IOC Report
doc1.exe

loading gif

Files

File Path
Type
Category
Malicious
doc1.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\msb.vbe
data
dropped
malicious
C:\Users\user\AppData\Roaming\bosotkm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\bosotkm.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\fNUATsLGslepRpn.vbs
ISO-8859 text
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0x11f752f5, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_1391fdf18fce9611e7ebad568844f3ce9010feab_c971f06d_1a33de68-415c-4d21-a784-b4668b7aa29d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_1391fdf18fce9611e7ebad568844f3ce9010feab_c971f06d_284e96a9-d937-48e9-bc99-8e8d88150844\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_1391fdf18fce9611e7ebad568844f3ce9010feab_c971f06d_2e43c2c4-838b-42d3-b7ee-15496157039b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_1391fdf18fce9611e7ebad568844f3ce9010feab_c971f06d_a7760778-d692-44af-a87f-1b51435c8703\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_1391fdf18fce9611e7ebad568844f3ce9010feab_c971f06d_b739a78d-41be-40a0-a67e-883bb739b228\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_119babc0-c119-4410-a6ce-083155f509a9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_6405b92d-62d2-455b-8ebe-be05040f6060\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_6a84cbbf-50c5-4904-b496-7b896f381c9a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_811181b0-5835-4638-92f6-9433f0ac2c6a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_90979711-5288-4b3a-abc8-1f7b30f493c7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A88.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Aug 27 18:03:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2BD1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2BFF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C3E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C3F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER69C3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER69E3.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Aug 27 18:04:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER69F3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6B99.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BC9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERABFD.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Aug 27 18:04:26 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD45.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERADC3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERADC4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAE21.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC3B0.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Aug 27 18:03:27 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC42D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC48C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC612.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC661.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF2AF.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Aug 27 18:03:39 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF4E2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF4F2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF521.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF570.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2exqzvuo.cdn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ox4kdpb.xhj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_41ttg5jc.s4m.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5dx5gnav.uwz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a5ntv2u2.abr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ah1i0yoj.pdx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cc0fmre0.rv0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ccbx03of.d2f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ciewq43x.cbp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kh5jnd1q.au2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pnbriqn5.1f5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_prkdvemx.4w3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rebom5ay.t4g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tju4kw2q.bm2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\227T1CRS3RKN7JOFY40N.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF55e0dd.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF561e05.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF565d40.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF569b43.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF56d9f2.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF571da2.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5BVTADRV8HYLQP5LWUTK.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6PA8S796JYOGKJ8YURG4.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\C4U4PU4G3ZTYT9N6BAR3.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MB0FFM5BGMWYG1V7S2VA.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PH3V7OUOZ3FWWTO0KHLX.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VACGQUYUXTWP9II47VG9.temp
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
\Device\ConDrv
ASCII text, with very long lines (875), with CRLF line terminators, with escape sequences
dropped
There are 66 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\doc1.exe
"C:\Users\user\Desktop\doc1.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\msb.vbe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\fNUATsLGslepRpn.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Users\user\AppData\Roaming\bosotkm.exe
"C:\Users\user\AppData\Roaming\bosotkm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "3508" "2808" "2740" "2812" "0" "0" "2816" "0" "0" "0" "0" "0"
malicious
C:\Users\user\AppData\Roaming\bosotkm.exe
"C:\Users\user\AppData\Roaming\bosotkm.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "2188" "2800" "2756" "2804" "0" "0" "2808" "0" "0" "0" "0" "0"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "6756" "2872" "2688" "2876" "0" "0" "2880" "0" "0" "0" "0" "0"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "2548" "2816" "1512" "2820" "0" "0" "2824" "0" "0" "0" "0" "0"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "2744" "2812" "2240" "2816" "0" "0" "2820" "0" "0" "0" "0" "0"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 1064
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 1064
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6452 -s 1064
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5984 -s 1064
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 1064
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 29 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://stackoverflow.com/q/14436606/23354
unknown
http://144.91.79.54/2508/file
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://144.91.79.54/2508/ThXb4tU1jp1fQQFsQkY1.txt
unknown
https://github.com/mgravell/protobuf-net
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://144.91.79.54/M
unknown
http://crl.ver)
unknown
http://checkip.dyndns.org
unknown
http://144.91.79.54:80/2508/s
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
http://144.91.79.54/2508/file0F?
unknown
http://144.91.79.54/2508/v
unknown
http://144.91.79.54/2508/ThXb4tU1jp1fQQFsQkY1.txtb
unknown
http://144.91.79.54/2508/r
unknown
http://144.91.79.54/2508/s
unknown
http://144.91.79.54/;
unknown
http://schemas.microso
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
http://checkip.dyndns.org/
158.101.44.242
https://github.com/mgravell/protobuf-neti
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://144.91.79.54/2508/filewF
unknown
http://checkip.dyndns.org/q
unknown
http://144.91.79.54/
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
http://144.91.79.54/2508/
unknown
http://checkip.dyndns.com
unknown
http://144.91.79.54/4
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
checkip.dyndns.org
unknown
malicious
fp2e7a.wpc.phicdn.net
192.229.221.95
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
144.91.79.54
unknown
Germany
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
158.101.44.242
checkip.dyndns.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
bosotkm
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn\donn
segment1
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn\donn
segment2
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn\donn
segment3
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn\donn
segment4
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn\donn
segment5
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn\donn
segment6
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn\donn
segment7
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn\donn
segment8
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn\donn
segment9
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn
cn
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn
i
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn
s
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn
r
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn
Path
HKEY_CURRENT_USER\SOFTWARE\fNUATsLGslepRpn
v
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
32E1000
trusted library allocation
page read and write
malicious
3C29000
trusted library allocation
page read and write
malicious
3CB1000
trusted library allocation
page read and write
malicious
2A51000
trusted library allocation
page read and write
malicious
2BCF000
trusted library allocation
page read and write
malicious
442B000
trusted library allocation
page read and write
malicious
3461000
trusted library allocation
page read and write
malicious
56F0000
trusted library section
page read and write
malicious
417B000
trusted library allocation
page read and write
malicious
41FB000
trusted library allocation
page read and write
malicious
2C34000
trusted library allocation
page read and write
malicious
41A000
remote allocation
page execute and read and write
malicious
2A11000
trusted library allocation
page read and write
malicious
9D2000
remote allocation
page execute and read and write
malicious
2D9B000
trusted library allocation
page read and write
malicious
41B000
remote allocation
page execute and read and write
malicious
2BD1000
trusted library allocation
page read and write
malicious
301B000
trusted library allocation
page read and write
malicious
2E51000
trusted library allocation
page read and write
malicious
30B1000
trusted library allocation
page read and write
malicious
3278000
trusted library allocation
page read and write
malicious
3881000
trusted library allocation
page read and write
2EEE000
trusted library allocation
page read and write
2D66000
trusted library allocation
page read and write
3BA000
stack
page read and write
59DE000
stack
page read and write
622000
unkown
page readonly
5020000
heap
page execute and read and write
386A000
trusted library allocation
page read and write
2D45000
trusted library allocation
page read and write
BD3000
heap
page read and write
556D000
stack
page read and write
BDA000
heap
page read and write
3084000
trusted library allocation
page read and write
BE9000
heap
page read and write
2FC7000
trusted library allocation
page read and write
365C000
trusted library allocation
page read and write
35CF000
trusted library allocation
page read and write
2B6F000
trusted library allocation
page read and write
5190000
heap
page read and write
2F21000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
BAD000
heap
page read and write
380F000
trusted library allocation
page read and write
4C1E000
trusted library allocation
page read and write
546E000
stack
page read and write
2F0A000
trusted library allocation
page read and write
DA7000
trusted library allocation
page execute and read and write
67CFD7E000
unkown
page readonly
2F00000
trusted library allocation
page read and write
2F43000
trusted library allocation
page read and write
1A10000
heap
page read and write
51E3000
heap
page read and write
33FA000
trusted library allocation
page read and write
5B8A000
heap
page read and write
19852337000
heap
page read and write
EDA000
stack
page read and write
2F67000
trusted library allocation
page read and write
198522CD000
heap
page read and write
3020000
trusted library allocation
page read and write
51D3000
heap
page read and write
2E2F000
trusted library allocation
page read and write
5D90000
trusted library allocation
page read and write
39A2000
trusted library allocation
page read and write
67D0B7E000
stack
page read and write
C1E000
heap
page read and write
5110000
trusted library allocation
page execute and read and write
3937000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
2C34000
trusted library allocation
page read and write
12D2000
trusted library allocation
page read and write
1985230B000
heap
page read and write
2F71000
trusted library allocation
page read and write
5F2E000
stack
page read and write
2B64000
trusted library allocation
page read and write
C1E000
heap
page read and write
30FD000
heap
page read and write
351B000
trusted library allocation
page read and write
3731000
trusted library allocation
page read and write
1E75A620000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
5854000
heap
page read and write
30F5000
heap
page read and write
60C0000
trusted library allocation
page execute and read and write
1E756040000
trusted library section
page readonly
1421000
heap
page read and write
2FFB000
trusted library allocation
page read and write
BD9000
heap
page read and write
1985232D000
heap
page read and write
3849000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
3545000
trusted library allocation
page read and write
1787000
trusted library allocation
page execute and read and write
15AE000
stack
page read and write
35B0000
trusted library allocation
page read and write
4E1E000
stack
page read and write
1110000
heap
page execute and read and write
646F000
stack
page read and write
50CE000
trusted library allocation
page read and write
3685000
trusted library allocation
page read and write
34FC000
trusted library allocation
page read and write
50D4000
trusted library allocation
page read and write
2EC8000
trusted library allocation
page read and write
55ED000
stack
page read and write
61AE000
stack
page read and write
36B2000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
5661000
heap
page read and write
4D6A000
trusted library allocation
page read and write
3692000
trusted library allocation
page read and write
3659000
trusted library allocation
page read and write
5810000
heap
page read and write
3584000
trusted library allocation
page read and write
721000
unkown
page readonly
A5E000
stack
page read and write
3767000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
1E755313000
heap
page read and write
2D5D000
stack
page read and write
2D50000
trusted library allocation
page read and write
68E0000
trusted library allocation
page execute and read and write
35C5000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
605E000
stack
page read and write
2E6F000
trusted library allocation
page read and write
3073000
trusted library allocation
page read and write
502E000
stack
page read and write
2CF0000
trusted library allocation
page read and write
C32000
heap
page read and write
65963FE000
stack
page read and write
36AC000
trusted library allocation
page read and write
2F45000
trusted library allocation
page read and write
9F0000
heap
page read and write
2B59000
trusted library allocation
page read and write
3794000
trusted library allocation
page read and write
407000
remote allocation
page execute and read and write
2F3A000
trusted library allocation
page read and write
5650000
heap
page execute and read and write
F57000
heap
page read and write
356B000
trusted library allocation
page read and write
3566000
trusted library allocation
page read and write
5FDD000
stack
page read and write
67D13FE000
stack
page read and write
4F7E000
stack
page read and write
3761000
trusted library allocation
page read and write
1E755274000
heap
page read and write
335D000
trusted library allocation
page read and write
2BB8000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
54C0000
heap
page read and write
2BAF000
trusted library allocation
page read and write
9A0000
heap
page read and write
5C9E000
stack
page read and write
369C000
trusted library allocation
page read and write
2EAB000
trusted library allocation
page read and write
D96000
trusted library allocation
page execute and read and write
3155000
trusted library allocation
page read and write
B92000
heap
page read and write
6140000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
CF8000
stack
page read and write
2E33000
trusted library allocation
page read and write
576E000
stack
page read and write
6690000
trusted library allocation
page read and write
5BCD000
heap
page read and write
5C07000
heap
page read and write
17CE000
stack
page read and write
2E94000
trusted library allocation
page read and write
5C24000
heap
page read and write
301A000
trusted library allocation
page read and write
19852332000
heap
page read and write
1E755F40000
trusted library allocation
page read and write
19852315000
heap
page read and write
3710000
trusted library allocation
page read and write
2C52000
trusted library allocation
page read and write
3672000
trusted library allocation
page read and write
11CE000
stack
page read and write
2D2B000
trusted library allocation
page read and write
344B000
trusted library allocation
page read and write
6360000
heap
page read and write
392D000
trusted library allocation
page read and write
27188030000
heap
page read and write
353D000
trusted library allocation
page read and write
1400000
heap
page read and write
2D87000
trusted library allocation
page read and write
38A0000
trusted library allocation
page read and write
392F000
trusted library allocation
page read and write
12AD000
trusted library allocation
page execute and read and write
BAD000
heap
page read and write
68A8000
trusted library allocation
page read and write
2D57000
trusted library allocation
page read and write
19852336000
heap
page read and write
2B49000
trusted library allocation
page read and write
3620000
trusted library allocation
page read and write
6634000
trusted library allocation
page read and write
67D03FE000
stack
page read and write
4F64000
heap
page read and write
57A5000
heap
page read and write
1010000
trusted library allocation
page read and write
1007000
trusted library allocation
page execute and read and write
5610000
trusted library allocation
page read and write
545E000
stack
page read and write
3357000
trusted library allocation
page read and write
BE9000
heap
page read and write
367B000
trusted library allocation
page read and write
2D59000
trusted library allocation
page read and write
2EA1000
trusted library allocation
page read and write
50D6000
trusted library allocation
page read and write
2EC4000
trusted library allocation
page read and write
FFA000
trusted library allocation
page execute and read and write
2D80000
trusted library allocation
page read and write
34A6000
trusted library allocation
page read and write
3529000
trusted library allocation
page read and write
4C2E000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
1E75A82B000
heap
page read and write
4F80000
trusted library allocation
page execute and read and write
34D1000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
371A000
trusted library allocation
page read and write
C20000
heap
page read and write
B86000
heap
page read and write
2D4C000
trusted library allocation
page read and write
2CC3000
trusted library allocation
page read and write
4D1E000
stack
page read and write
386E000
trusted library allocation
page read and write
19852341000
heap
page read and write
C28000
heap
page read and write
2E35000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
4F60000
heap
page read and write
30F4000
heap
page read and write
3082000
trusted library allocation
page read and write
19852340000
heap
page read and write
16C0000
heap
page read and write
3C54000
trusted library allocation
page read and write
1340000
heap
page read and write
3658000
trusted library allocation
page read and write
126E000
stack
page read and write
2EFE000
trusted library allocation
page read and write
63EE000
stack
page read and write
5E40000
trusted library allocation
page execute and read and write
2DBF000
trusted library allocation
page read and write
19852315000
heap
page read and write
50BE000
stack
page read and write
620000
unkown
page readonly
2DBD000
trusted library allocation
page read and write
35AB000
trusted library allocation
page read and write
BA8000
heap
page read and write
55CD000
stack
page read and write
2B87000
trusted library allocation
page read and write
5D5E000
stack
page read and write
19854342000
heap
page read and write
30D5000
trusted library allocation
page read and write
2E40000
heap
page read and write
341D000
trusted library allocation
page read and write
3935000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
3643000
trusted library allocation
page read and write
652E000
stack
page read and write
3092000
trusted library allocation
page read and write
572D000
stack
page read and write
3608000
trusted library allocation
page read and write
30FD000
heap
page read and write
2E3C000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
2E8A000
trusted library allocation
page read and write
5F40000
heap
page read and write
36ED000
trusted library allocation
page read and write
BF4000
heap
page read and write
2FB4000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
68CA000
trusted library allocation
page read and write
60C0000
trusted library allocation
page execute and read and write
13FE000
stack
page read and write
34F6000
trusted library allocation
page read and write
2D2D000
trusted library allocation
page read and write
1400000
heap
page read and write
2B78000
trusted library allocation
page read and write
37E5000
trusted library allocation
page read and write
C28000
heap
page read and write
53D0000
trusted library allocation
page read and write
2B86000
trusted library allocation
page read and write
2F1D000
trusted library allocation
page read and write
BAD000
heap
page read and write
30A0000
heap
page execute and read and write
365F000
trusted library allocation
page read and write
38F6000
trusted library allocation
page read and write
36CF000
trusted library allocation
page read and write
512A000
trusted library allocation
page read and write
27DF000
stack
page read and write
3718000
trusted library allocation
page read and write
1479000
heap
page read and write
150A000
heap
page read and write
27188155000
heap
page read and write
114F000
stack
page read and write
666F000
trusted library allocation
page read and write
355E000
trusted library allocation
page read and write
4C85000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
3361000
trusted library allocation
page read and write
34F2000
trusted library allocation
page read and write
E88000
heap
page read and write
C33000
heap
page read and write
1498000
heap
page read and write
3877000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
2B66000
trusted library allocation
page read and write
64AE000
stack
page read and write
4D71000
trusted library allocation
page read and write
3088000
trusted library allocation
page read and write
36A6000
trusted library allocation
page read and write
BB7000
heap
page read and write
1E75A8F4000
heap
page read and write
2DD4000
trusted library allocation
page read and write
BA8000
heap
page read and write
BDA000
heap
page read and write
113A000
heap
page read and write
36C1000
trusted library allocation
page read and write
348B000
trusted library allocation
page read and write
57B6000
heap
page read and write
1020000
trusted library allocation
page read and write
114E000
stack
page read and write
3664000
trusted library allocation
page read and write
35D7000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
5483000
heap
page read and write
3018000
trusted library allocation
page read and write
37CA000
trusted library allocation
page read and write
51E0000
heap
page read and write
B55000
heap
page read and write
FE0000
trusted library allocation
page read and write
F60000
heap
page read and write
BF4000
heap
page read and write
37B7000
trusted library allocation
page read and write
65960FD000
stack
page read and write
1E756080000
trusted library section
page readonly
512F000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
1660000
heap
page read and write
2DF3000
trusted library allocation
page read and write
1595000
heap
page read and write
33A6000
trusted library allocation
page read and write
601E000
stack
page read and write
2F59000
trusted library allocation
page read and write
2DD6000
trusted library allocation
page read and write
5700000
trusted library allocation
page execute and read and write
5616000
trusted library allocation
page read and write
3716000
trusted library allocation
page read and write
2DED000
trusted library allocation
page read and write
2D22000
trusted library allocation
page read and write
3653000
trusted library allocation
page read and write
2CD6000
trusted library allocation
page read and write
1985231C000
heap
page read and write
2C85000
trusted library allocation
page read and write
1590000
heap
page read and write
19852337000
heap
page read and write
5819000
heap
page read and write
12DB000
trusted library allocation
page execute and read and write
EE1000
heap
page read and write
3090000
trusted library allocation
page read and write
2B05000
trusted library allocation
page read and write
597E000
stack
page read and write
5BCE000
stack
page read and write
2F41000
trusted library allocation
page read and write
14CC000
heap
page read and write
1037000
trusted library allocation
page execute and read and write
A3E000
stack
page read and write
1372000
trusted library allocation
page read and write
5EC0000
heap
page read and write
3071000
trusted library allocation
page read and write
2F0D000
trusted library allocation
page read and write
50D1000
trusted library allocation
page read and write
33B7000
trusted library allocation
page read and write
3666000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
3515000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
3033000
trusted library allocation
page read and write
2D33000
trusted library allocation
page read and write
33E7000
trusted library allocation
page read and write
C2A000
heap
page read and write
C0A000
heap
page read and write
1E75A601000
trusted library allocation
page read and write
DE0000
heap
page read and write
3449000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
DF0000
heap
page read and write
12D0000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
B60000
heap
page read and write
1680000
heap
page read and write
2AE2000
trusted library allocation
page read and write
31F4000
trusted library allocation
page read and write
D92000
trusted library allocation
page read and write
BA9000
heap
page read and write
34EA000
trusted library allocation
page read and write
3693000
trusted library allocation
page read and write
612E000
stack
page read and write
585E000
heap
page read and write
55B0000
remote allocation
page read and write
2B7F000
trusted library allocation
page read and write
343D000
trusted library allocation
page read and write
2B08000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
1E75A85D000
heap
page read and write
5380000
trusted library allocation
page read and write
17E0000
heap
page read and write
5E5E000
stack
page read and write
2DBB000
trusted library allocation
page read and write
56FF000
stack
page read and write
35C9000
trusted library allocation
page read and write
3794000
trusted library allocation
page read and write
3075000
trusted library allocation
page read and write
2CAC000
trusted library allocation
page read and write
3A51000
trusted library allocation
page read and write
19852258000
heap
page read and write
ABE000
heap
page read and write
13E5000
heap
page read and write
2FDE000
trusted library allocation
page read and write
3757000
trusted library allocation
page read and write
4DF3000
heap
page read and write
37B1000
trusted library allocation
page read and write
C2A000
heap
page read and write
2E3A000
trusted library allocation
page read and write
3718000
trusted library allocation
page read and write
5FA3000
trusted library allocation
page read and write
16F2000
trusted library allocation
page read and write
2CD8000
trusted library allocation
page read and write
67D107E000
unkown
page readonly
589F000
stack
page read and write
165E000
stack
page read and write
19852315000
heap
page read and write
1E7559D0000
trusted library allocation
page read and write
C0A000
heap
page read and write
BF8000
heap
page read and write
3370000
trusted library allocation
page read and write
8E0000
heap
page read and write
1E755200000
heap
page read and write
31E1000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
357B000
trusted library allocation
page read and write
35F9000
trusted library allocation
page read and write
19852334000
heap
page read and write
549E000
stack
page read and write
2CCE000
trusted library allocation
page read and write
2D12000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
19852334000
heap
page read and write
1985231C000
heap
page read and write
5390000
trusted library allocation
page read and write
2F95000
trusted library allocation
page read and write
2FC1000
trusted library allocation
page read and write
366F000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
34A8000
trusted library allocation
page read and write
7FC000
heap
page read and write
34B0000
trusted library allocation
page read and write
2E65000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
35EC000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
305A000
trusted library allocation
page read and write
666A000
trusted library allocation
page read and write
C2B000
heap
page read and write
36F5000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
33AF000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
3883000
trusted library allocation
page read and write
31CC000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
4A59000
trusted library allocation
page read and write
352C000
trusted library allocation
page read and write
A60000
heap
page read and write
3813000
trusted library allocation
page read and write
3666000
trusted library allocation
page read and write
313E000
trusted library allocation
page read and write
389A000
trusted library allocation
page read and write
2F1B000
trusted library allocation
page read and write
C2A000
heap
page read and write
5BA6000
heap
page read and write
39A7000
trusted library allocation
page read and write
67CF47E000
unkown
page readonly
4C36000
trusted library allocation
page read and write
3582000
trusted library allocation
page read and write
350B000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
3676000
trusted library allocation
page read and write
60E4000
trusted library allocation
page read and write
1310000
heap
page read and write
35CB000
trusted library allocation
page read and write
C28000
heap
page read and write
2E8C000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
3562000
trusted library allocation
page read and write
348F000
trusted library allocation
page read and write
3920000
trusted library allocation
page read and write
3C1A000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
170B000
trusted library allocation
page execute and read and write
120E000
stack
page read and write
3407000
trusted library allocation
page read and write
1707000
trusted library allocation
page execute and read and write
C8E000
stack
page read and write
372F000
trusted library allocation
page read and write
115C000
stack
page read and write
3841000
trusted library allocation
page read and write
33C1000
trusted library allocation
page read and write
B92000
heap
page read and write
33A4000
trusted library allocation
page read and write
FED000
trusted library allocation
page execute and read and write
2D35000
trusted library allocation
page read and write
5480000
trusted library allocation
page execute and read and write
2E88000
trusted library allocation
page read and write
55B0000
remote allocation
page read and write
BAD000
heap
page read and write
3310000
trusted library allocation
page read and write
3541000
trusted library allocation
page read and write
D00000
heap
page read and write
5ED0000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
3629000
trusted library allocation
page read and write
176D000
trusted library allocation
page execute and read and write
198522BF000
heap
page read and write
3702000
trusted library allocation
page read and write
A5D000
trusted library allocation
page execute and read and write
F88000
heap
page read and write
619E000
stack
page read and write
6960000
trusted library allocation
page read and write
2F99000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
3E79000
trusted library allocation
page read and write
C2D000
heap
page read and write
4F6B000
heap
page read and write
2FDF000
trusted library allocation
page read and write
C1E000
heap
page read and write
C1E000
heap
page read and write
34FF000
trusted library allocation
page read and write
E2E000
heap
page read and write
1513000
heap
page read and write
435D000
trusted library allocation
page read and write
5190000
heap
page read and write
36BF000
trusted library allocation
page read and write
3306000
trusted library allocation
page read and write
2C8F000
stack
page read and write
2D85000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
BB7000
heap
page read and write
6894000
trusted library allocation
page read and write
C35000
heap
page read and write
3419000
trusted library allocation
page read and write
1E75A800000
heap
page read and write
54BE000
stack
page read and write
198522CD000
heap
page read and write
3571000
trusted library allocation
page read and write
F3B000
heap
page read and write
198522D2000
heap
page read and write
2B7B000
trusted library allocation
page read and write
2720000
heap
page read and write
56E0000
heap
page read and write
374C000
trusted library allocation
page read and write
B83000
heap
page read and write
5DDE000
stack
page read and write
3D09000
trusted library allocation
page read and write
423000
remote allocation
page execute and read and write
16F6000
trusted library allocation
page execute and read and write
68D0000
trusted library allocation
page execute and read and write
35CD000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
2DE3000
trusted library allocation
page read and write
4FEE000
stack
page read and write
BAA000
heap
page read and write
5663000
heap
page read and write
34B3000
trusted library allocation
page read and write
3931000
trusted library allocation
page read and write
BDA000
heap
page read and write
350B000
trusted library allocation
page read and write
5500000
heap
page execute and read and write
1290000
heap
page read and write
30CF000
trusted library allocation
page read and write
3A77000
trusted library allocation
page read and write
37E3000
trusted library allocation
page read and write
33A2000
trusted library allocation
page read and write
124E000
stack
page read and write
19852302000
heap
page read and write
35FF000
trusted library allocation
page read and write
355A000
trusted library allocation
page read and write
412000
remote allocation
page execute and read and write
2FA1000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
4E30000
heap
page execute and read and write
36FB000
trusted library allocation
page read and write
5660000
heap
page read and write
2E50000
trusted library allocation
page read and write
BB3000
heap
page read and write
2F6B000
trusted library allocation
page read and write
1353000
trusted library allocation
page execute and read and write
503E000
stack
page read and write
275B000
trusted library allocation
page read and write
67CF17E000
unkown
page readonly
37D6000
trusted library allocation
page read and write
5B2E000
stack
page read and write
51B0000
trusted library allocation
page execute and read and write
3914000
trusted library allocation
page read and write
5E5F000
stack
page read and write
522E000
stack
page read and write
2FD1000
trusted library allocation
page read and write
37C4000
trusted library allocation
page read and write
379E000
trusted library allocation
page read and write
2EAD000
trusted library allocation
page read and write
365E000
trusted library allocation
page read and write
3507000
trusted library allocation
page read and write
365A000
trusted library allocation
page read and write
E58000
heap
page read and write
BB9000
heap
page read and write
4F6A000
heap
page read and write
2F73000
trusted library allocation
page read and write
2EEB000
trusted library allocation
page read and write
2D23000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
3509000
trusted library allocation
page read and write
19852306000
heap
page read and write
B30000
heap
page read and write
6880000
trusted library allocation
page execute and read and write
2E1A000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
2F3E000
stack
page read and write
362C000
trusted library allocation
page read and write
51A7000
heap
page read and write
3939000
trusted library allocation
page read and write
36FD000
trusted library allocation
page read and write
2F03000
trusted library allocation
page read and write
33E5000
trusted library allocation
page read and write
C2A000
heap
page read and write
BF4000
heap
page read and write
3389000
trusted library allocation
page read and write
3476000
trusted library allocation
page read and write
33DA000
trusted library allocation
page read and write
9D0000
remote allocation
page execute and read and write
35C1000
trusted library allocation
page read and write
676E000
stack
page read and write
3413000
trusted library allocation
page read and write
2560000
heap
page execute and read and write
560E000
stack
page read and write
5F6E000
stack
page read and write
36D3000
trusted library allocation
page read and write
DA2000
trusted library allocation
page read and write
350D000
trusted library allocation
page read and write
56D3000
heap
page read and write
3C5D000
trusted library allocation
page read and write
3769000
trusted library allocation
page read and write
382A000
trusted library allocation
page read and write
585C000
heap
page read and write
1782000
trusted library allocation
page read and write
33C5000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
E70000
heap
page read and write
406000
remote allocation
page execute and read and write
2D2F000
trusted library allocation
page read and write
2CC5000
trusted library allocation
page read and write
67CF67E000
stack
page read and write
C1E000
heap
page read and write
C0A000
heap
page read and write
360B000
trusted library allocation
page read and write
3708000
trusted library allocation
page read and write
1770000
trusted library allocation
page read and write
367C000
trusted library allocation
page read and write
3EE8000
trusted library allocation
page read and write
C2A000
heap
page read and write
B61000
heap
page read and write
3573000
trusted library allocation
page read and write
19852340000
heap
page read and write
1240000
heap
page read and write
2DDC000
trusted library allocation
page read and write
BB5000
heap
page read and write
3342000
trusted library allocation
page read and write
1E75A916000
heap
page read and write
5890000
trusted library allocation
page read and write
64EE000
stack
page read and write
BE9000
heap
page read and write
332D000
trusted library allocation
page read and write
5740000
heap
page execute and read and write
3674000
trusted library allocation
page read and write
4E19000
heap
page read and write
2ACB000
trusted library allocation
page read and write
341B000
trusted library allocation
page read and write
2E18000
trusted library allocation
page read and write
101E000
stack
page read and write
1354000
trusted library allocation
page read and write
5811000
heap
page read and write
51B0000
trusted library allocation
page execute and read and write
30F8000
heap
page read and write
2EC6000
trusted library allocation
page read and write
3520000
trusted library allocation
page read and write
2FEF000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
2DC4000
trusted library allocation
page read and write
2F6D000
trusted library allocation
page read and write
67D047E000
unkown
page readonly
103B000
trusted library allocation
page execute and read and write
30F9000
heap
page read and write
2B73000
trusted library allocation
page read and write
5356000
trusted library allocation
page read and write
2B92000
trusted library allocation
page read and write
35F2000
trusted library allocation
page read and write
65964FD000
stack
page read and write
2BC0000
heap
page execute and read and write
19852305000
heap
page read and write
35D2000
trusted library allocation
page read and write
5BBC000
heap
page read and write
2D69000
trusted library allocation
page read and write
59EE000
stack
page read and write
60B0000
trusted library allocation
page execute and read and write
33FC000
trusted library allocation
page read and write
19852308000
heap
page read and write
1E7551E1000
trusted library allocation
page read and write
601C000
stack
page read and write
BD9000
heap
page read and write
292E000
stack
page read and write
309D000
trusted library allocation
page read and write
1030000
trusted library allocation
page execute and read and write
1165000
heap
page read and write
34CB000
trusted library allocation
page read and write
345B000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
39BD000
trusted library allocation
page read and write
3BD1000
trusted library allocation
page read and write
1180000
heap
page read and write
19852317000
heap
page read and write
2E14000
trusted library allocation
page read and write
3819000
trusted library allocation
page read and write
35CF000
trusted library allocation
page read and write
4FDE000
stack
page read and write
78E000
stack
page read and write
EB0000
heap
page read and write
1985232A000
heap
page read and write
E2D000
trusted library allocation
page execute and read and write
5980000
trusted library allocation
page read and write
2C7C000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
506E000
stack
page read and write
2FE0000
trusted library allocation
page read and write
35A5000
trusted library allocation
page read and write
2BB3000
trusted library allocation
page read and write
BF6000
heap
page read and write
62EE000
stack
page read and write
1110000
heap
page read and write
30FD000
heap
page read and write
4C98000
trusted library allocation
page read and write
9F5000
heap
page read and write
35C9000
trusted library allocation
page read and write
1004000
trusted library allocation
page read and write
51C3000
heap
page read and write
3472000
trusted library allocation
page read and write
1E75527D000
heap
page read and write
33AC000
trusted library allocation
page read and write
5BDE000
stack
page read and write
43AB000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
11FC000
heap
page read and write
2EF6000
trusted library allocation
page read and write
37BB000
trusted library allocation
page read and write
5B5E000
stack
page read and write
3541000
trusted library allocation
page read and write
3889000
trusted library allocation
page read and write
E20000
heap
page read and write
2B41000
trusted library allocation
page read and write
C0A000
heap
page read and write
2F8A000
trusted library allocation
page read and write
2E77000
trusted library allocation
page read and write
C1E000
heap
page read and write
2B55000
trusted library allocation
page read and write
372B000
trusted library allocation
page read and write
2AE1000
trusted library allocation
page read and write
35F7000
trusted library allocation
page read and write
C1E000
heap
page read and write
C35000
heap
page read and write
1702000
trusted library allocation
page read and write
19852225000
heap
page read and write
4D7D000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
6F8000
stack
page read and write
61B0000
heap
page read and write
BC8000
heap
page read and write
5ADE000
stack
page read and write
562E000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
13B5000
heap
page read and write
2ACA000
trusted library allocation
page read and write
E54000
heap
page read and write
368E000
trusted library allocation
page read and write
6990000
heap
page read and write
16E0000
trusted library allocation
page read and write
FD4000
trusted library allocation
page read and write
2C8B000
trusted library allocation
page read and write
DAB000
trusted library allocation
page execute and read and write
175E000
stack
page read and write
5106000
trusted library allocation
page read and write
BDA000
heap
page read and write
68C0000
trusted library allocation
page read and write
2F52000
trusted library allocation
page read and write
37B3000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
2E5C000
trusted library allocation
page read and write
D9A000
trusted library allocation
page execute and read and write
2E4A000
trusted library allocation
page read and write
3637000
trusted library allocation
page read and write
2DF9000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
31C8000
trusted library allocation
page read and write
656E000
stack
page read and write
2A4E000
stack
page read and write
1E75A7A0000
remote allocation
page read and write
30F5000
heap
page read and write
39D0000
trusted library allocation
page read and write
19852311000
heap
page read and write
382E000
trusted library allocation
page read and write
3534000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
67CFB7E000
unkown
page readonly
BDA000
heap
page read and write
2FA5000
trusted library allocation
page read and write
4C42000
trusted library allocation
page read and write
2E53000
trusted library allocation
page read and write
195E000
stack
page read and write
BC8000
heap
page read and write
3095000
trusted library allocation
page read and write
2F16000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
19852336000
heap
page read and write
990000
heap
page read and write
309A000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
19852301000
heap
page read and write
3C99000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page execute and read and write
3159000
trusted library allocation
page read and write
52E9000
trusted library allocation
page read and write
C1E000
heap
page read and write
3601000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
34CD000
trusted library allocation
page read and write
19852341000
heap
page read and write
53D8000
trusted library allocation
page read and write
37D2000
trusted library allocation
page read and write
2824000
trusted library allocation
page read and write
68F0000
trusted library allocation
page read and write
1E755150000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
2C97000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
2B10000
heap
page read and write
C02000
heap
page read and write
421000
remote allocation
page execute and read and write
539E000
trusted library allocation
page read and write
371A000
trusted library allocation
page read and write
4F6C000
heap
page read and write
2D20000
heap
page execute and read and write
67CFA7C000
stack
page read and write
C2A000
heap
page read and write
55E2000
heap
page read and write
2B5D000
trusted library allocation
page read and write
3680000
trusted library allocation
page read and write
38F2000
trusted library allocation
page read and write
689A000
trusted library allocation
page read and write
547F000
stack
page read and write
38BB000
trusted library allocation
page read and write
2FFB000
trusted library allocation
page read and write
3596000
trusted library allocation
page read and write
C04000
heap
page read and write
5BE0000
heap
page read and write
790000
heap
page read and write
154D000
heap
page read and write
2B60000
trusted library allocation
page read and write
51A0000
heap
page execute and read and write
2DA6000
trusted library allocation
page read and write
3575000
trusted library allocation
page read and write
348D000
trusted library allocation
page read and write
54F0000
heap
page execute and read and write
185E000
stack
page read and write
1850000
trusted library allocation
page read and write
34F7000
trusted library allocation
page read and write
1118000
heap
page read and write
2D04000
trusted library allocation
page read and write
CA0000
heap
page read and write
3C91000
trusted library allocation
page read and write
C1E000
heap
page read and write
2E75000
trusted library allocation
page read and write
2D26000
trusted library allocation
page read and write
3847000
trusted library allocation
page read and write
3556000
trusted library allocation
page read and write
2B80000
heap
page execute and read and write
13BA000
heap
page read and write
1E75A6D0000
trusted library allocation
page read and write
37E7000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
2A5E000
stack
page read and write
DA5000
trusted library allocation
page execute and read and write
A95000
heap
page read and write
3D01000
trusted library allocation
page read and write
2B89000
trusted library allocation
page read and write
3455000
trusted library allocation
page read and write
50DB000
trusted library allocation
page read and write
38F4000
trusted library allocation
page read and write
2F38000
trusted library allocation
page read and write
5761000
heap
page read and write
138B000
trusted library allocation
page execute and read and write
663E000
trusted library allocation
page read and write
5480000
trusted library allocation
page execute and read and write
1100000
trusted library allocation
page read and write
150F000
stack
page read and write
39D6000
trusted library allocation
page read and write
5B60000
heap
page read and write
882000
heap
page read and write
5C1E000
stack
page read and write
1020000
trusted library allocation
page read and write
2EA9000
trusted library allocation
page read and write
5612000
heap
page read and write
B72000
heap
page read and write
12CA000
trusted library allocation
page execute and read and write
5F9F000
stack
page read and write
BAD000
heap
page read and write
4269000
trusted library allocation
page read and write
5E4E000
stack
page read and write
512E000
stack
page read and write
38B5000
trusted library allocation
page read and write
1E75A7A0000
remote allocation
page read and write
37D4000
trusted library allocation
page read and write
2B6A000
trusted library allocation
page read and write
2E52000
trusted library allocation
page read and write
67D09FE000
stack
page read and write
19852305000
heap
page read and write
C28000
heap
page read and write
1E7552B2000
heap
page read and write
6135000
trusted library allocation
page read and write
19852308000
heap
page read and write
35EC000
trusted library allocation
page read and write
AF7000
stack
page read and write
3623000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
3763000
trusted library allocation
page read and write
5123000
trusted library allocation
page read and write
6730000
heap
page read and write
360D000
trusted library allocation
page read and write
50EE000
trusted library allocation
page read and write
2E59000
trusted library allocation
page read and write
5E64000
trusted library allocation
page read and write
34C5000
trusted library allocation
page read and write
67CF97E000
unkown
page readonly
2B6B000
trusted library allocation
page read and write
67CF77E000
unkown
page readonly
3355000
trusted library allocation
page read and write
1E75A5F0000
trusted library allocation
page read and write
560E000
stack
page read and write
2EE5000
trusted library allocation
page read and write
36BE000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
A38000
heap
page read and write
6920000
heap
page read and write
370C000
trusted library allocation
page read and write
2B94000
trusted library allocation
page read and write
A9A000
heap
page read and write
67D117C000
stack
page read and write
D8F000
stack
page read and write
67D087E000
stack
page read and write
1180000
trusted library allocation
page read and write
377F000
trusted library allocation
page read and write
110D000
trusted library allocation
page execute and read and write
5638000
trusted library allocation
page read and write
5155000
trusted library allocation
page read and write
1220000
heap
page read and write
3519000
trusted library allocation
page read and write
B80000
heap
page read and write
380D000
trusted library allocation
page read and write
BF4000
heap
page read and write
576E000
heap
page read and write
BF4000
heap
page read and write
37A2000
trusted library allocation
page read and write
FF7000
trusted library allocation
page execute and read and write
C2A000
heap
page read and write
3308000
trusted library allocation
page read and write
39DC000
trusted library allocation
page read and write
2F14000
trusted library allocation
page read and write
58BE000
stack
page read and write
2F61000
trusted library allocation
page read and write
176F000
stack
page read and write
3605000
trusted library allocation
page read and write
5115000
trusted library allocation
page read and write
C3D000
heap
page read and write
19852341000
heap
page read and write
19852336000
heap
page read and write
1380000
trusted library allocation
page read and write
C3E000
heap
page read and write
DD1C52C000
stack
page read and write
3678000
trusted library allocation
page read and write
12D7000
trusted library allocation
page execute and read and write
E50000
heap
page read and write
13BE000
heap
page read and write
1E75A644000
trusted library allocation
page read and write
2FC9000
trusted library allocation
page read and write
3817000
trusted library allocation
page read and write
1026000
trusted library allocation
page execute and read and write
BB7000
heap
page read and write
3641000
trusted library allocation
page read and write
E59000
stack
page read and write
387D000
trusted library allocation
page read and write
3721000
trusted library allocation
page read and write
33EB000
trusted library allocation
page read and write
39A4000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
2ABE000
stack
page read and write
3E51000
trusted library allocation
page read and write
37F4000
trusted library allocation
page read and write
30DB000
trusted library allocation
page read and write
524E000
stack
page read and write
1147000
heap
page read and write
3562000
trusted library allocation
page read and write
34FA000
trusted library allocation
page read and write
65967FB000
stack
page read and write
D85000
heap
page read and write
3391000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
3C38000
trusted library allocation
page read and write
ED0000
heap
page read and write
3716000
trusted library allocation
page read and write
3153000
trusted library allocation
page read and write
A43000
trusted library allocation
page execute and read and write
36F1000
trusted library allocation
page read and write
54C3000
heap
page read and write
5270000
heap
page read and write
3387000
trusted library allocation
page read and write
BBC000
heap
page read and write
61DE000
stack
page read and write
6340000
trusted library allocation
page execute and read and write
31E8000
trusted library allocation
page read and write
4C8A000
trusted library allocation
page read and write
53C5000
trusted library allocation
page read and write
19852334000
heap
page read and write
A80000
heap
page read and write
2E2D000
trusted library allocation
page read and write
4D8D000
stack
page read and write
44E3000
trusted library allocation
page read and write
BD5000
heap
page read and write
198522BB000
heap
page read and write
35FB000
trusted library allocation
page read and write
67CF27E000
unkown
page readonly
5E76000
trusted library allocation
page read and write
67CF4FE000
stack
page read and write
363B000
trusted library allocation
page read and write
2D2A000
trusted library allocation
page read and write
351E000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
3649000
trusted library allocation
page read and write
37FF000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
1E755040000
heap
page read and write
CF8000
stack
page read and write
564E000
stack
page read and write
34E8000
trusted library allocation
page read and write
13E7000
heap
page read and write
1E75527B000
heap
page read and write
16ED000
trusted library allocation
page execute and read and write
3363000
trusted library allocation
page read and write
57A5000
heap
page read and write
3054000
trusted library allocation
page read and write
1E75A90A000
heap
page read and write
2D2B000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
1300000
trusted library allocation
page execute and read and write
3671000
trusted library allocation
page read and write
BC7000
heap
page read and write
4C90000
trusted library allocation
page read and write
1040000
heap
page read and write
34DB000
trusted library allocation
page read and write
2532000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
5672000
heap
page read and write
2E56000
trusted library allocation
page read and write
362A000
trusted library allocation
page read and write
C02000
heap
page read and write
61C0000
heap
page read and write
35B3000
trusted library allocation
page read and write
330C000
trusted library allocation
page read and write
1E75A81E000
heap
page read and write
2CF9000
trusted library allocation
page read and write
178B000
trusted library allocation
page execute and read and write
5470000
heap
page read and write
566F000
heap
page read and write
3594000
trusted library allocation
page read and write
2B96000
trusted library allocation
page read and write
330E000
trusted library allocation
page read and write
359A000
trusted library allocation
page read and write
C2A000
heap
page read and write
D70000
heap
page read and write
384D000
trusted library allocation
page read and write
19852337000
heap
page read and write
162C000
stack
page read and write
5336000
trusted library allocation
page read and write
37B5000
trusted library allocation
page read and write
2E1C000
trusted library allocation
page read and write
1856000
trusted library allocation
page read and write
2EE9000
trusted library allocation
page read and write
38A4000
trusted library allocation
page read and write
1E755291000
heap
page read and write
389C000
trusted library allocation
page read and write
B9F000
heap
page read and write
BF4000
heap
page read and write
56FE000
stack
page read and write
33AA000
trusted library allocation
page read and write
59A0000
heap
page execute and read and write
35E2000
trusted library allocation
page read and write
10C0000
heap
page read and write
384B000
trusted library allocation
page read and write
2CE2000
trusted library allocation
page read and write
C0A000
heap
page read and write
1985230C000
heap
page read and write
13B0000
heap
page read and write
2CCE000
stack
page read and write
2FF3000
trusted library allocation
page read and write
133A000
heap
page read and write
B40000
heap
page read and write
3673000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
307E000
trusted library allocation
page read and write
364F000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
50BB000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
C32000
heap
page read and write
1E75A6D0000
trusted library allocation
page read and write
4C3D000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
3922000
trusted library allocation
page read and write
3496000
trusted library allocation
page read and write
19852332000
heap
page read and write
E1D000
trusted library allocation
page execute and read and write
1331000
heap
page read and write
599E000
stack
page read and write
39D2000
trusted library allocation
page read and write
B92000
heap
page read and write
2D7A000
trusted library allocation
page read and write
2CC4000
trusted library allocation
page read and write
16FA000
trusted library allocation
page execute and read and write
FD8000
stack
page read and write
1E755A15000
heap
page read and write
2CD0000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page execute and read and write
27187F30000
heap
page read and write
1854000
trusted library allocation
page read and write
3866000
trusted library allocation
page read and write
2CF0000
heap
page execute and read and write
2D1E000
stack
page read and write
2731000
trusted library allocation
page read and write
37BD000
trusted library allocation
page read and write
3864000
trusted library allocation
page read and write
2FC4000
trusted library allocation
page read and write
4E00000
heap
page read and write
7F0000
heap
page read and write
55B0000
remote allocation
page read and write
3522000
trusted library allocation
page read and write
4C16000
trusted library allocation
page read and write
F3E000
heap
page read and write
2E4E000
trusted library allocation
page read and write
2826000
trusted library allocation
page read and write
198522FC000
heap
page read and write
3560000
trusted library allocation
page read and write
35E4000
trusted library allocation
page read and write
3501000
trusted library allocation
page read and write
2E73000
trusted library allocation
page read and write
19852336000
heap
page read and write
68AB000
trusted library allocation
page read and write
3443000
trusted library allocation
page read and write
3739000
trusted library allocation
page read and write
1E7552B7000
heap
page read and write
F56000
heap
page read and write
9E4000
remote allocation
page execute and read and write
B58000
heap
page read and write
1E75A740000
trusted library allocation
page read and write
62EE000
stack
page read and write
1060000
trusted library allocation
page execute and read and write
2D89000
trusted library allocation
page read and write
301E000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
27188150000
heap
page read and write
579E000
heap
page read and write
13F2000
heap
page read and write
1002000
trusted library allocation
page read and write
387F000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
1482000
heap
page read and write
67CFF7E000
unkown
page readonly
2D65000
trusted library allocation
page read and write
2E48000
trusted library allocation
page read and write
151F000
heap
page read and write
67CF87E000
stack
page read and write
1280000
trusted library allocation
page read and write
2CC2000
trusted library allocation
page read and write
1E755020000
heap
page read and write
BCF000
heap
page read and write
346C000
trusted library allocation
page read and write
55FE000
stack
page read and write
1E75A917000
heap
page read and write
30B0000
heap
page read and write
305E000
trusted library allocation
page read and write
2E26000
trusted library allocation
page read and write
361C000
trusted library allocation
page read and write
34D5000
trusted library allocation
page read and write
2CC7000
trusted library allocation
page read and write
27187E20000
heap
page read and write
585E000
heap
page read and write
309B000
trusted library allocation
page read and write
30E0000
heap
page read and write
39BB000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
E4E000
stack
page read and write
AB0000
heap
page read and write
1E75A913000
heap
page read and write
34BD000
trusted library allocation
page read and write
26AE000
stack
page read and write
17EE000
stack
page read and write
37B3000
trusted library allocation
page read and write
B2B000
heap
page read and write
6AB000
stack
page read and write
35CD000
trusted library allocation
page read and write
3016000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
2F56000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
5420000
heap
page execute and read and write
3505000
trusted library allocation
page read and write
BB0000
heap
page read and write
57B6000
heap
page read and write
3376000
trusted library allocation
page read and write
67D007E000
unkown
page readonly
3547000
trusted library allocation
page read and write
3524000
trusted library allocation
page read and write
31C6000
trusted library allocation
page read and write
19852315000
heap
page read and write
2710000
trusted library allocation
page execute and read and write
2CDA000
trusted library allocation
page read and write
5E2E000
stack
page read and write
1318000
heap
page read and write
872000
heap
page read and write
369D000
trusted library allocation
page read and write
4F5F000
stack
page read and write
36FF000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
E24000
trusted library allocation
page read and write
3712000
trusted library allocation
page read and write
2E97000
trusted library allocation
page read and write
361A000
trusted library allocation
page read and write
5D23000
trusted library allocation
page read and write
6020000
trusted library allocation
page execute and read and write
36B5000
trusted library allocation
page read and write
1E75A859000
heap
page read and write
2EBE000
trusted library allocation
page read and write
BAE000
heap
page read and write
4D5B000
trusted library allocation
page read and write
F4B000
heap
page read and write
3097000
trusted library allocation
page read and write
1E75A750000
trusted library allocation
page read and write
C28000
heap
page read and write
5C22000
heap
page read and write
3669000
trusted library allocation
page read and write
1E755302000
heap
page read and write
50DD000
trusted library allocation
page read and write
C02000
heap
page read and write
19852342000
heap
page read and write
2F95000
trusted library allocation
page read and write
57A3000
heap
page read and write
34AE000
trusted library allocation
page read and write
335F000
trusted library allocation
page read and write
13E0000
heap
page read and write
30B0000
trusted library allocation
page read and write
D8D000
trusted library allocation
page execute and read and write
3BF9000
trusted library allocation
page read and write
C28000
heap
page read and write
5351000
trusted library allocation
page read and write
3424000
trusted library allocation
page read and write
1E755243000
heap
page read and write
57B6000
heap
page read and write
356D000
trusted library allocation
page read and write
2CC5000
trusted library allocation
page read and write
36E0000
trusted library allocation
page read and write
3603000
trusted library allocation
page read and write
403000
remote allocation
page execute and read and write
4D00000
heap
page read and write
2E44000
trusted library allocation
page read and write
C04000
heap
page read and write
2D46000
trusted library allocation
page read and write
B9F000
heap
page read and write
19852200000
heap
page read and write
5854000
heap
page read and write
1E755222000
heap
page read and write
D80000
trusted library allocation
page read and write
19852341000
heap
page read and write
BAB000
heap
page read and write
1E75A6E0000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
315B000
trusted library allocation
page read and write
4F3E000
stack
page read and write
356D000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
5B6F000
heap
page read and write
2C84000
trusted library allocation
page read and write
35A3000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
311E000
stack
page read and write
4DF0000
heap
page read and write
C1E000
heap
page read and write
3835000
trusted library allocation
page read and write
359D000
trusted library allocation
page read and write
2D04000
trusted library allocation
page read and write
643E000
stack
page read and write
3607000
trusted library allocation
page read and write
3618000
trusted library allocation
page read and write
3781000
trusted library allocation
page read and write
B90000
heap
page read and write
1E75A730000
trusted library allocation
page read and write
3642000
trusted library allocation
page read and write
BE9000
heap
page read and write
E40000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
1362000
trusted library allocation
page read and write
110E000
stack
page read and write
2CB2000
trusted library allocation
page read and write
BB7000
heap
page read and write
1376000
trusted library allocation
page execute and read and write
10E0000
trusted library allocation
page read and write
2D33000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
1E755C91000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
2EFE000
trusted library allocation
page read and write
35C3000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
B8E000
heap
page read and write
56BE000
heap
page read and write
5760000
trusted library allocation
page execute and read and write
31DF000
trusted library allocation
page read and write
354E000
trusted library allocation
page read and write
BE9000
heap
page read and write
599E000
stack
page read and write
1E75A866000
heap
page read and write
2CE8000
trusted library allocation
page read and write
12A3000
trusted library allocation
page execute and read and write
2F24000
trusted library allocation
page read and write
F66000
heap
page read and write
2DDA000
trusted library allocation
page read and write
633E000
stack
page read and write
BF6000
heap
page read and write
BE9000
heap
page read and write
2FF9000
trusted library allocation
page read and write
C0A000
heap
page read and write
10F3000
trusted library allocation
page execute and read and write
3549000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
2D9A000
trusted library allocation
page read and write
2DA8000
trusted library allocation
page read and write
357F000
trusted library allocation
page read and write
1E755279000
heap
page read and write
1E755B02000
heap
page read and write
412D000
trusted library allocation
page read and write
6015000
trusted library allocation
page read and write
1352000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
307C000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
DB0000
heap
page read and write
6660000
trusted library allocation
page read and write
19E0000
trusted library allocation
page read and write
10D0000
heap
page read and write
532E000
stack
page read and write
1032000
trusted library allocation
page read and write
37DD000
trusted library allocation
page read and write
57A3000
heap
page read and write
4DFE000
stack
page read and write
6890000
trusted library allocation
page read and write
346E000
trusted library allocation
page read and write
C0A000
heap
page read and write
3035000
trusted library allocation
page read and write
2D29000
trusted library allocation
page read and write
34E6000
trusted library allocation
page read and write
C1E000
heap
page read and write
5663000
heap
page read and write
C2A000
heap
page read and write
CF7000
stack
page read and write
3792000
trusted library allocation
page read and write
19852305000
heap
page read and write
BF6000
heap
page read and write
3041000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
F23000
heap
page read and write
3008000
trusted library allocation
page read and write
2C8B000
trusted library allocation
page read and write
26ED000
stack
page read and write
E20000
trusted library allocation
page read and write
BDA000
heap
page read and write
37FC000
trusted library allocation
page read and write
30FD000
heap
page read and write
3614000
trusted library allocation
page read and write
C04000
heap
page read and write
4131000
trusted library allocation
page read and write
34A4000
trusted library allocation
page read and write
2EDF000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
BF4000
heap
page read and write
3843000
trusted library allocation
page read and write
36B4000
trusted library allocation
page read and write
5B6E000
stack
page read and write
5397000
trusted library allocation
page read and write
338B000
trusted library allocation
page read and write
25AE000
stack
page read and write
1E75A8F0000
heap
page read and write
37AD000
trusted library allocation
page read and write
3558000
trusted library allocation
page read and write
50F1000
trusted library allocation
page read and write
3348000
trusted library allocation
page read and write
100B000
trusted library allocation
page execute and read and write
3001000
trusted library allocation
page read and write
5760000
heap
page read and write
E55000
trusted library allocation
page execute and read and write
558E000
stack
page read and write
10FD000
trusted library allocation
page execute and read and write
2C1F000
stack
page read and write
32DE000
stack
page read and write
3138000
trusted library allocation
page read and write
C1E000
heap
page read and write
2FA9000
trusted library allocation
page read and write
2F8C000
trusted library allocation
page read and write
2DB7000
trusted library allocation
page read and write
1E75A8DA000
heap
page read and write
19852332000
heap
page read and write
5E20000
trusted library allocation
page execute and read and write
3832000
trusted library allocation
page read and write
C0A000
heap
page read and write
2BAD000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
198522BF000
heap
page read and write
1E75A600000
trusted library allocation
page read and write
BDE000
heap
page read and write
19852250000
heap
page read and write
31CA000
trusted library allocation
page read and write
36AE000
trusted library allocation
page read and write
34F4000
trusted library allocation
page read and write
2EC2000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
1640000
heap
page read and write
1A30000
heap
page read and write
4D76000
trusted library allocation
page read and write
5C10000
trusted library allocation
page execute and read and write
35A7000
trusted library allocation
page read and write
19852337000
heap
page read and write
379C000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
301C000
trusted library allocation
page read and write
2EA7000
trusted library allocation
page read and write
36DA000
trusted library allocation
page read and write
13FF000
heap
page read and write
9B0000
heap
page read and write
2CC6000
trusted library allocation
page read and write
CB0000
heap
page read and write
2D31000
trusted library allocation
page read and write
35A3000
trusted library allocation
page read and write
C02000
heap
page read and write
3898000
trusted library allocation
page read and write
3830000
trusted library allocation
page read and write
4139000
trusted library allocation
page read and write
10F4000
trusted library allocation
page read and write
36F3000
trusted library allocation
page read and write
2D37000
trusted library allocation
page read and write
35AF000
trusted library allocation
page read and write
BF4000
heap
page read and write
30F9000
heap
page read and write
B99000
heap
page read and write
7A4000
stack
page read and write
10B0000
heap
page read and write
369B000
trusted library allocation
page read and write
5797000
heap
page read and write
C02000
heap
page read and write
1770000
trusted library allocation
page read and write
30F8000
heap
page read and write
2AE6000
trusted library allocation
page read and write
1830000
heap
page read and write
2FD0000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
E62000
heap
page read and write
66EE000
stack
page read and write
2D52000
trusted library allocation
page read and write
16D4000
trusted library allocation
page read and write
5E30000
trusted library allocation
page execute and read and write
5810000
trusted library allocation
page execute and read and write
367A000
trusted library allocation
page read and write
305C000
trusted library allocation
page read and write
3528000
trusted library allocation
page read and write
6425000
heap
page read and write
3733000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
19852348000
heap
page read and write
C3E000
heap
page read and write
42B3000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
99A000
stack
page read and write
60E0000
trusted library allocation
page read and write
33C7000
trusted library allocation
page read and write
517D000
stack
page read and write
FD0000
trusted library allocation
page read and write
C28000
heap
page read and write
672E000
stack
page read and write
2DA4000
trusted library allocation
page read and write
3815000
trusted library allocation
page read and write
B48000
heap
page read and write
5E68000
trusted library allocation
page read and write
38EE000
trusted library allocation
page read and write
333E000
trusted library allocation
page read and write
5370000
heap
page read and write
38A2000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
35EA000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
1E75525C000
heap
page read and write
2E00000
trusted library allocation
page read and write
6648000
trusted library allocation
page read and write
D10000
heap
page read and write
2830000
heap
page read and write
2F4E000
trusted library allocation
page read and write
57AE000
heap
page read and write
60EE000
stack
page read and write
E10000
trusted library allocation
page read and write
E4A000
trusted library allocation
page execute and read and write
2E22000
trusted library allocation
page read and write
4C78000
trusted library allocation
page read and write
362D000
trusted library allocation
page read and write
BE9000
heap
page read and write
6630000
trusted library allocation
page read and write
A90000
heap
page read and write
430D000
trusted library allocation
page read and write
15EE000
stack
page read and write
67D02FE000
stack
page read and write
1E75A640000
trusted library allocation
page read and write
26DE000
stack
page read and write
DEE000
stack
page read and write
5770000
trusted library allocation
page execute and read and write
570E000
stack
page read and write
1040000
heap
page read and write
1286000
trusted library allocation
page read and write
F43000
heap
page read and write
C2A000
heap
page read and write
A77000
trusted library allocation
page execute and read and write
34DD000
trusted library allocation
page read and write
4C66000
trusted library allocation
page read and write
5AA0000
heap
page read and write
2B78000
trusted library allocation
page read and write
3691000
trusted library allocation
page read and write
B92000
heap
page read and write
2C57000
trusted library allocation
page read and write
2FBF000
trusted library allocation
page read and write
99A000
stack
page read and write
C0A000
heap
page read and write
ED8000
heap
page read and write
13F0000
heap
page read and write
414000
remote allocation
page execute and read and write
C1E000
heap
page read and write
50DE000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
11A7000
heap
page read and write
103B000
trusted library allocation
page execute and read and write
1408000
heap
page read and write
309C000
trusted library allocation
page read and write
2CD2000
trusted library allocation
page read and write
615E000
stack
page read and write
C10000
heap
page read and write
4F68000
heap
page read and write
561C000
trusted library allocation
page read and write
1032000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
E91000
heap
page read and write
67D0E7E000
unkown
page readonly
158E000
stack
page read and write
50B9000
trusted library allocation
page read and write
3712000
trusted library allocation
page read and write
2F26000
trusted library allocation
page read and write
3346000
trusted library allocation
page read and write
102A000
trusted library allocation
page execute and read and write
2E71000
trusted library allocation
page read and write
37B9000
trusted library allocation
page read and write
2B01000
trusted library allocation
page read and write
1985230C000
heap
page read and write
3507000
trusted library allocation
page read and write
19852343000
heap
page read and write
30FD000
heap
page read and write
42E1000
trusted library allocation
page read and write
3579000
trusted library allocation
page read and write
3532000
trusted library allocation
page read and write
BCB000
heap
page read and write
B9C000
heap
page read and write
2ADE000
trusted library allocation
page read and write
50BE000
trusted library allocation
page read and write
D20000
heap
page read and write
331F000
trusted library allocation
page read and write
587E000
stack
page read and write
501E000
stack
page read and write
3402000
trusted library allocation
page read and write
FD5000
heap
page read and write
19852325000
heap
page read and write
34D9000
trusted library allocation
page read and write
36BA000
trusted library allocation
page read and write
364B000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
606E000
stack
page read and write
16C0000
trusted library allocation
page read and write
5FA0000
trusted library allocation
page read and write
35EA000
trusted library allocation
page read and write
3731000
trusted library allocation
page read and write
3564000
trusted library allocation
page read and write
19F0000
trusted library allocation
page read and write
E78000
heap
page read and write
379A000
trusted library allocation
page read and write
5430000
heap
page read and write
1387000
trusted library allocation
page execute and read and write
3579000
trusted library allocation
page read and write
3478000
trusted library allocation
page read and write
19852341000
heap
page read and write
C2A000
heap
page read and write
5E90000
trusted library allocation
page execute and read and write
69E0000
trusted library allocation
page execute and read and write
3568000
trusted library allocation
page read and write
13D0000
trusted library allocation
page execute and read and write
A10000
heap
page read and write
2DFF000
trusted library allocation
page read and write
358E000
trusted library allocation
page read and write
310C000
trusted library allocation
page read and write
35B2000
trusted library allocation
page read and write
33D6000
trusted library allocation
page read and write
2C77000
trusted library allocation
page read and write
2D44000
trusted library allocation
page read and write
408000
remote allocation
page execute and read and write
5D1F000
stack
page read and write
57B6000
heap
page read and write
573E000
stack
page read and write
BC8000
heap
page read and write
3738000
trusted library allocation
page read and write
4D62000
trusted library allocation
page read and write
2DE9000
trusted library allocation
page read and write
365D000
trusted library allocation
page read and write
C0A000
heap
page read and write
E46000
trusted library allocation
page execute and read and write
2550000
trusted library allocation
page read and write
2CB5000
trusted library allocation
page read and write
344D000
trusted library allocation
page read and write
342A000
trusted library allocation
page read and write
3404000
trusted library allocation
page read and write
1489000
heap
page read and write
67D0A7E000
unkown
page readonly
2D76000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
6670000
trusted library allocation
page execute and read and write
53F0000
trusted library allocation
page read and write
1E75A760000
trusted library allocation
page read and write
50CA000
trusted library allocation
page read and write
308E000
stack
page read and write
C70000
heap
page read and write
1E756050000
trusted library section
page readonly
36D1000
trusted library allocation
page read and write
C28000
heap
page read and write
34EC000
trusted library allocation
page read and write
365B000
trusted library allocation
page read and write
2DFB000
trusted library allocation
page read and write
614A000
trusted library allocation
page read and write
68B0000
trusted library allocation
page execute and read and write
351C000
trusted library allocation
page read and write
33BD000
trusted library allocation
page read and write
370E000
trusted library allocation
page read and write
BE9000
heap
page read and write
5150000
trusted library allocation
page read and write
3037000
trusted library allocation
page read and write
39B5000
trusted library allocation
page read and write
565A000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
35F0000
trusted library allocation
page read and write
2F04000
trusted library allocation
page read and write
2FBF000
stack
page read and write
3828000
trusted library allocation
page read and write
145D000
trusted library allocation
page execute and read and write
5130000
heap
page execute and read and write
4F6A000
heap
page read and write
1070000
heap
page read and write
31F2000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
C02000
heap
page read and write
39D4000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
386C000
trusted library allocation
page read and write
1E755B13000
heap
page read and write
1E75522B000
heap
page read and write
16D3000
trusted library allocation
page execute and read and write
4C10000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
1260000
heap
page read and write
101D000
trusted library allocation
page execute and read and write
575E000
stack
page read and write
E3D000
trusted library allocation
page execute and read and write
8E5000
heap
page read and write
59BE000
stack
page read and write
5A8E000
stack
page read and write
19854340000
heap
page read and write
BE3000
heap
page read and write
C0A000
heap
page read and write
369A000
trusted library allocation
page read and write
35BF000
trusted library allocation
page read and write
303F000
trusted library allocation
page read and write
35EE000
trusted library allocation
page read and write
114F000
stack
page read and write
C1E000
heap
page read and write
C2C000
heap
page read and write
2D9C000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
36A0000
trusted library allocation
page read and write
103C000
stack
page read and write
1E75A846000
heap
page read and write
BFA000
stack
page read and write
3417000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
51A0000
heap
page read and write
5A20000
heap
page execute and read and write
30A4000
trusted library allocation
page read and write
1E756060000
trusted library section
page readonly
30A1000
trusted library allocation
page read and write
1760000
trusted library allocation
page read and write
19852332000
heap
page read and write
2E27000
trusted library allocation
page read and write
153E000
stack
page read and write
B33000
trusted library allocation
page execute and read and write
2AC4000
trusted library allocation
page read and write
3916000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
3006000
trusted library allocation
page read and write
376B000
trusted library allocation
page read and write
535D000
trusted library allocation
page read and write
36BC000
trusted library allocation
page read and write
48CD000
stack
page read and write
5E9E000
stack
page read and write
385C000
trusted library allocation
page read and write
2FFD000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
30A8000
trusted library allocation
page read and write
29DD000
stack
page read and write
1E755A02000
heap
page read and write
F2D000
heap
page read and write
1440000
trusted library allocation
page read and write
379A000
trusted library allocation
page read and write
2CD0000
heap
page read and write
574E000
stack
page read and write
30FD000
heap
page read and write
33C3000
trusted library allocation
page read and write
3C69000
trusted library allocation
page read and write
5642000
trusted library allocation
page read and write
335B000
trusted library allocation
page read and write
2F65000
trusted library allocation
page read and write
1468000
heap
page read and write
1370000
trusted library allocation
page read and write
3489000
trusted library allocation
page read and write
2F69000
trusted library allocation
page read and write
19852342000
heap
page read and write
3571000
trusted library allocation
page read and write
1E755160000
trusted library section
page read and write
3F49000
trusted library allocation
page read and write
19852325000
heap
page read and write
C2A000
heap
page read and write
1382000
trusted library allocation
page read and write
38D4000
trusted library allocation
page read and write
36B6000
trusted library allocation
page read and write
198521D0000
heap
page read and write
3459000
trusted library allocation
page read and write
33E9000
trusted library allocation
page read and write
1439000
heap
page read and write
E57000
trusted library allocation
page execute and read and write
53B2000
trusted library allocation
page read and write
139E000
stack
page read and write
391C000
trusted library allocation
page read and write
19852340000
heap
page read and write
67D077E000
unkown
page readonly
2E46000
trusted library allocation
page read and write
E23000
trusted library allocation
page execute and read and write
2B81000
trusted library allocation
page read and write
19852311000
heap
page read and write
535E000
stack
page read and write
63F0000
heap
page read and write
3483000
trusted library allocation
page read and write
60FA000
trusted library allocation
page read and write
5631000
trusted library allocation
page read and write
50E2000
trusted library allocation
page read and write
3120000
heap
page execute and read and write
586E000
stack
page read and write
2D70000
heap
page read and write
3EDC000
trusted library allocation
page read and write
D6E000
stack
page read and write
4F90000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page read and write
55D0000
trusted library allocation
page execute and read and write
4C50000
heap
page read and write
2F50000
trusted library allocation
page read and write
1840000
trusted library allocation
page execute and read and write
30FE000
heap
page read and write
4C53000
heap
page read and write
2F84000
trusted library allocation
page read and write
19852340000
heap
page read and write
67CF0FE000
stack
page read and write
5620000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
3748000
trusted library allocation
page read and write
391A000
trusted library allocation
page read and write
3EB8000
trusted library allocation
page read and write
38B9000
trusted library allocation
page read and write
19852341000
heap
page read and write
338F000
trusted library allocation
page read and write
369E000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
3714000
trusted library allocation
page read and write
39BF000
trusted library allocation
page read and write
F58000
stack
page read and write
19852332000
heap
page read and write
BE3000
heap
page read and write
5FAA000
trusted library allocation
page read and write
E03000
trusted library allocation
page execute and read and write
C02000
heap
page read and write
51D0000
heap
page read and write
3453000
trusted library allocation
page read and write
363C000
trusted library allocation
page read and write
67CF1FD000
stack
page read and write
198521E0000
heap
page read and write
1E75A600000
trusted library allocation
page read and write
345D000
trusted library allocation
page read and write
34D3000
trusted library allocation
page read and write
67D0F7D000
stack
page read and write
D60000
heap
page read and write
3394000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
573E000
stack
page read and write
5797000
heap
page read and write
2A00000
trusted library allocation
page execute and read and write
67D147E000
unkown
page readonly
2D61000
trusted library allocation
page read and write
37F6000
trusted library allocation
page read and write
5810000
heap
page read and write
3003000
trusted library allocation
page read and write
41BC000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page read and write
545E000
stack
page read and write
37FA000
trusted library allocation
page read and write
510B000
trusted library allocation
page read and write
67D067E000
unkown
page readonly
EF7000
stack
page read and write
5970000
trusted library allocation
page read and write
DD0000
trusted library allocation
page execute and read and write
B40000
heap
page read and write
357F000
trusted library allocation
page read and write
38BF000
trusted library allocation
page read and write
1E755A00000
heap
page read and write
937000
stack
page read and write
A60000
heap
page read and write
1360000
trusted library allocation
page read and write
2EE7000
trusted library allocation
page read and write
5782000
heap
page read and write
34B9000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
31BC000
trusted library allocation
page read and write
1E75A8C9000
heap
page read and write
632E000
stack
page read and write
1460000
heap
page read and write
2B75000
trusted library allocation
page read and write
A77000
heap
page read and write
1E75A7A0000
remote allocation
page read and write
6090000
trusted library allocation
page read and write
391E000
trusted library allocation
page read and write
5EA2000
heap
page read and write
2D01000
trusted library allocation
page read and write
37D0000
trusted library allocation
page read and write
36A9000
trusted library allocation
page read and write
DB5000
heap
page read and write
B8E000
heap
page read and write
6680000
trusted library allocation
page execute and read and write
63C0000
trusted library allocation
page execute and read and write
3663000
trusted library allocation
page read and write
1356000
trusted library allocation
page execute and read and write
689E000
trusted library allocation
page read and write
67D027E000
unkown
page readonly
2FC3000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
C2A000
heap
page read and write
354C000
trusted library allocation
page read and write
303D000
trusted library allocation
page read and write
4D82000
trusted library allocation
page read and write
357B000
trusted library allocation
page read and write
2E6B000
trusted library allocation
page read and write
362B000
trusted library allocation
page read and write
67CFC7C000
stack
page read and write
2CDE000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
61EF000
stack
page read and write
3491000
trusted library allocation
page read and write
6663000
trusted library allocation
page read and write
307A000
trusted library allocation
page read and write
3603000
trusted library allocation
page read and write
30BE000
trusted library allocation
page read and write
662E000
stack
page read and write
67D05FE000
stack
page read and write
38B3000
trusted library allocation
page read and write
338D000
trusted library allocation
page read and write
35C7000
trusted library allocation
page read and write
B85000
heap
page read and write
40DD000
trusted library allocation
page read and write
BE9000
heap
page read and write
1740000
trusted library allocation
page execute and read and write
ADE000
stack
page read and write
3621000
trusted library allocation
page read and write
420000
remote allocation
page execute and read and write
B34000
trusted library allocation
page read and write
3457000
trusted library allocation
page read and write
2C87000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
597E000
trusted library allocation
page read and write
FB0000
heap
page read and write
333C000
trusted library allocation
page read and write
2EBF000
stack
page read and write
C2A000
heap
page read and write
1340000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
387B000
trusted library allocation
page read and write
3695000
trusted library allocation
page read and write
281D000
stack
page read and write
198522BF000
heap
page read and write
359A000
trusted library allocation
page read and write
3918000
trusted library allocation
page read and write
2FCB000
trusted library allocation
page read and write
1E755B1A000
heap
page read and write
2F3C000
trusted library allocation
page read and write
2D67000
trusted library allocation
page read and write
C28000
heap
page read and write
525E000
stack
page read and write
33CA000
trusted library allocation
page read and write
1540000
heap
page read and write
4C14000
trusted library allocation
page read and write
1E75A853000
heap
page read and write
3783000
trusted library allocation
page read and write
3601000
trusted library allocation
page read and write
36A2000
trusted library allocation
page read and write
2F43000
trusted library allocation
page read and write
52CD000
stack
page read and write
1475000
heap
page read and write
E9A000
heap
page read and write
198522CA000
heap
page read and write
55AE000
stack
page read and write
2E0E000
trusted library allocation
page read and write
29B0000
heap
page read and write
38A6000
trusted library allocation
page read and write
35AD000
trusted library allocation
page read and write
29AD000
stack
page read and write
2CAE000
trusted library allocation
page read and write
17A0000
trusted library allocation
page read and write
36DC000
trusted library allocation
page read and write
3083000
trusted library allocation
page read and write
AAE000
heap
page read and write
53CA000
trusted library allocation
page read and write
2D8B000
trusted library allocation
page read and write
2E8D000
trusted library allocation
page read and write
100D000
trusted library allocation
page execute and read and write
511A000
trusted library allocation
page read and write
57A7000
heap
page read and write
1350000
heap
page read and write
E04000
trusted library allocation
page read and write
3735000
trusted library allocation
page read and write
5E73000
trusted library allocation
page read and write
C1E000
heap
page read and write
3438000
trusted library allocation
page read and write
C28000
heap
page read and write
4499000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
102A000
trusted library allocation
page execute and read and write
2AD2000
trusted library allocation
page read and write
68C3000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
1348000
heap
page read and write
3064000
trusted library allocation
page read and write
1003000
trusted library allocation
page execute and read and write
67D0C7E000
unkown
page readonly
5159000
trusted library allocation
page read and write
4BEE000
stack
page read and write
3C53000
trusted library allocation
page read and write
2F17000
trusted library allocation
page read and write
1E755329000
heap
page read and write
2DF7000
trusted library allocation
page read and write
35CB000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
36DF000
trusted library allocation
page read and write
351A000
trusted library allocation
page read and write
99A000
stack
page read and write
36A4000
trusted library allocation
page read and write
1E75A8D0000
heap
page read and write
2EDD000
trusted library allocation
page read and write
1985232D000
heap
page read and write
1750000
heap
page read and write
135D000
trusted library allocation
page execute and read and write
1E75A8E9000
heap
page read and write
413000
remote allocation
page execute and read and write
1985231C000
heap
page read and write
1730000
heap
page execute and read and write
57F0000
trusted library allocation
page execute and read and write
2A7E000
stack
page read and write
1985230D000
heap
page read and write
4CC0000
trusted library allocation
page read and write
60F3000
trusted library allocation
page read and write
39DA000
trusted library allocation
page read and write
1E75A887000
heap
page read and write
405000
remote allocation
page execute and read and write
2F97000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
537E000
stack
page read and write
3434000
trusted library allocation
page read and write
1630000
trusted library allocation
page execute and read and write
E52000
trusted library allocation
page read and write
2FA1000
trusted library allocation
page read and write
300D000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
BC1000
heap
page read and write
2F8D000
trusted library allocation
page read and write
36D0000
trusted library allocation
page read and write
56D0000
heap
page read and write
3679000
trusted library allocation
page read and write
3436000
trusted library allocation
page read and write
1E75A750000
trusted library allocation
page read and write
36D2000
trusted library allocation
page read and write
2F8F000
trusted library allocation
page read and write
5800000
trusted library allocation
page execute and read and write
3596000
trusted library allocation
page read and write
31DD000
trusted library allocation
page read and write
2B9E000
stack
page read and write
2C88000
trusted library allocation
page read and write
2B62000
trusted library allocation
page read and write
19852340000
heap
page read and write
19853C20000
heap
page read and write
19854070000
heap
page read and write
376E000
trusted library allocation
page read and write
3511000
trusted library allocation
page read and write
37D9000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
BF4000
heap
page read and write
353D000
trusted library allocation
page read and write
BF4000
heap
page read and write
2CFF000
trusted library allocation
page read and write
5C40000
heap
page read and write
275D000
trusted library allocation
page read and write
5782000
heap
page read and write
38F0000
trusted library allocation
page read and write
2B93000
trusted library allocation
page read and write
E0D000
trusted library allocation
page execute and read and write
19852337000
heap
page read and write
68A0000
trusted library allocation
page read and write
2EFC000
trusted library allocation
page read and write
2A10000
heap
page read and write
5D20000
trusted library allocation
page read and write
3099000
trusted library allocation
page read and write
F90000
heap
page read and write
51A3000
heap
page read and write
367E000
trusted library allocation
page read and write
2D12000
trusted library allocation
page read and write
19DC000
stack
page read and write
389E000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
35AE000
trusted library allocation
page read and write
5070000
heap
page read and write
542E000
stack
page read and write
6780000
trusted library allocation
page execute and read and write
5875000
trusted library allocation
page read and write
FDD000
trusted library allocation
page execute and read and write
12BD000
trusted library allocation
page execute and read and write
2820000
trusted library allocation
page read and write
3163000
trusted library allocation
page read and write
11CE000
heap
page read and write
1170000
trusted library allocation
page read and write
D20000
heap
page read and write
34E1000
trusted library allocation
page read and write
BF4000
heap
page read and write
19852340000
heap
page read and write
4C31000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
2763000
trusted library allocation
page read and write
3025000
trusted library allocation
page read and write
E7A000
heap
page read and write
2EE3000
trusted library allocation
page read and write
B9F000
heap
page read and write
EFE000
heap
page read and write
598E000
stack
page read and write
2E31000
trusted library allocation
page read and write
353F000
trusted library allocation
page read and write
4F6B000
heap
page read and write
5BFD000
heap
page read and write
3887000
trusted library allocation
page read and write
2EAF000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
573E000
stack
page read and write
30C9000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
349A000
trusted library allocation
page read and write
1E755120000
heap
page read and write
4F68000
heap
page read and write
363D000
trusted library allocation
page read and write
636E000
stack
page read and write
370A000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
1E7565A0000
trusted library allocation
page read and write
4C1B000
trusted library allocation
page read and write
BD0000
heap
page read and write
596E000
stack
page read and write
136D000
trusted library allocation
page execute and read and write
31CE000
trusted library allocation
page read and write
34F8000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
533E000
trusted library allocation
page read and write
379C000
trusted library allocation
page read and write
FD0000
heap
page read and write
1270000
trusted library allocation
page execute and read and write
3649000
trusted library allocation
page read and write
37F2000
trusted library allocation
page read and write
3A11000
trusted library allocation
page read and write
3321000
trusted library allocation
page read and write
C1E000
heap
page read and write
3517000
trusted library allocation
page read and write
16F0000
trusted library allocation
page read and write
2C94000
trusted library allocation
page read and write
3513000
trusted library allocation
page read and write
67D127E000
unkown
page readonly
37AD000
trusted library allocation
page read and write
374A000
trusted library allocation
page read and write
128C000
stack
page read and write
10F0000
trusted library allocation
page read and write
53A8000
trusted library allocation
page read and write
1E755296000
heap
page read and write
2CCD000
trusted library allocation
page read and write
2D9E000
trusted library allocation
page read and write
3564000
trusted library allocation
page read and write
135A000
trusted library allocation
page execute and read and write
2E6D000
trusted library allocation
page read and write
5E3F000
stack
page read and write
2ABD000
stack
page read and write
43CC000
trusted library allocation
page read and write
1454000
trusted library allocation
page read and write
2CCB000
trusted library allocation
page read and write
4C64000
trusted library allocation
page read and write
350F000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
19852325000
heap
page read and write
2ACE000
trusted library allocation
page read and write
2E28000
trusted library allocation
page read and write
2D1A000
trusted library allocation
page read and write
36F7000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
19852336000
heap
page read and write
2DB3000
trusted library allocation
page read and write
2E1D000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
182D000
stack
page read and write
67D01FE000
stack
page read and write
1780000
trusted library allocation
page read and write
A30000
heap
page read and write
53E0000
trusted library allocation
page read and write
3645000
trusted library allocation
page read and write
5E50000
trusted library allocation
page execute and read and write
808000
heap
page read and write
34DF000
trusted library allocation
page read and write
3675000
trusted library allocation
page read and write
296E000
stack
page read and write
B70000
heap
page read and write
BB2000
heap
page read and write
BC6000
heap
page read and write
3625000
trusted library allocation
page read and write
2B83000
trusted library allocation
page read and write
2F73000
trusted library allocation
page read and write
2D29000
trusted library allocation
page read and write
E42000
trusted library allocation
page read and write
38EA000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
1E75A902000
heap
page read and write
3329000
trusted library allocation
page read and write
1E75A8FF000
heap
page read and write
538C000
trusted library allocation
page read and write
6153000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
34C9000
trusted library allocation
page read and write
1E75528F000
heap
page read and write
4F64000
heap
page read and write
19854350000
heap
page read and write
3470000
trusted library allocation
page read and write
2F69000
trusted library allocation
page read and write
2F02000
trusted library allocation
page read and write
19852301000
heap
page read and write
36F3000
trusted library allocation
page read and write
2E92000
trusted library allocation
page read and write
5A60000
heap
page read and write
30AA000
trusted library allocation
page read and write
3647000
trusted library allocation
page read and write
BAD000
heap
page read and write
C2A000
heap
page read and write
4F65000
heap
page read and write
5386000
trusted library allocation
page read and write
A6A000
heap
page read and write
2CFD000
trusted library allocation
page read and write
5D9E000
stack
page read and write
60F0000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
2F19000
trusted library allocation
page read and write
2D63000
trusted library allocation
page read and write
597A000
trusted library allocation
page read and write
2E4C000
trusted library allocation
page read and write
3592000
trusted library allocation
page read and write
5A1E000
stack
page read and write
8B0000
heap
page read and write
1020000
trusted library allocation
page read and write
51C0000
heap
page read and write
2E30000
heap
page execute and read and write
352A000
trusted library allocation
page read and write
DD1C5AF000
stack
page read and write
1985232A000
heap
page read and write
137A000
trusted library allocation
page execute and read and write
5B6C000
heap
page read and write
1E75A630000
trusted library allocation
page read and write
2AED000
trusted library allocation
page read and write
1090000
heap
page read and write
136B000
trusted library allocation
page execute and read and write
DD1C87F000
stack
page read and write
F0A000
heap
page read and write
A5D000
heap
page read and write
371D000
trusted library allocation
page read and write
36B7000
trusted library allocation
page read and write
60E6000
trusted library allocation
page read and write
13BD000
heap
page read and write
39C1000
trusted library allocation
page read and write
67CED8B000
stack
page read and write
C28000
heap
page read and write
33B9000
trusted library allocation
page read and write
36E2000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
404000
remote allocation
page execute and read and write
37B5000
trusted library allocation
page read and write
5A50000
heap
page read and write
12A4000
trusted library allocation
page read and write
355C000
trusted library allocation
page read and write
C28000
heap
page read and write
5782000
heap
page read and write
BE9000
heap
page read and write
313C000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
2F1F000
trusted library allocation
page read and write
355A000
trusted library allocation
page read and write
BE9000
heap
page read and write
2B45000
trusted library allocation
page read and write
67CF377000
stack
page read and write
65AE000
stack
page read and write
54C0000
heap
page read and write
DE0000
trusted library allocation
page read and write
1453000
trusted library allocation
page execute and read and write
39B7000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
68A6000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
3879000
trusted library allocation
page read and write
1E75A5E0000
trusted library allocation
page read and write
37AF000
trusted library allocation
page read and write
330A000
trusted library allocation
page read and write
34E4000
trusted library allocation
page read and write
3543000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
B98000
heap
page read and write
57EA000
heap
page read and write
13B9000
heap
page read and write
2AC6000
trusted library allocation
page read and write
5E66000
trusted library allocation
page read and write
6595B29000
stack
page read and write
3710000
trusted library allocation
page read and write
3323000
trusted library allocation
page read and write
36CA000
trusted library allocation
page read and write
2F06000
trusted library allocation
page read and write
1027000
trusted library allocation
page execute and read and write
6870000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
3378000
trusted library allocation
page read and write
271880F0000
heap
page read and write
BF4000
heap
page read and write
BCB000
heap
page read and write
4D5E000
trusted library allocation
page read and write
C02000
heap
page read and write
1E755213000
heap
page read and write
2BB4000
trusted library allocation
page read and write
3372000
trusted library allocation
page read and write
D80000
heap
page read and write
350D000
trusted library allocation
page read and write
4D6E000
trusted library allocation
page read and write
E9E000
stack
page read and write
3344000
trusted library allocation
page read and write
2C39000
trusted library allocation
page read and write
351E000
trusted library allocation
page read and write
2CBF000
trusted library allocation
page read and write
35FB000
trusted library allocation
page read and write
B3D000
trusted library allocation
page execute and read and write
3752000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
5837000
heap
page read and write
198522E2000
heap
page read and write
3575000
trusted library allocation
page read and write
4D56000
trusted library allocation
page read and write
1985231C000
heap
page read and write
198522BB000
heap
page read and write
67CFFFE000
stack
page read and write
3151000
trusted library allocation
page read and write
19852342000
heap
page read and write
3415000
trusted library allocation
page read and write
C02000
heap
page read and write
2CD0000
trusted library allocation
page read and write
4E5E000
stack
page read and write
198522C3000
heap
page read and write
3677000
trusted library allocation
page read and write
50D6000
trusted library allocation
page read and write
3661000
trusted library allocation
page read and write
1868000
trusted library allocation
page read and write
2DCC000
trusted library allocation
page read and write
2D2D000
trusted library allocation
page read and write
379F000
trusted library allocation
page read and write
253B000
trusted library allocation
page execute and read and write
33FE000
trusted library allocation
page read and write
26F0000
heap
page read and write
35D1000
trusted library allocation
page read and write
C28000
heap
page read and write
B74000
heap
page read and write
664B000
trusted library allocation
page read and write
3605000
trusted library allocation
page read and write
2B5C000
trusted library allocation
page read and write
B8F000
stack
page read and write
3796000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
C28000
heap
page read and write
2E23000
trusted library allocation
page read and write
4F68000
heap
page read and write
C2A000
heap
page read and write
A4D000
trusted library allocation
page execute and read and write
3526000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
C0A000
heap
page read and write
50FD000
trusted library allocation
page read and write
334A000
trusted library allocation
page read and write
65965FE000
stack
page read and write
3A92000
trusted library allocation
page read and write
2F36000
trusted library allocation
page read and write
30C7000
trusted library allocation
page read and write
50FE000
stack
page read and write
3796000
trusted library allocation
page read and write
2F07000
trusted library allocation
page read and write
BAD000
heap
page read and write
3862000
trusted library allocation
page read and write
EF9000
heap
page read and write
36BD000
trusted library allocation
page read and write
2B7D000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
B8F000
heap
page read and write
DAE000
stack
page read and write
2B68000
trusted library allocation
page read and write
5490000
trusted library allocation
page execute and read and write
584E000
stack
page read and write
19852343000
heap
page read and write
5750000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
2B6C000
trusted library allocation
page read and write
36C3000
trusted library allocation
page read and write
38BD000
trusted library allocation
page read and write
36DA000
trusted library allocation
page read and write
3493000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
3714000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
331B000
trusted library allocation
page read and write
36DD000
trusted library allocation
page read and write
3C73000
trusted library allocation
page read and write
36F1000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
3624000
trusted library allocation
page read and write
5460000
heap
page read and write
1860000
trusted library allocation
page read and write
2AF8000
trusted library allocation
page read and write
36EF000
trusted library allocation
page read and write
1870000
heap
page read and write
3798000
trusted library allocation
page read and write
19852337000
heap
page read and write
3086000
trusted library allocation
page read and write
19852340000
heap
page read and write
11A0000
heap
page read and write
3577000
trusted library allocation
page read and write
589E000
stack
page read and write
631F000
stack
page read and write
58C0000
trusted library section
page read and write
363F000
trusted library allocation
page read and write
332B000
trusted library allocation
page read and write
BE9000
heap
page read and write
34F2000
trusted library allocation
page read and write
36D7000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
19852334000
heap
page read and write
355E000
trusted library allocation
page read and write
51EE000
stack
page read and write
60A0000
trusted library allocation
page execute and read and write
35F5000
trusted library allocation
page read and write
2D14000
trusted library allocation
page read and write
BE9000
heap
page read and write
5ACE000
stack
page read and write
36BB000
trusted library allocation
page read and write
BBB000
heap
page read and write
6E80000
heap
page read and write
2F2E000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
3A39000
trusted library allocation
page read and write
5108000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
2F55000
trusted library allocation
page read and write
35E8000
trusted library allocation
page read and write
5F1C000
stack
page read and write
37B7000
trusted library allocation
page read and write
C02000
heap
page read and write
2FAA000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
C6E000
stack
page read and write
2B4D000
trusted library allocation
page read and write
31E5000
trusted library allocation
page read and write
3487000
trusted library allocation
page read and write
362F000
trusted library allocation
page read and write
303B000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
BD1000
heap
page read and write
1985230B000
heap
page read and write
3592000
trusted library allocation
page read and write
3699000
trusted library allocation
page read and write
FB1000
heap
page read and write
521E000
stack
page read and write
7D8000
heap
page read and write
2E29000
trusted library allocation
page read and write
BE9000
heap
page read and write
1350000
trusted library allocation
page read and write
4E1F000
stack
page read and write
2F6F000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
740000
heap
page read and write
67D0D7B000
stack
page read and write
67CF57E000
unkown
page readonly
2C49000
trusted library allocation
page read and write
BE9000
heap
page read and write
A7A000
trusted library allocation
page execute and read and write
19852332000
heap
page read and write
19852220000
heap
page read and write
5655000
trusted library allocation
page read and write
355C000
trusted library allocation
page read and write
BF4000
heap
page read and write
3868000
trusted library allocation
page read and write
BE3000
heap
page read and write
382C000
trusted library allocation
page read and write
40B1000
trusted library allocation
page read and write
7CC000
stack
page read and write
A9E000
heap
page read and write
5230000
trusted library section
page read and write
37CE000
trusted library allocation
page read and write
2537000
trusted library allocation
page execute and read and write
3AA8000
trusted library allocation
page read and write
2D19000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
5D95000
trusted library allocation
page read and write
309E000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
ECD000
heap
page read and write
5A80000
trusted library allocation
page execute and read and write
C04000
heap
page read and write
2F3E000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
33E3000
trusted library allocation
page read and write
3383000
trusted library allocation
page read and write
584A000
heap
page read and write
13B0000
heap
page read and write
2DCA000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
31E3000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
2DC1000
trusted library allocation
page read and write
559F000
stack
page read and write
35B5000
trusted library allocation
page read and write
1E755B1A000
heap
page read and write
3697000
trusted library allocation
page read and write
5600000
heap
page read and write
12A0000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
60D0000
trusted library allocation
page execute and read and write
621E000
stack
page read and write
19852336000
heap
page read and write
57E0000
trusted library allocation
page execute and read and write
1022000
trusted library allocation
page read and write
2B09000
trusted library allocation
page read and write
EAC000
heap
page read and write
2DB9000
trusted library allocation
page read and write
1985231D000
heap
page read and write
67D00FE000
stack
page read and write
2CE6000
trusted library allocation
page read and write
D30000
heap
page read and write
507E000
stack
page read and write
4D54000
trusted library allocation
page read and write
361E000
trusted library allocation
page read and write
19852307000
heap
page read and write
16A0000
heap
page read and write
177A000
trusted library allocation
page execute and read and write
3933000
trusted library allocation
page read and write
F2D000
heap
page read and write
2EA5000
trusted library allocation
page read and write
1E756070000
trusted library section
page readonly
547D000
stack
page read and write
2EA3000
trusted library allocation
page read and write
1E7559E0000
trusted library allocation
page read and write
37F0000
trusted library allocation
page read and write
1E7552A1000
heap
page read and write
4CB0000
trusted library allocation
page read and write
2BB6000
trusted library allocation
page read and write
5770000
heap
page read and write
6650000
trusted library allocation
page execute and read and write
198522CD000
heap
page read and write
3325000
trusted library allocation
page read and write
2F34000
trusted library allocation
page read and write
730000
unkown
page readonly
E28000
heap
page read and write
2E2E000
stack
page read and write
352E000
trusted library allocation
page read and write
57F2000
heap
page read and write
1365000
trusted library allocation
page execute and read and write
3359000
trusted library allocation
page read and write
FD3000
trusted library allocation
page execute and read and write
67D037E000
unkown
page readonly
2DA2000
trusted library allocation
page read and write
BD1000
heap
page read and write
1284000
trusted library allocation
page read and write
60F6000
trusted library allocation
page read and write
1160000
heap
page read and write
2E10000
trusted library allocation
page read and write
EA9000
heap
page read and write
36F7000
trusted library allocation
page read and write
35D3000
trusted library allocation
page read and write
60AE000
stack
page read and write
3143000
trusted library allocation
page read and write
2CF7000
trusted library allocation
page read and write
2759000
trusted library allocation
page read and write
2F11000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
2DDE000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
2FA5000
trusted library allocation
page read and write
BD6000
heap
page read and write
2D16000
trusted library allocation
page read and write
C28000
heap
page read and write
663A000
trusted library allocation
page read and write
3598000
trusted library allocation
page read and write
C02000
heap
page read and write
30BA000
trusted library allocation
page read and write
E5B000
trusted library allocation
page execute and read and write
13CE000
stack
page read and write
8D0000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
50B6000
trusted library allocation
page read and write
67D057B000
stack
page read and write
1E755B00000
heap
page read and write
12C7000
trusted library allocation
page execute and read and write
315D000
trusted library allocation
page read and write
65961FF000
stack
page read and write
142A000
heap
page read and write
2F54000
trusted library allocation
page read and write
5EB5000
trusted library allocation
page read and write
313A000
trusted library allocation
page read and write
2B85000
trusted library allocation
page read and write
372B000
trusted library allocation
page read and write
38B7000
trusted library allocation
page read and write
3798000
trusted library allocation
page read and write
3530000
trusted library allocation
page read and write
31DB000
trusted library allocation
page read and write
367D000
trusted library allocation
page read and write
2FE8000
trusted library allocation
page read and write
372D000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
1E756090000
trusted library section
page readonly
2530000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
19852337000
heap
page read and write
1137000
stack
page read and write
19852334000
heap
page read and write
5690000
trusted library allocation
page read and write
19852315000
heap
page read and write
1170000
heap
page read and write
27188010000
heap
page read and write
B9F000
heap
page read and write
5627000
trusted library allocation
page read and write
6BC0000
heap
page read and write
53A1000
trusted library allocation
page read and write
5668000
trusted library allocation
page read and write
8B6000
heap
page read and write
36D8000
trusted library allocation
page read and write
3755000
trusted library allocation
page read and write
67CFE7B000
stack
page read and write
3646000
trusted library allocation
page read and write
FD0000
heap
page read and write
39C3000
trusted library allocation
page read and write
1E7552FF000
heap
page read and write
3039000
trusted library allocation
page read and write
341F000
trusted library allocation
page read and write
1E756180000
trusted library allocation
page read and write
3503000
trusted library allocation
page read and write
34AA000
trusted library allocation
page read and write
BC9000
heap
page read and write
68CF000
trusted library allocation
page read and write
2E86000
trusted library allocation
page read and write
3374000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
7D0000
heap
page read and write
3537000
trusted library allocation
page read and write
30FD000
heap
page read and write
2D4A000
trusted library allocation
page read and write
61F3000
heap
page read and write
13D0000
heap
page read and write
1777000
trusted library allocation
page execute and read and write
583E000
stack
page read and write
BF4000
heap
page read and write
36DE000
trusted library allocation
page read and write
3ACD000
trusted library allocation
page read and write
A44000
trusted library allocation
page read and write
50F6000
trusted library allocation
page read and write
2A00000
heap
page execute and read and write
2D16000
trusted library allocation
page read and write
30FD000
heap
page read and write
10E0000
trusted library allocation
page read and write
10DE000
stack
page read and write
2FE6000
trusted library allocation
page read and write
309F000
trusted library allocation
page read and write
34FF000
trusted library allocation
page read and write
652D000
stack
page read and write
3727000
trusted library allocation
page read and write
2D5D000
trusted library allocation
page read and write
50E2000
trusted library allocation
page read and write
59DE000
stack
page read and write
67D017E000
unkown
page readonly
5D5E000
stack
page read and write
6646000
trusted library allocation
page read and write
2C3F000
trusted library allocation
page read and write
66AE000
stack
page read and write
6900000
trusted library allocation
page read and write
BDD000
heap
page read and write
2FC5000
trusted library allocation
page read and write
5770000
trusted library section
page read and write
307E000
trusted library allocation
page read and write
1E75A8C7000
heap
page read and write
5BAA000
heap
page read and write
14E2000
heap
page read and write
9FE000
stack
page read and write
3014000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page read and write
19852315000
heap
page read and write
2FCD000
trusted library allocation
page read and write
3A9C000
trusted library allocation
page read and write
2D64000
trusted library allocation
page read and write
83A000
stack
page read and write
B9F000
heap
page read and write
C1E000
heap
page read and write
16DD000
trusted library allocation
page execute and read and write
3662000
trusted library allocation
page read and write
14F0000
heap
page read and write
55C0000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
4D6E000
stack
page read and write
36D4000
trusted library allocation
page read and write
19852326000
heap
page read and write
C0A000
heap
page read and write
F70000
heap
page read and write
2B5E000
stack
page read and write
2E0A000
trusted library allocation
page read and write
3560000
trusted library allocation
page read and write
61E9000
heap
page read and write
2F6D000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
CA5000
heap
page read and write
35A9000
trusted library allocation
page read and write
1E75B000000
heap
page read and write
5480000
heap
page read and write
36EB000
trusted library allocation
page read and write
67D097E000
unkown
page readonly
3474000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
5EA8000
heap
page read and write
517E000
stack
page read and write
30F0000
heap
page read and write
1E75528D000
heap
page read and write
3F41000
trusted library allocation
page read and write
1037000
trusted library allocation
page execute and read and write
19852305000
heap
page read and write
3ED3000
trusted library allocation
page read and write
35D5000
trusted library allocation
page read and write
36F5000
trusted library allocation
page read and write
57B6000
heap
page read and write
199E000
stack
page read and write
57A5000
heap
page read and write
30BC000
trusted library allocation
page read and write
1245000
heap
page read and write
56EF000
stack
page read and write
3644000
trusted library allocation
page read and write
F50000
heap
page read and write
2D83000
trusted library allocation
page read and write
2D7B000
trusted library allocation
page read and write
B90000
heap
page read and write
3077000
trusted library allocation
page read and write
35B1000
trusted library allocation
page read and write
1E75A65E000
trusted library allocation
page read and write
3131000
trusted library allocation
page read and write
3594000
trusted library allocation
page read and write
3313000
trusted library allocation
page read and write
27187E28000
heap
page read and write
3058000
trusted library allocation
page read and write
2E2B000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
C2A000
heap
page read and write
3765000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
C02000
heap
page read and write
2FE4000
trusted library allocation
page read and write
C02000
heap
page read and write
BF4000
heap
page read and write
A20000
trusted library allocation
page read and write
1E75A630000
trusted library allocation
page read and write
52EF000
stack
page read and write
59BE000
stack
page read and write
36D5000
trusted library allocation
page read and write
1466000
heap
page read and write
43EC000
trusted library allocation
page read and write
3786000
trusted library allocation
page read and write
5ADE000
stack
page read and write
2B0D000
trusted library allocation
page read and write
5EDF000
stack
page read and write
1A20000
trusted library allocation
page read and write
859000
heap
page read and write
E71000
heap
page read and write
B45000
heap
page read and write
19852348000
heap
page read and write
31D3000
trusted library allocation
page read and write
35EF000
trusted library allocation
page read and write
2D8E000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
686E000
stack
page read and write
F80000
heap
page read and write
347A000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
2E63000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
36B9000
trusted library allocation
page read and write
32FE000
trusted library allocation
page read and write
2F6B000
trusted library allocation
page read and write
31C2000
trusted library allocation
page read and write
3052000
trusted library allocation
page read and write
36D6000
trusted library allocation
page read and write
2FE2000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
34D7000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
1367000
trusted library allocation
page execute and read and write
1387000
stack
page read and write
2D27000
trusted library allocation
page read and write
There are 2788 hidden memdumps, click here to show them.