
24A7E090000
heap
page read and write
25E755D0000
heap
page read and write
24119020000
heap
page read and write
A4F000
stack
page read and write
F6C000
stack
page read and write
2E70000
heap
page read and write
7FF77B366000
unkown
page readonly
C2744FF000
stack
page read and write
4550000
trusted library allocation
page read and write
7050000
heap
page execute and read and write
4F113FF000
unkown
page read and write
7022000
heap
page read and write
8530000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
18BC4946000
heap
page read and write
8540000
trusted library allocation
page read and write
6DBF000
heap
page read and write
84E0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
AE70000
heap
page read and write
213059B0000
heap
page readonly
4F114FF000
stack
page read and write
89F7000
heap
page read and write
292E0287000
heap
page read and write
8620000
trusted library allocation
page read and write
4D80000
heap
page execute and read and write
356E000
stack
page read and write
D1F000
stack
page read and write
84F0000
trusted library allocation
page read and write
58F9000
trusted library allocation
page read and write
4CF5000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
36D0000
heap
page read and write
8590000
trusted library allocation
page read and write
7FF8B9849000
unkown
page read and write
8540000
trusted library allocation
page read and write
2EA486A5000
heap
page read and write
CEC000
stack
page read and write
2D60000
heap
page read and write
8A0E000
heap
page read and write
7D00000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
E09000
heap
page read and write
8520000
trusted library allocation
page read and write
6AD000
heap
page read and write
6D6A000
heap
page read and write
3437000
heap
page read and write
8580000
trusted library allocation
page read and write
69C000
stack
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
140000000
unkown
page readonly
C8D000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
9F0E000
stack
page read and write
4470000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8D0000
heap
page read and write
7D20000
trusted library allocation
page read and write
785000
heap
page read and write
5BDC000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
2CA7000
heap
page read and write
8540000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2411907D000
heap
page read and write
6A61000
heap
page read and write
65FE2FF000
stack
page read and write
8970000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
140065000
unkown
page readonly
8530000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
690000
heap
page read and write
1F31CBE4000
heap
page read and write
8500000
trusted library allocation
page read and write
35DC0FC000
stack
page read and write
2D60000
heap
page read and write
80E000
stack
page read and write
24119070000
heap
page read and write
1ED105F0000
heap
page read and write
C13C8FF000
stack
page read and write
8500000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
7CC4000
trusted library allocation
page read and write
21691B30000
heap
page read and write
8500000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
7CDE000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8580000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
1A1F6CAE000
heap
page read and write
85B0000
trusted library allocation
page execute and read and write
8590000
trusted library allocation
page read and write
240816A0000
heap
page read and write
213068B0000
direct allocation
page read and write
877000
heap
page read and write
8500000
trusted library allocation
page read and write
94E5000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2CB5000
heap
page read and write
2130583D000
heap
page read and write
46F0000
heap
page read and write
8AD8000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
24A7E4C5000
heap
page read and write
2BA0000
heap
page read and write
3C988FD000
stack
page read and write
F14000
unkown
page readonly
6133FEB000
stack
page read and write
8BA0000
trusted library allocation
page read and write
836A12B000
stack
page read and write
8580000
trusted library allocation
page read and write
2EA0000
heap
page read and write
21DAA460000
heap
page read and write
8540000
trusted library allocation
page read and write
34AA000
heap
page read and write
8540000
trusted library allocation
page read and write
6961000
heap
page read and write
140001000
unkown
page execute read
4879000
trusted library allocation
page read and write
D2B34FC000
stack
page read and write
2C90000
heap
page read and write
2F7C000
stack
page read and write
7D10000
trusted library allocation
page read and write
2CB8000
heap
page read and write
8A03000
heap
page read and write
190791F6000
heap
page read and write
213058B4000
heap
page read and write
26209EE0000
heap
page read and write
DD8000
heap
page read and write
D0490FC000
stack
page read and write
C2742FB000
stack
page read and write
C94000
heap
page read and write
18BC492D000
heap
page read and write
8970000
trusted library allocation
page read and write
759000
stack
page read and write
2B0E000
stack
page read and write
7562000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
651000
trusted library allocation
page read and write
2130587B000
heap
page read and write
6CF000
stack
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
5A44000
trusted library allocation
page read and write
838000
heap
page read and write
7CE1000
trusted library allocation
page read and write
28281FF000
stack
page read and write
184D32C0000
heap
page read and write
4450000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
2061D9B0000
heap
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
213058B3000
heap
page read and write
8500000
trusted library allocation
page read and write
190000
heap
page read and write
213058B3000
heap
page read and write
8520000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
9880000
trusted library allocation
page read and write
21691EE0000
heap
page read and write
40C30FC000
stack
page read and write
8590000
trusted library allocation
page read and write
4B0F000
stack
page read and write
213066A2000
heap
page read and write
349F000
heap
page read and write
2D60000
heap
page read and write
84F0000
trusted library allocation
page read and write
21306930000
direct allocation
page read and write
216A6960000
heap
page read and write
886E000
stack
page read and write
45C000
stack
page read and write
8530000
trusted library allocation
page read and write
FA3F2FF000
unkown
page read and write
7D10000
trusted library allocation
page read and write
184D3480000
heap
page read and write
58A0000
trusted library allocation
page read and write
5AFE000
trusted library allocation
page read and write
1A1F6F35000
heap
page read and write
8501000
trusted library allocation
page read and write
B40000
heap
page read and write
6D84000
heap
page read and write
8520000
trusted library allocation
page read and write
22AE22E5000
heap
page read and write
500A000
trusted library allocation
page read and write
1ED10A10000
heap
page read and write
F621CFC000
stack
page read and write
8540000
trusted library allocation
page read and write
690000
heap
page read and write
2061D9CD000
heap
page read and write
C60000
heap
page read and write
A00000
heap
page read and write
7D10000
trusted library allocation
page read and write
48E0000
heap
page read and write
4F2E000
trusted library allocation
page read and write
3330000
heap
page read and write
9F20000
heap
page read and write
886000
heap
page read and write
40C31FF000
unkown
page read and write
2061D920000
heap
page read and write
140062000
unkown
page read and write
4EA1000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
26F31B20000
heap
page read and write
8540000
trusted library allocation
page read and write
9E38000
heap
page read and write
73A000
heap
page read and write
C40000
heap
page read and write
21305858000
heap
page read and write
BD0000
heap
page read and write
8570000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
323F000
unkown
page read and write
C7E000
heap
page read and write
49C5000
trusted library allocation
page read and write
2B3C000
heap
page read and write
7FF8BA508000
unkown
page read and write
5AE6000
trusted library allocation
page read and write
CD27AFF000
unkown
page read and write
8970000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
87D000
heap
page read and write
8580000
trusted library allocation
page read and write
2C5C1120000
heap
page read and write
9860000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
6E70000
heap
page execute and read and write
8590000
trusted library allocation
page read and write
508E000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
1D2D82D0000
heap
page read and write
140030000
unkown
page read and write
755D000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
317F000
stack
page read and write
84F0000
trusted library allocation
page read and write
6F0000
heap
page read and write
25E75A65000
heap
page read and write
8500000
trusted library allocation
page read and write
535000
heap
page read and write
18471360000
heap
page read and write
1AA5E880000
heap
page read and write
7B5B000
trusted library allocation
page read and write
270F000
stack
page read and write
7D10000
trusted library allocation
page read and write
34C3000
heap
page read and write
7D10000
trusted library allocation
page read and write
3497000
heap
page read and write
8500000
trusted library allocation
page read and write
89E7000
heap
page read and write
5905000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
24081740000
heap
page read and write
8590000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
2B29000
stack
page read and write
4AD000
stack
page read and write
8590000
trusted library allocation
page read and write
5A5B000
trusted library allocation
page read and write
22AE2316000
heap
page read and write
8590000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
454000
unkown
page readonly
6BA000
heap
page read and write
21691D40000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
1B92F130000
heap
page read and write
213058B4000
heap
page read and write
8570000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
85A2000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
6888000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
50CF000
stack
page read and write
8970000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
952E000
stack
page read and write
8540000
trusted library allocation
page read and write
21305874000
heap
page read and write
2D1963F5000
heap
page read and write
8590000
trusted library allocation
page read and write
140001000
unkown
page execute read
88C000
heap
page read and write
8510000
trusted library allocation
page read and write
6FF0000
heap
page read and write
4D40000
heap
page read and write
21DAA440000
heap
page read and write
33F0000
heap
page read and write
C6B000
heap
page read and write
8540000
trusted library allocation
page read and write
877000
heap
page read and write
8500000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
88C000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
1C37BED0000
heap
page read and write
1F4A30B0000
heap
page read and write
1D2D83B0000
heap
page read and write
BB0000
heap
page read and write
C0A000
heap
page read and write
25E75770000
heap
page read and write
7D10000
trusted library allocation
page read and write
2BA0000
heap
page read and write
2769F140000
heap
page read and write
7CFE000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
680000
heap
page read and write
21305890000
heap
page read and write
7D30000
trusted library allocation
page execute and read and write
21691B70000
heap
page read and write
2A50000
heap
page read and write
140065000
unkown
page readonly
84F0000
trusted library allocation
page read and write
24118F40000
heap
page read and write
8540000
trusted library allocation
page read and write
7FF8BA241000
unkown
page execute read
22AE2500000
heap
page read and write
7D10000
trusted library allocation
page read and write
334E000
stack
page read and write
9870000
trusted library allocation
page read and write
12D1EA60000
heap
page read and write
8540000
trusted library allocation
page read and write
5A1B000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
5DE000
stack
page read and write
8540000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
292D0D60000
heap
page read and write
8590000
trusted library allocation
page read and write
996B000
heap
page read and write
3F1000
unkown
page execute read
560000
heap
page read and write
190793C0000
heap
page read and write
B1E000
stack
page read and write
8540000
trusted library allocation
page read and write
6A53000
heap
page read and write
7FF8BFAD6000
unkown
page readonly
76C0000
trusted library allocation
page read and write
1E0000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
216A6758000
heap
page read and write
140000000
unkown
page readonly
7D10000
trusted library allocation
page read and write
877000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7FF8B9F6E000
unkown
page readonly
7FF8A87CD000
unkown
page execute read
93D0000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
1EC08C90000
heap
page read and write
77B0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
17DB3900000
heap
page read and write
8540000
trusted library allocation
page read and write
80EDFFE000
stack
page read and write
7CD0000
trusted library allocation
page read and write
682A2FF000
stack
page read and write
8540000
trusted library allocation
page read and write
8A2B000
heap
page read and write
8540000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
1ECF0120000
heap
page read and write
97C0000
heap
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8AB7000
heap
page read and write
8530000
trusted library allocation
page read and write
8550000
trusted library allocation
page read and write
2061D9CD000
heap
page read and write
8500000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
6AC2000
heap
page read and write
7FF8B8088000
unkown
page readonly
7C20000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
3390000
heap
page read and write
59F1000
trusted library allocation
page read and write
1DE8EC20000
heap
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
349D000
heap
page read and write
D90000
heap
page read and write
6E54000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
6BC000
stack
page read and write
4CFC000
trusted library allocation
page read and write
4A1F000
heap
page read and write
2426CD40000
heap
page read and write
2B73000
heap
page read and write
71A000
heap
page read and write
B7F000
stack
page read and write
8540000
trusted library allocation
page read and write
C8F000
heap
page read and write
84D0000
trusted library allocation
page read and write
2769F2D4000
heap
page read and write
7AC0000
trusted library allocation
page read and write
56CA5FF000
stack
page read and write
C7A000
heap
page read and write
8540000
trusted library allocation
page read and write
2130699D000
heap
page read and write
7FF77B363000
unkown
page read and write
8540000
trusted library allocation
page read and write
71A000
heap
page read and write
1E19AC16000
heap
page read and write
8BB0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
59F8000
trusted library allocation
page read and write
28D7000
heap
page read and write
CDE000
stack
page read and write
316F000
stack
page read and write
12D1EABD000
heap
page read and write
8540000
trusted library allocation
page read and write
2744000
unkown
page readonly
6C7000
heap
page read and write
73A000
heap
page read and write
3320000
heap
page read and write
213068B0000
direct allocation
page read and write
8540000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
3460000
heap
page read and write
8ACF000
heap
page read and write
9700000
trusted library allocation
page read and write
624F000
stack
page read and write
8B9000
heap
page read and write
2061D950000
heap
page read and write
7B7ECFF000
stack
page read and write
6A61000
heap
page read and write
190790C0000
heap
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
B375AFC000
stack
page read and write
84F0000
trusted library allocation
page read and write
3000000
heap
page read and write
8540000
trusted library allocation
page read and write
7FF8BFAD1000
unkown
page execute read
8540000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
33F0000
heap
page read and write
213068B0000
direct allocation
page read and write
8540000
trusted library allocation
page read and write
1AA5E8A7000
heap
page read and write
8520000
trusted library allocation
page read and write
AEE000
stack
page read and write
93FF000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8CD4FFF000
stack
page read and write
8540000
trusted library allocation
page read and write
65E000
stack
page read and write
8540000
trusted library allocation
page read and write
3117000
heap
page read and write
8540000
trusted library allocation
page read and write
1F31CBCB000
heap
page read and write
7FF8BFAB5000
unkown
page read and write
854C000
trusted library allocation
page read and write
30D0000
heap
page read and write
7D0000
heap
page read and write
8580000
trusted library allocation
page read and write
292D0FB0000
heap
page read and write
2D50000
heap
page read and write
2D30000
heap
page read and write
2D19620D000
heap
page read and write
89E0000
heap
page read and write
8540000
trusted library allocation
page read and write
49DE000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
27CB000
heap
page read and write
426000
unkown
page execute and read and write
84F0000
trusted library allocation
page read and write
7FF8B9061000
unkown
page execute read
21DAA490000
heap
page read and write
84E0000
trusted library allocation
page read and write
2B32000
stack
page read and write
8540000
trusted library allocation
page read and write
2EA488F5000
heap
page read and write
A20000
heap
page read and write
84D0000
trusted library allocation
page read and write
DFC000
heap
page read and write
1FD6F6C0000
heap
page read and write
84F0000
trusted library allocation
page read and write
540000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
2A3D000
stack
page read and write
8970000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
10904FC000
stack
page read and write
87D000
stack
page read and write
94E0000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
5B5D000
trusted library allocation
page read and write
69C1000
heap
page read and write
1DE8ECD6000
heap
page read and write
84F0000
trusted library allocation
page read and write
213057E0000
heap
page read and write
520000
heap
page read and write
88C000
heap
page read and write
C63000
heap
page read and write
8530000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
93FA000
trusted library allocation
page read and write
AF31000
heap
page read and write
9A000
stack
page read and write
7D10000
trusted library allocation
page read and write
A0E000
stack
page read and write
1A26D436000
heap
page read and write
3C989FE000
unkown
page readonly
660000
heap
page read and write
7BA3000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7FF8BA511000
unkown
page execute read
5138000
heap
page read and write
8520000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4F29000
trusted library allocation
page read and write
276D89DD000
heap
page read and write
4F2000
stack
page read and write
9E30000
trusted library allocation
page read and write
2130583D000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page read and write
884000
heap
page read and write
42B000
unkown
page execute and read and write
2061D910000
heap
page readonly
84F0000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
8C0000
heap
page read and write
8540000
trusted library allocation
page read and write
849000
heap
page read and write
E21000
heap
page read and write
1E19ABFB000
heap
page read and write
8540000
trusted library allocation
page read and write
2C223CD6000
heap
page read and write
2EA48560000
heap
page read and write
8AAD000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4E9000
stack
page read and write
2426CAE7000
heap
page read and write
96038FE000
unkown
page read and write
8540000
trusted library allocation
page read and write
7C85000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
6BC55F0000
stack
page read and write
8540000
trusted library allocation
page read and write
2F38000
heap
page read and write
84E0000
trusted library allocation
page read and write
7FF77B366000
unkown
page readonly
8540000
trusted library allocation
page read and write
2D196070000
heap
page read and write
1F31CBE6000
heap
page read and write
7C7A000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
38DCEFF000
stack
page read and write
8540000
trusted library allocation
page read and write
830000
heap
page read and write
8500000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
190000
heap
page read and write
26209FA5000
heap
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8A94000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
848000
heap
page read and write
985E000
stack
page read and write
1EC08F60000
heap
page read and write
4430000
trusted library allocation
page read and write
7FF8B93DB000
unkown
page read and write
8540000
trusted library allocation
page read and write
1F4A3117000
heap
page read and write
51359FF000
stack
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2B2C000
heap
page read and write
8520000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
1F1DEE4E000
heap
page read and write
7D10000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
867000
heap
page read and write
8540000
trusted library allocation
page read and write
4E0000
heap
page read and write
25E756B0000
heap
page read and write
310E000
stack
page read and write
9420000
trusted library allocation
page execute and read and write
E09000
heap
page read and write
8540000
trusted library allocation
page read and write
140026000
unkown
page readonly
8540000
trusted library allocation
page read and write
2130588F000
heap
page read and write
8590000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
20B86EDB000
heap
page read and write
292D0DE0000
heap
page read and write
8A9E000
heap
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
85C0000
trusted library allocation
page read and write
99D000
stack
page read and write
94E0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
18471387000
heap
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
4D0A000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
140030000
unkown
page read and write
51B4000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
292E01F0000
heap
page read and write
8540000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
F70000
heap
page read and write
8540000
trusted library allocation
page read and write
85C0000
trusted library allocation
page read and write
94E3000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
2CFD000
stack
page read and write
B5D000
stack
page read and write
84F0000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
EE3000
unkown
page readonly
8A9F000
heap
page read and write
327E000
unkown
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
21306740000
direct allocation
page read and write
4CBA000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7FF8B8076000
unkown
page write copy
8540000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
289F000
stack
page read and write
12DCD240000
heap
page read and write
7B10000
trusted library allocation
page read and write
94F0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
446A000
trusted library allocation
page execute and read and write
1C37BFD0000
heap
page read and write
69F3000
heap
page read and write
1ECF0040000
heap
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
2B1C000
stack
page read and write
6670000
heap
page read and write
84F0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
DA0000
heap
page read and write
197000
stack
page read and write
29D0000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
5887000
trusted library allocation
page read and write
B2E000
stack
page read and write
84F0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
4E98000
trusted library allocation
page read and write
4E1F000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
5040000
heap
page read and write
7D10000
trusted library allocation
page read and write
180000
heap
page read and write
8500000
trusted library allocation
page read and write
93E8000
trusted library allocation
page read and write
5B3B000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
4C9000
stack
page read and write
2750000
heap
page read and write
8540000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
2D2E000
heap
page read and write
8540000
trusted library allocation
page read and write
21305879000
heap
page read and write
9420000
trusted library allocation
page read and write
C94000
heap
page read and write
8540000
trusted library allocation
page read and write
1E0000
heap
page read and write
61342FF000
unkown
page read and write
6A53000
heap
page read and write
4850000
trusted library allocation
page read and write
1EC08CF5000
heap
page read and write
8AE0000
heap
page read and write
6960000
heap
page read and write
7AD0000
trusted library allocation
page read and write
5E89000
trusted library allocation
page read and write
990000
heap
page read and write
8560000
trusted library allocation
page read and write
85E0000
trusted library allocation
page read and write
529E000
stack
page read and write
830000
heap
page read and write
22AE24C0000
heap
page read and write
140062000
unkown
page read and write
7AF000
stack
page read and write
340000
heap
page read and write
CA6B4FC000
stack
page read and write
4DC000
stack
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
1E0000
heap
page read and write
8540000
trusted library allocation
page read and write
24A7E140000
heap
page read and write
3C9833B000
stack
page read and write
C7D000
heap
page read and write
D7E000
stack
page read and write
B375BFF000
unkown
page read and write
4D8000
stack
page read and write
8540000
trusted library allocation
page read and write
5B6D000
trusted library allocation
page read and write
4680000
heap
page read and write
5B68000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
C78000
heap
page read and write
8E8000
heap
page read and write
4A32000
trusted library allocation
page read and write
213067C0000
direct allocation
page read and write
988A000
trusted library allocation
page read and write
7FF77B320000
unkown
page readonly
9700000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
8BA0000
trusted library allocation
page read and write
2E89000
heap
page read and write
26F31BF7000
heap
page read and write
1E19AD35000
heap
page read and write
8540000
trusted library allocation
page read and write
7055000
heap
page execute and read and write
6FD0000
heap
page read and write
734A000
heap
page read and write
2130584E000
heap
page read and write
1C37C020000
heap
page read and write
8630000
trusted library allocation
page read and write
E3228FC000
stack
page read and write
77C0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
634C000
stack
page read and write
76F0000
trusted library allocation
page execute and read and write
24D000
stack
page read and write
8540000
trusted library allocation
page read and write
9E30000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
AC6F000
stack
page read and write
8540000
trusted library allocation
page read and write
337E000
stack
page read and write
7B70000
trusted library allocation
page read and write
1ED106B7000
heap
page read and write
84F0000
trusted library allocation
page read and write
AD5000
heap
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
882C000
stack
page read and write
84F0000
trusted library allocation
page read and write
1F4A3115000
heap
page read and write
8AA0000
heap
page read and write
8500000
trusted library allocation
page read and write
5B410FF000
unkown
page read and write
756E000
stack
page read and write
84F0000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
899C000
heap
page read and write
8590000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
5AF2000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
18DD6EE5000
heap
page read and write
B9119FF000
stack
page read and write
73AC000
heap
page read and write
8590000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
79C000
stack
page read and write
7C50000
trusted library allocation
page read and write
E604AFF000
unkown
page read and write
4A49000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
7FF8A8EE1000
unkown
page read and write
9860000
trusted library allocation
page execute and read and write
84F0000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
1F31CEB0000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4EC8000
trusted library allocation
page read and write
454000
unkown
page readonly
7AA0000
trusted library allocation
page read and write
18DD7175000
heap
page read and write
8540000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
8AB7000
heap
page read and write
1E9D7843000
heap
page read and write
5881000
trusted library allocation
page read and write
FEF000
stack
page read and write
7FF8A8A2E000
unkown
page readonly
1FD6F690000
heap
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
4A8F000
stack
page read and write
904000
heap
page read and write
8970000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
5150000
heap
page read and write
7C20000
trusted library allocation
page read and write
4F3D000
trusted library allocation
page read and write
8A9F000
heap
page read and write
8530000
trusted library allocation
page read and write
20B86FD0000
heap
page read and write
8590000
trusted library allocation
page read and write
9440000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
CB0000
heap
page read and write
8500000
trusted library allocation
page read and write
1FD6F4B0000
heap
page read and write
84E0000
trusted library allocation
page read and write
213058B4000
heap
page read and write
BEE000
stack
page read and write
8540000
trusted library allocation
page read and write
344E000
stack
page read and write
75AE000
stack
page read and write
7D10000
trusted library allocation
page read and write
4CAC000
trusted library allocation
page read and write
C63000
heap
page read and write
99E000
stack
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
BCF000
stack
page read and write
8530000
trusted library allocation
page read and write
2EBE000
stack
page read and write
1E9D7841000
heap
page read and write
3489000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
2130587E000
heap
page read and write
4E8000
heap
page read and write
7D10000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
8550000
trusted library allocation
page read and write
34A5000
heap
page read and write
720E000
stack
page read and write
8540000
trusted library allocation
page read and write
7FF77B320000
unkown
page readonly
2CBC000
heap
page read and write
5A0A000
trusted library allocation
page read and write
19D8ECE0000
heap
page read and write
7FF8A8EE7000
unkown
page read and write
8520000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
2130588E000
heap
page read and write
7B90000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
97F1000
heap
page read and write
85F0000
trusted library allocation
page read and write
490000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
184712B0000
heap
page read and write
C7A000
heap
page read and write
8500000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
998000
heap
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
2EA48680000
heap
page read and write
7CB0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
2426CAC0000
heap
page read and write
2D196200000
heap
page read and write
7D10000
trusted library allocation
page read and write
754E000
trusted library allocation
page read and write
4CED000
stack
page read and write
877000
heap
page read and write
25183320000
heap
page read and write
5E61000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
2A36000
stack
page read and write
89B6000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
4E96000
trusted library allocation
page read and write
1EC08CDD000
heap
page read and write
8590000
trusted library allocation
page read and write
510E000
stack
page read and write
287E000
stack
page read and write
7FF8B9094000
unkown
page readonly
7C3C000
trusted library allocation
page read and write
6DC8000
heap
page read and write
6F2D000
stack
page read and write
D1E000
stack
page read and write
7CFB000
trusted library allocation
page read and write
28D000
stack
page read and write
36B0000
heap
page read and write
8540000
trusted library allocation
page read and write
401000
unkown
page execute read
84E0000
trusted library allocation
page execute and read and write
9700000
trusted library allocation
page read and write
CCF000
stack
page read and write
8500000
trusted library allocation
page read and write
B6E000
stack
page read and write
2769F2B0000
heap
page read and write
8540000
trusted library allocation
page read and write
C13C6FB000
stack
page read and write
9870000
trusted library allocation
page read and write
8A94000
heap
page read and write
8970000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
59F1000
trusted library allocation
page read and write
333E000
stack
page read and write
7FF8B93C1000
unkown
page execute read
8540000
trusted library allocation
page read and write
94E0000
trusted library allocation
page read and write
7FF8BA4F0000
unkown
page readonly
445D000
trusted library allocation
page execute and read and write
8540000
trusted library allocation
page read and write
292E00E0000
heap
page read and write
21305885000
heap
page read and write
5B31000
trusted library allocation
page read and write
8B90000
trusted library allocation
page read and write
2F3C000
stack
page read and write
12D1E960000
heap
page read and write
8510000
trusted library allocation
page read and write
4C8000
heap
page read and write
5E33000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
276D89B0000
heap
page read and write
8540000
trusted library allocation
page read and write
53F0000
heap
page read and write
310F000
stack
page read and write
292E0285000
heap
page read and write
84F0000
trusted library allocation
page read and write
81C0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
18471290000
heap
page read and write
4C83000
trusted library allocation
page read and write
8A9F000
heap
page read and write
7700000
trusted library allocation
page read and write
7FF8BA51E000
unkown
page readonly
7FF77B35E000
unkown
page write copy
2B18000
stack
page read and write
30EA000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
D60000
heap
page read and write
AF40000
heap
page read and write
48B0000
trusted library allocation
page read and write
EB0000
unkown
page readonly
4CFF000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
33FF000
stack
page read and write
6BE000
heap
page read and write
8500000
trusted library allocation
page read and write
352E000
stack
page read and write
7D10000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
7C52000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
9700000
heap
page read and write
5A53000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
DAE000
stack
page read and write
2FE0000
heap
page read and write
8590000
trusted library allocation
page read and write
F8E000
unkown
page read and write
8520000
trusted library allocation
page read and write
3F0000
unkown
page readonly
615C000
heap
page read and write
7D10000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
94FC000
trusted library allocation
page read and write
26FD000
stack
page read and write
240814CD000
heap
page read and write
4A0F000
stack
page read and write
30CE3AC000
stack
page read and write
8540000
trusted library allocation
page read and write
80E000
stack
page read and write
84D0000
trusted library allocation
page read and write
19D8EB00000
heap
page read and write
514F000
stack
page read and write
8A9E000
heap
page read and write
8540000
trusted library allocation
page read and write
6E9E000
stack
page read and write
8540000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
190DE560000
heap
page read and write
213058B3000
heap
page read and write
8540000
trusted library allocation
page read and write
4E61000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
349D000
heap
page read and write
21305883000
heap
page read and write
8540000
trusted library allocation
page read and write
2426CACD000
heap
page read and write
8590000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
97C0000
heap
page read and write
7D10000
trusted library allocation
page read and write
12DCD447000
heap
page read and write
8540000
trusted library allocation
page read and write
2BD0000
heap
page read and write
21305885000
heap
page read and write
30EE000
unkown
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
21691EE5000
heap
page read and write
8530000
trusted library allocation
page read and write
140062000
unkown
page read and write
8530000
trusted library allocation
page read and write
213069AE000
heap
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
3300FF000
stack
page read and write
7FF8BA253000
unkown
page readonly
9822000
heap
page read and write
5C03000
trusted library allocation
page read and write
8A59000
heap
page read and write
2061D9CD000
heap
page read and write
2EA48640000
heap
page read and write
EB1000
unkown
page execute read
84F0000
trusted library allocation
page read and write
3488000
heap
page read and write
8540000
trusted library allocation
page read and write
1FD6F6B0000
heap
page read and write
4EB7000
trusted library allocation
page read and write
4F24000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2B31000
heap
page read and write
2D196170000
heap
page read and write
7600000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
7FF77B34B000
unkown
page readonly
D57BBFE000
unkown
page read and write
8540000
trusted library allocation
page read and write
8F4000
heap
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7CEA1FF000
stack
page read and write
6DE000
stack
page read and write
4C97000
trusted library allocation
page read and write
4ACE000
stack
page read and write
722E000
stack
page read and write
682A0FB000
stack
page read and write
8530000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
7C60000
trusted library allocation
page execute and read and write
10905FF000
unkown
page read and write
84D0000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
6BA000
heap
page read and write
8520000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
30D1000
trusted library allocation
page read and write
7FF8BA251000
unkown
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4567000
heap
page read and write
8520000
trusted library allocation
page read and write
860000
heap
page read and write
8540000
trusted library allocation
page read and write
32B5000
heap
page read and write
8590000
trusted library allocation
page read and write
9E30000
trusted library allocation
page read and write
4456000
direct allocation
page read and write
8540000
trusted library allocation
page read and write
4CAE000
stack
page read and write
7FF8B8081000
unkown
page readonly
785E000
stack
page read and write
8530000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
23EE000
stack
page read and write
FA3F3FF000
stack
page read and write
5AB6000
trusted library allocation
page read and write
1E19ABD0000
heap
page read and write
5A8F000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
860000
heap
page read and write
8540000
trusted library allocation
page read and write
2D0C000
heap
page read and write
8530000
trusted library allocation
page read and write
D60000
heap
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
14C000
stack
page read and write
8590000
trusted library allocation
page read and write
D00000
heap
page read and write
5E46000
trusted library allocation
page read and write
D2B36FF000
stack
page read and write
3120000
heap
page read and write
84F0000
trusted library allocation
page read and write
2061D9CD000
heap
page read and write
84F0000
trusted library allocation
page read and write
4CF3000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
A28000
heap
page read and write
8540000
trusted library allocation
page read and write
6DDE000
heap
page read and write
2C5C10B0000
heap
page read and write
8500000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2F3E000
stack
page read and write
35DC1FF000
unkown
page read and write
8580000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
6A96000
heap
page read and write
94E0000
trusted library allocation
page read and write
308D000
stack
page read and write
140026000
unkown
page readonly
E18000
heap
page read and write
5B2A000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
4460000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
8A02000
heap
page read and write
89AC000
heap
page read and write
A4E000
stack
page read and write
423000
unkown
page readonly
DEF000
stack
page read and write
2130587E000
heap
page read and write
96B0000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
140026000
unkown
page readonly
1FD6F6B5000
heap
page read and write
2890000
heap
page read and write
5A30000
trusted library allocation
page read and write
2C223E80000
heap
page read and write
7D72FF000
unkown
page read and write
2F77000
heap
page read and write
8500000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
4E24000
trusted library allocation
page read and write
44A0000
trusted library allocation
page execute and read and write
8510000
trusted library allocation
page read and write
8D9EAFF000
stack
page read and write
1FD6F5B0000
heap
page read and write
8540000
trusted library allocation
page read and write
590A000
trusted library allocation
page read and write
3C98FFE000
unkown
page readonly
8510000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
6FF0000
heap
page read and write
4E5000
stack
page read and write
4D68000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
1AA5EBD0000
heap
page read and write
2EFE000
stack
page read and write
8500000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
C8E000
stack
page read and write
7A0000
heap
page read and write
8540000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
C30000
heap
page read and write
8540000
trusted library allocation
page read and write
4E85000
trusted library allocation
page read and write
2CAB000
heap
page read and write
84F0000
trusted library allocation
page read and write
232D2A95000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
99137FE000
unkown
page read and write
8580000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
89D8000
heap
page read and write
8540000
trusted library allocation
page read and write
529E000
stack
page read and write
84E0000
trusted library allocation
page read and write
1ED000
stack
page read and write
3C98BFE000
unkown
page readonly
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
190DE260000
heap
page read and write
2CA7000
heap
page read and write
8540000
trusted library allocation
page read and write
6E54000
heap
page read and write
27C7000
heap
page read and write
525F000
stack
page read and write
8530000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
5B18000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
6D6C000
heap
page read and write
2CAD000
heap
page read and write
1E19ACF0000
heap
page read and write
26F31BF5000
heap
page read and write
89E000
heap
page read and write
8590000
trusted library allocation
page read and write
8AE0000
heap
page read and write
50D0000
trusted library allocation
page read and write
8997000
heap
page read and write
7FF8A8A03000
unkown
page readonly
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
6A24000
heap
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
89D000
stack
page read and write
8540000
trusted library allocation
page read and write
C40000
heap
page read and write
2061D9CD000
heap
page read and write
8590000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
89FE000
heap
page read and write
8540000
trusted library allocation
page read and write
58FC000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
32FFFF000
unkown
page read and write
84E0000
trusted library allocation
page read and write
21305850000
heap
page read and write
3410000
heap
page read and write
8540000
trusted library allocation
page read and write
4CC5000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
3535000
heap
page read and write
1A26D770000
heap
page read and write
51E000
stack
page read and write
5AD4000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4DBB000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
4DF2000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
343F000
stack
page read and write
1F31CAF0000
heap
page read and write
8520000
trusted library allocation
page read and write
93D2000
trusted library allocation
page read and write
89FF000
heap
page read and write
7332000
heap
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
3120000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8996000
heap
page read and write
5AD0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
7FF8B93CD000
unkown
page readonly
8ACB000
heap
page read and write
21DAA7E0000
heap
page read and write
8540000
trusted library allocation
page read and write
7AFA000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
24A7E166000
heap
page read and write
8590000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
9853000
heap
page read and write
3320000
heap
page read and write
2CB8000
heap
page read and write
C7A000
heap
page read and write
1F4A30FD000
heap
page read and write
1ED10690000
heap
page read and write
9700000
trusted library allocation
page read and write
8570000
trusted library allocation
page execute and read and write
8540000
trusted library allocation
page read and write
880000
heap
page read and write
7D10000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
2061D9CD000
heap
page read and write
84F0000
trusted library allocation
page read and write
1EC08CF7000
heap
page read and write
7FF8B9F73000
unkown
page read and write
84F4000
trusted library allocation
page read and write
A90000
heap
page read and write
8590000
trusted library allocation
page read and write
1800A817000
heap
page read and write
1A26D3D0000
heap
page read and write
7D20000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
770000
heap
page read and write
441F000
stack
page read and write
8540000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
B9118FE000
unkown
page read and write
8510000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
9470000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
4BBC000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
2CB8000
heap
page read and write
84D0000
trusted library allocation
page read and write
5AD8000
trusted library allocation
page read and write
E1120FF000
stack
page read and write
1AA5EA50000
heap
page read and write
6A9000
heap
page read and write
190791A0000
heap
page read and write
4F32000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
C48000
heap
page read and write
8540000
trusted library allocation
page read and write
25E75795000
heap
page read and write
8500000
trusted library allocation
page read and write
3150000
heap
page read and write
1E9D782B000
heap
page read and write
8540000
trusted library allocation
page read and write
89F3000
heap
page read and write
8540000
trusted library allocation
page read and write
5BFD000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
44C0000
heap
page read and write
8540000
trusted library allocation
page read and write
4B40000
heap
page read and write
8540000
trusted library allocation
page read and write
2B80000
heap
page read and write
240814C0000
heap
page read and write
190792D0000
heap
page read and write
962F000
stack
page read and write
24A7E4C0000
heap
page read and write
8540000
trusted library allocation
page read and write
C5F000
heap
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
53E000
stack
page read and write
5971000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7A6000
heap
page read and write
276D8D85000
heap
page read and write
35DC2FF000
stack
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8B5000
heap
page read and write
31C8000
heap
page read and write
1B92F1C7000
heap
page read and write
21305855000
heap
page read and write
2061E0B0000
heap
page read and write
2CDA000
heap
page read and write
21DAA7E5000
heap
page read and write
1E0000
heap
page read and write
8540000
trusted library allocation
page read and write
2061D9CD000
heap
page read and write
495D000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
32D0000
heap
page read and write
5B1F000
trusted library allocation
page read and write
24A7E0B0000
heap
page read and write
6E7000
heap
page read and write
8540000
trusted library allocation
page read and write
34BA000
heap
page read and write
2E00000
heap
page read and write
2F3E000
unkown
page read and write
A8E000
stack
page read and write
B70000
heap
page read and write
494000
heap
page read and write
31B0000
heap
page read and write
97C1000
heap
page read and write
7CD0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
5C5000
heap
page read and write
8540000
trusted library allocation
page read and write
7FF77B320000
unkown
page readonly
58F2000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
C2743FE000
unkown
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
58AD000
trusted library allocation
page read and write
7D6F2B000
stack
page read and write
1F1DEE47000
heap
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
240815C0000
heap
page read and write
8590000
trusted library allocation
page read and write
1F4A30C0000
heap
page read and write
731B000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
6A53000
heap
page read and write
7FF8B93D8000
unkown
page read and write
8540000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
6E36000
heap
page read and write
232D28A5000
heap
page read and write
9853000
heap
page read and write
5E55000
trusted library allocation
page read and write
33E000
stack
page read and write
8530000
trusted library allocation
page read and write
712E000
stack
page read and write
190793C5000
heap
page read and write
84F0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
EE0000
heap
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7E0000
heap
page read and write
7FF8BA501000
unkown
page readonly
9931000
heap
page read and write
2C223C00000
heap
page read and write
AC8000
heap
page read and write
516D000
trusted library allocation
page read and write
18BC4AF0000
heap
page read and write
190DE180000
heap
page read and write
1E9D8002000
trusted library allocation
page read and write
5A9A000
trusted library allocation
page read and write
20B86ED0000
heap
page read and write
8590000
trusted library allocation
page read and write
21306860000
direct allocation
page read and write
2130587F000
heap
page read and write
34A2000
heap
page read and write
8540000
trusted library allocation
page read and write
4A2B000
trusted library allocation
page read and write
232D28A7000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
D2C000
stack
page read and write
2F3D000
stack
page read and write
8590000
trusted library allocation
page read and write
2426CD35000
heap
page read and write
22482FE000
unkown
page read and write
8530000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8A1A000
heap
page read and write
349E000
stack
page read and write
9430000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
1AA5E88B000
heap
page read and write
2FF0000
heap
page read and write
1D0000
heap
page read and write
4E2E000
stack
page read and write
7B00000
trusted library allocation
page read and write
9870000
trusted library allocation
page read and write
C71000
heap
page read and write
7D10000
trusted library allocation
page read and write
DEC000
heap
page read and write
6DC8000
heap
page read and write
CD27BFF000
stack
page read and write
8500000
trusted library allocation
page read and write
2990000
heap
page read and write
8540000
trusted library allocation
page read and write
6FD4000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
2DBF000
unkown
page read and write
21691B50000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
9420000
trusted library allocation
page read and write
2F10000
heap
page read and write
8540000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
9F928FC000
stack
page read and write
1ECF0140000
heap
page read and write
61343FF000
stack
page read and write
E322AFF000
stack
page read and write
84E0000
trusted library allocation
page read and write
8A9E000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
E09000
heap
page read and write
8530000
trusted library allocation
page read and write
4ED22FF000
stack
page read and write
7D10000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
54E83E7000
stack
page read and write
510000
heap
page read and write
8540000
trusted library allocation
page read and write
30CE7FF000
stack
page read and write
8540000
trusted library allocation
page read and write
A4E000
unkown
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
1E9D7760000
trusted library allocation
page read and write
140065000
unkown
page readonly
8590000
trusted library allocation
page read and write
307E000
stack
page read and write
88D000
heap
page read and write
25183220000
heap
page read and write
84D0000
trusted library allocation
page read and write
75B000
heap
page read and write
8540000
trusted library allocation
page read and write
7EE000
stack
page read and write
8540000
trusted library allocation
page read and write
8591000
trusted library allocation
page read and write
7FF77B366000
unkown
page readonly
4D28000
trusted library allocation
page read and write
1800AA00000
heap
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8A02000
heap
page read and write
8510000
trusted library allocation
page read and write
2769F585000
heap
page read and write
835F6FB000
stack
page read and write
8540000
trusted library allocation
page read and write
4863000
trusted library allocation
page execute and read and write
8AD2000
heap
page read and write
213069B1000
heap
page read and write
7B7EBFF000
unkown
page read and write
85A0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8580000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
5B76000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
7FF77B35E000
unkown
page write copy
A80000
heap
page read and write
720000
heap
page read and write
8530000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4FA000
stack
page read and write
7D10000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
6BA000
heap
page read and write
84F000
stack
page read and write
7710000
trusted library allocation
page read and write
99138FF000
stack
page read and write
21305850000
heap
page read and write
2830000
heap
page read and write
7FF8A87C1000
unkown
page execute read
9E2D000
stack
page read and write
1800A7F0000
heap
page read and write
78E000
stack
page read and write
7C50000
trusted library allocation
page read and write
213058B3000
heap
page read and write
8530000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
2F60000
heap
page read and write
71CE000
stack
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
1D2D8420000
heap
page read and write
DD0000
heap
page read and write
241192C0000
heap
page read and write
7FF77B366000
unkown
page readonly
7D10000
trusted library allocation
page read and write
341B000
heap
page read and write
8510000
trusted library allocation
page read and write
1E9D7650000
heap
page read and write
BC0000
heap
page read and write
52DF000
stack
page read and write
94E0000
trusted library allocation
page read and write
140030000
unkown
page write copy
213058B3000
heap
page read and write
84F0000
trusted library allocation
page read and write
E09000
heap
page read and write
8540000
trusted library allocation
page read and write
8BC0000
heap
page read and write
2769F2BB000
heap
page read and write
8540000
trusted library allocation
page read and write
7FF8BFAD0000
unkown
page readonly
8540000
trusted library allocation
page read and write
213058D6000
heap
page read and write
190DE32D000
heap
page read and write
D3E000
stack
page read and write
338F000
stack
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
2769F240000
heap
page read and write
84F0000
trusted library allocation
page read and write
C86000
heap
page read and write
96039FF000
stack
page read and write
2D2F000
heap
page read and write
2744000
unkown
page readonly
BDF000
stack
page read and write
343F000
stack
page read and write
5ADD000
trusted library allocation
page read and write
140065000
unkown
page readonly
84F0000
trusted library allocation
page read and write
2827DFC000
stack
page read and write
8590000
trusted library allocation
page read and write
4D44000
heap
page read and write
21306560000
direct allocation
page read and write
2C5C118D000
heap
page read and write
2B53000
heap
page read and write
5A7B000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
2F90000
heap
page read and write
8590000
trusted library allocation
page read and write
1ECF01E7000
heap
page read and write
2C5C1090000
heap
page read and write
21305880000
heap
page read and write
12D1EAB0000
heap
page read and write
9700000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
21691B20000
heap
page read and write
6AF000
heap
page read and write
7FF8B909B000
unkown
page read and write
292E0360000
heap
page read and write
4E2C000
stack
page read and write
6D8D000
heap
page read and write
86B000
heap
page read and write
BAF000
stack
page read and write
7FF77B364000
unkown
page read and write
9870000
trusted library allocation
page read and write
341F000
stack
page read and write
84F0000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
12DCD625000
heap
page read and write
7FF8BA240000
unkown
page readonly
4D0000
heap
page read and write
7FF8A8825000
unkown
page execute read
84D0000
trusted library allocation
page read and write
8620000
trusted library allocation
page execute and read and write
7D10000
trusted library allocation
page read and write
8610000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
568000
heap
page read and write
2130586F000
heap
page read and write
400000
unkown
page execute and read and write
8A46000
heap
page read and write
21305F40000
direct allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4B16000
trusted library allocation
page read and write
8B90000
trusted library allocation
page read and write
8B90000
trusted library allocation
page read and write
7FF8A8AAA000
unkown
page readonly
2E7D000
stack
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
21305852000
heap
page read and write
12DCD620000
heap
page read and write
8540000
trusted library allocation
page read and write
85FF000
trusted library allocation
page read and write
4420000
trusted library section
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
6FB1000
heap
page read and write
7FF8BA522000
unkown
page read and write
1C37C047000
heap
page read and write
8530000
trusted library allocation
page read and write
2130583D000
heap
page read and write
8540000
trusted library allocation
page read and write
5300000
heap
page read and write
140065000
unkown
page readonly
88F000
stack
page read and write
C61000
heap
page read and write
190791DD000
heap
page read and write
DA0000
heap
page read and write
94E0000
trusted library allocation
page read and write
4447000
direct allocation
page read and write
2E3D000
stack
page read and write
4DCF000
stack
page read and write
7D10000
trusted library allocation
page read and write
4881000
trusted library allocation
page read and write
2658000
heap
page read and write
8540000
trusted library allocation
page read and write
7FF77B321000
unkown
page execute read
8530000
trusted library allocation
page read and write
58DB000
trusted library allocation
page read and write
C0A82FF000
stack
page read and write
8590000
trusted library allocation
page read and write
3F1000
unkown
page execute read
1847136C000
heap
page read and write
84F0000
trusted library allocation
page read and write
5D0000
heap
page read and write
8540000
trusted library allocation
page read and write
213058D6000
heap
page read and write
7D10000
trusted library allocation
page read and write
33EE000
stack
page read and write
3350000
heap
page read and write
477F000
stack
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
AD6F000
stack
page read and write
8540000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
E3229FF000
unkown
page read and write
316E000
stack
page read and write
8540000
trusted library allocation
page read and write
33BF000
stack
page read and write
2130586F000
heap
page read and write
8590000
trusted library allocation
page read and write
457000
unkown
page write copy
4CCC000
trusted library allocation
page read and write
2E3E000
stack
page read and write
5B80000
trusted library allocation
page read and write
4CDE000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
20E0000
heap
page read and write
2061D9CD000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
18DD6EE7000
heap
page read and write
94F0000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8541000
trusted library allocation
page read and write
26F31A40000
heap
page read and write
8540000
trusted library allocation
page read and write
E60477C000
stack
page read and write
EB0000
unkown
page readonly
8510000
trusted library allocation
page read and write
960358C000
stack
page read and write
6E41000
heap
page read and write
4C30000
heap
page read and write
8540000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
9520000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
85D000
heap
page read and write
C71000
heap
page read and write
5E42000
trusted library allocation
page read and write
32FEFC000
stack
page read and write
8540000
trusted library allocation
page read and write
343C000
heap
page read and write
98D0000
trusted library allocation
page execute and read and write
9700000
trusted library allocation
page read and write
F13000
unkown
page write copy
5A16000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
7FF8BA4F1000
unkown
page execute read
4890000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
6A90000
heap
page read and write
8500000
trusted library allocation
page read and write
4475000
trusted library allocation
page execute and read and write
7FF8A885E000
unkown
page execute read
216A6700000
heap
page read and write
DEC000
heap
page read and write
213068B0000
direct allocation
page read and write
1800A815000
heap
page read and write
1F0000
heap
page read and write
7AF0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
BA0000
heap
page read and write
84D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
DB0000
heap
page read and write
86A000
heap
page read and write
7053000
heap
page read and write
8E2000
heap
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
6E44000
heap
page read and write
AE0000
heap
page read and write
7C50000
trusted library allocation
page read and write
75D000
stack
page read and write
21305874000
heap
page read and write
8BA9000
trusted library allocation
page read and write
180000
heap
page read and write
8540000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
6673000
heap
page read and write
292E026B000
heap
page read and write
8500000
trusted library allocation
page read and write
24081745000
heap
page read and write
7D10000
trusted library allocation
page read and write
8B90000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
89AD000
heap
page read and write
94E0000
trusted library allocation
page read and write
18BC4920000
heap
page read and write
2CAE000
heap
page read and write
8500000
trusted library allocation
page read and write
7FF8A8AD7000
unkown
page read and write
C6C000
heap
page read and write
12D1EC35000
heap
page read and write
7FF8B8053000
unkown
page readonly
ABD000
stack
page read and write
3324000
heap
page read and write
740E000
stack
page read and write
7D00000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
3C98EFC000
stack
page read and write
4BB4000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
7FF8B9840000
unkown
page readonly
6A7F000
heap
page read and write
7FF8BA510000
unkown
page readonly
8570000
trusted library allocation
page read and write
276D8980000
heap
page read and write
2B8E000
stack
page read and write
83D000
stack
page read and write
33CE000
stack
page read and write
8570000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
760000
heap
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
771E000
stack
page read and write
8530000
trusted library allocation
page read and write
53E000
stack
page read and write
D5F000
stack
page read and write
7FF8A8B10000
unkown
page readonly
344F000
stack
page read and write
89D3000
heap
page read and write
8540000
trusted library allocation
page read and write
292D0D30000
heap
page read and write
3428000
heap
page read and write
739000
heap
page read and write
8530000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8501000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
213068F0000
direct allocation
page read and write
6AC1000
heap
page read and write
8520000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
80EDB0B000
stack
page read and write
2B0D000
heap
page read and write
8590000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
2E23000
heap
page read and write
8540000
trusted library allocation
page read and write
4BC4000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
932000
heap
page read and write
C37000
heap
page read and write
8590000
trusted library allocation
page read and write
3468000
heap
page read and write
5B57000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
347E000
heap
page read and write
A7F000
stack
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
D9F000
stack
page read and write
9DE000
stack
page read and write
FA3EFCC000
stack
page read and write
5E4B000
trusted library allocation
page read and write
18471280000
heap
page read and write
860000
heap
page read and write
2130668E000
heap
page read and write
8500000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
1E9D7630000
heap
page read and write
9F92AFF000
stack
page read and write
33F8000
heap
page read and write
8540000
trusted library allocation
page read and write
9500000
trusted library allocation
page read and write
2F15000
heap
page read and write
88A000
heap
page read and write
8500000
trusted library allocation
page read and write
12DCD445000
heap
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
D10000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
1800A7A0000
heap
page read and write
6680000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
22D78FF000
stack
page read and write
8530000
trusted library allocation
page read and write
7FF77B320000
unkown
page readonly
8530000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
89D7000
heap
page read and write
6AE000
heap
page read and write
8BB1000
heap
page read and write
8600000
trusted library allocation
page execute and read and write
8500000
trusted library allocation
page read and write
85D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
28D0000
heap
page read and write
7D10000
trusted library allocation
page read and write
838000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
2061D9D6000
heap
page read and write
8590000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
85D0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
4FD000
stack
page read and write
51C2000
trusted library allocation
page read and write
190000
heap
page read and write
2BFE000
stack
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
21306780000
direct allocation
page read and write
8540000
trusted library allocation
page read and write
32B0000
heap
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
9408000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
81D0000
heap
page read and write
674000
heap
page read and write
213058B3000
heap
page read and write
2769F580000
heap
page read and write
7AB0000
trusted library allocation
page read and write
400000
unkown
page readonly
1EC08CB0000
heap
page read and write
8510000
trusted library allocation
page read and write
65FE1FF000
unkown
page read and write
8590000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
7C90000
trusted library allocation
page read and write
8A94000
heap
page read and write
4E8E000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
20B870D5000
heap
page read and write
8530000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
EBC5EFE000
unkown
page read and write
4D6000
heap
page read and write
8540000
trusted library allocation
page read and write
1E9D7802000
heap
page read and write
22AE22FE000
heap
page read and write
2CA4000
heap
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
6F6B000
stack
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
810000
heap
page read and write
7D10000
trusted library allocation
page read and write
4E6C000
trusted library allocation
page read and write
5BC8000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
C4A000
heap
page read and write
3428000
heap
page read and write
8970000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
340F000
stack
page read and write
8540000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
342C000
heap
page read and write
84D0000
trusted library allocation
page read and write
240816C0000
heap
page read and write
348A000
heap
page read and write
3430000
heap
page read and write
4EAD000
trusted library allocation
page read and write
30C0000
heap
page read and write
59F1000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
487C000
heap
page read and write
88CF0FF000
stack
page read and write
94E0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
48D0000
trusted library allocation
page execute and read and write
49D1000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
50FE000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
4E2A000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
1A1F6CA8000
heap
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
140030000
unkown
page read and write
8500000
trusted library allocation
page read and write
2CB0000
heap
page read and write
2B37000
heap
page read and write
8590000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
2C8E000
unkown
page read and write
26F31B50000
heap
page read and write
7C30000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
71A000
heap
page read and write
33DE000
stack
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
4BB6000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7CC1000
trusted library allocation
page read and write
4D6E000
stack
page read and write
84F0000
trusted library allocation
page read and write
739000
heap
page read and write
8530000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
184D32E7000
heap
page read and write
8540000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
B12E000
stack
page read and write
1C37C045000
heap
page read and write
5C16000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
7FF8B9F60000
unkown
page readonly
6B7000
heap
page read and write
1800A7C0000
heap
page read and write
8540000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
84D0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
213065F0000
heap
page read and write
216A6970000
heap
page read and write
21305887000
heap
page read and write
2213000
heap
page read and write
54E83ED000
stack
page read and write
3530000
heap
page read and write
232D288D000
heap
page read and write
8500000
trusted library allocation
page read and write
20B86EB0000
heap
page read and write
F40000
heap
page read and write
7770000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
140001000
unkown
page execute read
2620A080000
heap
page read and write
4B98000
trusted library allocation
page read and write
292E0260000
heap
page read and write
7D10000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
1A26D438000
heap
page read and write
84E0000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
291E000
stack
page read and write
521E000
stack
page read and write
9AE000
stack
page read and write
38DCDFF000
unkown
page read and write
2E78000
heap
page read and write
8501000
trusted library allocation
page read and write
8AA9000
heap
page read and write
8580000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
1DE8ECA0000
heap
page read and write
6AC2000
heap
page read and write
40C32FF000
stack
page read and write
84F0000
trusted library allocation
page read and write
5C13000
trusted library allocation
page read and write
1E9D7800000
heap
page read and write
96B0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8501000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
3325000
heap
page read and write
2720000
heap
page read and write
2BA5000
heap
page read and write
7FF77B321000
unkown
page execute read
7B60000
trusted library allocation
page read and write
2650000
heap
page read and write
59F1000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
26209F00000
heap
page read and write
8500000
trusted library allocation
page read and write
BF8000
heap
page read and write
34B8000
heap
page read and write
84F0000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
523F000
stack
page read and write
213066F0000
direct allocation
page read and write
46D000
stack
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4D5F000
trusted library allocation
page read and write
2B6F000
stack
page read and write
330F000
stack
page read and write
2B80000
heap
page read and write
7D10000
trusted library allocation
page read and write
323D000
unkown
page read and write
9720000
trusted library allocation
page read and write
7CA0000
heap
page read and write
4577000
heap
page read and write
2C224055000
heap
page read and write
44B0000
heap
page execute and read and write
8540000
trusted library allocation
page read and write
3F0000
unkown
page readonly
1F4A3420000
heap
page read and write
8590000
trusted library allocation
page read and write
1E19AC14000
heap
page read and write
8500000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
4AAB000
trusted library allocation
page read and write
B9D000
stack
page read and write
84F0000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
7FF8BFAB6000
unkown
page readonly
327D000
stack
page read and write
2CC8000
heap
page read and write
1A26D41B000
heap
page read and write
2061D830000
heap
page read and write
9690000
trusted library allocation
page read and write
93D5000
trusted library allocation
page read and write
26F31BD0000
heap
page read and write
8540000
trusted library allocation
page read and write
4C0000
heap
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
4A59000
trusted library allocation
page read and write
1800A7FD000
heap
page read and write
8CD0000
trusted library allocation
page read and write
84E0000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
98CF4FE000
unkown
page read and write
8530000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
21305EC0000
direct allocation
page read and write
94E0000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
D20000
heap
page read and write
4D05000
trusted library allocation
page read and write
330F000
stack
page read and write
There are 4275 hidden memdumps, click here to show them.