IOC Report
KPFv8ATDx0.exe

loading gif

Files

File Path
Type
Category
Malicious
KPFv8ATDx0.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\Internet Explorer\en-GB\oqWNZWQNWoNnROlqjKcKhLM.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Internet Explorer\en-GB\oqWNZWQNWoNnROlqjKcKhLM.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Windows Defender\oqWNZWQNWoNnROlqjKcKhLM.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Multimedia Platform\oqWNZWQNWoNnROlqjKcKhLM.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\KPFv8ATDx0.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\4XCyKdTKaY.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\JRGN3N9ZXF.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\TqMgut2j0M.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\aehWhM7TGU.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\bgR6NVhjy4.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\bqMLTwU6O8.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\cWXsH5vMZ0.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\iHmrx8Dkeu.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\pFxSEGDzP3.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\yJr0BespZg.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\ACAUZvYN.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\AHwNgZaF.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ARClkDgk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\AWvLLWqc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\BXwkEeIS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CGsDyrOn.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CKTJbAfr.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CnRDnDvx.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CqTJEOHT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CvAVSmWD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CyIkUInh.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\EZPbybNn.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\FCcCDjRB.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\FTyBLKyM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\FvOMJVpt.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\FxClgbOG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GKfLNjlY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GLOjgbXG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GoybbFob.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GxRSZgBO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\IHWAbonb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\IPEdAXAX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\JEwTrooN.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KFhcUPbS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KpuBgggp.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LWkTXfAf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LcQaEBDP.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LljRCdQC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LqfKJGTv.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\MtmZLckZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NgGUXyfg.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NqOhhczU.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NvmJyloG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ObZHJZRv.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OgVBQDTo.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OkvSnMWj.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OqbZUiZT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OwGrvDOt.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PAkihvfV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PFIKyDTH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PYmimUsi.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PthzQDco.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QYBPfZgq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RONsALFU.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RyZipATO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\SIxHSvEB.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\SeerDZBz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\SmOJiIbE.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\TraZorfO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\TvAqLAiJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UCgheeoa.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UTCgmFWk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UTTISNjC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UYcyJOZf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VcGpvFqH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VggGSNtC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VijSQbQY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VuurXSIi.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VxlkbjYv.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WQvQoNyx.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WhRPvofH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\XOEIXFmQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\XaOgexda.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YBagvbJq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YHFyVwyQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YMBsdaAI.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YPpRAgYW.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YWHQgFFn.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\abhXZtjw.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\axOHLXft.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cCsjkXAC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cxwpdtyJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\dSJhnlvh.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\eCWwWibS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\eulplymD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gHANBhKj.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gMZpSqzV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gUKxCZnk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\hhWvCZxk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\hxXYHhry.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\iLUfkInD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ijuwfDOX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\iqYOFZDy.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jKmGQQAV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jpnvyeqG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jsgdIvVc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lHcvfWDY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lgAYTQQj.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lkpWjeGm.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lvRXXeLO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\mBLWrFnw.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\mFCPuWEK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nimHpzUe.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nlafNFtr.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nyDFtNQJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\olpMFKgz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\pafNrbGf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\phiwHSJM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\pqhfBjOC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\qDdNmCtS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\qZdxwwVX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rdSwMKLb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rlBOrtmg.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rsUNXSTy.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sSNMOgTF.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sbztrXaK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\tCqOXkyz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\uZZMHXbv.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\udSmiqlo.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\unoxMcqb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\vPiVwyIZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\vfTLbyDe.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\wbMvdGfr.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\xMZKLDLb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\xhGuwiIZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\xtgFehys.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\yYBvlMUk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zZntUmUz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zdNKrvXu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zlxdWeyz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\ShellExperiences\oqWNZWQNWoNnROlqjKcKhLM.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Internet Explorer\en-GB\0b77faa1f189a8
ASCII text, with very long lines (804), with no line terminators
dropped
C:\Program Files\Windows Defender\0b77faa1f189a8
ASCII text, with very long lines (707), with no line terminators
dropped
C:\Program Files\Windows Defender\oqWNZWQNWoNnROlqjKcKhLM.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Multimedia Platform\0b77faa1f189a8
ASCII text, with very long lines (775), with no line terminators
dropped
C:\Program Files\Windows Multimedia Platform\oqWNZWQNWoNnROlqjKcKhLM.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\oqWNZWQNWoNnROlqjKcKhLM.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\1GlaBTLt9k
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\51yavEShxN
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\6973u7blL4
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\Eee1q2H6Zy
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\GmrVH2RRtM
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\RW8E5HpYwQ
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\fdYSUxHhNe
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\ki5mgHFA5B
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\mzahGM93Su
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\rmWrz5JDk6
ASCII text, with no line terminators
dropped
C:\Users\jones\OneDrive\0b77faa1f189a8
ASCII text, with very long lines (901), with no line terminators
dropped
C:\Windows\ShellExperiences\0b77faa1f189a8
ASCII text, with very long lines (722), with no line terminators
dropped
C:\Windows\ShellExperiences\oqWNZWQNWoNnROlqjKcKhLM.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 149 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\KPFv8ATDx0.exe
"C:\Users\user\Desktop\KPFv8ATDx0.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\iHmrx8Dkeu.bat"
malicious
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\JRGN3N9ZXF.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\aehWhM7TGU.bat"
malicious
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\cWXsH5vMZ0.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\pFxSEGDzP3.bat"
malicious
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\yJr0BespZg.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\bgR6NVhjy4.bat"
malicious
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\bqMLTwU6O8.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\4XCyKdTKaY.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
There are 36 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://38.180.228.120
unknown
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
38.180.228.120
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\5e4e68aedc554f14148d63aeddf19bf6305b2da8
b33c9dc0e47119d66db9d7a755209454d79862f4
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12961000
trusted library allocation
page read and write
malicious
3A2000
unkown
page readonly
malicious
13CB8000
trusted library allocation
page read and write
7FFAACD6B000
trusted library allocation
page read and write
7FFAACAC0000
trusted library allocation
page read and write
13606000
trusted library allocation
page read and write
1C0B8000
heap
page read and write
7FFAAC4B0000
trusted library allocation
page read and write
7FFAACBB0000
trusted library allocation
page read and write
7FFAACB50000
trusted library allocation
page read and write
7FFAACD30000
trusted library allocation
page read and write
F12000
unkown
page readonly
1BFDE000
stack
page read and write
13598000
trusted library allocation
page read and write
7FFAAC492000
trusted library allocation
page read and write
7FFAACBA0000
trusted library allocation
page read and write
7FFAACD1F000
trusted library allocation
page read and write
3924000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page read and write
130FF000
trusted library allocation
page read and write
147D000
heap
page read and write
7FFAAC660000
trusted library allocation
page read and write
7FFAAC5E6000
trusted library allocation
page read and write
7FFAAC546000
trusted library allocation
page read and write
2985000
trusted library allocation
page read and write
1BE0E000
stack
page read and write
136A000
heap
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
39E3000
trusted library allocation
page read and write
12A43000
trusted library allocation
page read and write
7FFAAC6C0000
trusted library allocation
page execute and read and write
1855000
heap
page read and write
3291000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
7FFAACB52000
trusted library allocation
page read and write
7FFAAC5D6000
trusted library allocation
page read and write
12B2B000
trusted library allocation
page read and write
7FFAACDA0000
trusted library allocation
page read and write
7FFAACB47000
trusted library allocation
page read and write
2D97000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page read and write
7FFAAC54D000
trusted library allocation
page execute and read and write
7FFAAC733000
trusted library allocation
page read and write
7FFAACD92000
trusted library allocation
page read and write
3693000
trusted library allocation
page read and write
7FFAACC70000
trusted library allocation
page read and write
1C9DD000
stack
page read and write
7FFAACC80000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
7FFAAC9E1000
trusted library allocation
page read and write
7FFAACB90000
trusted library allocation
page read and write
1B06B000
heap
page read and write
348E000
trusted library allocation
page read and write
7FFAACDA4000
trusted library allocation
page read and write
7FFAAC7DF000
trusted library allocation
page read and write
13115000
trusted library allocation
page read and write
265E000
stack
page read and write
B85000
heap
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
2C53000
trusted library allocation
page read and write
7FFAAC743000
trusted library allocation
page read and write
7FFAACACF000
trusted library allocation
page read and write
1B70E000
heap
page read and write
1B38B000
stack
page read and write
1CA90000
heap
page read and write
7FFAAC56D000
trusted library allocation
page execute and read and write
2A5F000
trusted library allocation
page read and write
7FFAAC754000
trusted library allocation
page read and write
13330000
trusted library allocation
page read and write
1AF2D060000
heap
page read and write
7FFAACA30000
trusted library allocation
page read and write
7FFAACB00000
trusted library allocation
page read and write
7FFAACD20000
trusted library allocation
page read and write
7FFAACAF1000
trusted library allocation
page read and write
2745000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page execute and read and write
7FFAAC684000
trusted library allocation
page read and write
7FFAAC533000
trusted library allocation
page execute and read and write
2CCD000
heap
page read and write
1450000
trusted library allocation
page read and write
105A000
heap
page read and write
7FFAACB55000
trusted library allocation
page read and write
2850000
heap
page execute and read and write
7FFAACCC0000
trusted library allocation
page read and write
7FFAACBA0000
trusted library allocation
page read and write
281C000
trusted library allocation
page read and write
2912000
trusted library allocation
page read and write
7FFAACB30000
trusted library allocation
page read and write
133F4000
trusted library allocation
page read and write
7FFAACD57000
trusted library allocation
page read and write
1B77E000
stack
page read and write
AB4000
heap
page read and write
7FFAAC554000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page read and write
7FFAAC760000
trusted library allocation
page read and write
2E9F000
trusted library allocation
page read and write
7FFAACB01000
trusted library allocation
page read and write
7FFAAC55D000
trusted library allocation
page execute and read and write
7FFAAC5F6000
trusted library allocation
page read and write
BCC000
heap
page read and write
7FFAACE40000
trusted library allocation
page execute and read and write
7FFAAC7E0000
trusted library allocation
page execute and read and write
7FFAAC69A000
trusted library allocation
page execute and read and write
1B67F000
stack
page read and write
1030000
heap
page read and write
7FFAAC700000
trusted library allocation
page read and write
7FFAAC522000
trusted library allocation
page read and write
2CC9000
heap
page read and write
269F000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
2CC7000
trusted library allocation
page read and write
23A9CBB8000
heap
page read and write
7FFAACC70000
trusted library allocation
page read and write
7FFAACA80000
trusted library allocation
page read and write
12F3A000
trusted library allocation
page read and write
7FFAAC787000
trusted library allocation
page read and write
1A627FB6000
heap
page read and write
8B8000
heap
page read and write
7FFAACE30000
trusted library allocation
page read and write
1B8AB000
stack
page read and write
7FFAACC59000
trusted library allocation
page read and write
131E0000
trusted library allocation
page read and write
7FFAACD96000
trusted library allocation
page read and write
3740000
trusted library allocation
page read and write
7FFAAC6B4000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
129B0000
trusted library allocation
page read and write
7FFAAC7BF000
trusted library allocation
page read and write
7FFAAC864000
trusted library allocation
page read and write
2403325A000
heap
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
23D5D967000
heap
page read and write
1BD5F000
heap
page read and write
7FFAACC59000
trusted library allocation
page read and write
1385D000
trusted library allocation
page read and write
1386F000
trusted library allocation
page read and write
7FFAAC892000
trusted library allocation
page read and write
7FFAAC770000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
31C0000
heap
page execute and read and write
7FFAACBB0000
trusted library allocation
page read and write
7FFAACD00000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page read and write
7FFAAC745000
trusted library allocation
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
7FFAAC6E9000
trusted library allocation
page read and write
7FFAAC606000
trusted library allocation
page execute and read and write
1C8ED000
stack
page read and write
32DF000
trusted library allocation
page read and write
286F000
trusted library allocation
page read and write
7FFAACD7D000
trusted library allocation
page read and write
7FFAAC80B000
trusted library allocation
page read and write
7FFAACE30000
trusted library allocation
page read and write
1AF2CDFA000
heap
page read and write
7FFAAC568000
trusted library allocation
page read and write
3A5A000
trusted library allocation
page read and write
1ACE3000
heap
page read and write
7FFAACC60000
trusted library allocation
page read and write
7FFAACD37000
trusted library allocation
page read and write
7FFAACD70000
trusted library allocation
page read and write
1C091000
heap
page read and write
1CA4C000
heap
page read and write
2786000
trusted library allocation
page read and write
7FFAACB9E000
trusted library allocation
page read and write
1BC48000
heap
page read and write
DC9000
heap
page read and write
7FFAAC7CD000
trusted library allocation
page read and write
1C19D000
stack
page read and write
7FFAACAD0000
trusted library allocation
page read and write
7FFAACCBB000
trusted library allocation
page read and write
7FFAACC79000
trusted library allocation
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
7FFAACC90000
trusted library allocation
page read and write
1B5E6000
heap
page read and write
800000
heap
page read and write
7FFAAC700000
trusted library allocation
page read and write
7FFAACB50000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
34F3000
trusted library allocation
page read and write
288D000
trusted library allocation
page read and write
3431000
trusted library allocation
page read and write
7FFAACD1B000
trusted library allocation
page read and write
7FFAACC20000
trusted library allocation
page read and write
1CA5E000
heap
page read and write
1B79C000
heap
page read and write
7FFAACD10000
trusted library allocation
page read and write
7FFAACCB6000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page execute and read and write
7FFAACB90000
trusted library allocation
page read and write
1A627FA9000
heap
page read and write
7FFAAC558000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
7FFAACBC0000
trusted library allocation
page read and write
2FE4000
trusted library allocation
page read and write
7FFAACE20000
trusted library allocation
page read and write
17C0000
heap
page execute and read and write
7FFAACC40000
trusted library allocation
page read and write
7FFAACB69000
trusted library allocation
page read and write
164F04B0000
heap
page read and write
148D000
heap
page read and write
1BBE4000
heap
page read and write
2E21000
trusted library allocation
page read and write
7FFAACD74000
trusted library allocation
page read and write
7FFAAC493000
trusted library allocation
page execute and read and write
3A0000
unkown
page readonly
1295D000
trusted library allocation
page read and write
7FFAAC7A7000
trusted library allocation
page read and write
12A06000
trusted library allocation
page read and write
7FFAACA1E000
trusted library allocation
page read and write
1B4FE000
stack
page read and write
1156000
trusted library allocation
page read and write
11A0000
heap
page read and write
7FFAAC680000
trusted library allocation
page read and write
A58000
heap
page read and write
7FFAACAF0000
trusted library allocation
page read and write
7FFAACCF0000
trusted library allocation
page read and write
1B9FF000
stack
page read and write
7FFAAC710000
trusted library allocation
page read and write
2E58000
trusted library allocation
page read and write
7FFAAC550000
trusted library allocation
page read and write
28C3000
trusted library allocation
page read and write
1C2DE000
stack
page read and write
7FFAAC46D000
trusted library allocation
page execute and read and write
7FFAACE40000
trusted library allocation
page execute and read and write
3B40000
trusted library allocation
page read and write
14E9000
heap
page read and write
1AF2CDF0000
heap
page read and write
7FFAACD9E000
trusted library allocation
page read and write
3180000
heap
page execute and read and write
7FFAACD24000
trusted library allocation
page read and write
130C3000
trusted library allocation
page read and write
2CEA000
trusted library allocation
page read and write
7FFAAC686000
trusted library allocation
page execute and read and write
3528000
trusted library allocation
page read and write
7FFAACBC3000
trusted library allocation
page read and write
1CF7C000
stack
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
13741000
trusted library allocation
page read and write
1AF20000
heap
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
1C9EF000
heap
page read and write
1C9FC000
heap
page read and write
7FFAAC45D000
trusted library allocation
page execute and read and write
7FFAACD7B000
trusted library allocation
page read and write
7FFAACBB8000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
1C5CD000
stack
page read and write
7FFAAC63F000
trusted library allocation
page read and write
2D25E1E0000
heap
page read and write
7FFAACD70000
trusted library allocation
page read and write
7FFAAC730000
trusted library allocation
page execute and read and write
7FFAAC790000
trusted library allocation
page read and write
7FFAACBB7000
trusted library allocation
page read and write
7FFAAC7F0000
trusted library allocation
page read and write
3448000
trusted library allocation
page read and write
1800000
heap
page execute and read and write
7FFAAC774000
trusted library allocation
page read and write
7FFAACD20000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page read and write
1C3DD000
stack
page read and write
1650000
heap
page read and write
F453C7F000
stack
page read and write
7FFB226E0000
unkown
page read and write
7FFAAC7F0000
trusted library allocation
page execute and read and write
1CA96000
heap
page read and write
7FFAACBBF000
trusted library allocation
page read and write
7FFAACD30000
trusted library allocation
page read and write
7FFAACC2B000
trusted library allocation
page read and write
7FFAAC797000
trusted library allocation
page read and write
12D66000
trusted library allocation
page read and write
28C3000
trusted library allocation
page read and write
1AF2CD00000
heap
page read and write
2DB0000
trusted library allocation
page read and write
7FFAAC563000
trusted library allocation
page read and write
274D000
heap
page read and write
7FFAAC747000
trusted library allocation
page read and write
1BE20000
heap
page read and write
7FFAAC516000
trusted library allocation
page execute and read and write
1362F000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page read and write
7FFAAC710000
trusted library allocation
page read and write
7FFAAC7E0000
trusted library allocation
page execute and read and write
F4539AF000
stack
page read and write
C50000
heap
page read and write
231A551A000
heap
page read and write
13E32000
trusted library allocation
page read and write
7FFAAC810000
trusted library allocation
page execute and read and write
132CF000
trusted library allocation
page read and write
7FFAAC54B000
trusted library allocation
page execute and read and write
7FFAACB80000
trusted library allocation
page read and write
26F3000
trusted library allocation
page read and write
7FFAAC7E0000
trusted library allocation
page execute and read and write
129EC000
trusted library allocation
page read and write
309E000
stack
page read and write
12D1A000
trusted library allocation
page read and write
1B62B000
heap
page read and write
7FFAACE20000
trusted library allocation
page read and write
7FFAAC6F6000
trusted library allocation
page read and write
1C078000
heap
page read and write
1282C000
trusted library allocation
page read and write
13ABF000
trusted library allocation
page read and write
7FFAAC780000
trusted library allocation
page read and write
1CD9E000
stack
page read and write
1C1437E0000
heap
page read and write
1BBA5000
heap
page read and write
1B662000
unkown
page readonly
7FFAAC630000
trusted library allocation
page read and write
7FFAACCBF000
trusted library allocation
page read and write
7FFAACD59000
trusted library allocation
page read and write
7FFAAC550000
trusted library allocation
page read and write
7FFAAC630000
trusted library allocation
page execute and read and write
104E000
heap
page read and write
7FFAACC70000
trusted library allocation
page read and write
1370000
heap
page read and write
7FFAAC7DE000
trusted library allocation
page read and write
7FFAACDC0000
trusted library allocation
page execute and read and write
7FFAACD90000
trusted library allocation
page read and write
A18000
heap
page read and write
7FFAACD40000
trusted library allocation
page read and write
1085000
heap
page read and write
7FFAAC876000
trusted library allocation
page read and write
7FFAAC753000
trusted library allocation
page read and write
930000
heap
page read and write
7FFAAC574000
trusted library allocation
page read and write
1BEE0000
heap
page read and write
1358C000
trusted library allocation
page read and write
C95000
heap
page read and write
7FFAACBB0000
trusted library allocation
page read and write
1BCC4000
heap
page read and write
12C75000
trusted library allocation
page read and write
136C000
heap
page read and write
133DC000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
1A680000
trusted library allocation
page read and write
137CA000
trusted library allocation
page read and write
7FFAAC70C000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page execute and read and write
7FFAAC710000
trusted library allocation
page read and write
7FFAAC74E000
trusted library allocation
page read and write
1BBA4000
heap
page read and write
13EB5000
trusted library allocation
page read and write
EBD000
heap
page read and write
7FFAACC96000
trusted library allocation
page read and write
7FFAAC710000
trusted library allocation
page read and write
13DEB000
trusted library allocation
page read and write
23911CBA000
heap
page read and write
7FFAACD40000
trusted library allocation
page read and write
7FFAAC7D1000
trusted library allocation
page read and write
7FFB226DD000
unkown
page readonly
7FFAAC450000
trusted library allocation
page read and write
7FFAACC54000
trusted library allocation
page read and write
23D5DC30000
heap
page read and write
7FFAACBD9000
trusted library allocation
page read and write
7FFAACBF3000
trusted library allocation
page read and write
1C11F000
stack
page read and write
7FFAACAAE000
trusted library allocation
page read and write
7FFAAC666000
trusted library allocation
page execute and read and write
129A0000
trusted library allocation
page read and write
1B584000
heap
page read and write
7FFAAC55D000
trusted library allocation
page execute and read and write
7FFAACBB3000
trusted library allocation
page read and write
2967000
trusted library allocation
page read and write
129C6000
trusted library allocation
page read and write
1BFAB000
heap
page read and write
1480000
heap
page read and write
7FFAACA30000
trusted library allocation
page read and write
A4A000
heap
page read and write
1B0B6000
heap
page read and write
7FFAAC533000
trusted library allocation
page execute and read and write
136CF000
trusted library allocation
page read and write
7FFAACCB0000
trusted library allocation
page read and write
23A9CDE0000
heap
page read and write
7FFAACB20000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
1B790000
heap
page read and write
1BC3A000
heap
page read and write
7FFB1E0F6000
unkown
page readonly
7FFAACBA0000
trusted library allocation
page read and write
325A000
trusted library allocation
page read and write
1B07D000
heap
page read and write
1B292000
unkown
page readonly
1A780000
trusted library allocation
page read and write
1338000
heap
page read and write
7FFAAC798000
trusted library allocation
page read and write
2823000
trusted library allocation
page read and write
A39000
heap
page read and write
7FFAACB80000
trusted library allocation
page read and write
2BFF000
trusted library allocation
page read and write
7FFAAC533000
trusted library allocation
page read and write
7FFAACBA0000
trusted library allocation
page read and write
7FFAAC790000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
7FFAACB50000
trusted library allocation
page read and write
7FFAACD10000
trusted library allocation
page read and write
7FFAAC574000
trusted library allocation
page read and write
3625000
trusted library allocation
page read and write
7FFAACB30000
trusted library allocation
page read and write
1760000
heap
page read and write
27B3000
trusted library allocation
page read and write
D10000
heap
page read and write
7FFAACD40000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
7FFAACCC0000
trusted library allocation
page read and write
7FFAAC554000
trusted library allocation
page read and write
7FFAAC67F000
trusted library allocation
page execute and read and write
7FFAAC890000
trusted library allocation
page execute and read and write
7FFAACCA0000
trusted library allocation
page read and write
1293F000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page execute and read and write
7FFAAC600000
trusted library allocation
page read and write
1B252000
unkown
page readonly
858000
heap
page read and write
12C5F000
trusted library allocation
page read and write
7FFAACADE000
trusted library allocation
page read and write
7FFAAC5AC000
trusted library allocation
page execute and read and write
2A0C000
trusted library allocation
page read and write
7FFAAC626000
trusted library allocation
page execute and read and write
2769000
trusted library allocation
page read and write
7FFAAC7C0000
trusted library allocation
page execute and read and write
7FFAACC48000
trusted library allocation
page read and write
1BCCF000
heap
page read and write
1A710000
trusted library allocation
page read and write
7FFAAC683000
trusted library allocation
page read and write
7FFAAC606000
trusted library allocation
page read and write
1B726000
heap
page read and write
7FFAAC700000
trusted library allocation
page read and write
1C6B4000
heap
page read and write
23D5DC35000
heap
page read and write
7FFAACC40000
trusted library allocation
page read and write
7FFAACDA0000
trusted library allocation
page execute and read and write
7FFAACB56000
trusted library allocation
page read and write
359F000
trusted library allocation
page read and write
BE4000
heap
page read and write
11C5000
heap
page read and write
354C000
trusted library allocation
page read and write
3576000
trusted library allocation
page read and write
1BD56000
heap
page read and write
3403000
heap
page execute and read and write
7FFAAC524000
trusted library allocation
page read and write
7FFAAC7FE000
trusted library allocation
page read and write
13C2A000
trusted library allocation
page read and write
7FFAACBC0000
trusted library allocation
page read and write
7FFAAC747000
trusted library allocation
page read and write
1BD61000
heap
page read and write
7FFAAC7D0000
trusted library allocation
page execute and read and write
7FFAAC8B2000
trusted library allocation
page read and write
28C5000
trusted library allocation
page read and write
349B000
trusted library allocation
page read and write
1440000
heap
page read and write
12976000
trusted library allocation
page read and write
3703000
trusted library allocation
page read and write
1B313000
heap
page execute and read and write
7FFAACC1F000
trusted library allocation
page read and write
7FFAAC58C000
trusted library allocation
page execute and read and write
7FFAAC763000
trusted library allocation
page read and write
328F000
stack
page read and write
7FFAACC48000
trusted library allocation
page read and write
7FFAACE50000
trusted library allocation
page read and write
1C1437E7000
heap
page read and write
7FFAAC540000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page read and write
7FFAAC4AD000
trusted library allocation
page execute and read and write
7FFAACCB0000
trusted library allocation
page read and write
7FFAAC810000
trusted library allocation
page execute and read and write
291E000
trusted library allocation
page read and write
34FB000
trusted library allocation
page read and write
7FFAACD1B000
trusted library allocation
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page read and write
7FFAAC675000
trusted library allocation
page execute and read and write
14005000
trusted library allocation
page read and write
16A0000
heap
page execute and read and write
7FFAACAC0000
trusted library allocation
page read and write
1C0DE000
stack
page read and write
240333C0000
heap
page read and write
12A18000
trusted library allocation
page read and write
7FFAAC7D7000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page read and write
7FFAACD34000
trusted library allocation
page read and write
7FFAACD24000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page execute and read and write
E6B239F000
stack
page read and write
7FFAACBE0000
trusted library allocation
page read and write
7FFAACDB8000
trusted library allocation
page read and write
1B6D0000
heap
page read and write
1BC04000
heap
page read and write
1C2DE000
stack
page read and write
7FFB226E0000
unkown
page read and write
7FFAAC880000
trusted library allocation
page read and write
7FFAACAF0000
trusted library allocation
page read and write
11E0000
heap
page read and write
32F5000
trusted library allocation
page read and write
26B3000
trusted library allocation
page read and write
7FFAAC790000
trusted library allocation
page read and write
7FFAACCF0000
trusted library allocation
page read and write
1C2FE000
stack
page read and write
139ED000
trusted library allocation
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
2920000
unkown
page readonly
7FFAAC675000
trusted library allocation
page execute and read and write
1B710000
heap
page read and write
231A5710000
heap
page read and write
2A4E000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
1383A000
trusted library allocation
page read and write
7FFAAC4EC000
trusted library allocation
page execute and read and write
7FFAACD96000
trusted library allocation
page read and write
7FFAAC74A000
trusted library allocation
page read and write
289C1AE0000
heap
page read and write
2DE0000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
164F04BA000
heap
page read and write
27F9000
trusted library allocation
page read and write
7FFAAC780000
trusted library allocation
page read and write
7FFAAC740000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
1B6B0000
heap
page execute and read and write
7FFAAC448000
trusted library allocation
page read and write
7FFAAC744000
trusted library allocation
page read and write
1083000
heap
page read and write
7FFAAC870000
trusted library allocation
page read and write
7FFAACB9F000
trusted library allocation
page read and write
1345E000
trusted library allocation
page read and write
1BFCF000
heap
page read and write
1B2E0000
heap
page execute and read and write
7FFAACE10000
trusted library allocation
page read and write
6CDBC7C000
stack
page read and write
3442000
trusted library allocation
page read and write
7FFAACB30000
trusted library allocation
page read and write
7FFAACC90000
trusted library allocation
page read and write
7FFAAC650000
trusted library allocation
page read and write
7FFAACBA0000
trusted library allocation
page read and write
1CC7E000
stack
page read and write
7FFAACB00000
trusted library allocation
page read and write
7FFAACB56000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page execute and read and write
1AEEA000
stack
page read and write
7FFAACD3B000
trusted library allocation
page read and write
7FFAACD98000
trusted library allocation
page read and write
1C7D0000
heap
page read and write
7FFAAC780000
trusted library allocation
page read and write
7FFAAC830000
trusted library allocation
page execute and read and write
341C000
trusted library allocation
page read and write
7FFAAC7A2000
trusted library allocation
page read and write
7FFAACB05000
trusted library allocation
page read and write
1775000
heap
page read and write
7FFAACB78000
trusted library allocation
page read and write
2B6F000
trusted library allocation
page read and write
1B63E000
stack
page read and write
7FFAACC00000
trusted library allocation
page read and write
231A54E0000
heap
page read and write
7FFAAC770000
trusted library allocation
page read and write
7FFAACBEF000
trusted library allocation
page read and write
A4D000
heap
page read and write
7FFAACBC0000
trusted library allocation
page read and write
7FFAACAD1000
trusted library allocation
page read and write
273E000
trusted library allocation
page read and write
1C31D000
stack
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
7FFAAC866000
trusted library allocation
page read and write
1B13B000
stack
page read and write
2BB1000
trusted library allocation
page read and write
1A7B5330000
heap
page read and write
AA0000
heap
page read and write
7FFAACA60000
trusted library allocation
page read and write
12DA000
stack
page read and write
DC0000
heap
page read and write
7FFAACDB4000
trusted library allocation
page read and write
3438000
trusted library allocation
page read and write
F52000
unkown
page readonly
33C1000
trusted library allocation
page read and write
3379000
trusted library allocation
page read and write
7FFAACBE0000
trusted library allocation
page read and write
7FFAAC73A000
trusted library allocation
page read and write
7FFAACB7E000
trusted library allocation
page read and write
25D005F0000
heap
page read and write
1341C000
trusted library allocation
page read and write
28E8000
trusted library allocation
page read and write
AD0000
heap
page read and write
7FFAACA90000
trusted library allocation
page read and write
1385F000
trusted library allocation
page read and write
265F000
trusted library allocation
page read and write
7FFAAC890000
trusted library allocation
page read and write
25D00600000
heap
page read and write
7FFAAC7D0000
trusted library allocation
page execute and read and write
1A6280B0000
heap
page read and write
13490000
trusted library allocation
page read and write
7FFAACCE0000
trusted library allocation
page read and write
1BC80000
heap
page read and write
7FFAACBC0000
trusted library allocation
page read and write
7FFAAC616000
trusted library allocation
page execute and read and write
7FFAAC6E7000
trusted library allocation
page read and write
1C0DE000
stack
page read and write
7FFAACADF000
trusted library allocation
page read and write
7FFAACD96000
trusted library allocation
page read and write
7FFB226D9000
unkown
page readonly
1375C000
trusted library allocation
page read and write
C2E000
stack
page read and write
7FFAACA2F000
trusted library allocation
page read and write
7FFAAC6FF000
trusted library allocation
page read and write
1AF2CEF0000
heap
page read and write
2775000
trusted library allocation
page read and write
7FFAACB9F000
trusted library allocation
page read and write
7FFB226E0000
unkown
page read and write
2CC0000
heap
page read and write
7FFAAC620000
trusted library allocation
page read and write
1AF2CF10000
heap
page read and write
12C4A000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page read and write
7FFAAC57B000
trusted library allocation
page execute and read and write
1BBC9000
heap
page read and write
7FFAACCE3000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page read and write
7FFAAC970000
trusted library allocation
page read and write
1420000
heap
page read and write
F45392C000
stack
page read and write
7FFAACD70000
trusted library allocation
page execute and read and write
1B16B000
heap
page read and write
2893000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
920000
heap
page read and write
7FFAACB10000
trusted library allocation
page read and write
7FFAAC636000
trusted library allocation
page execute and read and write
3421000
trusted library allocation
page read and write
1756000
trusted library allocation
page read and write
13995000
trusted library allocation
page read and write
266A000
trusted library allocation
page read and write
27FE000
trusted library allocation
page read and write
7FFB1E3C0000
unkown
page read and write
24033250000
heap
page read and write
7FFAAC53D000
trusted library allocation
page execute and read and write
AF0000
heap
page read and write
3538000
trusted library allocation
page read and write
1B680000
heap
page read and write
7FFAAC79F000
trusted library allocation
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAACAE0000
trusted library allocation
page read and write
7FFAACD24000
trusted library allocation
page read and write
2530000
heap
page read and write
7FFAAC750000
trusted library allocation
page execute and read and write
7FFAACAE1000
trusted library allocation
page read and write
1CE70000
heap
page read and write
7FFAACB0A000
trusted library allocation
page read and write
1189000
heap
page read and write
2783000
trusted library allocation
page read and write
36A7000
trusted library allocation
page read and write
1C965000
heap
page read and write
254D000
heap
page read and write
7FFAACD80000
trusted library allocation
page read and write
139AF000
trusted library allocation
page read and write
7FFAACDA0000
trusted library allocation
page execute and read and write
1489000
heap
page read and write
2805000
trusted library allocation
page read and write
7FFAAC53D000
trusted library allocation
page execute and read and write
2DDC000
trusted library allocation
page read and write
13C14000
trusted library allocation
page read and write
335B000
trusted library allocation
page read and write
C0C000
heap
page read and write
7FFAACC30000
trusted library allocation
page read and write
78B000
stack
page read and write
3561000
trusted library allocation
page read and write
12FAE000
trusted library allocation
page read and write
7FFAAC830000
trusted library allocation
page execute and read and write
129A2000
trusted library allocation
page read and write
7FFAAC5EC000
trusted library allocation
page execute and read and write
7FFAAC706000
trusted library allocation
page read and write
7FFAACADF000
trusted library allocation
page read and write
7FFAAC7A2000
trusted library allocation
page read and write
7FFAACB67000
trusted library allocation
page read and write
3AA6000
trusted library allocation
page read and write
7FFAACC50000
trusted library allocation
page read and write
7FFAAC443000
trusted library allocation
page read and write
1B72E000
stack
page read and write
7FFAACB10000
trusted library allocation
page read and write
7FFAACB52000
trusted library allocation
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
1289C000
trusted library allocation
page read and write
7FFB226E0000
unkown
page read and write
7FFAACCF8000
trusted library allocation
page read and write
1B290000
unkown
page readonly
2A8E000
trusted library allocation
page read and write
3491000
trusted library allocation
page read and write
1B004000
heap
page read and write
7FFAACB89000
trusted library allocation
page read and write
286E000
trusted library allocation
page read and write
7FFAAC57C000
trusted library allocation
page execute and read and write
11C0000
heap
page read and write
7FFAAC72A000
trusted library allocation
page read and write
7FFAAC610000
trusted library allocation
page execute and read and write
1363A000
trusted library allocation
page read and write
7FFAACCEB000
trusted library allocation
page read and write
2A73000
trusted library allocation
page read and write
F75000
heap
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
1BED6000
heap
page read and write
13477000
trusted library allocation
page read and write
128E1000
trusted library allocation
page read and write
1925000
heap
page read and write
7FFAAC750000
trusted library allocation
page execute and read and write
7FFAAC645000
trusted library allocation
page read and write
7FFAACB49000
trusted library allocation
page read and write
2E1A000
trusted library allocation
page read and write
7FFAACCCF000
trusted library allocation
page read and write
1BFCD000
heap
page read and write
12751000
trusted library allocation
page read and write
EB0000
heap
page read and write
23911CB0000
heap
page read and write
2FD3000
trusted library allocation
page read and write
7FFAACDA8000
trusted library allocation
page read and write
2759000
trusted library allocation
page read and write
178F000
stack
page read and write
7FFAACAF2000
trusted library allocation
page read and write
292E000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
13226000
trusted library allocation
page read and write
1B6A2000
unkown
page readonly
7FFAACD0B000
trusted library allocation
page read and write
7FFAACCFA000
trusted library allocation
page read and write
1CC9E000
stack
page read and write
1336A000
trusted library allocation
page read and write
7FFAACBF0000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
7FFAACDB0000
trusted library allocation
page execute and read and write
7FFAAC754000
trusted library allocation
page read and write
7FFAAC7B0000
trusted library allocation
page execute and read and write
3647000
trusted library allocation
page read and write
347F000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
2E38000
trusted library allocation
page read and write
1B57E000
stack
page read and write
7FFAAC55D000
trusted library allocation
page execute and read and write
1BBA2000
heap
page read and write
12E0E000
trusted library allocation
page read and write
F99310F000
stack
page read and write
164F03F0000
heap
page read and write
12DE5000
trusted library allocation
page read and write
12950000
trusted library allocation
page read and write
7FFAAC568000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
BA0000
heap
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
1AFB0000
heap
page read and write
2E48000
trusted library allocation
page read and write
2D25E2F0000
heap
page read and write
164F0310000
heap
page read and write
13E8D000
trusted library allocation
page read and write
7FFAACAC6000
trusted library allocation
page read and write
D30000
heap
page read and write
3688000
trusted library allocation
page read and write
1C8E0000
heap
page read and write
7FFAAC725000
trusted library allocation
page read and write
7FFAACB9B000
trusted library allocation
page read and write
A8A000
heap
page read and write
A74000
heap
page read and write
7FFAACB29000
trusted library allocation
page read and write
7FFAAC760000
trusted library allocation
page read and write
7FFAACAD0000
trusted library allocation
page read and write
1A7B5510000
heap
page read and write
1394000
heap
page read and write
7FFAACCF0000
trusted library allocation
page read and write
7FFAAC538000
trusted library allocation
page read and write
7FFAAC616000
trusted library allocation
page execute and read and write
1315E000
trusted library allocation
page read and write
7FFAAC650000
trusted library allocation
page execute and read and write
131BC000
trusted library allocation
page read and write
2D25E1E8000
heap
page read and write
7FFAAC654000
trusted library allocation
page read and write
13C7D000
trusted library allocation
page read and write
7FFAACB78000
trusted library allocation
page read and write
34D3000
trusted library allocation
page read and write
1B98D000
stack
page read and write
23911BE0000
heap
page read and write
7FFAACC90000
trusted library allocation
page read and write
1C143740000
heap
page read and write
7FFAACCB0000
trusted library allocation
page read and write
1B615000
heap
page read and write
7FFAACD72000
trusted library allocation
page read and write
2AD3000
trusted library allocation
page read and write
7FFAACCB3000
trusted library allocation
page read and write
12A7A000
trusted library allocation
page read and write
12902000
trusted library allocation
page read and write
1B148000
heap
page read and write
7FFAAC6D6000
trusted library allocation
page read and write
1770000
heap
page read and write
327C000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page execute and read and write
A79000
heap
page read and write
CAF67E000
stack
page read and write
A50000
heap
page execute and read and write
1B250000
unkown
page readonly
2DCE000
stack
page read and write
135DE000
trusted library allocation
page read and write
7FFAACCC0000
trusted library allocation
page read and write
1C8DF000
stack
page read and write
7FFAAC8A0000
trusted library allocation
page execute and read and write
3851000
trusted library allocation
page read and write
1BCC6000
heap
page read and write
7FFAAC580000
trusted library allocation
page execute and read and write
7FFAACBB3000
trusted library allocation
page read and write
10D7000
heap
page read and write
7FFAACB00000
trusted library allocation
page read and write
7FFAACCF0000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page read and write
CA5000
heap
page read and write
7FFAACD39000
trusted library allocation
page read and write
7FFAACC30000
trusted library allocation
page read and write
7FFAACC93000
trusted library allocation
page read and write
7FFAACAF0000
trusted library allocation
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
7FFAAC59C000
trusted library allocation
page execute and read and write
7FFAAC43D000
trusted library allocation
page execute and read and write
7FFAACAC0000
trusted library allocation
page read and write
7FFAAC694000
trusted library allocation
page execute and read and write
299C000
trusted library allocation
page read and write
12A8F000
trusted library allocation
page read and write
7FFAAC730000
trusted library allocation
page execute and read and write
1309B000
trusted library allocation
page read and write
33AE000
trusted library allocation
page read and write
307E000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page read and write
1B020000
heap
page read and write
129FC000
trusted library allocation
page read and write
1389C000
trusted library allocation
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
13431000
trusted library allocation
page read and write
7FFAACA00000
trusted library allocation
page read and write
7FFAAC886000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page read and write
7FFAACBB9000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
12C9F000
trusted library allocation
page read and write
28C9000
trusted library allocation
page read and write
36EC000
trusted library allocation
page read and write
3ADB000
trusted library allocation
page read and write
7FFAACB00000
trusted library allocation
page read and write
2B4D000
trusted library allocation
page read and write
2570000
trusted library allocation
page read and write
1C67C000
heap
page read and write
26B5000
trusted library allocation
page read and write
7FFAACB90000
trusted library allocation
page read and write
7FFAACB80000
trusted library allocation
page read and write
1BEC1000
heap
page read and write
7FFAACC5B000
trusted library allocation
page read and write
2743000
trusted library allocation
page read and write
7FFAACDA0000
trusted library allocation
page execute and read and write
1BBA7000
heap
page read and write
7FFAACB60000
trusted library allocation
page read and write
7FFAAC798000
trusted library allocation
page read and write
1289C000
trusted library allocation
page read and write
2811000
trusted library allocation
page read and write
7FFAAC827000
trusted library allocation
page execute and read and write
1B73E000
stack
page read and write
7FFAACD54000
trusted library allocation
page read and write
3A4D000
trusted library allocation
page read and write
278A000
trusted library allocation
page read and write
7FFAAC777000
trusted library allocation
page read and write
7FFAAC7FB000
trusted library allocation
page read and write
1CD7D000
stack
page read and write
1490000
heap
page read and write
F62000
unkown
page readonly
1370F000
trusted library allocation
page read and write
1C5AB000
stack
page read and write
7FFAACB30000
trusted library allocation
page read and write
103E000
heap
page read and write
133F6000
trusted library allocation
page read and write
1357C000
trusted library allocation
page read and write
7FFAACC84000
trusted library allocation
page read and write
7FFB226E0000
unkown
page read and write
130D4000
trusted library allocation
page read and write
1A7B5410000
heap
page read and write
12FFA000
trusted library allocation
page read and write
7FFAACC00000
trusted library allocation
page read and write
7FFAACD14000
trusted library allocation
page read and write
12A16000
trusted library allocation
page read and write
12E2D000
trusted library allocation
page read and write
1B8F0000
heap
page execute and read and write
12ACC000
trusted library allocation
page read and write
3519000
trusted library allocation
page read and write
1C943000
heap
page read and write
32D1000
trusted library allocation
page read and write
1B070000
heap
page read and write
2979000
trusted library allocation
page read and write
BE1000
heap
page read and write
26E1000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page read and write
2B08000
trusted library allocation
page read and write
170E000
stack
page read and write
25AD000
heap
page read and write
7FFAAC4F0000
trusted library allocation
page execute and read and write
23911AE0000
heap
page read and write
7FFAAC7BD000
trusted library allocation
page read and write
12651000
trusted library allocation
page read and write
7FFAACC20000
trusted library allocation
page read and write
7FFAACD00000
trusted library allocation
page read and write
7FFAACB98000
trusted library allocation
page read and write
7FFAAC54D000
trusted library allocation
page execute and read and write
7FFAAC653000
trusted library allocation
page read and write
7FFAACAD9000
trusted library allocation
page read and write
7FFAACD84000
trusted library allocation
page read and write
1BB29000
heap
page read and write
7FFAAC72C000
trusted library allocation
page read and write
25D00630000
heap
page read and write
7FFAACD4B000
trusted library allocation
page read and write
7FFAAC554000
trusted library allocation
page read and write
109B000
heap
page read and write
7FFAACCF0000
trusted library allocation
page read and write
1B248000
unkown
page readonly
12F34000
trusted library allocation
page read and write
7FFAAC673000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page read and write
1360C000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
7FFB226D6000
unkown
page readonly
7FFAAC730000
trusted library allocation
page read and write
7FFAACD76000
trusted library allocation
page read and write
1AA66000
heap
page read and write
2961000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page read and write
7FFAAC55D000
trusted library allocation
page execute and read and write
130EA000
trusted library allocation
page read and write
1311A000
trusted library allocation
page read and write
7FFAAC63C000
trusted library allocation
page read and write
7FFAACA20000
trusted library allocation
page read and write
145B000
heap
page read and write
129AC000
trusted library allocation
page read and write
1BB60000
heap
page read and write
7FFAACB40000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
F99318F000
stack
page read and write
1B594000
heap
page read and write
1350000
heap
page read and write
DCB000
stack
page read and write
1C4CD000
stack
page read and write
32F1000
trusted library allocation
page read and write
7FFAAC8B0000
trusted library allocation
page read and write
7FFAACB70000
trusted library allocation
page read and write
23911C05000
heap
page read and write
7FFAACBB7000
trusted library allocation
page read and write
9FD000
heap
page read and write
7FFAACC50000
trusted library allocation
page read and write
1BEED000
stack
page read and write
1170000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
3C0000
heap
page read and write
7FFAACB80000
trusted library allocation
page read and write
1B6A0000
unkown
page readonly
13421000
trusted library allocation
page read and write
1C65B000
stack
page read and write
7FFAACD30000
trusted library allocation
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
1B0B0000
heap
page read and write
7FFAACD54000
trusted library allocation
page read and write
7FFB1E105000
unkown
page readonly
7FFAACB01000
trusted library allocation
page read and write
7FFAACBB5000
trusted library allocation
page read and write
288C000
trusted library allocation
page read and write
13A0B000
trusted library allocation
page read and write
7FFAACE40000
trusted library allocation
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
7FFAACC80000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page read and write
2875000
trusted library allocation
page read and write
7FFAACD72000
trusted library allocation
page read and write
289C1B86000
heap
page read and write
7FFAAC6B4000
trusted library allocation
page execute and read and write
7FFAAC710000
trusted library allocation
page read and write
7FFAACB50000
trusted library allocation
page read and write
7FFAACCDF000
trusted library allocation
page read and write
1B36F000
heap
page read and write
7FFAACB08000
trusted library allocation
page read and write
348E000
trusted library allocation
page read and write
3A8B000
trusted library allocation
page read and write
7FFAACB7E000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page read and write
7FFAAC706000
trusted library allocation
page read and write
C14000
heap
page read and write
F80000
heap
page read and write
2540000
heap
page read and write
36D1000
trusted library allocation
page read and write
1A2E000
stack
page read and write
1BBCD000
heap
page read and write
7FFAACD03000
trusted library allocation
page read and write
7FFAACCE0000
trusted library allocation
page read and write
7FFAAC534000
trusted library allocation
page read and write
7FFAAC494000
trusted library allocation
page read and write
7FFAAC4A8000
trusted library allocation
page read and write
7FFAACBC0000
trusted library allocation
page read and write
24033370000
heap
page read and write
2B32000
trusted library allocation
page read and write
128B6000
trusted library allocation
page read and write
3027000
trusted library allocation
page read and write
1BB47000
heap
page read and write
7FFAAC563000
trusted library allocation
page read and write
1800000
heap
page read and write
2C11000
trusted library allocation
page read and write
7FFAACAD2000
trusted library allocation
page read and write
C89000
heap
page read and write
7FFAAC554000
trusted library allocation
page read and write
3868000
trusted library allocation
page read and write
1BFD0000
heap
page read and write
7FFAACD92000
trusted library allocation
page read and write
1BE7D000
stack
page read and write
7FFAACC50000
trusted library allocation
page read and write
7FFAACC70000
trusted library allocation
page read and write
1B232000
unkown
page readonly
1283D000
trusted library allocation
page read and write
7FFAACB5B000
trusted library allocation
page read and write
1CE7E000
stack
page read and write
34A8000
trusted library allocation
page read and write
7FFAACD9D000
trusted library allocation
page read and write
14FE000
heap
page read and write
7FFAAC5E0000
trusted library allocation
page execute and read and write
1C450000
heap
page read and write
136CB000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page read and write
7FFAACA80000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page read and write
2A78000
trusted library allocation
page read and write
7FFAACD30000
trusted library allocation
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
38A5000
trusted library allocation
page read and write
28B4000
trusted library allocation
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
7FFAACDA8000
trusted library allocation
page execute and read and write
7FFAACAB0000
trusted library allocation
page read and write
2BF4000
trusted library allocation
page read and write
2549000
heap
page read and write
7FFAACBC0000
trusted library allocation
page read and write
EDA000
stack
page read and write
3483000
trusted library allocation
page read and write
126E1000
trusted library allocation
page read and write
12CBA000
trusted library allocation
page read and write
7FFAAC6D2000
trusted library allocation
page read and write
7FFAAC650000
trusted library allocation
page execute and read and write
32D9000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
1B065000
heap
page read and write
139C5000
trusted library allocation
page read and write
7FFAACD80000
trusted library allocation
page read and write
14A8000
heap
page read and write
7FFAAC536000
trusted library allocation
page read and write
371D000
trusted library allocation
page read and write
7FFAAC454000
trusted library allocation
page read and write
2E75000
trusted library allocation
page read and write
7FFAACB30000
trusted library allocation
page read and write
1BECD000
stack
page read and write
7FFAACDBA000
trusted library allocation
page read and write
2D5E000
trusted library allocation
page read and write
1BBD0000
heap
page read and write
1850000
heap
page read and write
7FFAAC819000
trusted library allocation
page execute and read and write
6CDBCFF000
stack
page read and write
7FFAACAF5000
trusted library allocation
page read and write
7FFAACC65000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
240333C5000
heap
page read and write
27C0000
heap
page read and write
7FFAAC740000
trusted library allocation
page execute and read and write
7FFAACDC0000
trusted library allocation
page execute and read and write
D9E000
stack
page read and write
1CE7B000
stack
page read and write
7FFAACE40000
trusted library allocation
page read and write
7FFAAC60C000
trusted library allocation
page read and write
DE0000
heap
page read and write
2F3C000
trusted library allocation
page read and write
7FFAACB46000
trusted library allocation
page read and write
7FFAAC615000
trusted library allocation
page read and write
1CA51000
heap
page read and write
127DE000
trusted library allocation
page read and write
7FFAAC890000
trusted library allocation
page read and write
290C000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page execute and read and write
12E34000
trusted library allocation
page read and write
1B783000
heap
page execute and read and write
7FFAAC5B0000
trusted library allocation
page execute and read and write
7FFAAC56D000
trusted library allocation
page execute and read and write
13505000
trusted library allocation
page read and write
3A2000
unkown
page readonly
7FFAACC96000
trusted library allocation
page read and write
1B659000
heap
page read and write
D00000
heap
page read and write
7FFAAC57D000
trusted library allocation
page execute and read and write
354E000
trusted library allocation
page read and write
7FFAAC7C0000
trusted library allocation
page execute and read and write
7FFAACAE1000
trusted library allocation
page read and write
2AD9000
trusted library allocation
page read and write
2839000
trusted library allocation
page read and write
1BE3F000
stack
page read and write
25A9000
heap
page read and write
7FFAAC54C000
trusted library allocation
page execute and read and write
7FFAAC5F0000
trusted library allocation
page execute and read and write
2556000
trusted library allocation
page read and write
12D56000
trusted library allocation
page read and write
1C143B55000
heap
page read and write
1ABE6000
heap
page read and write
A2E000
heap
page read and write
12AD9000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
7FFAACD1C000
trusted library allocation
page read and write
7FFAAC460000
trusted library allocation
page read and write
7FFAACD20000
trusted library allocation
page read and write
7FFAACE30000
trusted library allocation
page read and write
7FFAAC5E6000
trusted library allocation
page read and write
1B32D000
heap
page read and write
7FFAAC720000
trusted library allocation
page read and write
C90000
heap
page read and write
2A99000
trusted library allocation
page read and write
7FFAACB24000
trusted library allocation
page read and write
1C1DE000
stack
page read and write
1BD3F000
stack
page read and write
7FFAAC45B000
trusted library allocation
page execute and read and write
7FFAACB24000
trusted library allocation
page read and write
12CE4000
trusted library allocation
page read and write
1C980000
heap
page read and write
7FFAACB00000
trusted library allocation
page read and write
1383F000
trusted library allocation
page read and write
13D33000
trusted library allocation
page read and write
2A3D000
trusted library allocation
page read and write
7FFAAC839000
trusted library allocation
page execute and read and write
7FFAACABF000
trusted library allocation
page read and write
2D57000
trusted library allocation
page read and write
7FFAACAF6000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page read and write
12F3E000
trusted library allocation
page read and write
7FFAAC4BC000
trusted library allocation
page execute and read and write
7FFAACB85000
trusted library allocation
page read and write
7FFAAC870000
trusted library allocation
page read and write
7FFAAC7D4000
trusted library allocation
page read and write
2CC9000
trusted library allocation
page read and write
2DD5000
trusted library allocation
page read and write
1B460000
trusted library allocation
page read and write
3CFB000
trusted library allocation
page read and write
13583000
trusted library allocation
page read and write
7FFAAC4E6000
trusted library allocation
page read and write
F99308C000
stack
page read and write
7FFAACA50000
trusted library allocation
page read and write
7FFAAC7E7000
trusted library allocation
page read and write
3A36000
trusted library allocation
page read and write
1BBAB000
heap
page read and write
7FFAACA50000
trusted library allocation
page read and write
7FFAACC80000
trusted library allocation
page read and write
33B5000
trusted library allocation
page read and write
7FFAACCF3000
trusted library allocation
page read and write
7FFAACD5B000
trusted library allocation
page read and write
7FFAAC7B7000
trusted library allocation
page read and write
7FFAACBB0000
trusted library allocation
page read and write
2981000
trusted library allocation
page read and write
1B58C000
heap
page read and write
7FFAACB30000
trusted library allocation
page read and write
7FFAACB2E000
trusted library allocation
page read and write
7FFAACA00000
trusted library allocation
page read and write
14C8000
heap
page read and write
289C1AC0000
heap
page read and write
7FFAAC763000
trusted library allocation
page read and write
1710000
heap
page read and write
1ACDB000
stack
page read and write
12A56000
trusted library allocation
page read and write
13C55000
trusted library allocation
page read and write
13545000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
7FFAAC743000
trusted library allocation
page read and write
7FFAACA30000
trusted library allocation
page read and write
12CFC000
trusted library allocation
page read and write
EE8DCFF000
stack
page read and write
1BB10000
heap
page read and write
295B000
trusted library allocation
page read and write
7FFAACE30000
trusted library allocation
page read and write
7FFAACD44000
trusted library allocation
page read and write
7FFAAC660000
trusted library allocation
page execute and read and write
7FFAACAD0000
trusted library allocation
page read and write
1BCD8000
heap
page read and write
7FFAAC554000
trusted library allocation
page read and write
1BF9E000
stack
page read and write
DB0000
heap
page read and write
7FFAAC7BB000
trusted library allocation
page read and write
7FFAAC4BB000
trusted library allocation
page execute and read and write
7FFAACB5F000
trusted library allocation
page read and write
1CA7F000
heap
page read and write
7FFAACAD0000
trusted library allocation
page read and write
7FFAACB70000
trusted library allocation
page read and write
ABB000
heap
page read and write
7FFAAC4E0000
trusted library allocation
page read and write
7FFAAC7EE000
trusted library allocation
page read and write
1C634000
heap
page read and write
F70000
heap
page read and write
7FFAACE56000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page read and write
7FFAAC4BD000
trusted library allocation
page execute and read and write
7E0000
heap
page read and write
118D000
heap
page read and write
231A5715000
heap
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
7FFAAC4EC000
trusted library allocation
page execute and read and write
129F7000
trusted library allocation
page read and write
13887000
trusted library allocation
page read and write
2D75000
trusted library allocation
page read and write
369E000
trusted library allocation
page read and write
1B2B0000
unkown
page readonly
7FFAACD00000
trusted library allocation
page read and write
1C5F3000
heap
page read and write
7FFAAC548000
trusted library allocation
page read and write
7FFAAC6A2000
trusted library allocation
page read and write
7FFAAC55D000
trusted library allocation
page execute and read and write
52EC6DC000
stack
page read and write
7FFAACCC0000
trusted library allocation
page read and write
7FFAAC463000
trusted library allocation
page execute and read and write
37BF000
trusted library allocation
page read and write
3E2000
unkown
page readonly
1AF3A000
heap
page read and write
13855000
trusted library allocation
page read and write
12B1F000
trusted library allocation
page read and write
7FFAAC8C0000
trusted library allocation
page execute and read and write
23911CB7000
heap
page read and write
3E0000
heap
page read and write
7FFAACB26000
trusted library allocation
page read and write
264E000
stack
page read and write
7FFAACC55000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page read and write
7FFAAC44D000
trusted library allocation
page execute and read and write
7FFAACD20000
trusted library allocation
page read and write
1B8FE000
stack
page read and write
7FFAACA47000
trusted library allocation
page read and write
7FFAACBB0000
trusted library allocation
page read and write
7FF41D470000
trusted library allocation
page execute and read and write
132AF000
trusted library allocation
page read and write
7FFAAC548000
trusted library allocation
page read and write
1C29D000
stack
page read and write
2950000
heap
page execute and read and write
11C0000
heap
page read and write
137E3000
trusted library allocation
page read and write
7FFAACBB5000
trusted library allocation
page read and write
1A7B57A0000
heap
page read and write
1303C000
trusted library allocation
page read and write
129DC000
trusted library allocation
page read and write
7FFAAC743000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page read and write
7FFAACB0D000
trusted library allocation
page read and write
38E0000
trusted library allocation
page read and write
2861000
trusted library allocation
page read and write
7FFAACD70000
trusted library allocation
page read and write
7FFAAC570000
trusted library allocation
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
7FFAACB00000
trusted library allocation
page read and write
1C0FE000
stack
page read and write
910000
heap
page read and write
31AE000
stack
page read and write
7FFAACC60000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
C55000
heap
page read and write
7FFAACD30000
trusted library allocation
page read and write
7FFAACD13000
trusted library allocation
page read and write
7FFAAC4B4000
trusted library allocation
page read and write
7FFAACCB0000
trusted library allocation
page read and write
28A9000
trusted library allocation
page read and write
7BA000
stack
page read and write
7FFAAC559000
trusted library allocation
page read and write
2875000
trusted library allocation
page read and write
1A627FC8000
heap
page read and write
14A6000
heap
page read and write
1B187000
heap
page read and write
279F000
trusted library allocation
page read and write
7FFAACC93000
trusted library allocation
page read and write
13B35000
trusted library allocation
page read and write
7FFAACCB3000
trusted library allocation
page read and write
B56000
trusted library allocation
page read and write
33CC000
trusted library allocation
page read and write
127F7000
trusted library allocation
page read and write
7FFAAC552000
trusted library allocation
page read and write
A50000
heap
page read and write
1B182000
heap
page read and write
231A5517000
heap
page read and write
2942000
unkown
page readonly
7FFAACAD2000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page read and write
2B1C000
trusted library allocation
page read and write
1AE30000
trusted library allocation
page read and write
7FFAACA50000
trusted library allocation
page read and write
7FFAAC789000
trusted library allocation
page read and write
12D24000
trusted library allocation
page read and write
7FFAACE50000
trusted library allocation
page read and write
3229000
heap
page read and write
7FFAACCDA000
trusted library allocation
page read and write
14FA000
heap
page read and write
7FFAACCF3000
trusted library allocation
page read and write
3D5000
unkown
page readonly
25D00930000
heap
page read and write
12806000
trusted library allocation
page read and write
7FFAAC6B7000
trusted library allocation
page read and write
1C9E6000
heap
page read and write
52EC7DF000
stack
page read and write
12968000
trusted library allocation
page read and write
7FFAACCE0000
trusted library allocation
page read and write
135AD000
trusted library allocation
page read and write
D86000
trusted library allocation
page read and write
276A000
trusted library allocation
page read and write
12B05000
trusted library allocation
page read and write
372E000
trusted library allocation
page read and write
7FFAACDBD000
trusted library allocation
page read and write
1366B000
trusted library allocation
page read and write
25A0000
heap
page read and write
1B910000
heap
page execute and read and write
7FFAAC553000
trusted library allocation
page execute and read and write
7FFAAC700000
trusted library allocation
page read and write
7FFB1E3BD000
unkown
page readonly
9C0000
heap
page read and write
276E000
trusted library allocation
page read and write
3493000
trusted library allocation
page read and write
7FFAAC7F1000
trusted library allocation
page read and write
7FFAACC38000
trusted library allocation
page read and write
7FFAAC950000
trusted library allocation
page read and write
1A627FA0000
heap
page read and write
7FFAACB10000
trusted library allocation
page read and write
FD0000
heap
page read and write
7FFAACBA0000
trusted library allocation
page read and write
1C2CE000
stack
page read and write
7FFAAC78F000
trusted library allocation
page read and write
1BA1D000
stack
page read and write
7FFAACA90000
trusted library allocation
page read and write
1ABE0000
trusted library allocation
page read and write
27AB000
trusted library allocation
page read and write
28BE000
trusted library allocation
page read and write
356C000
trusted library allocation
page read and write
7FFAACAC4000
trusted library allocation
page read and write
13A06000
trusted library allocation
page read and write
7FFAACA41000
trusted library allocation
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
2A6B000
trusted library allocation
page read and write
1AF2D065000
heap
page read and write
13864000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
BF0000
heap
page read and write
7FFAACD1F000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page execute and read and write
8B6000
heap
page read and write
7FFAACD50000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page execute and read and write
1284C000
trusted library allocation
page read and write
7FFAACD5D000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
7FFAAC794000
trusted library allocation
page read and write
7FFAACC81000
trusted library allocation
page read and write
7FFAACABE000
trusted library allocation
page read and write
1334D000
trusted library allocation
page read and write
FA0000
heap
page read and write
3882000
trusted library allocation
page read and write
7FFAACD96000
trusted library allocation
page read and write
289C1AB0000
heap
page read and write
2A54000
trusted library allocation
page read and write
8F0000
heap
page read and write
7FFAACB40000
trusted library allocation
page read and write
7FFAACDA8000
trusted library allocation
page execute and read and write
7FFAACDA0000
trusted library allocation
page read and write
2F37000
trusted library allocation
page read and write
A24000
heap
page read and write
7FFAAC78D000
trusted library allocation
page read and write
7FFAACC69000
trusted library allocation
page read and write
7FFAACD7E000
trusted library allocation
page read and write
1B7A5000
heap
page read and write
13057000
trusted library allocation
page read and write
1C030000
heap
page read and write
7FFAAC767000
trusted library allocation
page read and write
7FFAACC59000
trusted library allocation
page read and write
3507000
trusted library allocation
page read and write
1347E000
trusted library allocation
page read and write
7FFAACC90000
trusted library allocation
page read and write
7FFAAC8B0000
trusted library allocation
page read and write
7FFAACBC0000
trusted library allocation
page read and write
7FFAAC430000
trusted library allocation
page read and write
BBE000
stack
page read and write
AF1000
heap
page read and write
7FFAACB80000
trusted library allocation
page read and write
DD5000
heap
page read and write
EE8D9BC000
stack
page read and write
38F6000
trusted library allocation
page read and write
7FFAACADF000
trusted library allocation
page read and write
850000
heap
page read and write
7FFAAC550000
trusted library allocation
page execute and read and write
1070000
heap
page read and write
7FFAACB72000
trusted library allocation
page read and write
7FF408210000
trusted library allocation
page execute and read and write
13EAC000
trusted library allocation
page read and write
1BBBA000
heap
page read and write
7FFAACB44000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
7FFAACBE0000
trusted library allocation
page read and write
2DF7000
trusted library allocation
page read and write
7FFAAC960000
trusted library allocation
page read and write
7FFAAC6A3000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
147E000
stack
page read and write
12861000
trusted library allocation
page read and write
7FFAACB4D000
trusted library allocation
page read and write
DCD000
heap
page read and write
36A3000
trusted library allocation
page read and write
129B8000
trusted library allocation
page read and write
3495000
trusted library allocation
page read and write
7FFAAC542000
trusted library allocation
page read and write
1C3CE000
stack
page read and write
1B5DD000
heap
page read and write
139D8000
trusted library allocation
page read and write
7FFAAC7BF000
trusted library allocation
page read and write
12D16000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
134E0000
trusted library allocation
page read and write
D9F000
stack
page read and write
13829000
trusted library allocation
page read and write
7FFAACB70000
trusted library allocation
page read and write
2A7C000
trusted library allocation
page read and write
23A9CC90000
heap
page read and write
EED478F000
stack
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
130AD000
trusted library allocation
page read and write
7FFAACDA0000
trusted library allocation
page execute and read and write
7FFAACE26000
trusted library allocation
page read and write
7FFAACACE000
trusted library allocation
page read and write
1B170000
heap
page read and write
12F7F000
trusted library allocation
page read and write
879000
heap
page read and write
7FFAACB96000
trusted library allocation
page read and write
13D18000
trusted library allocation
page read and write
7FFAAC576000
trusted library allocation
page execute and read and write
33D3000
trusted library allocation
page read and write
B10000
heap
page read and write
33A9000
trusted library allocation
page read and write
7FFAACB90000
trusted library allocation
page read and write
2969000
trusted library allocation
page read and write
7FFAAC66B000
trusted library allocation
page execute and read and write
1B92F000
stack
page read and write
7FFAACB7A000
trusted library allocation
page read and write
7FFAACAE4000
trusted library allocation
page read and write
7FFAACCFB000
trusted library allocation
page read and write
23D5D8D0000
heap
page read and write
1190000
heap
page execute and read and write
7FFAAC520000
trusted library allocation
page execute and read and write
1C7E0000
heap
page read and write
7FFAAC65F000
trusted library allocation
page execute and read and write
2523000
heap
page execute and read and write
3825000
trusted library allocation
page read and write
12A2E000
trusted library allocation
page read and write
3A57000
trusted library allocation
page read and write
105C000
heap
page read and write
3573000
trusted library allocation
page read and write
7FFAAC80E000
trusted library allocation
page read and write
54FF3FB000
stack
page read and write
1C5E0000
heap
page read and write
7FFAAC740000
trusted library allocation
page read and write
7FFAAC6E6000
trusted library allocation
page read and write
7FFAAC5AC000
trusted library allocation
page execute and read and write
1C440000
heap
page read and write
7FFAAC6E6000
trusted library allocation
page read and write
128B2000
trusted library allocation
page read and write
13C5F000
trusted library allocation
page read and write
1A990000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
13436000
trusted library allocation
page read and write
2A4E000
trusted library allocation
page read and write
3266000
trusted library allocation
page read and write
F50000
unkown
page readonly
1A7B5536000
heap
page read and write
1C7EE000
stack
page read and write
7FFAACB52000
trusted library allocation
page read and write
1448000
heap
page read and write
7FFAAC6BA000
trusted library allocation
page execute and read and write
7FFAAC7A4000
trusted library allocation
page read and write
7FFAACA60000
trusted library allocation
page read and write
7FFAAC764000
trusted library allocation
page read and write
7FFAACD7A000
trusted library allocation
page read and write
7FFAAC636000
trusted library allocation
page execute and read and write
7FFAAC606000
trusted library allocation
page read and write
13448000
trusted library allocation
page read and write
BAC000
heap
page read and write
7FFAAC8B0000
trusted library allocation
page execute and read and write
127F4000
trusted library allocation
page read and write
12AEF000
trusted library allocation
page read and write
7FFAACBA6000
trusted library allocation
page read and write
B20000
heap
page read and write
7FFAACC93000
trusted library allocation
page read and write
107E000
stack
page read and write
3531000
trusted library allocation
page read and write
7FFAACAED000
trusted library allocation
page read and write
7FFAACC50000
trusted library allocation
page read and write
D0E000
stack
page read and write
7FFAACD51000
trusted library allocation
page read and write
CAF34B000
stack
page read and write
7FFAAC7C0000
trusted library allocation
page execute and read and write
9A0000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page read and write
3A5E000
trusted library allocation
page read and write
1C1DE000
stack
page read and write
129F1000
trusted library allocation
page read and write
7FFAAC74B000
trusted library allocation
page read and write
2CEE000
trusted library allocation
page read and write
1670000
heap
page read and write
7FFAAC730000
trusted library allocation
page read and write
372A000
trusted library allocation
page read and write
7FFAACE36000
trusted library allocation
page read and write
7FFAACD92000
trusted library allocation
page read and write
7FFAACC58000
trusted library allocation
page read and write
1378B000
trusted library allocation
page read and write
7FFAACB78000
trusted library allocation
page read and write
10A3000
heap
page read and write
7FFAACC23000
trusted library allocation
page read and write
7FFAAC434000
trusted library allocation
page read and write
2DED000
trusted library allocation
page read and write
7FFAACAFF000
trusted library allocation
page read and write
7FFAACBB9000
trusted library allocation
page read and write
129E2000
trusted library allocation
page read and write
7FFB1E0E1000
unkown
page execute read
7FFAACABF000
trusted library allocation
page read and write
1C21E000
stack
page read and write
3022000
trusted library allocation
page read and write
3333000
trusted library allocation
page read and write
7FFAACD51000
trusted library allocation
page read and write
135E6000
trusted library allocation
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
7FFB226C0000
unkown
page readonly
7FFAACAB0000
trusted library allocation
page read and write
826000
trusted library allocation
page read and write
7FFAACDA0000
trusted library allocation
page read and write
23D5D96A000
heap
page read and write
FC0000
heap
page read and write
7FFAAC54D000
trusted library allocation
page execute and read and write
E6B229C000
stack
page read and write
13291000
trusted library allocation
page read and write
7FFAAC754000
trusted library allocation
page read and write
1400000
heap
page read and write
7FFAACBD0000
trusted library allocation
page read and write
7FFAACB25000
trusted library allocation
page read and write
1B614000
heap
page read and write
7FFAACB47000
trusted library allocation
page read and write
13542000
trusted library allocation
page read and write
1B264000
unkown
page readonly
1385A000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page read and write
7FFAACA80000
trusted library allocation
page read and write
12FB6000
trusted library allocation
page read and write
7FFAACC80000
trusted library allocation
page read and write
D40000
heap
page execute and read and write
25D0000
heap
page execute and read and write
1B82E000
stack
page read and write
7FFAAC65A000
trusted library allocation
page read and write
7FFAACBA0000
trusted library allocation
page read and write
7FFAAC47D000
trusted library allocation
page execute and read and write
7FFAAC650000
trusted library allocation
page execute and read and write
1B7D0000
heap
page read and write
2F87000
trusted library allocation
page read and write
7FFAACE20000
trusted library allocation
page read and write
13038000
trusted library allocation
page read and write
105A000
heap
page read and write
88E000
heap
page read and write
E9E000
stack
page read and write
113A000
stack
page read and write
29A8000
trusted library allocation
page read and write
7FFAAC72A000
trusted library allocation
page read and write
7FFAAC56B000
trusted library allocation
page execute and read and write
7FFAAC7A0000
trusted library allocation
page execute and read and write
1C8DB000
stack
page read and write
7FFAAC730000
trusted library allocation
page read and write
7FFAACAD5000
trusted library allocation
page read and write
7FFAAC630000
trusted library allocation
page read and write
1CEDD000
stack
page read and write
2EF3000
trusted library allocation
page read and write
7FFAACBC0000
trusted library allocation
page read and write
2B18000
trusted library allocation
page read and write
7FFAACD13000
trusted library allocation
page read and write
26E9000
trusted library allocation
page read and write
23D5D8A0000
heap
page read and write
7FFAACD60000
trusted library allocation
page read and write
1B36D000
stack
page read and write
1790000
heap
page read and write
7FFAAC790000
trusted library allocation
page read and write
7FFAAC5D8000
trusted library allocation
page read and write
1020000
heap
page read and write
7FFAACAD5000
trusted library allocation
page read and write
6CDBD7F000
stack
page read and write
13756000
trusted library allocation
page read and write
7FFAACB80000
trusted library allocation
page read and write
7FFAAC5B5000
trusted library allocation
page execute and read and write
B70000
trusted library allocation
page read and write
A6B000
heap
page read and write
7FFAACBB6000
trusted library allocation
page read and write
1BCE8000
heap
page read and write
7FFAAC6A5000
trusted library allocation
page execute and read and write
1C0C3000
heap
page read and write
7FFAAC695000
trusted library allocation
page execute and read and write
7FFAACB5D000
trusted library allocation
page read and write
7FFAACB10000
trusted library allocation
page read and write
7FFAACC50000
trusted library allocation
page read and write
7FFAACD35000
trusted library allocation
page read and write
1920000
heap
page read and write
1AF2CDF7000
heap
page read and write
7FFAACC48000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
7FFAAC5FC000
trusted library allocation
page execute and read and write
1372C000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
7FFAAC770000
trusted library allocation
page read and write
2D34000
trusted library allocation
page read and write
1AF7F000
heap
page read and write
3503000
trusted library allocation
page read and write
7FFAACB49000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
25D00637000
heap
page read and write
7FFAACAE0000
trusted library allocation
page read and write
1B1FE000
heap
page read and write
29F7000
trusted library allocation
page read and write
1C999000
heap
page read and write
12A02000
trusted library allocation
page read and write
7FFAAC49D000
trusted library allocation
page execute and read and write
7FFAACB6E000
trusted library allocation
page read and write
29B3000
trusted library allocation
page read and write
1B0A3000
heap
page read and write
1CA47000
heap
page read and write
7FFAACA77000
trusted library allocation
page read and write
1BCDA000
heap
page read and write
7FFAAC550000
trusted library allocation
page execute and read and write
7FFAACAE0000
trusted library allocation
page read and write
2CB6000
trusted library allocation
page read and write
7FFAACB37000
trusted library allocation
page read and write
CBE000
stack
page read and write
1BC73000
heap
page execute and read and write
7FFAACB96000
trusted library allocation
page read and write
278E000
stack
page read and write
2D25E1EA000
heap
page read and write
34C1000
trusted library allocation
page read and write
1B130000
heap
page read and write
1B3FE000
stack
page read and write
2CD5000
trusted library allocation
page read and write
7D0000
heap
page read and write
7FFAACC70000
trusted library allocation
page read and write
1200000
heap
page read and write
7FFAAC8C0000
trusted library allocation
page execute and read and write
7FFAACB00000
trusted library allocation
page read and write
2D25E3D0000
heap
page read and write
7FFAACC90000
trusted library allocation
page read and write
7FFAAC730000
trusted library allocation
page execute and read and write
128F6000
trusted library allocation
page read and write
1C1437EA000
heap
page read and write
133CC000
trusted library allocation
page read and write
3878000
trusted library allocation
page read and write
363B000
trusted library allocation
page read and write
7FFAAC620000
trusted library allocation
page read and write
137FA000
trusted library allocation
page read and write
DD0000
heap
page read and write
7FFAAC666000
trusted library allocation
page execute and read and write
7FFAACAE0000
trusted library allocation
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page read and write
1C9C0000
heap
page read and write
27C9000
trusted library allocation
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
7FFAACBD7000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page execute and read and write
1B1B3000
heap
page execute and read and write
7FFB226E0000
unkown
page read and write
2949000
trusted library allocation
page read and write
1C1FE000
stack
page read and write
4892D7F000
stack
page read and write
2739000
trusted library allocation
page read and write
1BB44000
heap
page read and write
13BEC000
trusted library allocation
page read and write
7FFAACD80000
trusted library allocation
page read and write
DCD288C000
stack
page read and write
8CA847C000
stack
page read and write
7FFAAC560000
trusted library allocation
page read and write
2E55000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page read and write
36D8000
trusted library allocation
page read and write
13BBB000
trusted library allocation
page read and write
7FFAACB10000
trusted library allocation
page read and write
7FFB1E3B9000
unkown
page readonly
EE8DC7F000
stack
page read and write
27AE000
trusted library allocation
page read and write
2550000
trusted library allocation
page read and write
1436000
trusted library allocation
page read and write
1CBDE000
stack
page read and write
1B310000
heap
page execute and read and write
7FFAAC6CF000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page read and write
33A9000
trusted library allocation
page read and write
54FF6FE000
stack
page read and write
7FFAACB70000
trusted library allocation
page read and write
12CBB000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page read and write
7FFAAC53D000
trusted library allocation
page execute and read and write
7FFAACD9A000
trusted library allocation
page read and write
1B351000
heap
page read and write
12E55000
trusted library allocation
page read and write
7FFB1E100000
unkown
page read and write
7FFAAC890000
trusted library allocation
page read and write
2B5E000
trusted library allocation
page read and write
7FFAACBC0000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
2903000
trusted library allocation
page read and write
27F3000
trusted library allocation
page read and write
358E000
trusted library allocation
page read and write
7FFAACC90000
trusted library allocation
page read and write
134B8000
trusted library allocation
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
7FFAAC54D000
trusted library allocation
page execute and read and write
A10000
heap
page read and write
7FFAACE46000
trusted library allocation
page read and write
129CD000
trusted library allocation
page read and write
7FFAACA11000
trusted library allocation
page read and write
7FFAAC9D0000
trusted library allocation
page read and write
14B0000
heap
page read and write
12BBA000
trusted library allocation
page read and write
2758000
trusted library allocation
page read and write
7FFAAC670000
trusted library allocation
page read and write
164F04B7000
heap
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
322D000
heap
page read and write
7FFAACB60000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
176D000
heap
page read and write
7FFAACBB9000
trusted library allocation
page read and write
1316000
trusted library allocation
page read and write
13474000
trusted library allocation
page read and write
12F65000
trusted library allocation
page read and write
26AE000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page read and write
1B2A2000
unkown
page readonly
7FFAACC70000
trusted library allocation
page read and write
132D1000
trusted library allocation
page read and write
7FFAACABF000
trusted library allocation
page read and write
7FFAACAC0000
trusted library allocation
page read and write
1A627E90000
heap
page read and write
7FFAACB90000
trusted library allocation
page read and write
7FFAAC779000
trusted library allocation
page read and write
7FFAAC7A9000
trusted library allocation
page read and write
1C672000
heap
page read and write
1180000
heap
page read and write
7FFAACBBB000
trusted library allocation
page read and write
13C9C000
trusted library allocation
page read and write
7FFAACB70000
trusted library allocation
page read and write
1D2BC000
stack
page read and write
135A4000
trusted library allocation
page read and write
12F3B000
trusted library allocation
page read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAACB7F000
trusted library allocation
page read and write
7FFAACD5B000
trusted library allocation
page read and write
7FFAAC6F3000
trusted library allocation
page read and write
1BBFE000
heap
page read and write
1323F000
trusted library allocation
page read and write
7FFAAC723000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page read and write
7FFAACDC8000
trusted library allocation
page execute and read and write
7FFAACD94000
trusted library allocation
page read and write
23911C00000
heap
page read and write
2800000
heap
page execute and read and write
7FFAAC7E7000
trusted library allocation
page read and write
54FF67E000
stack
page read and write
1C9EE000
stack
page read and write
7FFAACC30000
trusted library allocation
page read and write
1B2C0000
trusted library allocation
page read and write
7FFAAC51C000
trusted library allocation
page execute and read and write
1780000
trusted library allocation
page read and write
2C99000
trusted library allocation
page read and write
C26000
heap
page read and write
1396000
heap
page read and write
109D000
heap
page read and write
12DCA000
trusted library allocation
page read and write
7FFAACCAF000
trusted library allocation
page read and write
7FFAAC725000
trusted library allocation
page read and write
7FFAAC7AF000
trusted library allocation
page read and write
7FFAAC743000
trusted library allocation
page read and write
323D000
heap
page read and write
7FFAAC8A0000
trusted library allocation
page execute and read and write
32CF000
stack
page read and write
12A82000
trusted library allocation
page read and write
1B3F0000
heap
page read and write
1A890000
trusted library allocation
page read and write
7FFAACE30000
trusted library allocation
page execute and read and write
7FFAAC610000
trusted library allocation
page read and write
7FFAACCB0000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
7FFAACD39000
trusted library allocation
page read and write
12C9D000
trusted library allocation
page read and write
13486000
trusted library allocation
page read and write
1B611000
heap
page read and write
1CA28000
heap
page read and write
9FA000
heap
page read and write
1340C000
trusted library allocation
page read and write
147B000
heap
page read and write
1B83E000
stack
page read and write
2BAE000
stack
page read and write
7FFAAC733000
trusted library allocation
page read and write
12D2C000
trusted library allocation
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
7FFAACCF3000
trusted library allocation
page read and write
277F000
trusted library allocation
page read and write
7FFAAC789000
trusted library allocation
page read and write
7FFAACB90000
trusted library allocation
page read and write
7FFAAC794000
trusted library allocation
page read and write
7FFAACB93000
trusted library allocation
page read and write
7FFAACB60000
trusted library allocation
page read and write
7FFAACDB6000
trusted library allocation
page read and write
7FFAACB10000
trusted library allocation
page read and write
7FFB1E102000
unkown
page readonly
7FFAAC543000
trusted library allocation
page read and write
1C143B50000
heap
page read and write
7FFAAC536000
trusted library allocation
page read and write
EEE000
stack
page read and write
7FFAAC478000
trusted library allocation
page read and write
7FFAACC40000
trusted library allocation
page read and write
7FFAAC433000
trusted library allocation
page execute and read and write
1020000
heap
page read and write
1C98C000
stack
page read and write
13558000
trusted library allocation
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
FF0000
heap
page read and write
1336E000
trusted library allocation
page read and write
1B5FE000
stack
page read and write
12D41000
trusted library allocation
page read and write
7FFAAC7B4000
trusted library allocation
page read and write
7FFAAC48D000
trusted library allocation
page execute and read and write
AB6000
heap
page read and write
7FFAACAA7000
trusted library allocation
page read and write
289C1ED0000
heap
page read and write
32F3000
trusted library allocation
page read and write
7FFAAC69A000
trusted library allocation
page execute and read and write
7FFAAC7F0000
trusted library allocation
page read and write
7FFAACB30000
trusted library allocation
page read and write
EE0000
heap
page read and write
7FFAAC71B000
trusted library allocation
page read and write
289C1B70000
heap
page read and write
23A9CAA0000
heap
page read and write
7FFAACC49000
trusted library allocation
page read and write
1352C000
trusted library allocation
page read and write
7FFAACB26000
trusted library allocation
page read and write
7FFAACBA0000
trusted library allocation
page read and write
373F000
trusted library allocation
page read and write
2D85000
trusted library allocation
page read and write
7FFAACB40000
trusted library allocation
page read and write
7FFAAC9F0000
trusted library allocation
page read and write
1B063000
heap
page execute and read and write
7FFAAC473000
trusted library allocation
page read and write
7FFAAC52D000
trusted library allocation
page execute and read and write
1B0CE000
heap
page read and write
12981000
trusted library allocation
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
26EF000
trusted library allocation
page read and write
329C000
trusted library allocation
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
C0E000
heap
page read and write
1600000
trusted library allocation
page read and write
28BE000
trusted library allocation
page read and write
7FFAACC55000
trusted library allocation
page read and write
7FFAACAA0000
trusted library allocation
page read and write
2E56000
trusted library allocation
page read and write
25D00800000
heap
page read and write
7FFAACD30000
trusted library allocation
page read and write
362E000
trusted library allocation
page read and write
368A000
trusted library allocation
page read and write
7FFAAC55B000
trusted library allocation
page execute and read and write
2CBC000
trusted library allocation
page read and write
282C000
trusted library allocation
page read and write
7FFAAC7F0000
trusted library allocation
page execute and read and write
7FFAAC702000
trusted library allocation
page read and write
1BC50000
heap
page read and write
7FFAACA20000
trusted library allocation
page read and write
8DB000
stack
page read and write
13716000
trusted library allocation
page read and write
7FFAACCB0000
trusted library allocation
page read and write
13D8C000
trusted library allocation
page read and write
7FFAAC708000
trusted library allocation
page read and write
1356E000
trusted library allocation
page read and write
7FFAACA60000
trusted library allocation
page read and write
1356000
heap
page read and write
7FFAACBF0000
trusted library allocation
page read and write
135BE000
trusted library allocation
page read and write
7FFAACA70000
trusted library allocation
page read and write
7FFAAC543000
trusted library allocation
page execute and read and write
128CC000
trusted library allocation
page read and write
1B7FF000
stack
page read and write
1AFF0000
heap
page execute and read and write
7FFAACD60000
trusted library allocation
page read and write
1C066000
heap
page read and write
2922000
unkown
page readonly
7FFAAC743000
trusted library allocation
page read and write
3345000
trusted library allocation
page read and write
7FFAAC808000
trusted library allocation
page execute and read and write
34FE000
trusted library allocation
page read and write
1495000
heap
page read and write
2B01000
trusted library allocation
page read and write
1B2B2000
unkown
page readonly
23A9CBA6000
heap
page read and write
26C8000
trusted library allocation
page read and write
7FFAAC7EB000
trusted library allocation
page read and write
1330000
heap
page read and write
13CF0000
trusted library allocation
page read and write
1B173000
heap
page read and write
7FFAACD00000
trusted library allocation
page read and write
129BA000
trusted library allocation
page read and write
1CAED000
stack
page read and write
2D25E3F0000
heap
page read and write
1A7B5526000
heap
page read and write
7FFAAC484000
trusted library allocation
page read and write
7FF497990000
trusted library allocation
page execute and read and write
12F9A000
trusted library allocation
page read and write
2DA4000
trusted library allocation
page read and write
7FFAAC670000
trusted library allocation
page execute and read and write
7FFAAC546000
trusted library allocation
page execute and read and write
DE5000
heap
page read and write
7FFAACAD9000
trusted library allocation
page read and write
7FFAACBA0000
trusted library allocation
page read and write
1B272000
unkown
page readonly
7FFAACAEF000
trusted library allocation
page read and write
340A000
trusted library allocation
page read and write
13513000
trusted library allocation
page read and write
7FFAACD76000
trusted library allocation
page read and write
371A000
trusted library allocation
page read and write
7FFAAC6E8000
trusted library allocation
page read and write
7FFAACD7E000
trusted library allocation
page read and write
7FFAACCF0000
trusted library allocation
page read and write
2B4D000
trusted library allocation
page read and write
1769000
heap
page read and write
2ACE000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
7FFAAC740000
trusted library allocation
page read and write
1B7A1000
heap
page read and write
2E01000
trusted library allocation
page read and write
AF8000
heap
page read and write
7FFAACD60000
trusted library allocation
page read and write
7FFAAC6EA000
trusted library allocation
page read and write
7FFAAC730000
trusted library allocation
page read and write
1A9D5000
heap
page read and write
3C10000
trusted library allocation
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
12CE000
stack
page read and write
7FFAAC490000
trusted library allocation
page read and write
A26000
heap
page read and write
7FFAAC7A2000
trusted library allocation
page read and write
7FFAAC534000
trusted library allocation
page read and write
7FFAAC54D000
trusted library allocation
page execute and read and write
7FFAAC540000
trusted library allocation
page read and write
7FFAACACF000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page read and write
7FFAAC860000
trusted library allocation
page read and write
7FFAACC80000
trusted library allocation
page read and write
7FFAACAC0000
trusted library allocation
page read and write
7FFAACCF4000
trusted library allocation
page read and write
1BCDD000
heap
page read and write
1BF89000
heap
page read and write
7FFAAC534000
trusted library allocation
page read and write
1B1C0000
heap
page read and write
1C9A0000
heap
page read and write
CAF3CE000
stack
page read and write
7FFAACD44000
trusted library allocation
page read and write
F20000
heap
page execute and read and write
2C56000
trusted library allocation
page read and write
7FFAAC713000
trusted library allocation
page read and write
DCD290F000
stack
page read and write
7FFAACB47000
trusted library allocation
page read and write
136D1000
trusted library allocation
page read and write
8E0000
heap
page read and write
1CDDD000
stack
page read and write
7FFAACB40000
trusted library allocation
page read and write
7FFAACBB0000
trusted library allocation
page read and write
136B8000
trusted library allocation
page read and write
1525000
heap
page read and write
F10000
unkown
page readonly
24033170000
heap
page read and write
4892CFF000
stack
page read and write
294E000
trusted library allocation
page read and write
2651000
trusted library allocation
page read and write
7FFAAC553000
trusted library allocation
page read and write
7FFAAC807000
trusted library allocation
page read and write
1BCC0000
heap
page execute and read and write
130AC000
trusted library allocation
page read and write
7FFAAC7FE000
trusted library allocation
page read and write
1BE9B000
heap
page read and write
2902000
trusted library allocation
page read and write
23D5D8B0000
heap
page read and write
7FFAAC532000
trusted library allocation
page read and write
2D25E505000
heap
page read and write
7FFAACDAD000
trusted library allocation
page read and write
5AB000
stack
page read and write
7FFAACBD0000
trusted library allocation
page read and write
7FFAACAF0000
trusted library allocation
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
7FFAAC464000
trusted library allocation
page read and write
7FFAAC53D000
trusted library allocation
page execute and read and write
7FFAACB90000
trusted library allocation
page read and write
1C690000
heap
page read and write
986000
trusted library allocation
page read and write
7FFAACCA3000
trusted library allocation
page read and write
8E5000
heap
page read and write
7FFAACD3F000
trusted library allocation
page read and write
12E01000
trusted library allocation
page read and write
CF0000
heap
page execute and read and write
7FFAACB80000
trusted library allocation
page read and write
7FFAACAB0000
trusted library allocation
page read and write
1675000
heap
page read and write
2BB9000
trusted library allocation
page read and write
7FFAAC870000
trusted library allocation
page read and write
1BBA0000
heap
page read and write
7FFAACBD5000
trusted library allocation
page read and write
292B000
trusted library allocation
page read and write
7FFAAC7B2000
trusted library allocation
page read and write
7FFAACBB0000
trusted library allocation
page read and write
7FFB1E3A0000
unkown
page readonly
2C50000
trusted library allocation
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
289C1B79000
heap
page read and write
36FC000
trusted library allocation
page read and write
7FFAAC68A000
trusted library allocation
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
1C0A0000
heap
page read and write
2FB6000
trusted library allocation
page read and write
7FFAACC75000
trusted library allocation
page read and write
7FFAACAC4000
trusted library allocation
page read and write
7FFAAC5E6000
trusted library allocation
page read and write
7FFAACD80000
trusted library allocation
page read and write
272F000
trusted library allocation
page read and write
1D17B000
stack
page read and write
231A5510000
heap
page read and write
7FFAACC80000
trusted library allocation
page read and write
7FFAACC10000
trusted library allocation
page read and write
7FFAAC520000
trusted library allocation
page read and write
7FFAAC7F0000
trusted library allocation
page execute and read and write
12D1D000
trusted library allocation
page read and write
7FFAACCBF000
trusted library allocation
page read and write
7FFAAC72A000
trusted library allocation
page read and write
1BB33000
heap
page read and write
7FFAAC553000
trusted library allocation
page execute and read and write
12F0F000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
7FFAAC68B000
trusted library allocation
page execute and read and write
7FFAACACF000
trusted library allocation
page read and write
2C99000
trusted library allocation
page read and write
7FFAACC75000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
2C15000
trusted library allocation
page read and write
1052000
heap
page read and write
9E9000
heap
page read and write
135D7000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
1375000
heap
page read and write
12E2A000
trusted library allocation
page read and write
1C700000
heap
page read and write
AE4000
heap
page read and write
7FFAAC544000
trusted library allocation
page read and write
12917000
trusted library allocation
page read and write
1C3A0000
heap
page read and write
7FFAAC740000
trusted library allocation
page read and write
7FFAAC670000
trusted library allocation
page read and write
1B2BE000
unkown
page readonly
7FFAAC510000
trusted library allocation
page read and write
1B1B0000
heap
page execute and read and write
13446000
trusted library allocation
page read and write
7FFAACCDA000
trusted library allocation
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
12A6C000
trusted library allocation
page read and write
7FFAACB76000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
7FFAACA40000
trusted library allocation
page read and write
7FFAACD37000
trusted library allocation
page read and write
1330000
heap
page read and write
7FFAACD20000
trusted library allocation
page read and write
7FFAAC830000
trusted library allocation
page execute and read and write
35E2000
trusted library allocation
page read and write
7FFAAC539000
trusted library allocation
page read and write
1ABDA000
stack
page read and write
1313D000
trusted library allocation
page read and write
7FFAACD70000
trusted library allocation
page read and write
1B230000
unkown
page readonly
7FFAAC7F0000
trusted library allocation
page read and write
132E000
stack
page read and write
7FFAACB7A000
trusted library allocation
page read and write
2749000
heap
page read and write
7FFAACAB0000
trusted library allocation
page read and write
1D1B0000
heap
page read and write
2FE0000
trusted library allocation
page read and write
7FFAACB10000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page read and write
7FFAAC6F3000
trusted library allocation
page read and write
7FFAAC800000
trusted library allocation
page execute and read and write
7FFAAC564000
trusted library allocation
page read and write
EED468B000
stack
page read and write
7FFAACA90000
trusted library allocation
page read and write
23911BC0000
heap
page read and write
7FFAACCBF000
trusted library allocation
page read and write
7FFAACC55000
trusted library allocation
page read and write
105C000
heap
page read and write
7FFAACB98000
trusted library allocation
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
7FFAAC760000
trusted library allocation
page read and write
7FFAAC800000
trusted library allocation
page execute and read and write
1BF63000
heap
page read and write
7FFAACBD0000
trusted library allocation
page read and write
7FFAACC81000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
1BD21000
heap
page read and write
3420000
heap
page execute and read and write
C4E000
stack
page read and write
AE0000
heap
page execute and read and write
7FFAACB98000
trusted library allocation
page read and write
127FE000
trusted library allocation
page read and write
A4F000
stack
page read and write
12846000
trusted library allocation
page read and write
271B000
trusted library allocation
page read and write
CA0000
heap
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
1B2E3000
heap
page execute and read and write
EED470E000
stack
page read and write
7FFAACBF0000
trusted library allocation
page read and write
1CCD0000
heap
page read and write
1B21D000
stack
page read and write
36E5000
trusted library allocation
page read and write
3549000
trusted library allocation
page read and write
12BB1000
trusted library allocation
page read and write
F42000
unkown
page readonly
2991000
trusted library allocation
page read and write
1AF22000
heap
page read and write
130E2000
trusted library allocation
page read and write
13C3F000
trusted library allocation
page read and write
11E0000
heap
page read and write
3270000
trusted library allocation
page read and write
1028000
heap
page read and write
7FFAACE36000
trusted library allocation
page read and write
26FA000
trusted library allocation
page read and write
1C69B000
heap
page read and write
1AC6B000
stack
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
1B660000
unkown
page readonly
34E8000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
7FFAAC710000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page read and write
7FFAAC9EE000
trusted library allocation
page read and write
7FFAAC694000
trusted library allocation
page execute and read and write
7FFAACAE0000
trusted library allocation
page read and write
7FFAACD88000
trusted library allocation
page read and write
7FFAAC556000
trusted library allocation
page read and write
231A54F0000
heap
page read and write
2751000
trusted library allocation
page read and write
28F2000
trusted library allocation
page read and write
1BBF0000
heap
page read and write
7FFAACC8B000
trusted library allocation
page read and write
7FFAAC48C000
trusted library allocation
page execute and read and write
B50000
trusted library allocation
page read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAAC480000
trusted library allocation
page read and write
299C000
trusted library allocation
page read and write
7FFAACC40000
trusted library allocation
page read and write
2943000
trusted library allocation
page read and write
7FFAACC10000
trusted library allocation
page read and write
17F0000
heap
page read and write
BBF26FF000
stack
page read and write
88B000
heap
page read and write
2D73000
trusted library allocation
page read and write
1298C000
trusted library allocation
page read and write
1C1DE000
stack
page read and write
7FFAACD90000
trusted library allocation
page read and write
1190000
heap
page read and write
164F0410000
heap
page read and write
7FFAAC892000
trusted library allocation
page read and write
1CF9D000
stack
page read and write
1BBB0000
heap
page read and write
1B51D000
stack
page read and write
7FFAAC7A9000
trusted library allocation
page read and write
7FFAAC530000
trusted library allocation
page read and write
1386B000
trusted library allocation
page read and write
1299A000
trusted library allocation
page read and write
7FFAAC6E8000
trusted library allocation
page read and write
28F9000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page read and write
7FFAACB48000
trusted library allocation
page read and write
1CF7D000
stack
page read and write
7FFB1E0E0000
unkown
page readonly
118A000
stack
page read and write
1B3BD000
stack
page read and write
1BCF0000
heap
page read and write
34A7000
trusted library allocation
page read and write
1120000
heap
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
7FFAACC79000
trusted library allocation
page read and write
7FFAAC60C000
trusted library allocation
page execute and read and write
7FFAACBB0000
trusted library allocation
page read and write
7FFAACBB0000
trusted library allocation
page read and write
13E13000
trusted library allocation
page read and write
7FFAAC600000
trusted library allocation
page execute and read and write
7FFAACC45000
trusted library allocation
page read and write
12A58000
trusted library allocation
page read and write
1C09E000
stack
page read and write
7FFAACD10000
trusted library allocation
page read and write
1B2F0000
heap
page read and write
1C80B000
stack
page read and write
7FFAAC600000
trusted library allocation
page read and write
7FFAACD35000
trusted library allocation
page read and write
7FFAACBE0000
trusted library allocation
page read and write
52EC75F000
stack
page read and write
7FFAACC10000
trusted library allocation
page read and write
2869000
trusted library allocation
page read and write
7FFAAC7DB000
trusted library allocation
page read and write
231A56E0000
heap
page read and write
7FFAACB9B000
trusted library allocation
page read and write
7FFAAC800000
trusted library allocation
page read and write
1C143730000
heap
page read and write
7FFAAC6F0000
trusted library allocation
page execute and read and write
131B8000
trusted library allocation
page read and write
7FFAACD5D000
trusted library allocation
page read and write
1B78A000
heap
page read and write
7FFAAC650000
trusted library allocation
page read and write
12FA7000
trusted library allocation
page read and write
7FFB1E100000
unkown
page read and write
1C143760000
heap
page read and write
1308F000
trusted library allocation
page read and write
3A42000
trusted library allocation
page read and write
1B21D000
heap
page read and write
1BBE0000
heap
page read and write
129D3000
trusted library allocation
page read and write
1C55E000
stack
page read and write
7FFAAC543000
trusted library allocation
page read and write
1C41D000
stack
page read and write
1BCD0000
heap
page read and write
7FFAACB57000
trusted library allocation
page read and write
1CE9D000
stack
page read and write
7FFAACB70000
trusted library allocation
page read and write
2AA9000
trusted library allocation
page read and write
13244000
trusted library allocation
page read and write
7FFAAC71E000
trusted library allocation
page read and write
1BB89000
heap
page read and write
7FFAAC70C000
trusted library allocation
page read and write
F40000
unkown
page readonly
7FFAACB5F000
trusted library allocation
page read and write
7FFAACD10000
trusted library allocation
page read and write
13D5B000
trusted library allocation
page read and write
7FFAACCFC000
trusted library allocation
page read and write
7FFAACAE1000
trusted library allocation
page read and write
7FFAAC66B000
trusted library allocation
page execute and read and write
3252000
trusted library allocation
page read and write
2520000
heap
page execute and read and write
1D2DB000
stack
page read and write
1BF0E000
stack
page read and write
31B3000
trusted library allocation
page read and write
7FFAACB4E000
trusted library allocation
page read and write
2869000
trusted library allocation
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
7FFAACE60000
trusted library allocation
page execute and read and write
7FFAACD40000
trusted library allocation
page read and write
7FFAACB9A000
trusted library allocation
page read and write
7FFAACD7B000
trusted library allocation
page read and write
390E000
trusted library allocation
page read and write
12B8F000
trusted library allocation
page read and write
7FFAACCC0000
trusted library allocation
page read and write
7FFAACBE0000
trusted library allocation
page read and write
2DD0000
heap
page read and write
13136000
trusted library allocation
page read and write
7FFAACE21000
trusted library allocation
page read and write
7FFAAC789000
trusted library allocation
page read and write
7FFAAC6E6000
trusted library allocation
page read and write
134FA000
trusted library allocation
page read and write
12978000
trusted library allocation
page read and write
7FFAACD1B000
trusted library allocation
page read and write
1B300000
trusted library allocation
page read and write
9C8000
heap
page read and write
7FFAACB2C000
trusted library allocation
page read and write
7FFAAC7C2000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page read and write
1349B000
trusted library allocation
page read and write
7FFAACA10000
trusted library allocation
page read and write
7FFAACB60000
trusted library allocation
page read and write
12906000
trusted library allocation
page read and write
7FFAAC65F000
trusted library allocation
page execute and read and write
7FFAACB60000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page execute and read and write
12944000
trusted library allocation
page read and write
B10000
heap
page read and write
F70000
heap
page read and write
29BE000
trusted library allocation
page read and write
1B320000
heap
page read and write
29A3000
trusted library allocation
page read and write
1B270000
unkown
page readonly
7FFAAC9C0000
trusted library allocation
page read and write
7FFAAC713000
trusted library allocation
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
164F06B0000
heap
page read and write
3B0000
heap
page read and write
7FFAACAD0000
trusted library allocation
page read and write
1073000
heap
page read and write
7FFAAC660000
trusted library allocation
page execute and read and write
13010000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
2C13000
trusted library allocation
page read and write
164F06B5000
heap
page read and write
7FFAAC5E5000
trusted library allocation
page execute and read and write
7FFAACC70000
trusted library allocation
page read and write
12A6D000
trusted library allocation
page read and write
17D0000
heap
page read and write
130D5000
trusted library allocation
page read and write
190E000
stack
page read and write
7FFAAC723000
trusted library allocation
page read and write
7FFAAC7B8000
trusted library allocation
page read and write
7FFAAC9FF000
trusted library allocation
page read and write
7FFAACAF0000
trusted library allocation
page read and write
1B81B000
stack
page read and write
7FFAACC20000
trusted library allocation
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
7FFAAC723000
trusted library allocation
page read and write
1279C000
trusted library allocation
page read and write
12F2D000
trusted library allocation
page read and write
1B5ED000
stack
page read and write
1B85A000
stack
page read and write
1530000
heap
page read and write
1ADEB000
stack
page read and write
7FFAACC53000
trusted library allocation
page read and write
7FFAAC544000
trusted library allocation
page read and write
3308000
trusted library allocation
page read and write
12B8B000
trusted library allocation
page read and write
3E6000
unkown
page readonly
7FFAACCDF000
trusted library allocation
page read and write
2741000
trusted library allocation
page read and write
28D8000
trusted library allocation
page read and write
7FFAACC00000
trusted library allocation
page read and write
7FFAAC660000
trusted library allocation
page read and write
1BE34000
heap
page read and write
7FFAAC610000
trusted library allocation
page read and write
3400000
heap
page execute and read and write
3623000
trusted library allocation
page read and write
1210000
heap
page read and write
1A6280C0000
heap
page read and write
7FFAAC874000
trusted library allocation
page read and write
7FFAACB5D000
trusted library allocation
page read and write
7FFAACB10000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page read and write
7FFAACB90000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
BCE000
heap
page read and write
7FFAACB60000
trusted library allocation
page read and write
1A7B5519000
heap
page read and write
A76000
heap
page read and write
2740000
heap
page read and write
1BB7F000
heap
page read and write
7FFAACE60000
trusted library allocation
page execute and read and write
3555000
trusted library allocation
page read and write
1B780000
heap
page execute and read and write
7FFAACB80000
trusted library allocation
page read and write
2A9C000
trusted library allocation
page read and write
1B020000
heap
page read and write
103C000
heap
page read and write
7FFAAC5DC000
trusted library allocation
page execute and read and write
7FFAACE56000
trusted library allocation
page read and write
7FFAACD5B000
trusted library allocation
page read and write
26DE000
stack
page read and write
1353000
heap
page read and write
7FFAACB05000
trusted library allocation
page read and write
7FFAAC792000
trusted library allocation
page read and write
7FFAACC83000
trusted library allocation
page read and write
F60000
unkown
page readonly
BBF239C000
stack
page read and write
13E69000
trusted library allocation
page read and write
3299000
trusted library allocation
page read and write
7FFAAC774000
trusted library allocation
page read and write
DCD298F000
stack
page read and write
7FFAAC800000
trusted library allocation
page read and write
32AA000
trusted library allocation
page read and write
C60000
heap
page read and write
7FFAACD7A000
trusted library allocation
page read and write
7FFAAC55D000
trusted library allocation
page execute and read and write
384A000
trusted library allocation
page read and write
1C39E000
stack
page read and write
24033350000
heap
page read and write
1360C000
trusted library allocation
page read and write
7FFAAC940000
trusted library allocation
page read and write
BE0000
heap
page read and write
25D0063A000
heap
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
7FFAACE36000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page read and write
14C0000
heap
page read and write
297E000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page read and write
7FFAACBE0000
trusted library allocation
page read and write
7FFAAC539000
trusted library allocation
page read and write
7FFAAC600000
trusted library allocation
page read and write
1805000
heap
page read and write
7FFAAC686000
trusted library allocation
page execute and read and write
291E000
stack
page read and write
7FFAAC4A3000
trusted library allocation
page read and write
135D4000
trusted library allocation
page read and write
1BCC3000
heap
page execute and read and write
7FFAAC533000
trusted library allocation
page execute and read and write
7FFAAC650000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page read and write
23D5D960000
heap
page read and write
2C7B000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
1BC78000
heap
page read and write
7FFAAC799000
trusted library allocation
page read and write
7FFAACA70000
trusted library allocation
page read and write
2E6C000
trusted library allocation
page read and write
B80000
heap
page read and write
2D6C000
trusted library allocation
page read and write
7FFAACB93000
trusted library allocation
page read and write
1B209000
heap
page read and write
1A7B5430000
heap
page read and write
7FFAACAEF000
trusted library allocation
page read and write
7FFAAC884000
trusted library allocation
page read and write
6DB000
stack
page read and write
7FFAAC670000
trusted library allocation
page execute and read and write
132F7000
trusted library allocation
page read and write
7FFAACD00000
trusted library allocation
page execute and read and write
12FEF000
trusted library allocation
page read and write
7FFAAC516000
trusted library allocation
page read and write
7FFAAC543000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page read and write
1B787000
heap
page read and write
7FFAAC685000
trusted library allocation
page execute and read and write
23A9CB90000
heap
page read and write
7FFAACAF0000
trusted library allocation
page read and write
7FFAAC71A000
trusted library allocation
page read and write
1B913000
heap
page execute and read and write
1BE27000
heap
page read and write
7FFAACD9A000
trusted library allocation
page read and write
7FFAACCE0000
trusted library allocation
page read and write
7FFAACE50000
trusted library allocation
page execute and read and write
7FFAACB96000
trusted library allocation
page read and write
7FFAACBB6000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page read and write
7FFAACBA8000
trusted library allocation
page read and write
23A9CCB0000
heap
page read and write
1BCA0000
heap
page read and write
7FFAAC523000
trusted library allocation
page execute and read and write
1368F000
trusted library allocation
page read and write
7FFAAC770000
trusted library allocation
page read and write
1BF3E000
stack
page read and write
2938000
trusted library allocation
page read and write
7FFAACCC0000
trusted library allocation
page read and write
7FFAAC540000
trusted library allocation
page read and write
7FFAAC9F0000
trusted library allocation
page read and write
25D00935000
heap
page read and write
7FFAACB70000
trusted library allocation
page read and write
7FFAACAA0000
trusted library allocation
page read and write
1B5C2000
heap
page read and write
7FFAACC68000
trusted library allocation
page read and write
7FFAAC790000
trusted library allocation
page read and write
7FFAACB86000
trusted library allocation
page read and write
7FFAAC48B000
trusted library allocation
page execute and read and write
7FFAAC58C000
trusted library allocation
page execute and read and write
1CBDD000
stack
page read and write
7FFAACE41000
trusted library allocation
page read and write
7FFAACCE0000
trusted library allocation
page read and write
1B060000
heap
page execute and read and write
3220000
heap
page read and write
1C5AE000
stack
page read and write
7FFAACA20000
trusted library allocation
page read and write
DB5000
heap
page read and write
7FFAAC7DE000
trusted library allocation
page read and write
12B1B000
trusted library allocation
page read and write
BBF267F000
stack
page read and write
3809000
trusted library allocation
page read and write
1046000
heap
page read and write
1CCDE000
stack
page read and write
1292B000
trusted library allocation
page read and write
15FF000
stack
page read and write
134E000
heap
page read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
7FFAAC7DE000
trusted library allocation
page read and write
27B1000
trusted library allocation
page read and write
7FFAAC819000
trusted library allocation
page execute and read and write
7FFAAC616000
trusted library allocation
page execute and read and write
7FFAACBB0000
trusted library allocation
page read and write
2659000
trusted library allocation
page read and write
1205000
heap
page read and write
7FFAAC78D000
trusted library allocation
page read and write
1CADE000
stack
page read and write
7FFAACB50000
trusted library allocation
page read and write
1325C000
trusted library allocation
page read and write
31F5000
trusted library allocation
page read and write
7FFAAC686000
trusted library allocation
page execute and read and write
343F000
trusted library allocation
page read and write
1CA3A000
heap
page read and write
1376B000
trusted library allocation
page read and write
7FFAAC7AD000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
1399A000
trusted library allocation
page read and write
128DA000
trusted library allocation
page read and write
2899000
trusted library allocation
page read and write
28C1000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
287A000
trusted library allocation
page read and write
B25000
heap
page read and write
329F000
trusted library allocation
page read and write
3A0000
unkown
page readonly
1AAD9000
heap
page read and write
7FFAAC7AD000
trusted library allocation
page read and write
7FFAAC894000
trusted library allocation
page read and write
A20000
heap
page read and write
289C1B98000
heap
page read and write
7FFAACE40000
trusted library allocation
page execute and read and write
7FFAACADF000
trusted library allocation
page read and write
132BC000
trusted library allocation
page read and write
1C4DE000
stack
page read and write
7FFAAC56D000
trusted library allocation
page execute and read and write
7FFAACD72000
trusted library allocation
page read and write
7FFAAC774000
trusted library allocation
page read and write
7FFAACC68000
trusted library allocation
page read and write
24033257000
heap
page read and write
7FFAAC685000
trusted library allocation
page execute and read and write
17F5000
heap
page read and write
12A1B000
trusted library allocation
page read and write
7FFAAC680000
trusted library allocation
page read and write
7FFAAC896000
trusted library allocation
page read and write
35F8000
trusted library allocation
page read and write
13667000
trusted library allocation
page read and write
2DF9000
trusted library allocation
page read and write
7FFAACCB0000
trusted library allocation
page read and write
7FFAAC74A000
trusted library allocation
page read and write
2D25E500000
heap
page read and write
12DE7000
trusted library allocation
page read and write
7FFAAC6B9000
trusted library allocation
page read and write
127C4000
trusted library allocation
page read and write
4892C7C000
stack
page read and write
1A627F70000
heap
page read and write
13444000
trusted library allocation
page read and write
7FFAACAF0000
trusted library allocation
page read and write
7FFAACB7D000
trusted library allocation
page read and write
1527000
heap
page read and write
12F4C000
trusted library allocation
page read and write
1315C000
trusted library allocation
page read and write
7FFAAC6A6000
trusted library allocation
page execute and read and write
A00000
heap
page read and write
1B580000
heap
page read and write
7FFAAC548000
trusted library allocation
page read and write
12CB6000
trusted library allocation
page read and write
7FFAACDB0000
trusted library allocation
page read and write
2BCA000
trusted library allocation
page read and write
2AB8000
trusted library allocation
page read and write
303B000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
27C8000
trusted library allocation
page read and write
1B57E000
stack
page read and write
13700000
trusted library allocation
page read and write
7FFAACCFC000
trusted library allocation
page read and write
7FFB1E3B6000
unkown
page readonly
2DF0000
heap
page execute and read and write
7FFAAC58C000
trusted library allocation
page execute and read and write
840000
trusted library allocation
page read and write
136EA000
trusted library allocation
page read and write
7FFAACB67000
trusted library allocation
page read and write
1BC70000
heap
page execute and read and write
23A9CB99000
heap
page read and write
7FFAACB80000
trusted library allocation
page read and write
E6B231F000
stack
page read and write
2988000
trusted library allocation
page read and write
7FFAAC7C2000
trusted library allocation
page read and write
1BC62000
heap
page read and write
7FFAAC890000
trusted library allocation
page read and write
There are 2558 hidden memdumps, click here to show them.