IOC Report
adKGhCOOzg.exe

loading gif

Files

File Path
Type
Category
Malicious
adKGhCOOzg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\01cb5ea0-7f93-4a93-908b-352473040093.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\1aed32cf-2de1-4530-92b6-4347a499f45a.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\5607663c-c622-426c-855c-ef5fb85dae90.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\826f54c5c35521aef4aae8ba444affffb02e2dfd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\8636c2ce-b0e0-4557-b01c-75132397eb84.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\91745221-1208-4818-9185-e92567cf8b4d.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\9e72009f-739b-4ea4-b505-4e802e14614f.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\a838f51f-2608-4fa8-98f2-8c025efe4e1a.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\c1de1a4a-c903-48ef-a3ac-c4f3ffa7e9ae.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\c755c5ef-7934-4641-b1a5-88ef130986ad.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\d652d8e0-fd2b-4425-99bd-1792324a729f.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\edd106de-c4c6-4bbc-b780-ae6716fb30a7.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\f765102e-847e-4ba7-8e69-2cfb40b35d1c.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\suxlltqCa3.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\portcontainerRef\SurrogateContainerAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\portcontainerRef\myQbMgAKm.vbe
data
dropped
malicious
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SurrogateContainerAgent.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\zTShuhFeOCWKXCInUCSTgJmE.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\K0Xr29C3HF
ASCII text, with no line terminators
dropped
C:\portcontainerRef\2a821a36bead33
ASCII text, with very long lines (645), with no line terminators
dropped
C:\portcontainerRef\J34SCTDenq2CEriZjkOuf.bat
ASCII text, with no line terminators
dropped
\Device\Null
ASCII text
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\adKGhCOOzg.exe
"C:\Users\user\Desktop\adKGhCOOzg.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\portcontainerRef\myQbMgAKm.vbe"
malicious
C:\portcontainerRef\SurrogateContainerAgent.exe
"C:\portcontainerRef\SurrogateContainerAgent.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "zTShuhFeOCWKXCInUCSTgJmEz" /sc MINUTE /mo 14 /tr "'C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "zTShuhFeOCWKXCInUCSTgJmE" /sc ONLOGON /tr "'C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "zTShuhFeOCWKXCInUCSTgJmEz" /sc MINUTE /mo 11 /tr "'C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "zTShuhFeOCWKXCInUCSTgJmEz" /sc MINUTE /mo 7 /tr "'C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "zTShuhFeOCWKXCInUCSTgJmE" /sc ONLOGON /tr "'C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "zTShuhFeOCWKXCInUCSTgJmEz" /sc MINUTE /mo 5 /tr "'C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe'" /rl HIGHEST /f
malicious
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
malicious
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
malicious
C:\Windows\SysWOW64\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\d652d8e0-fd2b-4425-99bd-1792324a729f.vbs"
malicious
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
"C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\f765102e-847e-4ba7-8e69-2cfb40b35d1c.vbs"
malicious
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\a838f51f-2608-4fa8-98f2-8c025efe4e1a.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\edd106de-c4c6-4bbc-b780-ae6716fb30a7.vbs"
malicious
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\91745221-1208-4818-9185-e92567cf8b4d.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\5607663c-c622-426c-855c-ef5fb85dae90.vbs"
malicious
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\9e72009f-739b-4ea4-b505-4e802e14614f.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\8636c2ce-b0e0-4557-b01c-75132397eb84.vbs"
malicious
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\c1de1a4a-c903-48ef-a3ac-c4f3ffa7e9ae.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\1aed32cf-2de1-4530-92b6-4347a499f45a.vbs"
malicious
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\01cb5ea0-7f93-4a93-908b-352473040093.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\c755c5ef-7934-4641-b1a5-88ef130986ad.vbs"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\portcontainerRef\J34SCTDenq2CEriZjkOuf.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\suxlltqCa3.bat"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://a1025223.xsph.ru/d2e9d328.php?UJm7tEakW4DhlWwkna0hC=XFOwV2Tzt0&2132410dd3c9d0ed40475469f1dad04b=a4985c72318361485c5567463b9f03e9&5f975759356989d1a1cbaf57a59bcab1=AMiJGN0MDN0cjYwMGNmV2Y3UWOzADMiFjMkBTY0MTOllDOzETYyMGO&UJm7tEakW4DhlWwkna0hC=XFOwV2Tzt0
141.8.194.149
malicious
http://a1025223.xsph.ru/d2e9d328.php?TIhQfugI6qD9EGxcg3vTGUCLj6Y4Mi=5F3FLPT&2132410dd3c9d0ed40475469f1dad04b=a4985c72318361485c5567463b9f03e9&5f975759356989d1a1cbaf57a59bcab1=AMiJGN0MDN0cjYwMGNmV2Y3UWOzADMiFjMkBTY0MTOllDOzETYyMGO&TIhQfugI6qD9EGxcg3vTGUCLj6Y4Mi=5F3FLPT
141.8.194.149
malicious
http://a1025223.xsph.ru/d2e9d328.php?YyNDR3TlOsqwkTKEyKWhRDLsjJJiW2r=BuUiy1r4iQfw1ZDtv1bvF&2132410dd3c9d0ed40475469f1dad04b=a4985c72318361485c5567463b9f03e9&5f975759356989d1a1cbaf57a59bcab1=AMiJGN0MDN0cjYwMGNmV2Y3UWOzADMiFjMkBTY0MTOllDOzETYyMGO&YyNDR3TlOsqwkTKEyKWhRDLsjJJiW2r=BuUiy1r4iQfw1ZDtv1bvF
141.8.194.149
malicious
http://a1025223.xsph.ru/d2e9d328.php?uqxA755t6aUOPvdhb47UTU5K8HjMT=5kNUaRG0xjgAsz&2132410dd3c9d0ed40475469f1dad04b=a4985c72318361485c5567463b9f03e9&5f975759356989d1a1cbaf57a59bcab1=AMiJGN0MDN0cjYwMGNmV2Y3UWOzADMiFjMkBTY0MTOllDOzETYyMGO&uqxA755t6aUOPvdhb47UTU5K8HjMT=5kNUaRG0xjgAsz
141.8.194.149
malicious
http://a1025223.xsph.ru/d2e9d328.php?jMy2l9ofssClq5c0mtSKS5eB=aT8&ypKouMyQik=1N3uV2MDdEMLW&bosx0LppM3C276sojEJ5=FCtpJNQfNme&2132410dd3c9d0ed40475469f1dad04b=a4985c72318361485c5567463b9f03e9&5f975759356989d1a1cbaf57a59bcab1=AMiJGN0MDN0cjYwMGNmV2Y3UWOzADMiFjMkBTY0MTOllDOzETYyMGO&jMy2l9ofssClq5c0mtSKS5eB=aT8&ypKouMyQik=1N3uV2MDdEMLW&bosx0LppM3C276sojEJ5=FCtpJNQfNme
141.8.194.149
malicious
http://a1025223.xsph.ru/d2e9d328.php?4acnMu3AiXjx7W4g=3wYdYqeqdVKTtaR4nW1a6PqTDmuH&XER5ENhWA=u76tZtrz6R2UADF6n&EZw5=aFR3YoMuimzGc&2132410dd3c9d0ed40475469f1dad04b=a4985c72318361485c5567463b9f03e9&5f975759356989d1a1cbaf57a59bcab1=AMiJGN0MDN0cjYwMGNmV2Y3UWOzADMiFjMkBTY0MTOllDOzETYyMGO&4acnMu3AiXjx7W4g=3wYdYqeqdVKTtaR4nW1a6PqTDmuH&XER5ENhWA=u76tZtrz6R2UADF6n&EZw5=aFR3YoMuimzGc
141.8.194.149
malicious
https://cp.sprinthost.ru
unknown
https://index.from.sh/pages/game.html
unknown
http://a1025223.xsph.ru/d2e9d328.php?4acnMu3AiXjx7W4g=3wYdYqeqdVKTtaR4nW1a6PqTDmuH&XER5ENhWA=u76tZtr
unknown
http://a1025223.xsph.ru/d2e9d328.php?UJm7tEakW4DhlWwkna0hC=XFOwV2Tzt0&2132410dd3c9d0ed40475469f1dad0
unknown
https://cp.sprinthost.ru/auth/login
unknown
http://a1025223.xsph.ru/
unknown
http://a1025223.xsph.ru/d2e9d328.php?YyNDR3TlOsqwkTKEyKWhRDLsjJJiW2r=BuUiy1r4iQfw1ZDtv1bvF&2132410dd
unknown
http://a1025223.xsph.ru
unknown
http://a1025223.xsph.ru/d2e9d328.php?uqxA755t6aUOPvdhb47UTU5K8HjMT=5kNUaRG0xjgAsz&2132410dd3c9d0ed40
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://a1025223.xsph.ru/d2e9d328.php?jMy2l9ofssClq5c0mtSKS5eB=aT8&ypKouMyQik=1N3uV2MDdEMLW&bosx0LppM
unknown
http://a1025223.xsph.ru/d2e9d328.php?TIhQfugI6qD9EGxcg3vTGUCLj6Y4Mi=5F3FLPT&2132410dd3c9d0ed40475469
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
a1025223.xsph.ru
141.8.194.149
malicious

IPs

IP
Domain
Country
Malicious
141.8.194.149
a1025223.xsph.ru
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
PromptOnSecureDesktop
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
DisableTaskMgr
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\9bd8c94cb32b47b6f62d1f33c9e5fad2872c318d
4c3b5d21398a857e0a3a8f1e1bad462a06f3c5a6
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
FileDirectory
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3401000
trusted library allocation
page read and write
malicious
279D000
trusted library allocation
page read and write
malicious
2761000
trusted library allocation
page read and write
malicious
2EE0000
trusted library allocation
page read and write
malicious
2A51000
trusted library allocation
page read and write
malicious
3A28000
trusted library allocation
page read and write
malicious
2FF1000
trusted library allocation
page read and write
malicious
2AD1000
trusted library allocation
page read and write
malicious
2E91000
trusted library allocation
page read and write
malicious
3441000
trusted library allocation
page read and write
malicious
2AF0000
trusted library allocation
page read and write
malicious
1344D000
trusted library allocation
page read and write
malicious
DD0000
heap
page read and write
1CE5D000
stack
page read and write
152C9000
trusted library allocation
page read and write
14F4B0E6000
heap
page read and write
7FF887B20000
trusted library allocation
page read and write
7FF887C2E000
trusted library allocation
page read and write
2311689B000
heap
page read and write
2296A8D0000
heap
page read and write
3235000
heap
page read and write
133C8000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
2311688C000
heap
page read and write
7FF887BC2000
trusted library allocation
page read and write
1350C000
trusted library allocation
page read and write
1938597B000
heap
page read and write
7FF887D20000
trusted library allocation
page read and write
2F48000
trusted library allocation
page read and write
12EDD000
trusted library allocation
page read and write
2FD8000
heap
page read and write
7FF887C60000
trusted library allocation
page read and write
14F4B116000
heap
page read and write
7FF887C80000
trusted library allocation
page read and write
17AF000
stack
page read and write
1BE4C000
heap
page read and write
7FF887BC0000
trusted library allocation
page read and write
19385987000
heap
page read and write
13CE1000
trusted library allocation
page read and write
BAB7AFE000
stack
page read and write
1B82E000
stack
page read and write
2C32000
trusted library allocation
page read and write
2AE1000
trusted library allocation
page read and write
23116830000
heap
page read and write
C80000
heap
page read and write
1150000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
1C4A0000
trusted library section
page read and write
1BE50000
trusted library section
page read and write
22968BA2000
heap
page read and write
193859AA000
heap
page read and write
1BCE1000
stack
page read and write
225093B5000
heap
page read and write
7FF887CA2000
trusted library allocation
page read and write
7FF887A80000
trusted library allocation
page read and write
1C65C000
heap
page read and write
7FF887CD9000
trusted library allocation
page read and write
CAF000
stack
page read and write
23116847000
heap
page read and write
7FF887A98000
trusted library allocation
page read and write
1130000
heap
page read and write
7FF887C92000
trusted library allocation
page read and write
26AB911D000
heap
page read and write
175D000
heap
page read and write
CBC000
heap
page read and write
23116895000
heap
page read and write
26AB9151000
heap
page read and write
18E734B5000
heap
page read and write
7FF887C80000
trusted library allocation
page read and write
26AB9167000
heap
page read and write
3447000
trusted library allocation
page read and write
590C000
stack
page read and write
18E734AB000
heap
page read and write
22968B80000
heap
page read and write
384C000
trusted library allocation
page read and write
7FF887DFF000
trusted library allocation
page read and write
7FF887B9B000
trusted library allocation
page read and write
7FF435420000
trusted library allocation
page execute and read and write
18E7347A000
heap
page read and write
15F78000
trusted library allocation
page read and write
1732000
heap
page read and write
1C654000
heap
page read and write
7FF887E00000
trusted library allocation
page read and write
A8568FE000
stack
page read and write
2F0D000
trusted library allocation
page read and write
7FF8879D4000
trusted library allocation
page read and write
1C4C0000
trusted library section
page read and write
1BACD000
heap
page read and write
18E73645000
heap
page read and write
7FF887C50000
trusted library allocation
page read and write
7FF8879D3000
trusted library allocation
page read and write
2FE5000
heap
page read and write
7FF887DCA000
trusted library allocation
page read and write
1BE79000
heap
page read and write
3A1000
unkown
page read and write
3007000
heap
page read and write
3076000
trusted library allocation
page read and write
12A51000
trusted library allocation
page read and write
1363C000
trusted library allocation
page read and write
7FF887B66000
trusted library allocation
page execute and read and write
1CEAE000
stack
page read and write
1AB10000
trusted library allocation
page read and write
3A4F000
trusted library allocation
page read and write
1BF8E000
stack
page read and write
1B807000
stack
page read and write
1C02D000
heap
page read and write
7FF887C40000
trusted library allocation
page read and write
2311683A000
heap
page read and write
1BCD7000
heap
page read and write
34E0000
heap
page read and write
1C8EE000
stack
page read and write
19D0000
heap
page read and write
7FF887E15000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
19BE000
stack
page read and write
7FF887BF9000
trusted library allocation
page read and write
18E7349B000
heap
page read and write
142E6000
trusted library allocation
page read and write
1BAD4000
heap
page read and write
7FF887AE0000
trusted library allocation
page execute and read and write
11DB000
heap
page read and write
18E7345D000
heap
page read and write
23436F90000
heap
page read and write
7FF887DA8000
trusted library allocation
page read and write
C60000
heap
page read and write
2F04000
trusted library allocation
page read and write
7FF887BA0000
trusted library allocation
page read and write
7FF8879E3000
trusted library allocation
page read and write
7FF887C50000
trusted library allocation
page read and write
1C087000
heap
page read and write
1CB58000
heap
page read and write
2FC5000
heap
page read and write
1600000
heap
page read and write
26AB90B5000
heap
page read and write
13E23000
trusted library allocation
page read and write
391E000
trusted library allocation
page read and write
7FF887D0C000
trusted library allocation
page read and write
11BE000
stack
page read and write
19385AF0000
heap
page read and write
7FF887A86000
trusted library allocation
page execute and read and write
2CAE000
trusted library allocation
page read and write
1D29D000
stack
page read and write
7FF887C40000
trusted library allocation
page read and write
1BECE000
stack
page read and write
9A0000
heap
page read and write
2F03000
trusted library allocation
page read and write
34EA000
heap
page read and write
D96000
stack
page read and write
23116898000
heap
page read and write
74C94FA000
stack
page read and write
26AB9152000
heap
page read and write
7FF887E17000
trusted library allocation
page read and write
14F4B0C6000
heap
page read and write
22CAC968000
heap
page read and write
7FF887D44000
trusted library allocation
page read and write
26AB916D000
heap
page read and write
2E46000
trusted library allocation
page read and write
14F4CDB0000
heap
page read and write
7FF887D40000
trusted library allocation
page read and write
1D4DD000
stack
page read and write
7FF887A50000
trusted library allocation
page read and write
130BA000
trusted library allocation
page read and write
1C361000
heap
page read and write
7FF887B26000
trusted library allocation
page read and write
BC970FE000
stack
page read and write
1BDBF000
heap
page read and write
1BA1C000
heap
page read and write
1C355000
heap
page read and write
2C16000
trusted library allocation
page read and write
18E73449000
heap
page read and write
23116899000
heap
page read and write
3939000
trusted library allocation
page read and write
7FF887BB0000
trusted library allocation
page read and write
7FF887C09000
trusted library allocation
page read and write
7FF887C40000
trusted library allocation
page read and write
2ACE000
stack
page read and write
18E7346C000
heap
page read and write
2C1B000
trusted library allocation
page read and write
22509220000
heap
page read and write
7FF887D1A000
trusted library allocation
page read and write
7FF8879CD000
trusted library allocation
page execute and read and write
2F80000
heap
page read and write
B1F000
heap
page read and write
26AB9151000
heap
page read and write
7FF8879C7000
trusted library allocation
page read and write
FEE000
stack
page read and write
C89000
heap
page read and write
A10000
heap
page read and write
26AB9131000
heap
page read and write
38A9000
trusted library allocation
page read and write
7FF887DE0000
trusted library allocation
page read and write
2BEF000
trusted library allocation
page read and write
2FDB000
heap
page read and write
139BC000
trusted library allocation
page read and write
1BBFE000
stack
page read and write
2FD7000
heap
page read and write
7FF887CDB000
trusted library allocation
page read and write
13EA4000
trusted library allocation
page read and write
7FF887DFF000
trusted library allocation
page read and write
1A85000
heap
page read and write
18E73449000
heap
page read and write
1C5E0000
trusted library section
page read and write
1D6F8000
heap
page read and write
5A0C000
stack
page read and write
26AB915C000
heap
page read and write
14F4B0E0000
heap
page read and write
23116885000
heap
page read and write
7FF887DC0000
trusted library allocation
page execute and read and write
7FF887C30000
trusted library allocation
page read and write
2311685E000
heap
page read and write
7FF887AA4000
trusted library allocation
page read and write
3826000
trusted library allocation
page read and write
57AC000
heap
page read and write
16F0000
heap
page read and write
7FF887A90000
trusted library allocation
page read and write
135F5000
trusted library allocation
page read and write
7FF887E12000
trusted library allocation
page read and write
1C620000
heap
page read and write
1BE80000
heap
page read and write
1198000
heap
page read and write
11BE000
stack
page read and write
7FF8879C0000
trusted library allocation
page read and write
5499FF000
stack
page read and write
1C34D000
heap
page read and write
26AB9153000
heap
page read and write
1CBAD000
stack
page read and write
2FC2000
heap
page read and write
12EB8000
trusted library allocation
page read and write
3475000
heap
page read and write
15EE000
stack
page read and write
13A5D000
trusted library allocation
page read and write
2C37000
trusted library allocation
page read and write
231185E0000
heap
page read and write
2D3E000
trusted library allocation
page read and write
26CB35F0000
heap
page read and write
274E000
stack
page read and write
132A8000
trusted library allocation
page read and write
23116889000
heap
page read and write
22CA9BA000
stack
page read and write
14F4B0DB000
heap
page read and write
C15000
heap
page read and write
1C525000
heap
page read and write
288F000
stack
page read and write
30AE000
trusted library allocation
page read and write
1AB00000
trusted library allocation
page read and write
1354D000
trusted library allocation
page read and write
F4E000
stack
page read and write
23116847000
heap
page read and write
3878000
trusted library allocation
page read and write
1BA40000
heap
page execute and read and write
D56000
heap
page read and write
302E000
trusted library allocation
page read and write
7FF887C2C000
trusted library allocation
page read and write
18E7346E000
heap
page read and write
22968AD0000
heap
page read and write
18E73471000
heap
page read and write
7FF887DF8000
trusted library allocation
page read and write
12EA1000
trusted library allocation
page read and write
14F4B115000
heap
page read and write
7FF887A8D000
trusted library allocation
page execute and read and write
1238000
heap
page read and write
3A2000
unkown
page readonly
22968BA2000
heap
page read and write
1B870000
heap
page execute and read and write
7FF887DF8000
trusted library allocation
page read and write
1BC07000
stack
page read and write
33781FF000
stack
page read and write
7FF887C50000
trusted library allocation
page read and write
CDB000
heap
page read and write
149BD000
trusted library allocation
page read and write
26AB9138000
heap
page read and write
2EB8000
trusted library allocation
page read and write
7FF8879D3000
trusted library allocation
page execute and read and write
7FF887CEA000
trusted library allocation
page read and write
1D19D000
stack
page read and write
18E73457000
heap
page read and write
7FF887CC9000
trusted library allocation
page read and write
7FF887B30000
trusted library allocation
page read and write
134E9000
trusted library allocation
page read and write
13BF000
stack
page read and write
1A790000
trusted library allocation
page read and write
7FF887BC7000
trusted library allocation
page execute and read and write
7FF887A8D000
trusted library allocation
page execute and read and write
7FF887B66000
trusted library allocation
page execute and read and write
18E73441000
heap
page read and write
1EA4AC20000
heap
page read and write
1CD4D000
stack
page read and write
1C8ED000
stack
page read and write
7FF887CFE000
trusted library allocation
page read and write
34B0000
heap
page read and write
3565000
trusted library allocation
page read and write
23116894000
heap
page read and write
13A11000
trusted library allocation
page read and write
2ABE000
stack
page read and write
12C3A000
trusted library allocation
page read and write
34E2000
heap
page read and write
7FF887C4C000
trusted library allocation
page read and write
D2D000
heap
page read and write
2FE3000
heap
page read and write
5510000
heap
page read and write
19385980000
heap
page read and write
F80000
heap
page execute and read and write
18E73491000
heap
page read and write
CF0000
heap
page read and write
1C191000
heap
page read and write
1CF2E000
stack
page read and write
7FF887C36000
trusted library allocation
page read and write
7FF887B66000
trusted library allocation
page execute and read and write
2ECE000
trusted library allocation
page read and write
1B30F000
stack
page read and write
1BD7D000
heap
page read and write
193859A6000
heap
page read and write
33DA000
trusted library allocation
page read and write
22CADFD000
stack
page read and write
7FF887E31000
trusted library allocation
page read and write
3007000
heap
page read and write
7FF887B50000
trusted library allocation
page read and write
7FF887BA0000
trusted library allocation
page read and write
2EDB000
trusted library allocation
page read and write
7FF887B36000
trusted library allocation
page read and write
18E73380000
heap
page read and write
397E000
trusted library allocation
page read and write
1BEEB000
stack
page read and write
7FF887C77000
trusted library allocation
page read and write
341000
unkown
page execute read
356D000
trusted library allocation
page read and write
15F871F0000
heap
page read and write
22968B87000
heap
page read and write
C40000
heap
page read and write
7FF887DBA000
trusted library allocation
page read and write
2311685E000
heap
page read and write
7FF887DC0000
trusted library allocation
page read and write
193859A6000
heap
page read and write
7FF887E52000
trusted library allocation
page read and write
7FF887B70000
trusted library allocation
page read and write
BD0000
heap
page read and write
14F4B0C6000
heap
page read and write
337797A000
stack
page read and write
7FF887B50000
trusted library allocation
page read and write
2311687E000
heap
page read and write
23116883000
heap
page read and write
7FF8879C0000
trusted library allocation
page read and write
7FF887CE0000
trusted library allocation
page read and write
7FF887BFB000
trusted library allocation
page read and write
3057000
trusted library allocation
page read and write
7FF8879DD000
trusted library allocation
page execute and read and write
1B78B000
heap
page read and write
2311684D000
heap
page read and write
18E7343C000
heap
page read and write
C78C67C000
stack
page read and write
7FF887C4B000
trusted library allocation
page read and write
1B72F000
stack
page read and write
14F4B0DD000
heap
page read and write
3542000
trusted library allocation
page read and write
7FF887DB0000
trusted library allocation
page read and write
22509240000
heap
page read and write
C30000
heap
page read and write
1938594C000
heap
page read and write
139F3000
trusted library allocation
page read and write
E9A000
heap
page read and write
D36000
heap
page read and write
3459000
heap
page read and write
522F000
stack
page read and write
9A304FE000
stack
page read and write
26AB917D000
heap
page read and write
7FF887BE0000
trusted library allocation
page read and write
1C410000
heap
page read and write
7FF887CDE000
trusted library allocation
page read and write
11E3000
heap
page read and write
7FF887C40000
trusted library allocation
page read and write
7FF887A9C000
trusted library allocation
page read and write
319D000
trusted library allocation
page read and write
1D18D000
stack
page read and write
7FF887A66000
trusted library allocation
page read and write
26AB9101000
heap
page read and write
19385980000
heap
page read and write
12955000
trusted library allocation
page read and write
14F4B0D9000
heap
page read and write
7FF887A7C000
trusted library allocation
page execute and read and write
26AB9165000
heap
page read and write
9A307FF000
stack
page read and write
7FF887D14000
trusted library allocation
page read and write
7FF887B56000
trusted library allocation
page execute and read and write
7FF887C3C000
trusted library allocation
page read and write
7FF887CD5000
trusted library allocation
page read and write
16C0000
heap
page read and write
14F4B108000
heap
page read and write
14F4B11E000
heap
page read and write
A856DFF000
stack
page read and write
3182000
trusted library allocation
page read and write
22CAE400000
heap
page read and write
7FF887CF0000
trusted library allocation
page read and write
7FF887D1C000
trusted library allocation
page read and write
7FF887BB8000
trusted library allocation
page read and write
2311685E000
heap
page read and write
3766000
trusted library allocation
page read and write
1BDEE000
stack
page read and write
3490000
trusted library allocation
page read and write
3007000
heap
page read and write
14F4B115000
heap
page read and write
18E73495000
heap
page read and write
18E7349A000
heap
page read and write
D06000
heap
page read and write
193859AE000
heap
page read and write
1BDC7000
heap
page read and write
7FF887CD2000
trusted library allocation
page read and write
551E000
stack
page read and write
DA0000
heap
page read and write
54C0000
heap
page read and write
131DA000
trusted library allocation
page read and write
11E0000
heap
page read and write
11F0000
trusted library allocation
page read and write
22968B6C000
heap
page read and write
26AB9151000
heap
page read and write
34E0000
heap
page read and write
7FF887B2C000
trusted library allocation
page execute and read and write
15F85850000
heap
page read and write
120D000
heap
page read and write
18E73490000
heap
page read and write
12CBA000
trusted library allocation
page read and write
1EA4ABF0000
heap
page read and write
2311685E000
heap
page read and write
3472000
heap
page read and write
7FF8879CC000
trusted library allocation
page read and write
7FF887AFA000
trusted library allocation
page execute and read and write
38B7000
heap
page read and write
12CC5000
trusted library allocation
page read and write
13A27000
trusted library allocation
page read and write
3460000
heap
page read and write
16066000
trusted library allocation
page read and write
EC2000
unkown
page readonly
3A49000
trusted library allocation
page read and write
1B904000
stack
page read and write
2FEE000
heap
page read and write
7FF8879D3000
trusted library allocation
page execute and read and write
7FF887A83000
trusted library allocation
page execute and read and write
1C36B000
heap
page read and write
1700000
heap
page read and write
7FF8879B4000
trusted library allocation
page read and write
1135000
heap
page read and write
13778000
trusted library allocation
page read and write
1C676000
heap
page read and write
13974000
trusted library allocation
page read and write
3410000
trusted library section
page read and write
D21000
heap
page read and write
7FF887E40000
trusted library allocation
page execute and read and write
23116894000
heap
page read and write
7FF887D12000
trusted library allocation
page read and write
13630000
trusted library allocation
page read and write
3200000
heap
page readonly
7FF887B36000
trusted library allocation
page read and write
345F000
trusted library allocation
page read and write
1C70F000
stack
page read and write
33782FF000
stack
page read and write
1C64A000
heap
page read and write
7FF887D70000
trusted library allocation
page read and write
14F4B115000
heap
page read and write
334E000
stack
page read and write
7FF887D60000
trusted library allocation
page execute and read and write
137F8000
trusted library allocation
page read and write
1C9EC000
stack
page read and write
26AB9166000
heap
page read and write
34E2000
heap
page read and write
22968BBB000
heap
page read and write
3970000
trusted library allocation
page read and write
193859A6000
heap
page read and write
26CB1CF5000
heap
page read and write
13CE000
stack
page read and write
7FF887D00000
trusted library allocation
page read and write
7FF887D24000
trusted library allocation
page read and write
12763000
trusted library allocation
page read and write
1C56E000
heap
page read and write
2C14000
trusted library allocation
page read and write
2ED4000
trusted library allocation
page read and write
B22000
heap
page read and write
17B0000
heap
page read and write
23116847000
heap
page read and write
7FF887CD2000
trusted library allocation
page read and write
7FF887E00000
trusted library allocation
page read and write
2311688C000
heap
page read and write
7FF887E50000
trusted library allocation
page execute and read and write
1D2D0000
heap
page read and write
23116A35000
heap
page read and write
2EEE000
stack
page read and write
1714000
heap
page read and write
7FF887A87000
trusted library allocation
page read and write
7FF4F3DF0000
trusted library allocation
page execute and read and write
7FF887A5C000
trusted library allocation
page execute and read and write
26AB9154000
heap
page read and write
14F4B0AB000
heap
page read and write
14F4B115000
heap
page read and write
26AB90E0000
heap
page read and write
26AB916D000
heap
page read and write
7FF887E40000
trusted library allocation
page read and write
3166000
stack
page read and write
1D3DE000
stack
page read and write
7FF887B90000
trusted library allocation
page read and write
2BC6000
trusted library allocation
page read and write
14F4B113000
heap
page read and write
7FF887C44000
trusted library allocation
page read and write
1D3DB000
stack
page read and write
A8569FE000
stack
page read and write
12E91000
trusted library allocation
page read and write
11C0000
heap
page read and write
1C5D0000
trusted library section
page read and write
15F85510000
heap
page read and write
7FF887AAD000
trusted library allocation
page execute and read and write
22968BB9000
heap
page read and write
134E1000
trusted library allocation
page read and write
1B32E000
stack
page read and write
7FF887A8C000
trusted library allocation
page execute and read and write
2CD6000
trusted library allocation
page read and write
57AE000
heap
page read and write
14F4B090000
heap
page read and write
26AB912E000
heap
page read and write
7FF887C70000
trusted library allocation
page read and write
B80000
heap
page read and write
1B460000
heap
page execute and read and write
26AB9130000
heap
page read and write
7FF8879D6000
trusted library allocation
page read and write
1B861000
stack
page read and write
15F0000
heap
page execute and read and write
7FF887C2B000
trusted library allocation
page read and write
2D3B000
stack
page read and write
14F4B117000
heap
page read and write
D85000
heap
page read and write
1C3A0000
heap
page read and write
7FF887D1F000
trusted library allocation
page read and write
7FF887B7B000
trusted library allocation
page read and write
139EC000
trusted library allocation
page read and write
19385953000
heap
page read and write
7FF887D14000
trusted library allocation
page read and write
3103000
trusted library allocation
page read and write
7FF887CB7000
trusted library allocation
page read and write
57CE000
stack
page read and write
34EA000
heap
page read and write
1630000
heap
page read and write
14F4AEB0000
heap
page read and write
361F000
stack
page read and write
7FF887B8B000
trusted library allocation
page read and write
1BE70000
heap
page execute and read and write
1C392000
heap
page read and write
7FF887AD0000
trusted library allocation
page execute and read and write
22968BA8000
heap
page read and write
23116891000
heap
page read and write
2CBA000
trusted library allocation
page read and write
1CC2D000
stack
page read and write
526A000
trusted library allocation
page read and write
18E733A0000
heap
page read and write
7FF887E60000
trusted library allocation
page execute and read and write
1435E000
trusted library allocation
page read and write
2311688F000
heap
page read and write
A50000
trusted library allocation
page read and write
2FDD000
heap
page read and write
23116830000
heap
page read and write
3007000
heap
page read and write
2C84000
trusted library allocation
page read and write
12E93000
trusted library allocation
page read and write
26CB1920000
heap
page read and write
2DD9000
trusted library allocation
page read and write
37E9000
trusted library allocation
page read and write
380E000
trusted library allocation
page read and write
14F4B107000
heap
page read and write
7FF887A9B000
trusted library allocation
page execute and read and write
1C07C000
heap
page read and write
1195000
heap
page read and write
7FF887AAB000
trusted library allocation
page execute and read and write
455CBFA000
stack
page read and write
139C3000
trusted library allocation
page read and write
22968B7D000
heap
page read and write
1C3CC000
heap
page read and write
57A0000
heap
page read and write
1D728000
heap
page read and write
7FF887D70000
trusted library allocation
page read and write
7FF887BB0000
trusted library allocation
page read and write
1CAF0000
heap
page read and write
1BFEE000
stack
page read and write
313D000
trusted library allocation
page read and write
CA0000
heap
page read and write
7FF8879A3000
trusted library allocation
page execute and read and write
17F0000
heap
page read and write
1BB0E000
stack
page read and write
120B000
heap
page read and write
18E734A9000
heap
page read and write
7FF887C00000
trusted library allocation
page read and write
1C4D6000
heap
page read and write
7FF8879B0000
trusted library allocation
page read and write
7FF887A56000
trusted library allocation
page read and write
1C490000
trusted library section
page read and write
7FF887AF0000
trusted library allocation
page execute and read and write
966000
stack
page read and write
3067000
trusted library allocation
page read and write
1C351000
heap
page read and write
A9B72FA000
stack
page read and write
3863000
trusted library allocation
page read and write
1CAEE000
stack
page read and write
1BD10000
heap
page read and write
1C630000
heap
page read and write
22CAC920000
heap
page read and write
12A5D000
trusted library allocation
page read and write
1CB32000
heap
page read and write
26AB9167000
heap
page read and write
269BDEDB000
heap
page read and write
1BD16000
heap
page read and write
7FF887CA7000
trusted library allocation
page read and write
34E0000
heap
page read and write
18E73496000
heap
page read and write
7FF887C80000
trusted library allocation
page read and write
7FF8879DB000
trusted library allocation
page execute and read and write
14F4B0DD000
heap
page read and write
32F0000
heap
page read and write
18E73496000
heap
page read and write
22968BC9000
heap
page read and write
1AF00000
trusted library allocation
page read and write
269BDC98000
heap
page read and write
AB0000
heap
page read and write
1C1BD000
stack
page read and write
11F5000
heap
page read and write
787A1FF000
stack
page read and write
3156000
stack
page read and write
7FF887AA6000
trusted library allocation
page execute and read and write
A70000
trusted library allocation
page read and write
7FF8879FB000
trusted library allocation
page execute and read and write
7FF887E17000
trusted library allocation
page read and write
7FF8879D7000
trusted library allocation
page read and write
12771000
trusted library allocation
page read and write
14F4B0B8000
heap
page read and write
2311687F000
heap
page read and write
7F0000
heap
page read and write
1BE4A000
heap
page read and write
BAB78FF000
stack
page read and write
38BB000
heap
page read and write
2EEE000
trusted library allocation
page read and write
7FF887CD8000
trusted library allocation
page read and write
1C30F000
stack
page read and write
193859BC000
heap
page read and write
FC0000
trusted library allocation
page read and write
C00000
heap
page read and write
2311684C000
heap
page read and write
22968B95000
heap
page read and write
7FF887C73000
trusted library allocation
page read and write
1BAEE000
stack
page read and write
1BC0D000
stack
page read and write
161B000
heap
page read and write
22968B30000
heap
page read and write
7FF887CD2000
trusted library allocation
page read and write
1340D000
trusted library allocation
page read and write
7FF887CFE000
trusted library allocation
page read and write
3455000
heap
page read and write
7FF887BB0000
trusted library allocation
page execute and read and write
E30000
heap
page read and write
7FF887CE0000
trusted library allocation
page read and write
E5D000
heap
page read and write
7FF887E60000
trusted library allocation
page execute and read and write
1BC70000
heap
page read and write
7FF887BA0000
trusted library allocation
page read and write
7FF887C71000
trusted library allocation
page read and write
14F6000
stack
page read and write
1B470000
trusted library allocation
page read and write
26AB917C000
heap
page read and write
1BD2A000
heap
page read and write
7FF887C34000
trusted library allocation
page read and write
CCD000
stack
page read and write
2E80000
heap
page execute and read and write
52B4000
heap
page read and write
26AB9167000
heap
page read and write
7FF887A74000
trusted library allocation
page read and write
149B0000
trusted library allocation
page read and write
7FF887B73000
trusted library allocation
page read and write
7FF887CE0000
trusted library allocation
page read and write
7FF8879E7000
trusted library allocation
page read and write
19385B50000
heap
page read and write
373000
unkown
page readonly
7FF887B60000
trusted library allocation
page read and write
7FF887A83000
trusted library allocation
page execute and read and write
7FF887A90000
trusted library allocation
page execute and read and write
512E000
stack
page read and write
143E000
stack
page read and write
14178000
trusted library allocation
page read and write
301B000
heap
page read and write
135EA000
trusted library allocation
page read and write
134F4000
trusted library allocation
page read and write
14F4B0B8000
heap
page read and write
7FF887AA0000
trusted library allocation
page read and write
15578000
trusted library allocation
page read and write
1210000
heap
page read and write
1554E000
trusted library allocation
page read and write
26CB1A20000
heap
page read and write
22509140000
heap
page read and write
14F4B115000
heap
page read and write
7FF887B90000
trusted library allocation
page read and write
13E7C000
trusted library allocation
page read and write
F95000
heap
page read and write
1035000
heap
page read and write
193859A1000
heap
page read and write
23116868000
heap
page read and write
C78C77E000
stack
page read and write
7FF887D70000
trusted library allocation
page read and write
2FDA000
heap
page read and write
14F4B100000
heap
page read and write
7FF887DB8000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
14815000
trusted library allocation
page read and write
52B0000
heap
page read and write
2C8F000
trusted library allocation
page read and write
380C000
trusted library allocation
page read and write
3173000
stack
page read and write
2311685A000
heap
page read and write
22CAC820000
heap
page read and write
3472000
heap
page read and write
7FF887B80000
trusted library allocation
page read and write
1D2D3000
heap
page read and write
13A94000
trusted library allocation
page read and write
18E734A0000
heap
page read and write
C90000
trusted library allocation
page read and write
7FF887B70000
trusted library allocation
page read and write
1C375000
heap
page read and write
7FF887E50000
trusted library allocation
page read and write
2D90000
heap
page read and write
13085000
trusted library allocation
page read and write
7FF887E42000
trusted library allocation
page read and write
1348C000
trusted library allocation
page read and write
7FF887A84000
trusted library allocation
page read and write
74C9AFE000
stack
page read and write
3511000
trusted library allocation
page read and write
CA0000
heap
page read and write
561E000
stack
page read and write
2CC8000
trusted library allocation
page read and write
1180000
heap
page read and write
DE0000
heap
page read and write
1B98D000
stack
page read and write
1BA30000
heap
page read and write
3818000
trusted library allocation
page read and write
1C31E000
stack
page read and write
269BDC20000
heap
page read and write
1C6CE000
stack
page read and write
7FF887D2E000
trusted library allocation
page read and write
7FF887D2E000
trusted library allocation
page read and write
7FF887C3B000
trusted library allocation
page read and write
2C8B000
trusted library allocation
page read and write
22968B51000
heap
page read and write
326F000
trusted library allocation
page read and write
BC96FFD000
stack
page read and write
7FF887A80000
trusted library allocation
page execute and read and write
2FCF000
heap
page read and write
1B64F000
stack
page read and write
A8565EA000
stack
page read and write
30E5000
trusted library allocation
page read and write
2F2D000
trusted library allocation
page read and write
1C580000
trusted library section
page read and write
3573000
trusted library allocation
page read and write
22CB2FF000
stack
page read and write
1C0C2000
stack
page read and write
2FE8000
heap
page read and write
1AE5C000
heap
page read and write
1C320000
heap
page read and write
7FF887B80000
trusted library allocation
page read and write
1B52A000
stack
page read and write
7FF887CC7000
trusted library allocation
page read and write
7FF887CA0000
trusted library allocation
page read and write
1B020000
trusted library allocation
page read and write
7FF887DE4000
trusted library allocation
page read and write
1C97E000
stack
page read and write
7FF887DB8000
trusted library allocation
page read and write
22968B89000
heap
page read and write
301E000
trusted library allocation
page read and write
1938596B000
heap
page read and write
1B80E000
stack
page read and write
22CAC930000
heap
page read and write
7FF887AC0000
trusted library allocation
page execute and read and write
7FF8879F0000
trusted library allocation
page read and write
3883000
trusted library allocation
page read and write
7FF887BA8000
trusted library allocation
page execute and read and write
F90000
heap
page read and write
7FF887D30000
trusted library allocation
page read and write
3074000
trusted library allocation
page read and write
7FF887C90000
trusted library allocation
page read and write
EEF000
heap
page read and write
1B9CD000
stack
page read and write
12E98000
trusted library allocation
page read and write
56A0000
heap
page read and write
BD0000
heap
page read and write
2C1D000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
3420000
heap
page read and write
2E1D000
stack
page read and write
1B90E000
stack
page read and write
2311682B000
heap
page read and write
7FF887B93000
trusted library allocation
page read and write
26ABAB80000
heap
page read and write
1C35D000
heap
page read and write
1AE4000
heap
page read and write
7FF887C20000
trusted library allocation
page read and write
7FF887C43000
trusted library allocation
page read and write
26AB9160000
heap
page read and write
2FCE000
trusted library allocation
page read and write
13C85000
trusted library allocation
page read and write
26AB912A000
heap
page read and write
3428000
heap
page read and write
139FD000
trusted library allocation
page read and write
7FF887D40000
trusted library allocation
page read and write
18E73484000
heap
page read and write
E20000
trusted library allocation
page read and write
7FF887C90000
trusted library allocation
page execute and read and write
EEE000
stack
page read and write
1BDB7000
heap
page read and write
371E000
stack
page read and write
7FF8879AD000
trusted library allocation
page execute and read and write
1625000
heap
page read and write
7FF887CFA000
trusted library allocation
page read and write
7FF887B80000
trusted library allocation
page read and write
22968B80000
heap
page read and write
33AD000
trusted library allocation
page read and write
26AB9173000
heap
page read and write
384000
unkown
page read and write
2E90000
heap
page read and write
19A0000
trusted library allocation
page read and write
7FF887CCD000
trusted library allocation
page read and write
2F37000
trusted library allocation
page read and write
7FF887A70000
trusted library allocation
page read and write
7FF887A94000
trusted library allocation
page read and write
1B6C0000
heap
page execute and read and write
1C7EE000
stack
page read and write
19385986000
heap
page read and write
2311688C000
heap
page read and write
14C5000
heap
page read and write
2FC1000
heap
page read and write
E8F000
stack
page read and write
29C0000
heap
page read and write
22968BA2000
heap
page read and write
37C0000
trusted library allocation
page read and write
7FF887C22000
trusted library allocation
page read and write
7FF8879EC000
trusted library allocation
page read and write
1B9BE000
stack
page read and write
193859B6000
heap
page read and write
12ED1000
trusted library allocation
page read and write
1C390000
heap
page read and write
7FF887B83000
trusted library allocation
page read and write
18E73490000
heap
page read and write
1B500000
heap
page read and write
3026000
trusted library allocation
page read and write
1BD87000
heap
page read and write
C46EFE000
stack
page read and write
3486000
trusted library allocation
page read and write
7FF887D43000
trusted library allocation
page read and write
1B400000
heap
page read and write
2FCB000
heap
page read and write
1C143000
heap
page read and write
14F4B110000
heap
page read and write
7FF8879D0000
trusted library allocation
page read and write
AF1000
heap
page read and write
7FF887E12000
trusted library allocation
page read and write
1B76E000
stack
page read and write
134C3000
trusted library allocation
page read and write
7FF887E30000
trusted library allocation
page read and write
7FF887E30000
trusted library allocation
page execute and read and write
2FDC000
heap
page read and write
549EFF000
stack
page read and write
11AA000
heap
page read and write
7FF887A90000
trusted library allocation
page execute and read and write
1460000
trusted library allocation
page read and write
14128000
trusted library allocation
page read and write
1C0ED000
stack
page read and write
22968B7F000
heap
page read and write
1C419000
heap
page read and write
C80000
heap
page read and write
1C2C4000
stack
page read and write
26CB1CFB000
heap
page read and write
1EA4AFB4000
heap
page read and write
18E73441000
heap
page read and write
12761000
trusted library allocation
page read and write
225093BE000
heap
page read and write
7FF887D00000
trusted library allocation
page read and write
1CFD9000
heap
page read and write
7FF887A7D000
trusted library allocation
page execute and read and write
7FF887D60000
trusted library allocation
page read and write
2FDF000
heap
page read and write
1C600000
trusted library section
page read and write
7FF887D14000
trusted library allocation
page read and write
7FF887DF2000
trusted library allocation
page read and write
9F6000
stack
page read and write
3A43000
trusted library allocation
page read and write
1645000
heap
page read and write
C468FA000
stack
page read and write
1B70E000
stack
page read and write
7FF887B93000
trusted library allocation
page read and write
1BAB0000
heap
page read and write
388D000
trusted library allocation
page read and write
2E64000
trusted library allocation
page read and write
1170000
heap
page read and write
1BDA7000
heap
page read and write
193859A1000
heap
page read and write
7FF887E23000
trusted library allocation
page read and write
7FF887B6C000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
7FF8879A0000
trusted library allocation
page read and write
1CFAC000
stack
page read and write
787A6FF000
stack
page read and write
5ADE000
stack
page read and write
3092000
trusted library allocation
page read and write
22968BB5000
heap
page read and write
7FF887E10000
trusted library allocation
page read and write
7FF887A83000
trusted library allocation
page execute and read and write
14F4B0B8000
heap
page read and write
1B25E000
heap
page read and write
26AB911C000
heap
page read and write
134F1000
trusted library allocation
page read and write
14C0000
heap
page read and write
7FF887C17000
trusted library allocation
page read and write
7FF887DCA000
trusted library allocation
page read and write
455D3FF000
stack
page read and write
9A301FE000
stack
page read and write
7FF887D10000
trusted library allocation
page read and write
7FF887C6B000
trusted library allocation
page read and write
2EDC000
trusted library allocation
page read and write
7FF887B60000
trusted library allocation
page read and write
C470FF000
stack
page read and write
EDA000
heap
page read and write
A9B73FF000
stack
page read and write
2311687E000
heap
page read and write
2C5E000
trusted library allocation
page read and write
D54000
heap
page read and write
3263000
trusted library allocation
page read and write
7FF887C33000
trusted library allocation
page read and write
23116847000
heap
page read and write
7FF8879F4000
trusted library allocation
page read and write
7FF887DF4000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
2311687E000
heap
page read and write
1970000
trusted library allocation
page read and write
7FF887D42000
trusted library allocation
page read and write
18E73449000
heap
page read and write
231167C0000
heap
page read and write
AF3000
heap
page read and write
26AB9020000
heap
page read and write
2311687E000
heap
page read and write
2DF8000
trusted library allocation
page read and write
135AC000
trusted library allocation
page read and write
DA5000
heap
page read and write
1B430000
trusted library allocation
page read and write
791F000
stack
page read and write
7FF887A2C000
trusted library allocation
page execute and read and write
1C349000
heap
page read and write
1313D000
trusted library allocation
page read and write
7FF887BD0000
trusted library allocation
page read and write
7FF887CC2000
trusted library allocation
page read and write
2296A490000
heap
page read and write
301B000
heap
page read and write
7FF887D00000
trusted library allocation
page read and write
EC0000
unkown
page readonly
54DE000
stack
page read and write
30A1000
trusted library allocation
page read and write
1D722000
heap
page read and write
7FF887C77000
trusted library allocation
page read and write
7FF887D30000
trusted library allocation
page read and write
28A8000
heap
page read and write
26AB916A000
heap
page read and write
18E7345C000
heap
page read and write
7FF887CD0000
trusted library allocation
page read and write
14F4B0FD000
heap
page read and write
2D10000
heap
page read and write
15F855F0000
heap
page read and write
326D000
trusted library allocation
page read and write
2FF2000
heap
page read and write
2FDD000
heap
page read and write
AA0000
trusted library allocation
page read and write
14F4B110000
heap
page read and write
3160000
stack
page read and write
18E734B8000
heap
page read and write
2311685E000
heap
page read and write
22509048000
heap
page read and write
3007000
heap
page read and write
7FF887DB8000
trusted library allocation
page read and write
7FF887BF2000
trusted library allocation
page read and write
7FF887BF7000
trusted library allocation
page read and write
7FF887C6D000
trusted library allocation
page read and write
2FC7000
heap
page read and write
7FF887B40000
trusted library allocation
page execute and read and write
12B38000
trusted library allocation
page read and write
7FF8879CD000
trusted library allocation
page execute and read and write
7FF887BA0000
trusted library allocation
page execute and read and write
3855000
trusted library allocation
page read and write
D6E000
heap
page read and write
1BD8E000
heap
page read and write
F6E000
stack
page read and write
338F000
stack
page read and write
7FF887DC0000
trusted library allocation
page read and write
231167E0000
heap
page read and write
38E0000
trusted library allocation
page read and write
26AB9108000
heap
page read and write
7FF887C30000
trusted library allocation
page read and write
1BB6E000
stack
page read and write
E59000
heap
page read and write
14F4B10F000
heap
page read and write
7FF887C60000
trusted library allocation
page read and write
2311688E000
heap
page read and write
15F85610000
heap
page read and write
34E1000
trusted library allocation
page read and write
231168A3000
heap
page read and write
2E88000
heap
page read and write
13448000
trusted library allocation
page read and write
1B05D000
stack
page read and write
3352000
trusted library allocation
page read and write
392C000
trusted library allocation
page read and write
1BE02000
heap
page read and write
7FF887C40000
trusted library allocation
page read and write
AF6000
stack
page read and write
16C5000
heap
page read and write
7FF887CD9000
trusted library allocation
page read and write
26ABAF10000
heap
page read and write
14F4B0FD000
heap
page read and write
26AB9131000
heap
page read and write
1C5F0000
trusted library section
page read and write
7FF887A8C000
trusted library allocation
page read and write
1B623000
stack
page read and write
7FF887D62000
trusted library allocation
page read and write
23116884000
heap
page read and write
DD0000
heap
page read and write
26AB912E000
heap
page read and write
2FE3000
heap
page read and write
7FF887D20000
trusted library allocation
page read and write
7FF887CE8000
trusted library allocation
page read and write
1CF4D000
stack
page read and write
2FD9000
heap
page read and write
FA0000
trusted library allocation
page read and write
C46DFE000
stack
page read and write
2FD9000
heap
page read and write
14392000
trusted library allocation
page read and write
7FF8879FB000
trusted library allocation
page execute and read and write
10B4000
heap
page read and write
22968BB1000
heap
page read and write
269BDCC7000
heap
page read and write
23116861000
heap
page read and write
CA9000
heap
page read and write
1ADE000
stack
page read and write
18E734A0000
heap
page read and write
7FF887C70000
trusted library allocation
page read and write
15F85670000
heap
page read and write
1C38D000
stack
page read and write
7FF887D24000
trusted library allocation
page read and write
26AB9104000
heap
page read and write
7FF887AAD000
trusted library allocation
page execute and read and write
22968AC0000
heap
page read and write
190E000
stack
page read and write
1938597F000
heap
page read and write
13401000
trusted library allocation
page read and write
14F4B0CC000
heap
page read and write
22968B95000
heap
page read and write
1BBEE000
stack
page read and write
3448000
heap
page read and write
1B96B000
stack
page read and write
7FF887DD0000
trusted library allocation
page read and write
26AB9131000
heap
page read and write
7FF887C50000
trusted library allocation
page read and write
7FF887E70000
trusted library allocation
page execute and read and write
389B000
trusted library allocation
page read and write
33F7000
trusted library allocation
page read and write
225093B0000
heap
page read and write
34E0000
heap
page read and write
23437017000
heap
page read and write
14F4B0FD000
heap
page read and write
7FF887C1C000
trusted library allocation
page read and write
23116A30000
heap
page read and write
1664000
heap
page read and write
E70000
heap
page read and write
1BCBE000
stack
page read and write
7FF887D10000
trusted library allocation
page read and write
7FF887D00000
trusted library allocation
page read and write
2A40000
heap
page execute and read and write
7FF887C40000
trusted library allocation
page read and write
1C2CE000
stack
page read and write
29A0000
heap
page read and write
2311688C000
heap
page read and write
1ACED000
stack
page read and write
14F4B280000
heap
page read and write
7FF887DFF000
trusted library allocation
page read and write
130C5000
trusted library allocation
page read and write
193859BA000
heap
page read and write
26AB913A000
heap
page read and write
361C000
trusted library allocation
page read and write
22968B7D000
heap
page read and write
229689C0000
heap
page read and write
1CCAE000
stack
page read and write
CEB000
heap
page read and write
338E000
stack
page read and write
12E9D000
trusted library allocation
page read and write
2311683D000
heap
page read and write
1D5DE000
stack
page read and write
23116893000
heap
page read and write
7FF887D08000
trusted library allocation
page read and write
CBA000
heap
page read and write
157D3000
trusted library allocation
page read and write
37C4000
trusted library allocation
page read and write
22968B6B000
heap
page read and write
7FF887A9D000
trusted library allocation
page execute and read and write
7FF8879ED000
trusted library allocation
page execute and read and write
F60000
trusted library allocation
page read and write
9F0000
heap
page read and write
7FF887C60000
trusted library allocation
page read and write
1BD53000
heap
page read and write
14F4B103000
heap
page read and write
1C590000
trusted library section
page read and write
2EA0000
heap
page read and write
2343724B000
heap
page read and write
7FF8879CD000
trusted library allocation
page execute and read and write
193859A5000
heap
page read and write
22509040000
heap
page read and write
7FF887E20000
trusted library allocation
page read and write
2FCF000
heap
page read and write
22968B66000
heap
page read and write
3404000
trusted library allocation
page read and write
1CFB0000
heap
page read and write
7FF887C60000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
C46FFF000
stack
page read and write
18E73448000
heap
page read and write
3430000
heap
page read and write
CED000
heap
page read and write
1C5C0000
trusted library section
page read and write
2811000
trusted library allocation
page read and write
2BF5000
trusted library allocation
page read and write
12EA8000
trusted library allocation
page read and write
344E000
heap
page read and write
7FF887CD0000
trusted library allocation
page read and write
13A4C000
trusted library allocation
page read and write
7FF887E10000
trusted library allocation
page read and write
B1D000
heap
page read and write
23436FE0000
heap
page read and write
7FF887C2A000
trusted library allocation
page read and write
2311689E000
heap
page read and write
1B57D000
stack
page read and write
18E73457000
heap
page read and write
2ED1000
trusted library allocation
page read and write
7FF887ADC000
trusted library allocation
page execute and read and write
18E73493000
heap
page read and write
1C08F000
stack
page read and write
344C000
heap
page read and write
1C4CD000
stack
page read and write
7FF887AA4000
trusted library allocation
page read and write
3836000
trusted library allocation
page read and write
1B120000
heap
page read and write
1BEB2000
stack
page read and write
1B375000
heap
page read and write
2FDC000
heap
page read and write
23116887000
heap
page read and write
7FF887B97000
trusted library allocation
page read and write
7FF887A60000
trusted library allocation
page read and write
7FF8879A4000
trusted library allocation
page read and write
7FF8879FC000
trusted library allocation
page execute and read and write
19385954000
heap
page read and write
C78C6FE000
stack
page read and write
1160000
heap
page read and write
32FE000
stack
page read and write
FF0000
trusted library allocation
page read and write
7FF887CF5000
trusted library allocation
page read and write
455D0FD000
stack
page read and write
14632000
trusted library allocation
page read and write
7FF887C4B000
trusted library allocation
page read and write
23116861000
heap
page read and write
CA8000
heap
page read and write
2EB8000
trusted library allocation
page read and write
22509076000
heap
page read and write
2FBD000
heap
page read and write
1513E000
trusted library allocation
page read and write
37E000
unkown
page write copy
1640000
heap
page read and write
310C000
trusted library allocation
page read and write
7FF8879BD000
trusted library allocation
page execute and read and write
7FF887B6A000
trusted library allocation
page read and write
14B3B000
trusted library allocation
page read and write
5E0000
heap
page read and write
7FF887E1D000
trusted library allocation
page read and write
1B42F000
stack
page read and write
14F4B115000
heap
page read and write
3214000
trusted library allocation
page read and write
3377CFE000
stack
page read and write
38CF000
trusted library allocation
page read and write
2311683E000
heap
page read and write
19385991000
heap
page read and write
7FF887C30000
trusted library allocation
page read and write
7FF887C30000
trusted library allocation
page read and write
1BBBF000
stack
page read and write
1D2EC000
heap
page read and write
7FF887B5C000
trusted library allocation
page read and write
7FF8879E0000
trusted library allocation
page read and write
18E73492000
heap
page read and write
23116860000
heap
page read and write
7FF887DF0000
trusted library allocation
page read and write
D80000
heap
page read and write
14F4B0B0000
heap
page read and write
7FF887C90000
trusted library allocation
page execute and read and write
7FF887D30000
trusted library allocation
page read and write
33A0000
heap
page execute and read and write
7FF8879C4000
trusted library allocation
page read and write
7FF8879C3000
trusted library allocation
page execute and read and write
7FF887C30000
trusted library allocation
page read and write
7FF887D28000
trusted library allocation
page read and write
2311688C000
heap
page read and write
57AE000
heap
page read and write
163A000
heap
page read and write
1BFBB000
stack
page read and write
11AC000
heap
page read and write
D15000
heap
page read and write
1C57D000
heap
page read and write
307E000
trusted library allocation
page read and write
2E8E000
stack
page read and write
7FF887E70000
trusted library allocation
page execute and read and write
2BD2000
trusted library allocation
page read and write
14F6000
stack
page read and write
2B9A000
trusted library allocation
page read and write
BAB76FA000
stack
page read and write
1EA4ABC0000
heap
page read and write
1CC6F000
stack
page read and write
19385966000
heap
page read and write
193859C4000
heap
page read and write
7FF887E39000
trusted library allocation
page read and write
7FF887DB0000
trusted library allocation
page execute and read and write
143AC000
trusted library allocation
page read and write
7FF887D1C000
trusted library allocation
page read and write
7FF887E52000
trusted library allocation
page read and write
2C3B000
stack
page read and write
18E73470000
heap
page read and write
13C79000
trusted library allocation
page read and write
7FF887D80000
trusted library allocation
page read and write
13495000
trusted library allocation
page read and write
7FF887A9D000
trusted library allocation
page execute and read and write
2DDF000
stack
page read and write
12768000
trusted library allocation
page read and write
11D0000
heap
page read and write
13808000
trusted library allocation
page read and write
787A0FA000
stack
page read and write
CDD000
heap
page read and write
269BDC90000
heap
page read and write
13270000
trusted library allocation
page read and write
1D31C000
heap
page read and write
7FF887CFA000
trusted library allocation
page read and write
193859AE000
heap
page read and write
378C000
trusted library allocation
page read and write
53DE000
stack
page read and write
C60000
trusted library allocation
page read and write
1437C000
trusted library allocation
page read and write
14F4B114000
heap
page read and write
2311685B000
heap
page read and write
2CF2000
trusted library allocation
page read and write
1352D000
trusted library allocation
page read and write
7FF887E40000
trusted library allocation
page execute and read and write
13D0000
heap
page read and write
7FF887B90000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
385C000
trusted library allocation
page read and write
455D1FF000
stack
page read and write
AE0000
heap
page read and write
7FF887C2C000
trusted library allocation
page read and write
22CAC996000
heap
page read and write
26AB9157000
heap
page read and write
7FF887BB0000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
7FF887BA0000
trusted library allocation
page read and write
7FF887D1C000
trusted library allocation
page read and write
3166000
trusted library allocation
page read and write
1C530000
trusted library section
page read and write
7FF887B60000
trusted library allocation
page read and write
AB6000
heap
page read and write
19385980000
heap
page read and write
1BE2E000
unkown
page read and write
7FF887E10000
trusted library allocation
page read and write
1B45D000
stack
page read and write
22968BC6000
heap
page read and write
7FF887CF0000
trusted library allocation
page read and write
18E732A0000
heap
page read and write
7FF887E50000
trusted library allocation
page read and write
7FF887D22000
trusted library allocation
page read and write
1C37E000
heap
page read and write
2E80000
heap
page read and write
1BE0E000
stack
page read and write
7FF887AB6000
trusted library allocation
page execute and read and write
12AED000
trusted library allocation
page read and write
D50000
heap
page read and write
7FF887B5B000
trusted library allocation
page read and write
7FF887D10000
trusted library allocation
page read and write
1B100000
heap
page execute and read and write
11CE000
stack
page read and write
7FF887D20000
trusted library allocation
page read and write
7FF887BF0000
trusted library allocation
page read and write
34EA000
heap
page read and write
787A8FF000
stack
page read and write
A856EFE000
stack
page read and write
3A3000
unkown
page readonly
3059000
trusted library allocation
page read and write
1BCFE000
stack
page read and write
123C000
heap
page read and write
A856FFE000
stack
page read and write
134F5000
trusted library allocation
page read and write
193859AE000
heap
page read and write
3378000
trusted library allocation
page read and write
58CF000
stack
page read and write
1B360000
heap
page execute and read and write
1215000
heap
page read and write
2EB4000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
7FF887A93000
trusted library allocation
page read and write
18E734A2000
heap
page read and write
7FF887E00000
trusted library allocation
page read and write
ABC000
heap
page read and write
1D6E0000
heap
page read and write
BC973FE000
stack
page read and write
2EC6000
trusted library allocation
page read and write
269BDED0000
heap
page read and write
193859AB000
heap
page read and write
1910000
heap
page read and write
301B000
heap
page read and write
193859B5000
heap
page read and write
3179000
stack
page read and write
1C563000
heap
page read and write
7FF887C4B000
trusted library allocation
page read and write
384B000
trusted library allocation
page read and write
1C9EB000
stack
page read and write
1730000
heap
page read and write
2B6E000
trusted library allocation
page read and write
38B0000
heap
page read and write
1EA4AFB0000
heap
page read and write
14F4B0E0000
heap
page read and write
7FF887E12000
trusted library allocation
page read and write
3044000
trusted library allocation
page read and write
22968BB4000
heap
page read and write
301B000
heap
page read and write
7FF887B63000
trusted library allocation
page read and write
1472B000
trusted library allocation
page read and write
1C641000
heap
page read and write
7FF887A73000
trusted library allocation
page execute and read and write
1938596C000
heap
page read and write
7FF887B90000
trusted library allocation
page execute and read and write
7FF887B7E000
trusted library allocation
page read and write
3472000
heap
page read and write
2FE0000
heap
page read and write
39A0000
trusted library allocation
page read and write
2FD9000
trusted library allocation
page read and write
1B6F0000
heap
page read and write
7FF887C0B000
trusted library allocation
page read and write
1C33A000
heap
page read and write
18E7346B000
heap
page read and write
1D11D000
stack
page read and write
22CAFFF000
stack
page read and write
7FF887DF4000
trusted library allocation
page read and write
1B701000
stack
page read and write
315C000
stack
page read and write
356B000
trusted library allocation
page read and write
193859B7000
heap
page read and write
ADC000
heap
page read and write
2FEC000
heap
page read and write
3210000
heap
page read and write
7FF887BE7000
trusted library allocation
page read and write
7FF887D1F000
trusted library allocation
page read and write
3177000
stack
page read and write
2FEE000
stack
page read and write
BB0000
heap
page read and write
19385966000
heap
page read and write
23437240000
heap
page read and write
134E4000
trusted library allocation
page read and write
33CE000
stack
page read and write
340000
unkown
page readonly
7FF887C50000
trusted library allocation
page read and write
19385990000
heap
page read and write
7FF887D1F000
trusted library allocation
page read and write
14345000
trusted library allocation
page read and write
7FF887AF8000
trusted library allocation
page execute and read and write
7FF887C2C000
trusted library allocation
page read and write
7FF887D80000
trusted library allocation
page execute and read and write
7FF887CDC000
trusted library allocation
page read and write
1B50E000
stack
page read and write
13ED6000
trusted library allocation
page read and write
1B9EF000
stack
page read and write
3182000
stack
page read and write
7FF8879BC000
trusted library allocation
page read and write
23437245000
heap
page read and write
2FEC000
heap
page read and write
7FF887D24000
trusted library allocation
page read and write
1C364000
heap
page read and write
1C4D0000
trusted library section
page read and write
1BA18000
heap
page read and write
2C1F000
trusted library allocation
page read and write
7FF8879E8000
trusted library allocation
page read and write
2750000
heap
page execute and read and write
3038000
trusted library allocation
page read and write
2E64000
trusted library allocation
page read and write
1B60E000
stack
page read and write
7FF887CF0000
trusted library allocation
page read and write
7FF887B01000
trusted library allocation
page execute and read and write
2E9C000
trusted library allocation
page read and write
7FF887BC0000
trusted library allocation
page read and write
22968AC5000
heap
page read and write
11F5000
heap
page read and write
2311685E000
heap
page read and write
1550000
trusted library allocation
page read and write
7FF887BA8000
trusted library allocation
page execute and read and write
7FF887D4F000
trusted library allocation
page read and write
7FF887E52000
trusted library allocation
page read and write
1B66E000
stack
page read and write
13D18000
trusted library allocation
page read and write
9A300FE000
stack
page read and write
7FF887D90000
trusted library allocation
page execute and read and write
3567000
trusted library allocation
page read and write
7FF887C3B000
trusted library allocation
page read and write
7FF887C60000
trusted library allocation
page read and write
1BE9F000
heap
page read and write
193859B5000
heap
page read and write
18E734A9000
heap
page read and write
7FF887C50000
trusted library allocation
page read and write
18E73492000
heap
page read and write
1C431000
heap
page read and write
1150000
heap
page read and write
C8D000
stack
page read and write
171C000
heap
page read and write
3007000
heap
page read and write
7FF887A8D000
trusted library allocation
page execute and read and write
26AB9153000
heap
page read and write
7FF887BF0000
trusted library allocation
page read and write
1BD00000
heap
page read and write
D54000
heap
page read and write
1C6DF000
unkown
page read and write
BAB77FE000
stack
page read and write
7FF887C20000
trusted library allocation
page read and write
33BE000
trusted library allocation
page read and write
9A303FF000
stack
page read and write
231168A6000
heap
page read and write
123B000
heap
page read and write
33CB000
trusted library allocation
page read and write
BAB7DFF000
stack
page read and write
10F6000
stack
page read and write
7FF887A93000
trusted library allocation
page read and write
2EDB000
trusted library allocation
page read and write
23436FE8000
heap
page read and write
30FB000
trusted library allocation
page read and write
37EE000
trusted library allocation
page read and write
7FF887D30000
trusted library allocation
page read and write
549AFF000
stack
page read and write
1EA4AC38000
heap
page read and write
26AB9163000
heap
page read and write
7FF887DE2000
trusted library allocation
page read and write
12C45000
trusted library allocation
page read and write
15D0000
heap
page read and write
7FF887A2C000
trusted library allocation
page execute and read and write
B90000
heap
page read and write
12ADD000
trusted library allocation
page read and write
7FF887E60000
trusted library allocation
page execute and read and write
34E2000
heap
page read and write
1CF5B000
stack
page read and write
26AB9010000
heap
page read and write
18E73457000
heap
page read and write
7FF887C70000
trusted library allocation
page read and write
7FF887C20000
trusted library allocation
page read and write
7FF887CF7000
trusted library allocation
page read and write
2F88000
heap
page read and write
3445000
heap
page read and write
23116886000
heap
page read and write
7FF887D20000
trusted library allocation
page read and write
13BF8000
trusted library allocation
page read and write
7FF887CF0000
trusted library allocation
page read and write
15F856A6000
heap
page read and write
771E000
stack
page read and write
7FF887A86000
trusted library allocation
page read and write
26AB9117000
heap
page read and write
33FE000
stack
page read and write
7FF887C43000
trusted library allocation
page read and write
7FF887C8D000
trusted library allocation
page read and write
7FF887E29000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
18E73490000
heap
page read and write
A9B76FE000
stack
page read and write
1404000
heap
page read and write
2890000
heap
page read and write
13F0000
heap
page read and write
7FF887CF7000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
1276D000
trusted library allocation
page read and write
3911000
trusted library allocation
page read and write
7FF887A93000
trusted library allocation
page read and write
1B06D000
stack
page read and write
D2B000
heap
page read and write
7FF887B36000
trusted library allocation
page read and write
7FF887D42000
trusted library allocation
page read and write
3413000
trusted library allocation
page read and write
269BDED5000
heap
page read and write
74C9BFF000
stack
page read and write
2E56000
trusted library allocation
page read and write
D0B000
heap
page read and write
7FF887C70000
trusted library allocation
page read and write
7FF887A60000
trusted library allocation
page execute and read and write
1BA0E000
stack
page read and write
7FF887C20000
trusted library allocation
page read and write
7FF887E20000
trusted library allocation
page read and write
7FF887B98000
trusted library allocation
page execute and read and write
22968BB1000
heap
page read and write
7FF887B70000
trusted library allocation
page read and write
7FF8879DC000
trusted library allocation
page read and write
7FF887A70000
trusted library allocation
page execute and read and write
1C1C7000
stack
page read and write
1C69A000
heap
page read and write
3030000
trusted library allocation
page read and write
18E73420000
heap
page read and write
22968BBC000
heap
page read and write
22968BBC000
heap
page read and write
22968B7D000
heap
page read and write
7FF887C74000
trusted library allocation
page read and write
A856CFF000
stack
page read and write
2EC8000
trusted library allocation
page read and write
7FF887E30000
trusted library allocation
page read and write
7FF887BD0000
trusted library allocation
page execute and read and write
7FF887D10000
trusted library allocation
page read and write
10B0000
heap
page read and write
1760000
heap
page execute and read and write
7FF887A80000
trusted library allocation
page read and write
1763000
heap
page read and write
1351C000
trusted library allocation
page read and write
7FF8879D4000
trusted library allocation
page read and write
1BCA8000
heap
page read and write
23116839000
heap
page read and write
D08000
heap
page read and write
C469FE000
stack
page read and write
781F000
stack
page read and write
2F23000
trusted library allocation
page read and write
7FF887C40000
trusted library allocation
page read and write
34E0000
heap
page read and write
12AE1000
trusted library allocation
page read and write
7FF8879ED000
trusted library allocation
page execute and read and write
1B8FF000
stack
page read and write
1130000
trusted library allocation
page read and write
3892000
trusted library allocation
page read and write
331A000
heap
page read and write
1CB01000
heap
page read and write
300F000
trusted library allocation
page read and write
7FF887B70000
trusted library allocation
page read and write
2C9E000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
2FDE000
heap
page read and write
2FA7000
heap
page read and write
2FC7000
heap
page read and write
2E72000
trusted library allocation
page read and write
193859B5000
heap
page read and write
7FF887A97000
trusted library allocation
page read and write
304B000
trusted library allocation
page read and write
13A71000
trusted library allocation
page read and write
12BE000
stack
page read and write
1D02D000
stack
page read and write
3052000
trusted library allocation
page read and write
22CB1FE000
stack
page read and write
2C2A000
trusted library allocation
page read and write
7FF887E24000
trusted library allocation
page read and write
7FF887E39000
trusted library allocation
page read and write
39DA000
trusted library allocation
page read and write
14F4B0FD000
heap
page read and write
9A306FE000
stack
page read and write
7FF8879B3000
trusted library allocation
page execute and read and write
269BDC00000
heap
page read and write
3377DFE000
stack
page read and write
2FC2000
heap
page read and write
7FF8879F0000
trusted library allocation
page read and write
7FF887C30000
trusted library allocation
page read and write
7FF887A83000
trusted library allocation
page read and write
1C36D000
heap
page read and write
CE5000
heap
page read and write
7FF887C6D000
trusted library allocation
page read and write
2EE0000
heap
page execute and read and write
CC5000
heap
page read and write
7FF887DF2000
trusted library allocation
page read and write
16EE000
stack
page read and write
7FF887E60000
trusted library allocation
page execute and read and write
7FF887A96000
trusted library allocation
page execute and read and write
2E50000
trusted library allocation
page read and write
1C379000
heap
page read and write
1D6DB000
stack
page read and write
DB0000
heap
page read and write
7FF887E00000
trusted library allocation
page read and write
3A2000
unkown
page write copy
1C445000
heap
page read and write
14F4B10D000
heap
page read and write
18E73490000
heap
page read and write
787A2FE000
stack
page read and write
231166E0000
heap
page read and write
14F4AFB0000
heap
page read and write
B63000
heap
page read and write
6E20000
trusted library allocation
page read and write
7FF887B90000
trusted library allocation
page read and write
26AB9162000
heap
page read and write
1BD0D000
stack
page read and write
31F0000
heap
page read and write
7FF887A84000
trusted library allocation
page read and write
19385966000
heap
page read and write
7FF887CC7000
trusted library allocation
page read and write
1BA01000
stack
page read and write
2CA0000
trusted library allocation
page read and write
7FF887C80000
trusted library allocation
page execute and read and write
23116884000
heap
page read and write
26AB9160000
heap
page read and write
7FF887BB1000
trusted library allocation
page execute and read and write
34E2000
heap
page read and write
22968B66000
heap
page read and write
1BC6D000
stack
page read and write
7FF887C43000
trusted library allocation
page read and write
7FF887A86000
trusted library allocation
page read and write
131E5000
trusted library allocation
page read and write
7FF8879C2000
trusted library allocation
page read and write
D97000
heap
page read and write
26AB916D000
heap
page read and write
118B000
heap
page read and write
1C5C0000
heap
page read and write
7FF887BC7000
trusted library allocation
page execute and read and write
2311683E000
heap
page read and write
7FF887B86000
trusted library allocation
page read and write
2EAA000
trusted library allocation
page read and write
1AECD000
stack
page read and write
1C43C000
heap
page read and write
7FF887A8D000
trusted library allocation
page execute and read and write
E6E000
heap
page read and write
26AB9103000
heap
page read and write
1730000
trusted library allocation
page read and write
1C87F000
stack
page read and write
7FF887B73000
trusted library allocation
page read and write
3400000
trusted library section
page read and write
7FF887AB6000
trusted library allocation
page execute and read and write
1C417000
heap
page read and write
9D0000
heap
page read and write
7FF8879D2000
trusted library allocation
page read and write
18E7346E000
heap
page read and write
193859B1000
heap
page read and write
2FCF000
heap
page read and write
7FF8879EB000
trusted library allocation
page execute and read and write
19385951000
heap
page read and write
7FF887B80000
trusted library allocation
page read and write
22968BA2000
heap
page read and write
1C3C2000
heap
page read and write
33AF000
trusted library allocation
page read and write
2D70000
heap
page read and write
23116881000
heap
page read and write
7FF887AF0000
trusted library allocation
page execute and read and write
12E28000
trusted library allocation
page read and write
1C5BC000
heap
page read and write
2F15000
trusted library allocation
page read and write
30D7000
trusted library allocation
page read and write
18E73483000
heap
page read and write
18E73471000
heap
page read and write
C9B000
heap
page read and write
7FF887A86000
trusted library allocation
page read and write
23116880000
heap
page read and write
26AB917F000
heap
page read and write
7FF8879E4000
trusted library allocation
page read and write
7FF887CC0000
trusted library allocation
page read and write
7FF887B5A000
trusted library allocation
page read and write
2E68000
trusted library allocation
page read and write
3047000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
7FF887ACC000
trusted library allocation
page execute and read and write
7FF887CD9000
trusted library allocation
page read and write
1A80000
heap
page read and write
57A7000
heap
page read and write
26AB90B0000
heap
page read and write
7FF8879D0000
trusted library allocation
page read and write
1C184000
stack
page read and write
9B0000
heap
page read and write
22968BAC000
heap
page read and write
22509370000
heap
page read and write
7FF887C54000
trusted library allocation
page read and write
7FF887BC0000
trusted library allocation
page execute and read and write
12FFD000
trusted library allocation
page read and write
CA5000
heap
page read and write
1392E000
trusted library allocation
page read and write
1430D000
trusted library allocation
page read and write
112E000
stack
page read and write
A9B74FF000
stack
page read and write
301B000
heap
page read and write
1D19E000
stack
page read and write
2DE0000
heap
page execute and read and write
26AB9151000
heap
page read and write
1AE0000
heap
page read and write
389B000
trusted library allocation
page read and write
7FF887D50000
trusted library allocation
page read and write
23436FC0000
heap
page read and write
2311689F000
heap
page read and write
1400000
heap
page read and write
22968B80000
heap
page read and write
1020000
heap
page read and write
A9B78FF000
stack
page read and write
7FF8879B3000
trusted library allocation
page read and write
7FF887C30000
trusted library allocation
page read and write
303C000
trusted library allocation
page read and write
391E000
trusted library allocation
page read and write
7FF887D60000
trusted library allocation
page execute and read and write
7FF887C75000
trusted library allocation
page read and write
7FF887ADC000
trusted library allocation
page execute and read and write
1BEBF000
unkown
page read and write
D80000
heap
page read and write
3289000
trusted library allocation
page read and write
193859A1000
heap
page read and write
1440000
trusted library allocation
page read and write
2CAB000
trusted library allocation
page read and write
357F000
trusted library allocation
page read and write
1950000
trusted library allocation
page read and write
1030000
heap
page read and write
13ECA000
trusted library allocation
page read and write
7FF8879C3000
trusted library allocation
page read and write
7FF887BD0000
trusted library allocation
page read and write
33780FF000
stack
page read and write
7FF887B7C000
trusted library allocation
page read and write
14F4B10D000
heap
page read and write
26CB1AD6000
heap
page read and write
2F0B000
trusted library allocation
page read and write
18E73490000
heap
page read and write
569D000
heap
page read and write
7FF887C60000
trusted library allocation
page read and write
15F85678000
heap
page read and write
175B000
heap
page read and write
EC0000
unkown
page readonly
1BDB4000
stack
page read and write
2FE4000
trusted library allocation
page read and write
26CB1AA0000
heap
page read and write
EFB000
heap
page read and write
17B5000
heap
page read and write
112E000
stack
page read and write
22968B7A000
heap
page read and write
3874000
trusted library allocation
page read and write
14F4B115000
heap
page read and write
1938597A000
heap
page read and write
7FF8879DD000
trusted library allocation
page execute and read and write
1B22E000
stack
page read and write
7FF887A6C000
trusted library allocation
page execute and read and write
13441000
trusted library allocation
page read and write
22968BB1000
heap
page read and write
2FE5000
heap
page read and write
1490000
trusted library allocation
page read and write
7FF887A70000
trusted library allocation
page read and write
26AB9117000
heap
page read and write
7FF887A80000
trusted library allocation
page read and write
345F000
heap
page read and write
7FF887D20000
trusted library allocation
page read and write
7FF887E40000
trusted library allocation
page execute and read and write
7FF887CE0000
trusted library allocation
page read and write
2E50000
heap
page read and write
2BFB000
trusted library allocation
page read and write
1C0F0000
heap
page read and write
14F4B285000
heap
page read and write
22968AA0000
heap
page read and write
7FF887B7B000
trusted library allocation
page read and write
7FF887D40000
trusted library allocation
page read and write
7FF8879F4000
trusted library allocation
page read and write
7FF887D10000
trusted library allocation
page read and write
7FF887C50000
trusted library allocation
page read and write
3390000
trusted library section
page read and write
22968B80000
heap
page read and write
7FF887A9D000
trusted library allocation
page execute and read and write
14F4B0B0000
heap
page read and write
A9B77FE000
stack
page read and write
18E73640000
heap
page read and write
7FF887D90000
trusted library allocation
page execute and read and write
116A000
unkown
page readonly
7FF887CF8000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
14F4B125000
heap
page read and write
1BE56000
heap
page read and write
CBB000
heap
page read and write
7FF8879C4000
trusted library allocation
page read and write
2E20000
heap
page read and write
302C000
heap
page read and write
7FF887E20000
trusted library allocation
page read and write
C46AFF000
stack
page read and write
14F4B0C6000
heap
page read and write
7FF887CCC000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
2BEC000
trusted library allocation
page read and write
7FF887C61000
trusted library allocation
page read and write
14F4B0B7000
heap
page read and write
134F7000
trusted library allocation
page read and write
15F8585B000
heap
page read and write
7FF887C2C000
trusted library allocation
page read and write
7FF887BAA000
trusted library allocation
page execute and read and write
2D29000
trusted library allocation
page read and write
3230000
heap
page read and write
14F4B060000
heap
page read and write
14F4AF90000
heap
page read and write
19387730000
heap
page read and write
7FF887A97000
trusted library allocation
page read and write
9A305FE000
stack
page read and write
1025000
heap
page read and write
34EA000
heap
page read and write
7FF887C02000
trusted library allocation
page read and write
7FF887DD0000
trusted library allocation
page read and write
787A4FE000
stack
page read and write
340000
unkown
page readonly
22CAC960000
heap
page read and write
22968BA3000
heap
page read and write
7FF887A80000
trusted library allocation
page read and write
7FF887E23000
trusted library allocation
page read and write
19385B55000
heap
page read and write
22968B95000
heap
page read and write
134E5000
trusted library allocation
page read and write
7FF887CC9000
trusted library allocation
page read and write
7FF887A1C000
trusted library allocation
page execute and read and write
26AB917F000
heap
page read and write
1C326000
heap
page read and write
38A5000
trusted library allocation
page read and write
373000
unkown
page readonly
12FF1000
trusted library allocation
page read and write
137B1000
trusted library allocation
page read and write
1C283000
stack
page read and write
2FCA000
heap
page read and write
7FF887BE0000
trusted library allocation
page execute and read and write
1C625000
heap
page read and write
2FA0000
heap
page read and write
7FF887E70000
trusted library allocation
page execute and read and write
22968BA8000
heap
page read and write
7FF887E50000
trusted library allocation
page read and write
7FF8879BD000
trusted library allocation
page execute and read and write
7FF887D12000
trusted library allocation
page read and write
7FF887BD0000
trusted library allocation
page read and write
1BE60000
trusted library section
page read and write
7FF887CA0000
trusted library allocation
page read and write
14F4B0CB000
heap
page read and write
7FF887D26000
trusted library allocation
page read and write
7FF887C10000
trusted library allocation
page read and write
7FF8879CB000
trusted library allocation
page execute and read and write
11DF000
heap
page read and write
7FF887DEE000
trusted library allocation
page read and write
14846000
trusted library allocation
page read and write
1C1D0000
heap
page read and write
1C4D0000
heap
page read and write
2FDA000
heap
page read and write
7FF887A76000
trusted library allocation
page read and write
1AE63000
heap
page read and write
2311686A000
heap
page read and write
109F000
stack
page read and write
347D000
trusted library allocation
page read and write
7FF887DA0000
trusted library allocation
page read and write
7FF887C10000
trusted library allocation
page read and write
18E7346E000
heap
page read and write
BAB7CFF000
stack
page read and write
14F4B10D000
heap
page read and write
7FF887C29000
trusted library allocation
page read and write
5A9E000
stack
page read and write
7FF887D50000
trusted library allocation
page read and write
2EA8000
trusted library allocation
page read and write
7FF887D32000
trusted library allocation
page read and write
26AB90FC000
heap
page read and write
397C000
trusted library allocation
page read and write
3A51000
trusted library allocation
page read and write
7FF8879DD000
trusted library allocation
page execute and read and write
2BE8000
trusted library allocation
page read and write
2FE2000
heap
page read and write
7FF887B7C000
trusted library allocation
page read and write
1CCAD000
stack
page read and write
455CEFF000
stack
page read and write
7FF887D24000
trusted library allocation
page read and write
7FF8879D0000
trusted library allocation
page read and write
549DFE000
stack
page read and write
14F4B0FF000
heap
page read and write
3230000
heap
page read and write
193857E0000
heap
page read and write
12CCA000
trusted library allocation
page read and write
7FF887D00000
trusted library allocation
page read and write
7FF887B7A000
trusted library allocation
page read and write
7FF887BA0000
trusted library allocation
page execute and read and write
23116893000
heap
page read and write
7FF887C3B000
trusted library allocation
page read and write
18E734AD000
heap
page read and write
26AB912C000
heap
page read and write
137D8000
trusted library allocation
page read and write
22968BAD000
heap
page read and write
7FF887D72000
trusted library allocation
page read and write
7FF887CE5000
trusted library allocation
page read and write
7FF887B30000
trusted library allocation
page execute and read and write
7FF887CB0000
trusted library allocation
page read and write
2FC1000
heap
page read and write
1CE4B000
stack
page read and write
7FF8879E3000
trusted library allocation
page read and write
13510000
trusted library allocation
page read and write
14F4B110000
heap
page read and write
7FF887C80000
trusted library allocation
page read and write
7FF8879D4000
trusted library allocation
page read and write
193859B0000
heap
page read and write
22CAC900000
heap
page read and write
1C44B000
heap
page read and write
22968B66000
heap
page read and write
1C071000
heap
page read and write
3521000
trusted library allocation
page read and write
1BDCF000
heap
page read and write
15F85855000
heap
page read and write
7FF887D14000
trusted library allocation
page read and write
37E000
unkown
page read and write
1B56E000
stack
page read and write
7FF8879FD000
trusted library allocation
page execute and read and write
7FF887B63000
trusted library allocation
page read and write
7FF887C10000
trusted library allocation
page read and write
9A2FDFA000
stack
page read and write
2EC0000
heap
page read and write
7FF887D40000
trusted library allocation
page read and write
1AA80000
trusted library allocation
page read and write
7FF887C20000
trusted library allocation
page read and write
1C3CE000
stack
page read and write
3488000
heap
page read and write
14F4B098000
heap
page read and write
26CB1A00000
heap
page read and write
37B4000
trusted library allocation
page read and write
2FA7000
heap
page read and write
CA5000
heap
page read and write
3283000
trusted library allocation
page read and write
7FF887CA4000
trusted library allocation
page read and write
1B9F3000
stack
page read and write
1710000
heap
page read and write
14DC0000
trusted library allocation
page read and write
148E9000
trusted library allocation
page read and write
269BF860000
heap
page read and write
2FC8000
heap
page read and write
7FF887DEF000
trusted library allocation
page read and write
7FF887A0C000
trusted library allocation
page execute and read and write
19385930000
heap
page read and write
7FF887D22000
trusted library allocation
page read and write
7FF887BA0000
trusted library allocation
page read and write
18BE000
stack
page read and write
7FF887C20000
trusted library allocation
page read and write
14F4B112000
heap
page read and write
7FF887ADC000
trusted library allocation
page execute and read and write
193859C4000
heap
page read and write
1C371000
heap
page read and write
22968B66000
heap
page read and write
7FF887AA4000
trusted library allocation
page read and write
7FF887C00000
trusted library allocation
page read and write
26AB9040000
heap
page read and write
14F4B0E0000
heap
page read and write
74C98FF000
stack
page read and write
549FFF000
stack
page read and write
7FF887CA8000
trusted library allocation
page read and write
5690000
heap
page read and write
22968BB7000
heap
page read and write
1B7FE000
stack
page read and write
7FF887A9C000
trusted library allocation
page read and write
BC96CFA000
stack
page read and write
3012000
trusted library allocation
page read and write
193859B5000
heap
page read and write
14F4B10C000
heap
page read and write
5BA0000
heap
page read and write
133C1000
trusted library allocation
page read and write
1BE4F000
heap
page read and write
7FF887CB0000
trusted library allocation
page read and write
1B60F000
stack
page read and write
1BD3E000
heap
page read and write
7FF887C90000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
318A000
stack
page read and write
7FF887CDE000
trusted library allocation
page read and write
23116A20000
heap
page read and write
1C4B0000
trusted library section
page read and write
1B4A0000
heap
page execute and read and write
7FF887C00000
trusted library allocation
page read and write
1BD84000
heap
page read and write
7FF887DEF000
trusted library allocation
page read and write
50EF000
stack
page read and write
5B5B000
stack
page read and write
305A000
trusted library allocation
page read and write
7FF887BA8000
trusted library allocation
page execute and read and write
1BA6E000
stack
page read and write
7FF887CA2000
trusted library allocation
page read and write
BAB79FD000
stack
page read and write
23116893000
heap
page read and write
7FF887DF4000
trusted library allocation
page read and write
74C97FD000
stack
page read and write
569C000
heap
page read and write
26AB915B000
heap
page read and write
13A3C000
trusted library allocation
page read and write
7FF887BF2000
trusted library allocation
page read and write
7FF8879FD000
trusted library allocation
page execute and read and write
13CFA000
trusted library allocation
page read and write
18E734AD000
heap
page read and write
BF0000
heap
page read and write
1D00F000
heap
page read and write
341000
unkown
page execute read
2EE8000
trusted library allocation
page read and write
14102000
trusted library allocation
page read and write
3992000
trusted library allocation
page read and write
163C000
heap
page read and write
7FF8879ED000
trusted library allocation
page execute and read and write
2AD0000
heap
page execute and read and write
7FF8879EC000
trusted library allocation
page read and write
34EA000
heap
page read and write
23116888000
heap
page read and write
14F4B0AC000
heap
page read and write
53BE000
stack
page read and write
A9B75FD000
stack
page read and write
C10000
heap
page read and write
1C610000
trusted library section
page read and write
18E73471000
heap
page read and write
3843000
trusted library allocation
page read and write
7FF887AAE000
trusted library allocation
page execute and read and write
13A40000
trusted library allocation
page read and write
9D0000
heap
page read and write
7FF887B53000
trusted library allocation
page read and write
193858C0000
heap
page read and write
19385966000
heap
page read and write
B46000
stack
page read and write
7FF887B40000
trusted library allocation
page read and write
2FA1000
heap
page read and write
1BFCE000
stack
page read and write
22968B7B000
heap
page read and write
CE7000
heap
page read and write
23116861000
heap
page read and write
15E0000
trusted library allocation
page read and write
22968BBB000
heap
page read and write
23438B20000
heap
page read and write
7FF887C68000
trusted library allocation
page read and write
1BE3E000
stack
page read and write
7FF887B4C000
trusted library allocation
page read and write
1CDAD000
stack
page read and write
26AB9177000
heap
page read and write
7FF887CC9000
trusted library allocation
page read and write
314C000
stack
page read and write
18E73478000
heap
page read and write
7FF887CB0000
trusted library allocation
page read and write
7FF887CF0000
trusted library allocation
page read and write
19385951000
heap
page read and write
1BAFA000
stack
page read and write
11A0000
heap
page read and write
1C66B000
heap
page read and write
1EA4AC37000
heap
page read and write
269BDB20000
heap
page read and write
15044000
trusted library allocation
page read and write
7FF887C6C000
trusted library allocation
page read and write
12AD1000
trusted library allocation
page read and write
7A1C000
stack
page read and write
14F4B103000
heap
page read and write
22968B4C000
heap
page read and write
7FF887B80000
trusted library allocation
page read and write
22968B95000
heap
page read and write
2B49000
trusted library allocation
page read and write
7FF887CA2000
trusted library allocation
page read and write
7FF887CA0000
trusted library allocation
page read and write
1D21E000
stack
page read and write
153E000
stack
page read and write
2FBD000
heap
page read and write
7FF887B40000
trusted library allocation
page execute and read and write
26CB1CF0000
heap
page read and write
7FF887C71000
trusted library allocation
page read and write
14F4B0DF000
heap
page read and write
1BFC0000
heap
page read and write
1CAAE000
stack
page read and write
2FC1000
heap
page read and write
7FF887C2E000
trusted library allocation
page read and write
7FF887D30000
trusted library allocation
page read and write
7FF887D2F000
trusted library allocation
page read and write
7FF887A9D000
trusted library allocation
page execute and read and write
18E734A6000
heap
page read and write
7FF887A84000
trusted library allocation
page read and write
1309C000
trusted library allocation
page read and write
26AB9101000
heap
page read and write
23436FA0000
heap
page read and write
1C368000
heap
page read and write
7FF887CE0000
trusted library allocation
page read and write
1100000
heap
page read and write
54A0FE000
stack
page read and write
7FF8879B7000
trusted library allocation
page read and write
455D4FF000
stack
page read and write
5498FA000
stack
page read and write
3310000
heap
page read and write
8F6000
stack
page read and write
1BE40000
heap
page read and write
34E2000
heap
page read and write
23116810000
heap
page read and write
7FF887A9C000
trusted library allocation
page read and write
1C329000
heap
page read and write
7FF887B6B000
trusted library allocation
page read and write
14F4B0E8000
heap
page read and write
1241000
heap
page read and write
2F40000
heap
page read and write
7FF887D30000
trusted library allocation
page read and write
14B78000
trusted library allocation
page read and write
38F7000
trusted library allocation
page read and write
22CAC925000
heap
page read and write
1938597D000
heap
page read and write
7FF887AA0000
trusted library allocation
page read and write
7FF887CA4000
trusted library allocation
page read and write
120F000
heap
page read and write
C20000
heap
page read and write
23116884000
heap
page read and write
7FF887D1A000
trusted library allocation
page read and write
26AB9109000
heap
page read and write
7FF887B70000
trusted library allocation
page read and write
3086000
stack
page read and write
7FF887A80000
trusted library allocation
page read and write
455CFFE000
stack
page read and write
E38000
heap
page read and write
193858E0000
heap
page read and write
7FF887D28000
trusted library allocation
page read and write
7FF887E2C000
trusted library allocation
page read and write
37E0000
trusted library allocation
page read and write
7FF887DCA000
trusted library allocation
page read and write
7FF887D00000
trusted library allocation
page read and write
327E000
stack
page read and write
5240000
heap
page read and write
1666000
heap
page read and write
344F000
heap
page read and write
7FF887BA0000
trusted library allocation
page execute and read and write
13EFD000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
1CD5D000
stack
page read and write
1EA4ABD0000
heap
page read and write
7FF887D50000
trusted library allocation
page read and write
26AB9169000
heap
page read and write
1BDCF000
stack
page read and write
13DDC000
trusted library allocation
page read and write
1CB04000
heap
page read and write
7FF887E10000
trusted library allocation
page read and write
18E73610000
heap
page read and write
19D4000
heap
page read and write
2FCC000
heap
page read and write
7FF887CC7000
trusted library allocation
page read and write
7FF887C25000
trusted library allocation
page read and write
7FF887C90000
trusted library allocation
page execute and read and write
3487000
heap
page read and write
1AEC0000
trusted library allocation
page read and write
7FF887B90000
trusted library allocation
page read and write
7FF887E02000
trusted library allocation
page read and write
13DD3000
trusted library allocation
page read and write
33783FF000
stack
page read and write
1010000
trusted library allocation
page read and write
5B1E000
stack
page read and write
3593000
trusted library allocation
page read and write
22968BC1000
heap
page read and write
12CD5000
trusted library allocation
page read and write
549CFE000
stack
page read and write
18E73471000
heap
page read and write
3377FFF000
stack
page read and write
23116894000
heap
page read and write
7FF887E13000
trusted library allocation
page read and write
787A7FE000
stack
page read and write
13CE5000
trusted library allocation
page read and write
1D316000
heap
page read and write
317E000
stack
page read and write
13584000
trusted library allocation
page read and write
2FBC000
heap
page read and write
1938597D000
heap
page read and write
2C57000
trusted library allocation
page read and write
193859B3000
heap
page read and write
301B000
heap
page read and write
3507000
trusted library allocation
page read and write
22968B51000
heap
page read and write
14F4B104000
heap
page read and write
7FF887CDC000
trusted library allocation
page read and write
225093BB000
heap
page read and write
5251000
trusted library allocation
page read and write
787A5FF000
stack
page read and write
1416A000
trusted library allocation
page read and write
7FF887DF2000
trusted library allocation
page read and write
26CB1AA8000
heap
page read and write
D30000
heap
page read and write
26AB9117000
heap
page read and write
C46CFF000
stack
page read and write
2311685C000
heap
page read and write
7FF8879DD000
trusted library allocation
page execute and read and write
7FF887D30000
trusted library allocation
page read and write
BC972FF000
stack
page read and write
1B8E0000
heap
page read and write
2FDE000
heap
page read and write
1EA4AC29000
heap
page read and write
7FF887D20000
trusted library allocation
page read and write
18E734A4000
heap
page read and write
A856BFE000
stack
page read and write
18E73457000
heap
page read and write
2C6E000
trusted library allocation
page read and write
347D000
heap
page read and write
7FF887B3C000
trusted library allocation
page execute and read and write
CD0000
trusted library allocation
page read and write
2EBA000
trusted library allocation
page read and write
37D3000
trusted library allocation
page read and write
18E751A0000
heap
page read and write
There are 2160 hidden memdumps, click here to show them.