IOC Report
yQrCGtNgsf.exe

loading gif

Files

File Path
Type
Category
Malicious
yQrCGtNgsf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Adobe\Acrobat DC\JPOyDhPFIytu.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Uninstall Information\JPOyDhPFIytu.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\JPOyDhPFIytu.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\yQrCGtNgsf.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\6C8kMSA4ag.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\77a9gOcAJB.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\9VsmEYMPZS.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\9eKXf9oU9J.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\F0qtrCuOKA.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\mpHYiEZ4vY.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\mzBmoeLRKc.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\riciCmDgnt.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tOMWzubzd4.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\uw07fWAZe6.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\BDesMBdT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\FTTrxXjd.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GJcAmyRG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HPxsKDSZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\IjLZavdG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KRjbfmWU.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KZthgyKJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LCrhcYww.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\MAAYLQkP.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NkPigQpK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OzAXPueG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RdNoqiHi.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RfcHRSFf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\SKvXgoIi.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\TADrPPcC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\TLlpvaAw.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\TzzXjEkC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UkLxLBCd.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VjLFuzVH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VnZQnlzb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WTjyQsvs.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\apDEhkEl.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cyaNQADQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\dUDNIbMu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\eReVdbbp.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\eWtfXNEJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\edjwtIzh.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fXYUxCDX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gcAWdtGq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lmQBfErr.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\mvOMxtrw.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nzBVHGUq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\oxAuScwr.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\pGrkhfIF.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\pLpTuJYH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\vlAbNuev.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\waJkCVMY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\yuIieleo.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zdFkvbcm.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zuWaRqDn.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\JPOyDhPFIytu.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft.NET\RedistList\599871f56ea49f
ASCII text, with very long lines (855), with no line terminators
dropped
C:\Program Files\Adobe\Acrobat DC\599871f56ea49f
ASCII text, with very long lines (348), with no line terminators
dropped
C:\Program Files\Adobe\Acrobat DC\JPOyDhPFIytu.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Uninstall Information\599871f56ea49f
ASCII text, with very long lines (466), with no line terminators
dropped
C:\Program Files\Uninstall Information\JPOyDhPFIytu.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\599871f56ea49f
ASCII text, with no line terminators
dropped
C:\Recovery\JPOyDhPFIytu.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\JPOyDhPFIytu.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\5mIZs8oYbs
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\DXbWJZalmv
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\EU3LD70Oqh
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\GYwT7aWjpb
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\KMybJi9dhQ
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\VKALHPRRoG
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\i68H4JRRfw
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\kbLEDWdIV6
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\sF1f8KSh6h
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tAlK2upyiu
ASCII text, with no line terminators
dropped
C:\Users\user\Desktop\38d863ed75bbb0
ASCII text, with very long lines (753), with no line terminators
dropped
C:\Windows\BitLockerDiscoveryVolumeContents\599871f56ea49f
ASCII text, with very long lines (349), with no line terminators
dropped
C:\Windows\BitLockerDiscoveryVolumeContents\JPOyDhPFIytu.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text
dropped
There are 70 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\yQrCGtNgsf.exe
"C:\Users\user\Desktop\yQrCGtNgsf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\9eKXf9oU9J.bat"
malicious
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\77a9gOcAJB.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\tOMWzubzd4.bat"
malicious
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\6C8kMSA4ag.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\mzBmoeLRKc.bat"
malicious
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\F0qtrCuOKA.bat"
malicious
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\uw07fWAZe6.bat"
malicious
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\9VsmEYMPZS.bat"
malicious
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\mpHYiEZ4vY.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\riciCmDgnt.bat"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
There are 40 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://115583cm.n9shteam2.top/
unknown
malicious
http://115583cm.n9shteam2.top/vmTo_authDbbaseTesttrackDatalifedownloads.php
37.44.238.250
malicious
http://115583cm.n9shteam2.top
unknown
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
115583cm.n9shteam2.top
37.44.238.250
malicious

IPs

IP
Domain
Country
Malicious
37.44.238.250
115583cm.n9shteam2.top
France
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\cbb3ca45e57c97e576553a11cd955c1ca9eafe4e
f859629861127e33de65a7f53854525a8b72ffb3
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
272000
unkown
page readonly
malicious
128EA000
trusted library allocation
page read and write
malicious
57A067C000
stack
page read and write
2B14F1B4000
heap
page read and write
7FFB4B47A000
trusted library allocation
page read and write
70D3CFF000
stack
page read and write
7FFB4B478000
trusted library allocation
page read and write
7FFB4B47A000
trusted library allocation
page read and write
7FFB4B612000
trusted library allocation
page read and write
7FFB4B4B4000
trusted library allocation
page read and write
3113000
trusted library allocation
page read and write
13302000
trusted library allocation
page read and write
7FFB4B3E0000
trusted library allocation
page execute and read and write
2B14F390000
heap
page read and write
7FFB4B3F0000
trusted library allocation
page execute and read and write
7FFB4B7F8000
trusted library allocation
page read and write
1B83F000
stack
page read and write
21EA9FD0000
heap
page read and write
2B8A000
trusted library allocation
page read and write
3455000
trusted library allocation
page read and write
89D000
heap
page read and write
2672E0B0000
heap
page read and write
7FFB4B3D6000
trusted library allocation
page execute and read and write
D40000
heap
page read and write
7FFB4B78F000
trusted library allocation
page read and write
1B62E000
stack
page read and write
2E39000
trusted library allocation
page read and write
7FFB4B760000
trusted library allocation
page read and write
14C0000
heap
page read and write
1BE8E000
stack
page read and write
7FFB4B5F4000
trusted library allocation
page read and write
DF0000
heap
page read and write
3431000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
10E5000
heap
page read and write
1B88A000
heap
page read and write
FAE82FB000
stack
page read and write
7FFB4B483000
trusted library allocation
page read and write
1BDBE000
stack
page read and write
2F3C000
trusted library allocation
page read and write
2B6E000
stack
page read and write
7FFB4B5D2000
trusted library allocation
page read and write
1AECF000
stack
page read and write
3398000
trusted library allocation
page read and write
7FFB4B800000
trusted library allocation
page execute and read and write
22664350000
heap
page read and write
12EF6000
trusted library allocation
page read and write
7FFB4B2DD000
trusted library allocation
page execute and read and write
13275000
trusted library allocation
page read and write
319B000
trusted library allocation
page read and write
1B6BE000
stack
page read and write
7FFB4B2CD000
trusted library allocation
page execute and read and write
30B6000
trusted library allocation
page read and write
7FFB4B4AA000
trusted library allocation
page read and write
12D10000
trusted library allocation
page read and write
19E3BDF3000
heap
page read and write
7FFB4B2DC000
trusted library allocation
page read and write
7FFB4B490000
trusted library allocation
page read and write
7FFB4B2D8000
trusted library allocation
page read and write
81C000
heap
page read and write
7FFB4B2F0000
trusted library allocation
page read and write
7FFB4B30D000
trusted library allocation
page execute and read and write
1B2A1000
heap
page read and write
20D87B14000
heap
page read and write
125F5000
trusted library allocation
page read and write
7FFB4B500000
trusted library allocation
page read and write
2BBE5BF4000
heap
page read and write
30BB000
trusted library allocation
page read and write
D00000
heap
page read and write
2F2D000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
7FFB4B540000
trusted library allocation
page execute and read and write
1AFE0000
unkown
page readonly
1321B000
trusted library allocation
page read and write
E50000
heap
page read and write
1BB0E000
heap
page read and write
7FFB4B4BC000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
2AD3000
trusted library allocation
page read and write
2D16000
trusted library allocation
page read and write
7FFB4B386000
trusted library allocation
page read and write
D822AB000
stack
page read and write
2672DF13000
heap
page read and write
7FFB4B31C000
trusted library allocation
page execute and read and write
7FFB4B530000
trusted library allocation
page execute and read and write
19E3BF90000
heap
page read and write
7FFB4B540000
trusted library allocation
page read and write
3A0000
heap
page read and write
7FFB4B7D0000
trusted library allocation
page read and write
2672E140000
heap
page read and write
321B000
trusted library allocation
page read and write
E31198E000
stack
page read and write
1CE4B3F0000
heap
page read and write
3022000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
DC0000
heap
page read and write
12881000
trusted library allocation
page read and write
7FFB4B500000
trusted library allocation
page execute and read and write
2647000
trusted library allocation
page read and write
167BEB80000
heap
page read and write
2B14F1B4000
heap
page read and write
7FFB4B2BD000
trusted library allocation
page execute and read and write
1219000
heap
page read and write
2E79000
trusted library allocation
page read and write
1B5AA000
heap
page read and write
2E19000
trusted library allocation
page read and write
2C09000
heap
page read and write
32B5000
trusted library allocation
page read and write
1C3BE000
stack
page read and write
132C0000
trusted library allocation
page read and write
7FFB4B512000
trusted library allocation
page read and write
7FFB4B30C000
trusted library allocation
page read and write
2F4A000
trusted library allocation
page read and write
7FFB4B7A0000
trusted library allocation
page read and write
36E0000
trusted library allocation
page read and write
A00000
heap
page read and write
1AE04000
heap
page read and write
7FFB4B410000
trusted library allocation
page execute and read and write
2450000
heap
page execute and read and write
12E24000
trusted library allocation
page read and write
18DE7959000
heap
page read and write
2F46000
trusted library allocation
page read and write
7FFB4B2ED000
trusted library allocation
page execute and read and write
1BDBB000
stack
page read and write
7FFB4B880000
trusted library allocation
page execute and read and write
1B0FE000
stack
page read and write
2771000
trusted library allocation
page read and write
16E0000
heap
page read and write
31B9000
trusted library allocation
page read and write
DCC000
heap
page read and write
21EA9E20000
heap
page read and write
7FFB4B800000
trusted library allocation
page execute and read and write
3972000
trusted library allocation
page read and write
7FFB4B472000
trusted library allocation
page execute and read and write
12F94000
trusted library allocation
page read and write
26A7B040000
heap
page read and write
12F20000
trusted library allocation
page read and write
279B000
trusted library allocation
page read and write
2787000
trusted library allocation
page read and write
11F0000
heap
page execute and read and write
205B0BE0000
heap
page read and write
7FFB4B740000
trusted library allocation
page read and write
1210000
heap
page read and write
7FFB4B30C000
trusted library allocation
page read and write
31CB000
trusted library allocation
page read and write
12FC0000
trusted library allocation
page read and write
3179000
trusted library allocation
page read and write
1B91E000
stack
page read and write
3388000
trusted library allocation
page read and write
24E0000
heap
page execute and read and write
16839123000
heap
page read and write
21EA9D2A000
heap
page read and write
7FFB4B7A0000
trusted library allocation
page read and write
78A000
heap
page read and write
26EE000
stack
page read and write
1F8B4200000
heap
page read and write
1BB3B000
heap
page read and write
8AA000
heap
page read and write
7FFB4B4BC000
trusted library allocation
page read and write
3433000
trusted library allocation
page read and write
1BA4F000
stack
page read and write
205B0FB5000
heap
page read and write
7FFB4B472000
trusted library allocation
page execute and read and write
2D17000
trusted library allocation
page read and write
1286C000
trusted library allocation
page read and write
278F000
trusted library allocation
page read and write
3169000
trusted library allocation
page read and write
18DE7967000
heap
page read and write
12D4B000
trusted library allocation
page read and write
1BDCE000
stack
page read and write
7FFB4B77E000
trusted library allocation
page read and write
AB0000
heap
page read and write
7FFB4B4AA000
trusted library allocation
page read and write
7FFB4B770000
trusted library allocation
page read and write
1B12E000
stack
page read and write
F43FBBC000
stack
page read and write
7FFB4B524000
trusted library allocation
page read and write
21F3A530000
heap
page read and write
7FFB4B314000
trusted library allocation
page read and write
F1D000
heap
page read and write
27A9000
trusted library allocation
page read and write
1245000
heap
page read and write
D60000
heap
page read and write
22922EF3000
heap
page read and write
18DE7940000
heap
page read and write
9F0000
heap
page read and write
760000
heap
page read and write
2671000
trusted library allocation
page read and write
1BA10000
heap
page read and write
7FFB4B32C000
trusted library allocation
page execute and read and write
7FFB4B530000
trusted library allocation
page execute and read and write
7FFB4B2F3000
trusted library allocation
page execute and read and write
CDE000
stack
page read and write
2A5F000
trusted library allocation
page read and write
2B14F180000
heap
page read and write
2E56000
trusted library allocation
page read and write
7FFB4B442000
trusted library allocation
page execute and read and write
7FFB4B2CD000
trusted library allocation
page execute and read and write
27DB000
trusted library allocation
page read and write
2B14F400000
heap
page read and write
D823AF000
stack
page read and write
12DCB000
trusted library allocation
page read and write
7FFB4B411000
trusted library allocation
page execute and read and write
7FFB4B4F0000
trusted library allocation
page read and write
20D8789F000
heap
page read and write
7FFB4B532000
trusted library allocation
page read and write
2569000
trusted library allocation
page read and write
F17000
heap
page read and write
7FFB4B3F0000
trusted library allocation
page execute and read and write
7FFB4B790000
trusted library allocation
page read and write
1B69D000
heap
page read and write
7FFB4B511000
trusted library allocation
page read and write
12EBF000
trusted library allocation
page read and write
203A9960000
heap
page read and write
7FFB4B4DD000
trusted library allocation
page read and write
1B1FE000
stack
page read and write
37DF000
trusted library allocation
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page read and write
1B437000
heap
page read and write
12C0000
heap
page read and write
1C4BE000
stack
page read and write
12C74000
trusted library allocation
page read and write
7FFB4B366000
trusted library allocation
page read and write
7FFB4B31B000
trusted library allocation
page execute and read and write
2A84000
trusted library allocation
page read and write
2F10000
heap
page read and write
853000
heap
page read and write
1305000
heap
page read and write
203A99F9000
heap
page read and write
3132000
trusted library allocation
page read and write
7FFB4B7E0000
trusted library allocation
page execute and read and write
3413000
trusted library allocation
page read and write
7FFB4B3B6000
trusted library allocation
page execute and read and write
3248000
trusted library allocation
page read and write
7FFB4B510000
trusted library allocation
page read and write
14C5000
heap
page read and write
26F9000
trusted library allocation
page read and write
2672E2A0000
heap
page read and write
7FFB4B4E7000
trusted library allocation
page read and write
5C0000
heap
page read and write
167BEC07000
heap
page read and write
7FFB4B4B7000
trusted library allocation
page read and write
13F5000
heap
page read and write
D9A000
heap
page read and write
20F2B458000
heap
page read and write
1B613000
heap
page execute and read and write
1B870000
heap
page read and write
F50000
heap
page read and write
7FFB4B4E2000
trusted library allocation
page read and write
1BFC0000
heap
page read and write
33AE000
trusted library allocation
page read and write
1EB66480000
heap
page read and write
2CF1000
trusted library allocation
page read and write
12F07000
trusted library allocation
page read and write
7FFB4B7BF000
trusted library allocation
page read and write
2430000
heap
page execute and read and write
1B43F000
stack
page read and write
1C08E000
stack
page read and write
274E000
trusted library allocation
page read and write
7FFB4B7B0000
trusted library allocation
page read and write
1A8BB000
heap
page read and write
12CF7000
trusted library allocation
page read and write
1BB3E000
stack
page read and write
278B000
trusted library allocation
page read and write
31DC000
trusted library allocation
page read and write
7FFB4B31C000
trusted library allocation
page execute and read and write
3049000
trusted library allocation
page read and write
7FFB4B7C8000
trusted library allocation
page read and write
7FFB4B557000
trusted library allocation
page read and write
1B22F000
stack
page read and write
1275D480000
heap
page read and write
7FFB4B550000
trusted library allocation
page execute and read and write
FC5000
heap
page read and write
11A5000
heap
page read and write
2F85000
trusted library allocation
page read and write
12DD4000
trusted library allocation
page read and write
12E2F000
trusted library allocation
page read and write
22922EF3000
heap
page read and write
7FFB4B4B0000
trusted library allocation
page execute and read and write
7FFB4B527000
trusted library allocation
page read and write
25C8000
trusted library allocation
page read and write
2FBB000
trusted library allocation
page read and write
1BB80000
heap
page read and write
2C99000
trusted library allocation
page read and write
89B000
heap
page read and write
7FFB4B4A0000
trusted library allocation
page execute and read and write
132EC000
trusted library allocation
page read and write
7FFB4B500000
trusted library allocation
page execute and read and write
12C5000
heap
page read and write
7FFB4B3A6000
trusted library allocation
page read and write
1EC054D0000
heap
page read and write
3415000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
12874000
trusted library allocation
page read and write
7FFB4B2C3000
trusted library allocation
page execute and read and write
7FFB4B510000
trusted library allocation
page read and write
167BEBE0000
heap
page read and write
21EA9D61000
heap
page read and write
21EA9D20000
heap
page read and write
12D90000
trusted library allocation
page read and write
2D2C000
trusted library allocation
page read and write
3A632FF000
stack
page read and write
2B14F1B4000
heap
page read and write
1C190000
heap
page read and write
36CA000
trusted library allocation
page read and write
7FFB4B3A0000
trusted library allocation
page read and write
1EB664D0000
heap
page read and write
7FFB4B760000
trusted library allocation
page read and write
168390F0000
heap
page read and write
266A000
trusted library allocation
page read and write
2376B660000
heap
page read and write
20F2B457000
heap
page read and write
7FFB4B478000
trusted library allocation
page read and write
19E3BDCA000
heap
page read and write
1EC0524F000
heap
page read and write
2672E144000
heap
page read and write
7FFB4B410000
trusted library allocation
page execute and read and write
3729000
trusted library allocation
page read and write
19E3BDF3000
heap
page read and write
1B20A000
stack
page read and write
7FFB4B4FE000
trusted library allocation
page read and write
317B000
trusted library allocation
page read and write
2DB0000
heap
page execute and read and write
7FFB4B540000
trusted library allocation
page read and write
7FFB4B2FD000
trusted library allocation
page execute and read and write
1313B000
trusted library allocation
page read and write
A380BFF000
unkown
page read and write
11EE000
stack
page read and write
7FFB4B4FB000
trusted library allocation
page read and write
7FFB4B758000
trusted library allocation
page read and write
2CD4000
trusted library allocation
page read and write
7FFB4B4A0000
trusted library allocation
page read and write
7FFB4B777000
trusted library allocation
page read and write
FF0000
heap
page read and write
16839123000
heap
page read and write
2AF0000
heap
page read and write
12EEE000
trusted library allocation
page read and write
2DEA000
trusted library allocation
page read and write
7FFB4B2D0000
trusted library allocation
page read and write
2BBE5BE3000
heap
page read and write
1B4E0000
heap
page read and write
2E1B000
trusted library allocation
page read and write
11B0000
heap
page read and write
7FFB4B524000
trusted library allocation
page read and write
2AD2000
trusted library allocation
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
2FF8000
trusted library allocation
page read and write
13D0000
heap
page read and write
1B686000
heap
page read and write
2E68000
trusted library allocation
page read and write
1B933000
heap
page execute and read and write
2756000
trusted library allocation
page read and write
1CA5B000
stack
page read and write
1B7BE000
stack
page read and write
3A948FF000
stack
page read and write
2B41000
trusted library allocation
page read and write
12C96000
trusted library allocation
page read and write
7FFB4B541000
trusted library allocation
page read and write
7FFB4B7D0000
trusted library allocation
page execute and read and write
168391F0000
heap
page read and write
1C210000
heap
page read and write
2FB8000
trusted library allocation
page read and write
1B56F000
stack
page read and write
7FFB4B750000
trusted library allocation
page read and write
12625000
trusted library allocation
page read and write
7FFB4B4A0000
trusted library allocation
page execute and read and write
2799000
trusted library allocation
page read and write
2F44000
trusted library allocation
page read and write
205B0FB0000
heap
page read and write
2B14F1B4000
heap
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
276ADE90000
heap
page read and write
12E63000
trusted library allocation
page read and write
2AB8000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
282A000
trusted library allocation
page read and write
22922EC0000
heap
page read and write
7FFB4B31C000
trusted library allocation
page execute and read and write
7FFB4B441000
trusted library allocation
page execute and read and write
1100000
heap
page read and write
7FFB4B411000
trusted library allocation
page execute and read and write
20D878A2000
heap
page read and write
7FFB4B500000
trusted library allocation
page read and write
324D000
trusted library allocation
page read and write
26A7B355000
heap
page read and write
2EA6000
trusted library allocation
page read and write
7FFB4B30D000
trusted library allocation
page execute and read and write
2FA2000
trusted library allocation
page read and write
7FFB4B870000
trusted library allocation
page read and write
2E00000
heap
page execute and read and write
1759000
heap
page read and write
2BAE000
stack
page read and write
21EA9D61000
heap
page read and write
7FFB4B7B4000
trusted library allocation
page read and write
1EC05440000
heap
page read and write
244AF5A7000
heap
page read and write
7FFB4B5D4000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
7FFB4B2FD000
trusted library allocation
page execute and read and write
20F2B3A0000
heap
page read and write
20D87BA0000
heap
page read and write
1EB664D7000
heap
page read and write
12754000
trusted library allocation
page read and write
B70000
heap
page read and write
1110000
heap
page read and write
133CB000
trusted library allocation
page read and write
1C85E000
stack
page read and write
7FFB4B789000
trusted library allocation
page read and write
2B6000
unkown
page readonly
F43FE7F000
stack
page read and write
2E50000
trusted library allocation
page read and write
13196000
trusted library allocation
page read and write
20D8789E000
heap
page read and write
2EFB000
trusted library allocation
page read and write
7FFB4B891000
trusted library allocation
page read and write
7FFB4B543000
trusted library allocation
page read and write
127D6000
trusted library allocation
page read and write
1B688000
heap
page read and write
7FFB4B797000
trusted library allocation
page read and write
7FFB4B488000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
12EA4000
trusted library allocation
page read and write
E40000
heap
page read and write
728000
heap
page read and write
9FCA7FF000
stack
page read and write
7FFB4B768000
trusted library allocation
page read and write
7FFB4B4C4000
trusted library allocation
page read and write
1236000
heap
page read and write
E00000
unkown
page readonly
28C8000
trusted library allocation
page read and write
2742000
trusted library allocation
page read and write
2D65000
trusted library allocation
page read and write
7FFB4B4F0000
trusted library allocation
page read and write
7FFB4B2F4000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
7FFB4B4F0000
trusted library allocation
page read and write
7FFB4B54E000
trusted library allocation
page read and write
1B6BA000
heap
page read and write
31BF000
trusted library allocation
page read and write
7FFB4B751000
trusted library allocation
page read and write
7FFB4B880000
trusted library allocation
page execute and read and write
1AF87000
heap
page read and write
1B61A000
heap
page read and write
2BBE5BDF000
heap
page read and write
E6D000
heap
page read and write
2672DEEA000
heap
page read and write
1B426000
heap
page read and write
270000
unkown
page readonly
7FFB4B520000
trusted library allocation
page read and write
885000
heap
page read and write
FAE84FF000
stack
page read and write
7FFB4B2F0000
trusted library allocation
page read and write
7FFB4B524000
trusted library allocation
page read and write
7FFB4B5E4000
trusted library allocation
page read and write
3715000
trusted library allocation
page read and write
2F26000
trusted library allocation
page read and write
2DB3000
heap
page execute and read and write
1282B000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
F55000
heap
page read and write
7FFB4B390000
trusted library allocation
page execute and read and write
D20000
heap
page read and write
1145000
heap
page read and write
D2F61FF000
stack
page read and write
7FFB4B7D0000
trusted library allocation
page read and write
21EA9F50000
heap
page read and write
12A51000
trusted library allocation
page read and write
276ADFA0000
heap
page read and write
7FFB4B7C0000
trusted library allocation
page read and write
FFAAE7E000
stack
page read and write
12CC6000
trusted library allocation
page read and write
7FFB4B51D000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
7FFB4B49D000
trusted library allocation
page read and write
E46000
heap
page read and write
35DA000
trusted library allocation
page read and write
2E07000
trusted library allocation
page read and write
7FFB4B478000
trusted library allocation
page read and write
7FFB4B480000
trusted library allocation
page read and write
7FFB4B4FB000
trusted library allocation
page read and write
70D3BFF000
unkown
page read and write
7FFB4B77E000
trusted library allocation
page read and write
7FFB4B4F4000
trusted library allocation
page read and write
11D9000
heap
page read and write
127E8000
trusted library allocation
page read and write
1BECE000
stack
page read and write
19E3BDEE000
heap
page read and write
264D000
trusted library allocation
page read and write
7FFB4B7BF000
trusted library allocation
page read and write
12EEC000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
1B635000
heap
page read and write
7FFB4B7AC000
trusted library allocation
page read and write
8D4327B000
stack
page read and write
BA3F8FF000
stack
page read and write
1275D380000
heap
page read and write
3187000
trusted library allocation
page read and write
1BD5E000
stack
page read and write
28EF000
trusted library allocation
page read and write
7FFB4B2C6000
trusted library allocation
page read and write
7FFB4B770000
trusted library allocation
page read and write
3185000
trusted library allocation
page read and write
7FFB4B787000
trusted library allocation
page read and write
338A000
trusted library allocation
page read and write
109D000
heap
page read and write
2EC1000
trusted library allocation
page read and write
2797000
trusted library allocation
page read and write
1C5AF000
stack
page read and write
7FFB4B7C8000
trusted library allocation
page read and write
7FFB4B570000
trusted library allocation
page execute and read and write
7FFB4B4BD000
trusted library allocation
page read and write
224EAFF000
stack
page read and write
F49000
heap
page read and write
7FFB4B2CC000
trusted library allocation
page read and write
22922ECA000
heap
page read and write
21F3A570000
heap
page read and write
A40000
heap
page read and write
7FFB4B790000
trusted library allocation
page read and write
7FFB4B510000
trusted library allocation
page read and write
253F000
trusted library allocation
page read and write
7FFB4B510000
trusted library allocation
page execute and read and write
7FFB4B488000
trusted library allocation
page read and write
DB0000
heap
page read and write
32EA000
trusted library allocation
page read and write
7FFB4B2B4000
trusted library allocation
page read and write
36E000
stack
page read and write
1EC05275000
heap
page read and write
7FFB4B543000
trusted library allocation
page read and write
7FFB4B50D000
trusted library allocation
page read and write
25117420000
heap
page read and write
26A7B148000
heap
page read and write
1277B000
trusted library allocation
page read and write
7FFB4B34C000
trusted library allocation
page execute and read and write
1C48B000
stack
page read and write
2B14F1B4000
heap
page read and write
7FFB4B2F3000
trusted library allocation
page execute and read and write
12686000
trusted library allocation
page read and write
24E3000
heap
page execute and read and write
E31188C000
stack
page read and write
7FFB4B7D0000
trusted library allocation
page read and write
12657000
trusted library allocation
page read and write
7FFB4B550000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
7FFB4B77C000
trusted library allocation
page read and write
12D08000
trusted library allocation
page read and write
1100000
heap
page read and write
7FFB4B7B0000
trusted library allocation
page read and write
709000
heap
page read and write
22922FE0000
heap
page read and write
1BE9D000
stack
page read and write
7FFB4B2DD000
trusted library allocation
page execute and read and write
25117247000
heap
page read and write
12B15000
trusted library allocation
page read and write
FFAABDE000
stack
page read and write
7FFB4B3A6000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
E31190E000
stack
page read and write
1EC05420000
heap
page read and write
2AED000
trusted library allocation
page read and write
810000
heap
page read and write
7FFB4B7A4000
trusted library allocation
page read and write
1314C000
trusted library allocation
page read and write
11A0000
heap
page read and write
3389000
trusted library allocation
page read and write
1B59D000
heap
page read and write
35BC000
trusted library allocation
page read and write
21EA9D61000
heap
page read and write
7FFB4B3A6000
trusted library allocation
page execute and read and write
12C53000
trusted library allocation
page read and write
2F3E000
trusted library allocation
page read and write
7FFB4B4C0000
trusted library allocation
page read and write
1BB5F000
stack
page read and write
21F3A607000
heap
page read and write
1266C000
trusted library allocation
page read and write
7FFB4B787000
trusted library allocation
page read and write
338F000
trusted library allocation
page read and write
3005000
trusted library allocation
page read and write
2E0F000
trusted library allocation
page read and write
1C43B000
stack
page read and write
7FFB4B530000
trusted library allocation
page execute and read and write
127CF000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page read and write
7FFB4B614000
trusted library allocation
page read and write
7FFB4B797000
trusted library allocation
page read and write
3481000
trusted library allocation
page read and write
12BFF000
trusted library allocation
page read and write
125C6000
trusted library allocation
page read and write
FFAAB5B000
stack
page read and write
3177000
trusted library allocation
page read and write
21EA9D51000
heap
page read and write
1B6C7000
heap
page read and write
2EF9000
trusted library allocation
page read and write
5DB52CC000
stack
page read and write
7FFB4B3D0000
trusted library allocation
page execute and read and write
1B0DB000
stack
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
7FFB4B7E0000
trusted library allocation
page read and write
7FFB4B4D0000
trusted library allocation
page execute and read and write
7FFB4B2E4000
trusted library allocation
page read and write
D50000
heap
page read and write
1B014000
unkown
page readonly
7FFB4B850000
trusted library allocation
page execute and read and write
126DC000
trusted library allocation
page read and write
7FFB4B760000
trusted library allocation
page read and write
7FFB4B4DD000
trusted library allocation
page read and write
7FFB4B7B9000
trusted library allocation
page read and write
22922F03000
heap
page read and write
2E0B000
trusted library allocation
page read and write
880000
heap
page read and write
7FFB4B4F4000
trusted library allocation
page read and write
12C01000
trusted library allocation
page read and write
1300000
heap
page read and write
7FFB4B7D0000
trusted library allocation
page execute and read and write
BC0000
heap
page read and write
1F8B4180000
heap
page read and write
1F8B4160000
heap
page read and write
2CE6000
trusted library allocation
page read and write
7FFB4B761000
trusted library allocation
page read and write
1C440000
heap
page read and write
7FFB4B7EB000
trusted library allocation
page read and write
7FFB4B2F6000
trusted library allocation
page read and write
278D000
trusted library allocation
page read and write
1B550000
heap
page read and write
E98000
heap
page read and write
1130000
heap
page read and write
7FFB4B2E4000
trusted library allocation
page read and write
1546000
heap
page read and write
12DA6000
trusted library allocation
page read and write
20D878A2000
heap
page read and write
7FFB4B512000
trusted library allocation
page read and write
7FFB4B7A0000
trusted library allocation
page read and write
7FFB4B4D0000
trusted library allocation
page read and write
7FFB4B476000
trusted library allocation
page read and write
3037000
trusted library allocation
page read and write
13046000
trusted library allocation
page read and write
2664000
trusted library allocation
page read and write
1C21F000
heap
page read and write
7FFB4B540000
trusted library allocation
page execute and read and write
1328E000
trusted library allocation
page read and write
1CE4B470000
heap
page read and write
317F000
trusted library allocation
page read and write
203A9A07000
heap
page read and write
3429000
trusted library allocation
page read and write
317C000
trusted library allocation
page read and write
31B1000
trusted library allocation
page read and write
18CE000
stack
page read and write
21EA9D64000
heap
page read and write
1F8B420A000
heap
page read and write
7FFB4B790000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
7FFB4B3AC000
trusted library allocation
page execute and read and write
7FFB4B4B0000
trusted library allocation
page read and write
7FFB4B470000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
7FFB4B3B0000
trusted library allocation
page execute and read and write
7FFB4B4B3000
trusted library allocation
page read and write
19E3BD80000
heap
page read and write
311E000
trusted library allocation
page read and write
1EC05560000
heap
page read and write
7FFB4B7E0000
trusted library allocation
page execute and read and write
E5D6A8C000
stack
page read and write
269A000
trusted library allocation
page read and write
7FFB4B530000
trusted library allocation
page read and write
13072000
trusted library allocation
page read and write
203A9970000
heap
page read and write
7FFB4B512000
trusted library allocation
page read and write
7FFB4B3D6000
trusted library allocation
page execute and read and write
151A000
heap
page read and write
1AE20000
heap
page read and write
F1C000
heap
page read and write
303D000
trusted library allocation
page read and write
2C09000
trusted library allocation
page read and write
7FFB4B4D7000
trusted library allocation
page read and write
1CE4B410000
heap
page read and write
1B673000
heap
page read and write
12B2E000
trusted library allocation
page read and write
1EB66675000
heap
page read and write
1070000
heap
page read and write
7FFB4B7F6000
trusted library allocation
page read and write
5D0000
heap
page read and write
2E6E000
stack
page read and write
F39D2DC000
stack
page read and write
7FFB4B780000
trusted library allocation
page read and write
2D97000
trusted library allocation
page read and write
7FFB4B520000
trusted library allocation
page read and write
2EAD000
trusted library allocation
page read and write
7FFB4B488000
trusted library allocation
page read and write
7FFB4B772000
trusted library allocation
page read and write
1430000
heap
page execute and read and write
25CD000
trusted library allocation
page read and write
7FFB4B760000
trusted library allocation
page read and write
242E000
stack
page read and write
7FFB4B520000
trusted library allocation
page read and write
79F000
heap
page read and write
12FFE000
trusted library allocation
page read and write
1275D680000
heap
page read and write
2DCE000
trusted library allocation
page read and write
1285B000
trusted library allocation
page read and write
7FFB4B530000
trusted library allocation
page execute and read and write
73B000
heap
page read and write
12C6B000
trusted library allocation
page read and write
E45000
heap
page read and write
7FFB4B2ED000
trusted library allocation
page execute and read and write
1B740000
heap
page read and write
2FBD000
trusted library allocation
page read and write
7FFB4B2CD000
trusted library allocation
page execute and read and write
D60000
trusted library allocation
page read and write
F05000
heap
page read and write
2969000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
7FFB4B303000
trusted library allocation
page read and write
2C12000
heap
page read and write
1B535000
heap
page read and write
1B17F000
stack
page read and write
35B4000
trusted library allocation
page read and write
1BD0B000
stack
page read and write
10DE000
stack
page read and write
12E11000
trusted library allocation
page read and write
12C4A000
trusted library allocation
page read and write
7FFB4B3B6000
trusted library allocation
page execute and read and write
7FFB4B4BC000
trusted library allocation
page read and write
12FBC000
trusted library allocation
page read and write
2DC2000
trusted library allocation
page read and write
26A7B350000
heap
page read and write
18DE7950000
heap
page read and write
800000
heap
page read and write
61BE2FF000
stack
page read and write
7FFB4B790000
trusted library allocation
page read and write
7FFB4B4ED000
trusted library allocation
page read and write
1B1E0000
trusted library allocation
page read and write
1B070000
heap
page read and write
E30000
unkown
page readonly
12D77000
trusted library allocation
page read and write
276ADFD0000
heap
page read and write
7FFB4B4A6000
trusted library allocation
page read and write
7FFB4B46C000
trusted library allocation
page read and write
1B32E000
stack
page read and write
276ADF75000
heap
page read and write
2BBE5B00000
heap
page read and write
25CB000
trusted library allocation
page read and write
2BBE5BE5000
heap
page read and write
13246000
trusted library allocation
page read and write
2BF0000
heap
page execute and read and write
7FFB4B870000
trusted library allocation
page read and write
7FFB4B492000
trusted library allocation
page read and write
12CD6000
trusted library allocation
page read and write
3454000
trusted library allocation
page read and write
3082000
trusted library allocation
page read and write
30FF000
trusted library allocation
page read and write
167BEBA0000
heap
page read and write
7FFB4B310000
trusted library allocation
page read and write
2D2E000
trusted library allocation
page read and write
7FFB4B48C000
trusted library allocation
page read and write
3D0000
heap
page read and write
12E76000
trusted library allocation
page read and write
1BAC0000
heap
page read and write
1CE4B310000
heap
page read and write
3199000
trusted library allocation
page read and write
7FFB4B557000
trusted library allocation
page read and write
7FFB4B4DD000
trusted library allocation
page read and write
1220000
heap
page read and write
12E1B000
trusted library allocation
page read and write
224E9FF000
unkown
page read and write
130CB000
trusted library allocation
page read and write
2D3A000
trusted library allocation
page read and write
7FFB4B30C000
trusted library allocation
page read and write
133AA000
trusted library allocation
page read and write
2A9A000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
7FFB4B52B000
trusted library allocation
page read and write
2A95000
trusted library allocation
page read and write
7FFB4B3A6000
trusted library allocation
page execute and read and write
5DB53CE000
stack
page read and write
22664357000
heap
page read and write
1B676000
heap
page read and write
2EAB000
trusted library allocation
page read and write
276ADFDA000
heap
page read and write
7FFB4B774000
trusted library allocation
page read and write
2BBE5DF0000
heap
page read and write
78C000
heap
page read and write
1B47F000
stack
page read and write
1B618000
heap
page read and write
2A59000
trusted library allocation
page read and write
3146000
trusted library allocation
page read and write
203A9D20000
heap
page read and write
2E26000
trusted library allocation
page read and write
1BA8E000
stack
page read and write
12EC4000
trusted library allocation
page read and write
7FFB4B74C000
trusted library allocation
page read and write
3A6337F000
stack
page read and write
2CC7000
trusted library allocation
page read and write
25117340000
heap
page read and write
2539000
trusted library allocation
page read and write
2CC9000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
1B6BC000
heap
page read and write
1311A000
trusted library allocation
page read and write
8D432FF000
stack
page read and write
7FFB4B7DA000
trusted library allocation
page read and write
1B780000
heap
page read and write
2B70000
heap
page read and write
7FFB4B780000
trusted library allocation
page read and write
7FFB4B4C4000
trusted library allocation
page read and write
3D0000
heap
page read and write
2CCD000
trusted library allocation
page read and write
20F2B440000
heap
page read and write
1B81E000
stack
page read and write
7FFB4B78F000
trusted library allocation
page read and write
370000
heap
page read and write
2E9E000
trusted library allocation
page read and write
1310B000
trusted library allocation
page read and write
3D5000
heap
page read and write
12FE5000
trusted library allocation
page read and write
20D8789F000
heap
page read and write
1AFF4000
heap
page read and write
7FFB4B2EC000
trusted library allocation
page read and write
12F4C000
trusted library allocation
page read and write
2BBE5BBB000
heap
page read and write
7FFB4B2FB000
trusted library allocation
page execute and read and write
2D1B000
trusted library allocation
page read and write
D8232F000
stack
page read and write
2672E0D0000
heap
page read and write
7FFB4B782000
trusted library allocation
page read and write
F8D000
heap
page read and write
F60000
trusted library allocation
page read and write
7FFB4B500000
trusted library allocation
page execute and read and write
7FFB4B4D0000
trusted library allocation
page read and write
7FFB4B861000
trusted library allocation
page read and write
7FFB4B3A6000
trusted library allocation
page execute and read and write
A1866FF000
stack
page read and write
7FFB4B4D0000
trusted library allocation
page read and write
7FFB4B7AA000
trusted library allocation
page read and write
2F42000
trusted library allocation
page read and write
1F8B4150000
heap
page read and write
1B5E9000
heap
page read and write
3108000
trusted library allocation
page read and write
1C140000
heap
page read and write
1F8B4190000
heap
page read and write
7FFB4B314000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
1B37E000
stack
page read and write
1BB21000
heap
page read and write
7FFB4B52E000
trusted library allocation
page read and write
2C00000
heap
page read and write
12DBC000
trusted library allocation
page read and write
7FFB4B790000
trusted library allocation
page read and write
7FFB4B7A9000
trusted library allocation
page read and write
26153460000
heap
page read and write
7FFB4B2F0000
trusted library allocation
page read and write
2C70000
heap
page read and write
AFE000
stack
page read and write
205B0C10000
heap
page read and write
7FFB4B787000
trusted library allocation
page read and write
E27000
heap
page read and write
7FFB4B476000
trusted library allocation
page read and write
20F2B3F0000
heap
page read and write
26153467000
heap
page read and write
295E6110000
heap
page read and write
295E6127000
heap
page read and write
2A40000
heap
page execute and read and write
2BA0000
heap
page execute and read and write
83B000
heap
page read and write
7FFB4B48C000
trusted library allocation
page read and write
2379000
heap
page read and write
13034000
trusted library allocation
page read and write
2BB3000
heap
page execute and read and write
1B016000
heap
page read and write
341B000
trusted library allocation
page read and write
7FFB4B505000
trusted library allocation
page read and write
13F0000
heap
page read and write
7FFB4B4D5000
trusted library allocation
page read and write
1AC7A000
stack
page read and write
7FFB4B861000
trusted library allocation
page read and write
7FFB4B850000
trusted library allocation
page execute and read and write
12EB8000
trusted library allocation
page read and write
316C000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
7FFB4B78C000
trusted library allocation
page read and write
2FBF000
trusted library allocation
page read and write
1263E000
trusted library allocation
page read and write
1BEDE000
stack
page read and write
2BC9000
trusted library allocation
page read and write
7FFB4B2C4000
trusted library allocation
page read and write
1274B000
trusted library allocation
page read and write
7FFB4B4B4000
trusted library allocation
page read and write
2793000
trusted library allocation
page read and write
3738000
trusted library allocation
page read and write
10D0000
heap
page read and write
2BBE5BB0000
heap
page read and write
7FFB4B490000
trusted library allocation
page read and write
A1865FF000
unkown
page read and write
7FFB4B2F2000
trusted library allocation
page read and write
7FFB4B532000
trusted library allocation
page read and write
29DE000
stack
page read and write
7FFB4B2D3000
trusted library allocation
page read and write
2615346A000
heap
page read and write
1BF8E000
stack
page read and write
3745000
trusted library allocation
page read and write
305A000
trusted library allocation
page read and write
7FFB4B2D3000
trusted library allocation
page read and write
1B00E000
heap
page read and write
7FFB4B470000
trusted library allocation
page read and write
19E3BDF3000
heap
page read and write
10B0000
heap
page read and write
7FFB4B758000
trusted library allocation
page read and write
13F0000
heap
page read and write
9E0000
heap
page read and write
7FFB4B2DC000
trusted library allocation
page read and write
2CF2000
trusted library allocation
page read and write
1B8DA000
heap
page read and write
354D000
trusted library allocation
page read and write
1305C000
trusted library allocation
page read and write
7FFB4B2CD000
trusted library allocation
page execute and read and write
7FFB4B2B3000
trusted library allocation
page execute and read and write
12D45000
trusted library allocation
page read and write
E10000
heap
page execute and read and write
7FFB4B4D0000
trusted library allocation
page read and write
970000
heap
page read and write
1B5F0000
heap
page read and write
2C0F000
trusted library allocation
page read and write
13017000
trusted library allocation
page read and write
19E3BFA0000
heap
page read and write
301E000
trusted library allocation
page read and write
7FFB4B466000
trusted library allocation
page read and write
1BA80000
heap
page read and write
12627000
trusted library allocation
page read and write
19E3BDC0000
heap
page read and write
7FFB4B7A2000
trusted library allocation
page read and write
7FFB4B54E000
trusted library allocation
page read and write
19E3BC80000
heap
page read and write
132D6000
trusted library allocation
page read and write
D50000
heap
page read and write
7FFB4B7B2000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
22923070000
heap
page read and write
2E29000
trusted library allocation
page read and write
7FFB4B780000
trusted library allocation
page read and write
7FFB4B79F000
trusted library allocation
page read and write
7FFB4B2C3000
trusted library allocation
page execute and read and write
151D000
heap
page read and write
1EC05271000
heap
page read and write
7FFB4B490000
trusted library allocation
page read and write
7FFB4B442000
trusted library allocation
page execute and read and write
EF0000
heap
page read and write
33E9000
trusted library allocation
page read and write
A8E000
stack
page read and write
7FFB4B562000
trusted library allocation
page read and write
B1A85CB000
stack
page read and write
7FFB4B500000
trusted library allocation
page read and write
1C220000
heap
page read and write
1EB66460000
heap
page read and write
7FFB4B4A8000
trusted library allocation
page read and write
1B98E000
stack
page read and write
125DF000
trusted library allocation
page read and write
7FFB4B492000
trusted library allocation
page read and write
7FFB4B2CD000
trusted library allocation
page execute and read and write
BC0000
heap
page read and write
816000
heap
page read and write
26A7B14A000
heap
page read and write
7FFB4B476000
trusted library allocation
page read and write
7FFB4B50D000
trusted library allocation
page read and write
7FFB4B487000
trusted library allocation
page read and write
C167E7F000
stack
page read and write
2CDC000
trusted library allocation
page read and write
7FFB4B7B7000
trusted library allocation
page read and write
7FFB4B510000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
7FFB4B2FD000
trusted library allocation
page execute and read and write
2EA8000
trusted library allocation
page read and write
7FFB4B380000
trusted library allocation
page read and write
2E2B000
trusted library allocation
page read and write
E0D000
heap
page read and write
10E0000
heap
page read and write
2E56000
trusted library allocation
page read and write
2761000
trusted library allocation
page read and write
7FFB4B2D3000
trusted library allocation
page read and write
EAA000
heap
page read and write
7FFB4B2D0000
trusted library allocation
page read and write
EA774FF000
unkown
page read and write
2E7E000
trusted library allocation
page read and write
2672DEE0000
heap
page read and write
E2C000
heap
page read and write
106E000
stack
page read and write
7FFB4B510000
trusted library allocation
page read and write
12B8C000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
134C4000
trusted library allocation
page read and write
A1864FC000
stack
page read and write
3036000
trusted library allocation
page read and write
7FFB4B787000
trusted library allocation
page read and write
7FFB4B4A0000
trusted library allocation
page execute and read and write
13030000
trusted library allocation
page read and write
7FFB4B860000
trusted library allocation
page read and write
1BFD0000
heap
page read and write
12D26000
trusted library allocation
page read and write
7FFB4B4E2000
trusted library allocation
page read and write
1275D510000
heap
page read and write
1B88F000
stack
page read and write
31C9000
trusted library allocation
page read and write
7FFB4B4B3000
trusted library allocation
page read and write
2C32000
trusted library allocation
page read and write
7FFB4B4B8000
trusted library allocation
page read and write
126F1000
trusted library allocation
page read and write
700000
heap
page read and write
12E68000
trusted library allocation
page read and write
1BC9E000
stack
page read and write
2DF4000
trusted library allocation
page read and write
1B4BC000
heap
page read and write
1C62F000
stack
page read and write
1275D684000
heap
page read and write
2376BA60000
heap
page read and write
1B4EB000
heap
page read and write
1AF30000
heap
page read and write
7FFB4B4F0000
trusted library allocation
page execute and read and write
2A51000
trusted library allocation
page read and write
FD0000
heap
page read and write
2F39000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
F1A000
heap
page read and write
1EC05275000
heap
page read and write
317D000
trusted library allocation
page read and write
18DE7C20000
heap
page read and write
2B74000
trusted library allocation
page read and write
6588A7C000
stack
page read and write
2B14F350000
heap
page read and write
3231000
trusted library allocation
page read and write
7FFB4B400000
trusted library allocation
page execute and read and write
7FFB4B7A2000
trusted library allocation
page read and write
340D000
trusted library allocation
page read and write
1B8BE000
heap
page read and write
12C81000
trusted library allocation
page read and write
7FFB4B513000
trusted library allocation
page read and write
7FFB4B4CC000
trusted library allocation
page read and write
21EA9D61000
heap
page read and write
276ADF80000
heap
page read and write
7FFB4B4C4000
trusted library allocation
page read and write
7FFB4B30D000
trusted library allocation
page execute and read and write
7FFB4B7DA000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
32B2000
trusted library allocation
page read and write
7FFB4B7B9000
trusted library allocation
page read and write
20D87B10000
heap
page read and write
7FFB4B861000
trusted library allocation
page read and write
12D60000
trusted library allocation
page read and write
2D02000
trusted library allocation
page read and write
25117440000
heap
page read and write
3192000
trusted library allocation
page read and write
1AFF8000
unkown
page readonly
2CDE000
trusted library allocation
page read and write
31A0000
heap
page execute and read and write
1B86D000
stack
page read and write
1B8CB000
stack
page read and write
2B14F1B3000
heap
page read and write
168390FA000
heap
page read and write
7FFB4B303000
trusted library allocation
page read and write
7FFB4B2D8000
trusted library allocation
page read and write
3465000
trusted library allocation
page read and write
12F0000
heap
page execute and read and write
2B5F000
trusted library allocation
page read and write
1EC05460000
heap
page read and write
7FFB4B620000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
7FFB4B871000
trusted library allocation
page read and write
1B940000
heap
page execute and read and write
7FFB4B442000
trusted library allocation
page execute and read and write
19E3BDF3000
heap
page read and write
7FFB4B2F4000
trusted library allocation
page read and write
3719000
trusted library allocation
page read and write
1CE4B650000
heap
page read and write
344F000
trusted library allocation
page read and write
1EB664DA000
heap
page read and write
F30000
heap
page read and write
2511725A000
heap
page read and write
7FFB4B5F0000
trusted library allocation
page read and write
1AF2E000
stack
page read and write
22923110000
heap
page read and write
2B14F18B000
heap
page read and write
7FFB4B74E000
trusted library allocation
page read and write
1275A000
trusted library allocation
page read and write
2E12000
trusted library allocation
page read and write
33F1000
trusted library allocation
page read and write
9FCA31C000
stack
page read and write
1B943000
heap
page execute and read and write
1CE4B477000
heap
page read and write
5DB534F000
stack
page read and write
7FFB4B2D4000
trusted library allocation
page read and write
261535C5000
heap
page read and write
265E000
trusted library allocation
page read and write
1018000
heap
page read and write
A380AFC000
stack
page read and write
22664620000
heap
page read and write
7FFB4B4D4000
trusted library allocation
page read and write
7FFB4B5E2000
trusted library allocation
page read and write
1EC05274000
heap
page read and write
2C82000
trusted library allocation
page read and write
21F3A600000
heap
page read and write
2795000
trusted library allocation
page read and write
7FFB4B4FE000
trusted library allocation
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
1B5D0000
heap
page read and write
21EA9F20000
heap
page read and write
12656000
trusted library allocation
page read and write
2AA9000
trusted library allocation
page read and write
2EBF000
trusted library allocation
page read and write
7FFB4B7A4000
trusted library allocation
page read and write
2D36000
trusted library allocation
page read and write
7FFB4B4C0000
trusted library allocation
page read and write
E25000
heap
page read and write
32F1000
trusted library allocation
page read and write
7FFB4B2E3000
trusted library allocation
page read and write
7FFB4B891000
trusted library allocation
page read and write
7FFB4B2D3000
trusted library allocation
page execute and read and write
300E000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
1B66D000
stack
page read and write
12F62000
trusted library allocation
page read and write
1C61E000
stack
page read and write
1055000
heap
page read and write
18DE7B40000
heap
page read and write
7FFB4B2DB000
trusted library allocation
page execute and read and write
61BE1FF000
unkown
page read and write
33CE000
trusted library allocation
page read and write
7FFB4B461000
trusted library allocation
page read and write
1AE08000
heap
page read and write
7FFB4B540000
trusted library allocation
page execute and read and write
132A7000
trusted library allocation
page read and write
28B2000
trusted library allocation
page read and write
25B2000
trusted library allocation
page read and write
26153380000
heap
page read and write
2BB9000
trusted library allocation
page read and write
104F000
stack
page read and write
329F000
trusted library allocation
page read and write
18DE7B20000
heap
page read and write
1A720000
trusted library allocation
page read and write
7FFB4B758000
trusted library allocation
page read and write
7FFB4B7DC000
trusted library allocation
page read and write
20D87A80000
heap
page read and write
7FFB4B2D4000
trusted library allocation
page read and write
26F1000
trusted library allocation
page read and write
27AB000
trusted library allocation
page read and write
1302B000
trusted library allocation
page read and write
1BE5D000
stack
page read and write
3379000
trusted library allocation
page read and write
12CAF000
trusted library allocation
page read and write
1B73D000
stack
page read and write
7FFB4B2DD000
trusted library allocation
page execute and read and write
7FFB4B2C4000
trusted library allocation
page read and write
7FFB4B452000
trusted library allocation
page execute and read and write
14E0000
heap
page read and write
2F19000
heap
page read and write
7FFB4B516000
trusted library allocation
page read and write
265C000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
205B0DE0000
heap
page read and write
7FFB4B4E2000
trusted library allocation
page read and write
12670000
trusted library allocation
page read and write
2789000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
1275D460000
heap
page read and write
2E0D000
trusted library allocation
page read and write
11F8000
heap
page read and write
12D2F000
trusted library allocation
page read and write
7FFB4B507000
trusted library allocation
page read and write
32DE000
trusted library allocation
page read and write
7FFB4B787000
trusted library allocation
page read and write
26A7B140000
heap
page read and write
13203000
trusted library allocation
page read and write
2376B760000
heap
page read and write
2320000
heap
page execute and read and write
7FFB4B7B9000
trusted library allocation
page read and write
7FFB4B7B7000
trusted library allocation
page read and write
1269C000
trusted library allocation
page read and write
DD0000
heap
page read and write
7FFB4B4F0000
trusted library allocation
page read and write
2E1F000
trusted library allocation
page read and write
3429000
trusted library allocation
page read and write
1AF50000
trusted library allocation
page read and write
2B30000
heap
page execute and read and write
31C6000
trusted library allocation
page read and write
17C0000
heap
page read and write
304E000
trusted library allocation
page read and write
7FFB4B760000
trusted library allocation
page read and write
70D3AFB000
stack
page read and write
7FFB4B482000
trusted library allocation
page read and write
22923074000
heap
page read and write
2672DF15000
heap
page read and write
10C0000
trusted library allocation
page read and write
1720000
heap
page execute and read and write
7FFB4B376000
trusted library allocation
page read and write
1275D51A000
heap
page read and write
2F2C000
trusted library allocation
page read and write
20D87A60000
heap
page read and write
1BC5E000
stack
page read and write
1A590000
trusted library allocation
page read and write
1288B000
trusted library allocation
page read and write
1B435000
heap
page read and write
1140000
heap
page read and write
2AEE000
stack
page read and write
12EA6000
trusted library allocation
page read and write
133D4000
trusted library allocation
page read and write
1AF89000
heap
page read and write
7FFB4B30C000
trusted library allocation
page execute and read and write
1C51B000
stack
page read and write
7FFB4B520000
trusted library allocation
page read and write
7FFB4B2E8000
trusted library allocation
page read and write
DB9000
heap
page read and write
7FFB4B860000
trusted library allocation
page execute and read and write
1C2BE000
stack
page read and write
57A06FF000
stack
page read and write
56E000
stack
page read and write
11EE000
stack
page read and write
2DDB000
trusted library allocation
page read and write
7FFB4B2FD000
trusted library allocation
page execute and read and write
1EC054D4000
heap
page read and write
13086000
trusted library allocation
page read and write
7FFB4B4ED000
trusted library allocation
page read and write
168392D0000
heap
page read and write
7FFB4B505000
trusted library allocation
page read and write
7FFB4B4B0000
trusted library allocation
page read and write
6DE000
stack
page read and write
3051000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
7FFB4B4D7000
trusted library allocation
page read and write
21EA9D53000
heap
page read and write
9F5000
heap
page read and write
7FFB4B507000
trusted library allocation
page read and write
7FFB4B562000
trusted library allocation
page read and write
7FFB4B386000
trusted library allocation
page read and write
7FFB4B780000
trusted library allocation
page read and write
7FFB4B441000
trusted library allocation
page execute and read and write
1BC4E000
stack
page read and write
12531000
trusted library allocation
page read and write
2FBB000
trusted library allocation
page read and write
1B420000
heap
page read and write
21F3A60A000
heap
page read and write
1AFFE000
stack
page read and write
7FFB4B7D0000
trusted library allocation
page execute and read and write
D0C000
stack
page read and write
12F7B000
trusted library allocation
page read and write
22922EEE000
heap
page read and write
1CB5F000
stack
page read and write
7FFB4B78F000
trusted library allocation
page read and write
7FFB4B490000
trusted library allocation
page execute and read and write
7FFB4B2DD000
trusted library allocation
page execute and read and write
7FFB4B7A2000
trusted library allocation
page read and write
7FFB4B2C2000
trusted library allocation
page read and write
7FFB4B2C4000
trusted library allocation
page read and write
7FFB4B540000
trusted library allocation
page execute and read and write
EE0000
heap
page read and write
20D878A2000
heap
page read and write
7FFB4B800000
trusted library allocation
page execute and read and write
2D1D000
trusted library allocation
page read and write
76C000
heap
page read and write
27D0000
trusted library allocation
page read and write
7FFB4B308000
trusted library allocation
page read and write
26A7AF60000
heap
page read and write
13468000
trusted library allocation
page read and write
1BA9F000
heap
page read and write
7FFB4B75E000
trusted library allocation
page read and write
12AE6000
trusted library allocation
page read and write
7FFB4B3A6000
trusted library allocation
page read and write
7FFB4B4A0000
trusted library allocation
page read and write
1C73B000
stack
page read and write
E5D6B0F000
stack
page read and write
2672DF24000
heap
page read and write
276ADF70000
heap
page read and write
342B000
trusted library allocation
page read and write
7FFB4B2E3000
trusted library allocation
page read and write
7FFB4B530000
trusted library allocation
page read and write
E02000
unkown
page readonly
766000
heap
page read and write
2D98000
trusted library allocation
page read and write
2EA8000
trusted library allocation
page read and write
7FFB4B49C000
trusted library allocation
page read and write
1B770000
heap
page read and write
12F14000
trusted library allocation
page read and write
7FFB4B32C000
trusted library allocation
page execute and read and write
3421000
trusted library allocation
page read and write
7FFB4B49C000
trusted library allocation
page read and write
1B4B0000
heap
page execute and read and write
2B14F160000
heap
page read and write
1300A000
trusted library allocation
page read and write
720000
trusted library allocation
page read and write
2C48000
trusted library allocation
page read and write
1C76E000
heap
page read and write
1B6E4FF000
unkown
page read and write
20F2B449000
heap
page read and write
1C4C0000
heap
page read and write
B1A887F000
stack
page read and write
7FFB4B536000
trusted library allocation
page read and write
6588B7F000
stack
page read and write
10F0000
heap
page read and write
2C9B000
trusted library allocation
page read and write
1BD7E000
stack
page read and write
3008000
trusted library allocation
page read and write
7FFB4B376000
trusted library allocation
page read and write
329E000
trusted library allocation
page read and write
7FFB4B380000
trusted library allocation
page read and write
2785000
trusted library allocation
page read and write
12D64000
trusted library allocation
page read and write
7FFB4B781000
trusted library allocation
page read and write
D4E000
stack
page read and write
D68000
heap
page read and write
329C000
trusted library allocation
page read and write
2C95000
trusted library allocation
page read and write
1B638000
heap
page read and write
7FFB4B7C0000
trusted library allocation
page read and write
126B2000
trusted library allocation
page read and write
3294000
trusted library allocation
page read and write
DE5000
heap
page read and write
31A8000
trusted library allocation
page read and write
7FFB4B2DC000
trusted library allocation
page read and write
2D2C000
trusted library allocation
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
7FFB4B7BB000
trusted library allocation
page read and write
7FFB4B3F0000
trusted library allocation
page execute and read and write
22664366000
heap
page read and write
32E4000
trusted library allocation
page read and write
2DEF000
trusted library allocation
page read and write
7FFB4B4B4000
trusted library allocation
page read and write
131D8000
trusted library allocation
page read and write
1BABB000
heap
page read and write
12ED5000
trusted library allocation
page read and write
1AABA000
stack
page read and write
2FEF000
trusted library allocation
page read and write
7FFB4B51E000
trusted library allocation
page read and write
1C190000
heap
page read and write
7FFB4B461000
trusted library allocation
page read and write
7FFB4B7B0000
trusted library allocation
page read and write
27D6000
trusted library allocation
page read and write
343F000
trusted library allocation
page read and write
7FFB4B38C000
trusted library allocation
page execute and read and write
7FFB4B2B0000
trusted library allocation
page read and write
3357000
trusted library allocation
page read and write
127A6000
trusted library allocation
page read and write
21F3A430000
heap
page read and write
1B76E000
stack
page read and write
33D6000
trusted library allocation
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
7FFB4B774000
trusted library allocation
page read and write
7FFB4B487000
trusted library allocation
page read and write
1750000
heap
page read and write
1BEBE000
stack
page read and write
7FFB4B772000
trusted library allocation
page read and write
1B4B3000
heap
page execute and read and write
7FFB4B4ED000
trusted library allocation
page read and write
7FFB4B308000
trusted library allocation
page read and write
D6AC6FF000
stack
page read and write
E32000
unkown
page readonly
1B6E14B000
stack
page read and write
7FFB4B4B0000
trusted library allocation
page read and write
7FFB4B74E000
trusted library allocation
page read and write
2BBE5D80000
heap
page read and write
3411000
trusted library allocation
page read and write
960000
heap
page read and write
33C2000
trusted library allocation
page read and write
2769000
trusted library allocation
page read and write
F43FEFF000
stack
page read and write
2511724A000
heap
page read and write
2F51000
trusted library allocation
page read and write
1C07D000
stack
page read and write
1325C000
trusted library allocation
page read and write
270F000
trusted library allocation
page read and write
7FFB4B4D5000
trusted library allocation
page read and write
7FFB4B475000
trusted library allocation
page read and write
12CA7000
trusted library allocation
page read and write
7FFB4B3F0000
trusted library allocation
page execute and read and write
7FFB4B460000
trusted library allocation
page read and write
1BB9E000
stack
page read and write
2CDE000
trusted library allocation
page read and write
270000
unkown
page readonly
19E3C010000
heap
page read and write
B4E000
stack
page read and write
2576000
trusted library allocation
page read and write
205B0C17000
heap
page read and write
1AC30000
trusted library allocation
page read and write
7FFB4B789000
trusted library allocation
page read and write
CFE000
stack
page read and write
31C0000
trusted library allocation
page read and write
7FFB4B4F4000
trusted library allocation
page read and write
7FFB4B7E0000
trusted library allocation
page read and write
2B4B000
trusted library allocation
page read and write
10E0000
heap
page read and write
1EC05240000
heap
page read and write
7FFB4B4CC000
trusted library allocation
page read and write
1C220000
heap
page read and write
1C155000
heap
page read and write
7FFB4B74E000
trusted library allocation
page read and write
12D3C000
trusted library allocation
page read and write
1EB66380000
heap
page read and write
1240000
heap
page read and write
1B844000
heap
page read and write
21EA9F60000
heap
page read and write
26A7B060000
heap
page read and write
7FFB4B7A2000
trusted library allocation
page read and write
380000
heap
page read and write
7FFB4B2C2000
trusted library allocation
page read and write
7FFB4B560000
trusted library allocation
page read and write
7FFB4B52E000
trusted library allocation
page read and write
339A000
trusted library allocation
page read and write
7FFB4B7C0000
trusted library allocation
page read and write
8D4337E000
stack
page read and write
3407000
trusted library allocation
page read and write
22923000000
heap
page read and write
12C8E000
trusted library allocation
page read and write
2D8F000
trusted library allocation
page read and write
7FFB4B7D2000
trusted library allocation
page read and write
7FFB4B4C0000
trusted library allocation
page read and write
12DAA000
trusted library allocation
page read and write
1B7F0000
heap
page read and write
7FFB4B51E000
trusted library allocation
page read and write
7FFB4B486000
trusted library allocation
page read and write
16839310000
heap
page read and write
2D1D000
trusted library allocation
page read and write
7FFB4B38C000
trusted library allocation
page execute and read and write
12640000
trusted library allocation
page read and write
1C18D000
stack
page read and write
3295000
trusted library allocation
page read and write
7FFB4B7A4000
trusted library allocation
page read and write
1AF6F000
heap
page read and write
271A000
trusted library allocation
page read and write
1ABE0000
trusted library allocation
page read and write
7FFB4B2E0000
trusted library allocation
page read and write
2B95000
trusted library allocation
page read and write
1280000
heap
page execute and read and write
2E15000
trusted library allocation
page read and write
FAE83FF000
unkown
page read and write
1240000
heap
page read and write
2D41000
trusted library allocation
page read and write
12B47000
trusted library allocation
page read and write
1EC05340000
heap
page read and write
850000
trusted library allocation
page read and write
1B270000
heap
page execute and read and write
1CE4B655000
heap
page read and write
2AC5000
trusted library allocation
page read and write
73D000
heap
page read and write
2666000
trusted library allocation
page read and write
A380CFF000
stack
page read and write
12F21000
trusted library allocation
page read and write
25117500000
heap
page read and write
7FFB4B4D2000
trusted library allocation
page read and write
1B50B000
heap
page read and write
12AA3000
trusted library allocation
page read and write
22922FC0000
heap
page read and write
1BE2E000
stack
page read and write
7FFB4B520000
trusted library allocation
page read and write
885000
heap
page read and write
7FFB4B4C0000
trusted library allocation
page read and write
21EA9D50000
heap
page read and write
6D0000
heap
page read and write
7FFB4B4C0000
trusted library allocation
page read and write
1325F000
trusted library allocation
page read and write
7FFB4B51D000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
1BCD0000
heap
page execute and read and write
7FFB4B4E0000
trusted library allocation
page read and write
7FFB4B4A5000
trusted library allocation
page read and write
7FFB4B4EC000
trusted library allocation
page read and write
7FFB4B4A8000
trusted library allocation
page read and write
7FFB4B2E4000
trusted library allocation
page read and write
20D8787B000
heap
page read and write
7FFB4B4E2000
trusted library allocation
page read and write
2B35000
trusted library allocation
page read and write
12D52000
trusted library allocation
page read and write
167BEC00000
heap
page read and write
2B14F370000
heap
page read and write
7FFB4B774000
trusted library allocation
page read and write
2BBE5B80000
heap
page read and write
272E000
trusted library allocation
page read and write
1DA2B000
heap
page read and write
7FFB4B550000
trusted library allocation
page read and write
2CDC000
trusted library allocation
page read and write
1BC8F000
stack
page read and write
DA0000
heap
page execute and read and write
2B14F404000
heap
page read and write
25117238000
heap
page read and write
7FFB4B78F000
trusted library allocation
page read and write
2531000
trusted library allocation
page read and write
7FFB4B4BD000
trusted library allocation
page read and write
295E5F30000
heap
page read and write
2F27000
trusted library allocation
page read and write
7FFB4B314000
trusted library allocation
page read and write
1AEDB000
heap
page read and write
203A9990000
heap
page read and write
21EA9F00000
heap
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
2549000
trusted library allocation
page read and write
7FFB4B8A0000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page read and write
7FFB4B497000
trusted library allocation
page read and write
22922DE0000
heap
page read and write
B6E000
stack
page read and write
1470000
trusted library allocation
page read and write
7FFB4B482000
trusted library allocation
page read and write
7FFB4B762000
trusted library allocation
page read and write
1BCCE000
stack
page read and write
D6AC67C000
stack
page read and write
7FFB4B390000
trusted library allocation
page execute and read and write
7FFB4B541000
trusted library allocation
page read and write
7FFB4B4D7000
trusted library allocation
page read and write
12DD2000
trusted library allocation
page read and write
2DD6000
trusted library allocation
page read and write
7FFB4B34C000
trusted library allocation
page execute and read and write
7FFB4B2F3000
trusted library allocation
page execute and read and write
7FFB4B4B0000
trusted library allocation
page execute and read and write
7FFB4B4E4000
trusted library allocation
page read and write
1D9B8000
heap
page read and write
2DE8000
trusted library allocation
page read and write
7FFB4B2D3000
trusted library allocation
page execute and read and write
272000
unkown
page readonly
7FFB4B2C3000
trusted library allocation
page read and write
338C000
trusted library allocation
page read and write
ED7000
heap
page read and write
302E000
trusted library allocation
page read and write
21EA9D50000
heap
page read and write
203A9A07000
heap
page read and write
7FFB4B2DC000
trusted library allocation
page read and write
3548000
trusted library allocation
page read and write
7FFB4B7B0000
trusted library allocation
page read and write
12FCF000
trusted library allocation
page read and write
7FFB4B4E4000
trusted library allocation
page read and write
22664170000
heap
page read and write
1AAEB000
stack
page read and write
7FFB4B370000
trusted library allocation
page read and write
1B53E000
stack
page read and write
7FFB4B7A0000
trusted library allocation
page read and write
7FFB4B511000
trusted library allocation
page read and write
2376B7A8000
heap
page read and write
1400000
heap
page read and write
35D2000
trusted library allocation
page read and write
7FFB4B420000
trusted library allocation
page execute and read and write
276ADFD8000
heap
page read and write
127E000
heap
page read and write
1135000
heap
page read and write
7FFB4B3F0000
trusted library allocation
page execute and read and write
7FFB4B500000
trusted library allocation
page read and write
134AB000
trusted library allocation
page read and write
3405000
trusted library allocation
page read and write
7FFB4B7F0000
trusted library allocation
page read and write
22922EF3000
heap
page read and write
1170000
trusted library allocation
page read and write
7FFB4B2D8000
trusted library allocation
page read and write
12818000
trusted library allocation
page read and write
2BBE5BBD000
heap
page read and write
7FFB4B370000
trusted library allocation
page execute and read and write
395C000
trusted library allocation
page read and write
1B4DC000
heap
page read and write
1B18A000
stack
page read and write
C167BEC000
stack
page read and write
12D5E000
trusted library allocation
page read and write
7FFB4B3B0000
trusted library allocation
page execute and read and write
1B5CE000
stack
page read and write
12784000
trusted library allocation
page read and write
7FF4C36D0000
trusted library allocation
page execute and read and write
2E6A000
trusted library allocation
page read and write
7FFB4B790000
trusted library allocation
page read and write
7FFB4B2F4000
trusted library allocation
page read and write
D9E000
stack
page read and write
7FFB4B7C0000
trusted library allocation
page read and write
22664368000
heap
page read and write
3E0000
heap
page read and write
7FFB4B2C3000
trusted library allocation
page execute and read and write
1D9A5000
heap
page read and write
1683911F000
heap
page read and write
31EF000
trusted library allocation
page read and write
1A8E1000
heap
page read and write
108F000
stack
page read and write
10B9000
heap
page read and write
7FFB4B570000
trusted library allocation
page execute and read and write
7FFB4B520000
trusted library allocation
page read and write
1BEA0000
heap
page read and write
13161000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
167BEBE5000
heap
page read and write
7FFB4B490000
trusted library allocation
page read and write
295E6030000
heap
page read and write
318B000
trusted library allocation
page read and write
7FFB4B781000
trusted library allocation
page read and write
12C5F000
trusted library allocation
page read and write
7FFB4B2D8000
trusted library allocation
page read and write
7FFB4B4D0000
trusted library allocation
page execute and read and write
7FFB4B4D0000
trusted library allocation
page read and write
7FFB4B788000
trusted library allocation
page read and write
1420000
heap
page read and write
6588AFF000
stack
page read and write
7FFB4B850000
trusted library allocation
page execute and read and write
1CE4B47A000
heap
page read and write
12CEC000
trusted library allocation
page read and write
102A000
heap
page read and write
7FFB4B2D4000
trusted library allocation
page read and write
1B4CA000
heap
page read and write
12BB1000
trusted library allocation
page read and write
12D02000
trusted library allocation
page read and write
203A99F0000
heap
page read and write
7FFB4B520000
trusted library allocation
page read and write
7FFB4B7A9000
trusted library allocation
page read and write
7CC000
heap
page read and write
D85000
heap
page read and write
7FFB4B37C000
trusted library allocation
page execute and read and write
15CE000
stack
page read and write
7FFB4B5F2000
trusted library allocation
page read and write
7FFB4B7C0000
trusted library allocation
page read and write
20D87980000
heap
page read and write
1B8BE000
stack
page read and write
7FFB4B8A0000
trusted library allocation
page read and write
7FFB4B770000
trusted library allocation
page read and write
7FFB4B789000
trusted library allocation
page read and write
1B62E000
heap
page read and write
205B0C1A000
heap
page read and write
3A9497F000
stack
page read and write
D9C000
heap
page read and write
7FFB4B376000
trusted library allocation
page read and write
1AFD0000
heap
page read and write
127C9000
trusted library allocation
page read and write
1BCBF000
stack
page read and write
21EA9D61000
heap
page read and write
2DF1000
trusted library allocation
page read and write
1AA80000
trusted library allocation
page read and write
310F000
trusted library allocation
page read and write
2EB1000
trusted library allocation
page read and write
12AFF000
trusted library allocation
page read and write
2B14F150000
heap
page read and write
7FFB4B513000
trusted library allocation
page read and write
1AA79000
heap
page read and write
BD0000
heap
page read and write
7FFB4B2B2000
trusted library allocation
page read and write
7FFB4B4C0000
trusted library allocation
page read and write
21EA9FD4000
heap
page read and write
1BF7D000
stack
page read and write
C4E000
stack
page read and write
7FFB4B2C3000
trusted library allocation
page execute and read and write
7FFB4B47A000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
134EC000
trusted library allocation
page read and write
7CA000
heap
page read and write
316E000
stack
page read and write
32C7000
trusted library allocation
page read and write
1EC0524A000
heap
page read and write
7FFB4B4F4000
trusted library allocation
page read and write
57A077F000
stack
page read and write
7FFB4B4D0000
trusted library allocation
page read and write
7FFB4B2D2000
trusted library allocation
page read and write
12583000
trusted library allocation
page read and write
2C89000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
7FFB4B52B000
trusted library allocation
page read and write
2B14F1B0000
heap
page read and write
125F6000
trusted library allocation
page read and write
7FFB4B772000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
12844000
trusted library allocation
page read and write
7FFB4B790000
trusted library allocation
page read and write
1275D610000
heap
page read and write
7FFB4B376000
trusted library allocation
page read and write
7FFB4B7C0000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
7FFB4B614000
trusted library allocation
page read and write
7FFB4B4A6000
trusted library allocation
page read and write
1B73B000
stack
page read and write
B1A88FF000
stack
page read and write
1B28B000
stack
page read and write
7FFB4B490000
trusted library allocation
page read and write
10D5000
heap
page read and write
12F38000
trusted library allocation
page read and write
2E92000
trusted library allocation
page read and write
7FFB4B7C6000
trusted library allocation
page read and write
1D960000
heap
page read and write
7FFB4B2ED000
trusted library allocation
page execute and read and write
12EFB000
trusted library allocation
page read and write
295E6119000
heap
page read and write
12DAF000
trusted library allocation
page read and write
2D34000
trusted library allocation
page read and write
2AEB000
trusted library allocation
page read and write
BD0000
heap
page read and write
7FFB4B510000
trusted library allocation
page read and write
125B3000
trusted library allocation
page read and write
1275D543000
heap
page read and write
19E3BDF2000
heap
page read and write
7FFB4B8A0000
trusted library allocation
page read and write
2FFA000
trusted library allocation
page read and write
7FFB4B7A2000
trusted library allocation
page read and write
7FFB4B534000
trusted library allocation
page read and write
2B2000
unkown
page readonly
7FFB4B5E0000
trusted library allocation
page read and write
3054000
trusted library allocation
page read and write
7FFB4B510000
trusted library allocation
page execute and read and write
2BBE5DF4000
heap
page read and write
2905000
trusted library allocation
page read and write
1260E000
trusted library allocation
page read and write
34A3000
trusted library allocation
page read and write
7FFB4B380000
trusted library allocation
page execute and read and write
20D87AA0000
heap
page read and write
881000
heap
page read and write
12EAB000
trusted library allocation
page read and write
120D000
heap
page read and write
2DE9000
trusted library allocation
page read and write
25117230000
heap
page read and write
120A000
heap
page read and write
3A9487C000
stack
page read and write
12F73000
trusted library allocation
page read and write
11EB000
heap
page read and write
32C8000
trusted library allocation
page read and write
98E000
stack
page read and write
16839490000
heap
page read and write
1C23D000
heap
page read and write
7FFB4B2ED000
trusted library allocation
page execute and read and write
1B13B000
stack
page read and write
7FFB4B3E0000
trusted library allocation
page execute and read and write
33A5000
trusted library allocation
page read and write
7FFB4B851000
trusted library allocation
page read and write
2F2F000
trusted library allocation
page read and write
1B5D8000
heap
page read and write
7FFB4B7DC000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
2E31000
trusted library allocation
page read and write
12B60000
trusted library allocation
page read and write
E5D6B8E000
stack
page read and write
ED9000
heap
page read and write
7FFB4B870000
trusted library allocation
page read and write
1B71E000
stack
page read and write
126E0000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
7FFB4B2DD000
trusted library allocation
page execute and read and write
7FFB4B483000
trusted library allocation
page read and write
7FFB4B3E0000
trusted library allocation
page execute and read and write
324B000
trusted library allocation
page read and write
7FFB4B2F4000
trusted library allocation
page read and write
1BFCD000
stack
page read and write
32E6000
trusted library allocation
page read and write
31EB000
trusted library allocation
page read and write
1B730000
heap
page read and write
2BB0000
heap
page execute and read and write
7FFB4B850000
trusted library allocation
page execute and read and write
1B440000
heap
page read and write
7FFB4B7C0000
trusted library allocation
page execute and read and write
7FFB4B7D2000
trusted library allocation
page read and write
1C760000
heap
page read and write
3161000
trusted library allocation
page read and write
13CE000
stack
page read and write
3447000
trusted library allocation
page read and write
7FFB4B7BB000
trusted library allocation
page read and write
DFC000
heap
page read and write
21F3A575000
heap
page read and write
2C01000
trusted library allocation
page read and write
7FFB4B4C4000
trusted library allocation
page read and write
33AE000
trusted library allocation
page read and write
2B14F1B4000
heap
page read and write
32DC000
trusted library allocation
page read and write
10D0000
heap
page read and write
7FFB4B4F2000
trusted library allocation
page read and write
1BB1C000
heap
page read and write
7FFB4B2FD000
trusted library allocation
page execute and read and write
1275D53F000
heap
page read and write
12B76000
trusted library allocation
page read and write
20F2B390000
heap
page read and write
7FFB4B480000
trusted library allocation
page read and write
FC0000
heap
page read and write
7FFB4B4A0000
trusted library allocation
page execute and read and write
13426000
trusted library allocation
page read and write
7FFB4B3D6000
trusted library allocation
page execute and read and write
7FFB4B4A0000
trusted library allocation
page read and write
7FFB4B31D000
trusted library allocation
page execute and read and write
9FCA6FF000
unkown
page read and write
1B9CE000
stack
page read and write
3232000
trusted library allocation
page read and write
13234000
trusted library allocation
page read and write
7FFB4B540000
trusted library allocation
page read and write
11D0000
heap
page read and write
A45000
heap
page read and write
3041000
trusted library allocation
page read and write
D60000
heap
page read and write
7FFB4B760000
trusted library allocation
page read and write
2F2B000
trusted library allocation
page read and write
2E17000
trusted library allocation
page read and write
12C75000
trusted library allocation
page read and write
2370000
heap
page read and write
7FFB4B777000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
7FFB4B308000
trusted library allocation
page read and write
7FFB4B2C8000
trusted library allocation
page read and write
DFA000
heap
page read and write
768000
heap
page read and write
12E7A000
trusted library allocation
page read and write
13271000
trusted library allocation
page read and write
1C62E000
stack
page read and write
1070000
heap
page read and write
1AEED000
heap
page read and write
2B85000
trusted library allocation
page read and write
27D9000
trusted library allocation
page read and write
7FFB4B870000
trusted library allocation
page read and write
12F01000
trusted library allocation
page read and write
1B698000
heap
page read and write
21EA9D60000
heap
page read and write
1BFBE000
stack
page read and write
1B87E000
stack
page read and write
7FFB4B4F4000
trusted library allocation
page read and write
D55000
heap
page read and write
7FFB4B73C000
trusted library allocation
page read and write
7FFB4B2C4000
trusted library allocation
page read and write
2A69000
trusted library allocation
page read and write
131B1000
trusted library allocation
page read and write
7FFB4B4F0000
trusted library allocation
page read and write
2C19000
trusted library allocation
page read and write
7FFB4B303000
trusted library allocation
page read and write
16DE000
stack
page read and write
7FFB4B450000
trusted library allocation
page read and write
7FFB4B4B0000
trusted library allocation
page read and write
12DFA000
trusted library allocation
page read and write
1BA7E000
stack
page read and write
7FFB4B2DD000
trusted library allocation
page execute and read and write
2DDF000
trusted library allocation
page read and write
DC8000
heap
page read and write
7FFB4B478000
trusted library allocation
page read and write
2DC1000
trusted library allocation
page read and write
BA3F97F000
stack
page read and write
EA775FF000
stack
page read and write
1057000
heap
page read and write
11C0000
heap
page execute and read and write
318B000
trusted library allocation
page read and write
7FFB4B500000
trusted library allocation
page read and write
7FFB4B520000
trusted library allocation
page read and write
850000
heap
page read and write
12EF000
stack
page read and write
1B273000
heap
page execute and read and write
7FFB4B7EB000
trusted library allocation
page read and write
205B0BD0000
heap
page read and write
7FFB4B2E4000
trusted library allocation
page read and write
7FFB4B2FB000
trusted library allocation
page execute and read and write
2376B7A0000
heap
page read and write
7FFB4B527000
trusted library allocation
page read and write
20D87870000
heap
page read and write
3201000
trusted library allocation
page read and write
1AF31000
heap
page read and write
102D000
heap
page read and write
2F66000
trusted library allocation
page read and write
21EA9D61000
heap
page read and write
7FFB4B7BF000
trusted library allocation
page read and write
1C1A3000
heap
page read and write
F30000
trusted library allocation
page read and write
20F2B3C0000
heap
page read and write
7FFB4B4F0000
trusted library allocation
page read and write
B80000
heap
page read and write
26153580000
heap
page read and write
7FFB4B772000
trusted library allocation
page read and write
3398000
trusted library allocation
page read and write
12CC5000
trusted library allocation
page read and write
22664250000
heap
page read and write
12786000
trusted library allocation
page read and write
7FFB4B4CC000
trusted library allocation
page read and write
1C080000
heap
page read and write
7FFB4B7C0000
trusted library allocation
page read and write
167BEC0A000
heap
page read and write
2D18000
trusted library allocation
page read and write
1BE60000
heap
page read and write
1335D000
trusted library allocation
page read and write
3487000
trusted library allocation
page read and write
17C5000
heap
page read and write
7FFB4B7C6000
trusted library allocation
page read and write
1AEDF000
heap
page read and write
21EA9D51000
heap
page read and write
7FFB4B880000
trusted library allocation
page execute and read and write
295E6127000
heap
page read and write
1AFE2000
unkown
page readonly
E30000
heap
page read and write
3159000
trusted library allocation
page read and write
2D9A000
trusted library allocation
page read and write
7FFB4B3A6000
trusted library allocation
page execute and read and write
7FFB4B7F6000
trusted library allocation
page read and write
304C000
trusted library allocation
page read and write
32CD000
trusted library allocation
page read and write
7FFB4B520000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
7FFB4B2D3000
trusted library allocation
page read and write
1C1BF000
stack
page read and write
1BCD3000
heap
page execute and read and write
2EDA000
trusted library allocation
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
7FFB4B751000
trusted library allocation
page read and write
7FFB4B7AC000
trusted library allocation
page read and write
1EB66670000
heap
page read and write
295E6330000
heap
page read and write
1BA3E000
stack
page read and write
7FFB4B500000
trusted library allocation
page execute and read and write
2376BA65000
heap
page read and write
35BE000
trusted library allocation
page read and write
7FFB4B360000
trusted library allocation
page read and write
7FFB4B4ED000
trusted library allocation
page read and write
7FFB4B380000
trusted library allocation
page execute and read and write
1B72E000
stack
page read and write
2376B7AA000
heap
page read and write
13144000
trusted library allocation
page read and write
E70000
heap
page read and write
2C46000
trusted library allocation
page read and write
7FFB4B4D4000
trusted library allocation
page read and write
19E3BD60000
heap
page read and write
9F0000
heap
page read and write
1B610000
heap
page execute and read and write
2672DEB0000
heap
page read and write
7FFB4B770000
trusted library allocation
page read and write
7FFB4B470000
trusted library allocation
page read and write
EA771FB000
stack
page read and write
7FFB4B4B8000
trusted library allocation
page read and write
1F8B4207000
heap
page read and write
7FFB4B2E8000
trusted library allocation
page read and write
320E000
trusted library allocation
page read and write
1B000000
unkown
page readonly
21EA9D60000
heap
page read and write
D2F5D6C000
stack
page read and write
7FFB4B600000
trusted library allocation
page read and write
16839340000
heap
page read and write
2C79000
heap
page read and write
1275D543000
heap
page read and write
1270F000
trusted library allocation
page read and write
310A000
trusted library allocation
page read and write
32D9000
trusted library allocation
page read and write
7FFB4B526000
trusted library allocation
page read and write
7FFB4B4ED000
trusted library allocation
page read and write
12D16000
trusted library allocation
page read and write
7FFB4B2F4000
trusted library allocation
page read and write
1BE7E000
stack
page read and write
7FFB4B5F2000
trusted library allocation
page read and write
295E6010000
heap
page read and write
2CEA000
trusted library allocation
page read and write
7FFB4B4D0000
trusted library allocation
page read and write
ED0000
heap
page read and write
7FFB4B556000
trusted library allocation
page read and write
2529000
heap
page read and write
7FFB4B2EC000
trusted library allocation
page read and write
7FFB4B7E0000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
AF0000
heap
page execute and read and write
446000
unkown
page readonly
7FFB4B784000
trusted library allocation
page read and write
1B633000
heap
page read and write
2EF5000
trusted library allocation
page read and write
14E8000
heap
page read and write
3A6327C000
stack
page read and write
130C8000
trusted library allocation
page read and write
2E92000
trusted library allocation
page read and write
1C51B000
stack
page read and write
7FFB4B570000
trusted library allocation
page execute and read and write
2C9D000
trusted library allocation
page read and write
9B0000
heap
page execute and read and write
336D000
trusted library allocation
page read and write
2520000
heap
page read and write
130D0000
trusted library allocation
page read and write
224E8FC000
stack
page read and write
2323000
heap
page execute and read and write
3132000
trusted library allocation
page read and write
7FFB4B530000
trusted library allocation
page read and write
7FFB4B4F2000
trusted library allocation
page read and write
1BB64000
heap
page read and write
21EA9D65000
heap
page read and write
3532000
trusted library allocation
page read and write
12D5B000
trusted library allocation
page read and write
1B6E5FF000
stack
page read and write
26153560000
heap
page read and write
7FFB4B4D0000
trusted library allocation
page execute and read and write
7FFB4B7B0000
trusted library allocation
page read and write
7FFB4B7D0000
trusted library allocation
page execute and read and write
12F36000
trusted library allocation
page read and write
E79000
heap
page read and write
1F8B4185000
heap
page read and write
2A5000
unkown
page readonly
2561000
trusted library allocation
page read and write
1EC05275000
heap
page read and write
7FFB4B396000
trusted library allocation
page execute and read and write
12DF000
stack
page read and write
7FFB4B4AC000
trusted library allocation
page read and write
1D9F1000
heap
page read and write
B85000
heap
page read and write
7FFB4B891000
trusted library allocation
page read and write
12682000
trusted library allocation
page read and write
3C0000
heap
page read and write
2672DF0F000
heap
page read and write
12BA2000
trusted library allocation
page read and write
3429000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
1050000
heap
page read and write
3417000
trusted library allocation
page read and write
DC7000
heap
page read and write
168392F0000
heap
page read and write
7FFB4B4BC000
trusted library allocation
page read and write
313E000
trusted library allocation
page read and write
7FFB4B2DD000
trusted library allocation
page execute and read and write
7FFB4B4FA000
trusted library allocation
page read and write
EE8000
heap
page read and write
12E9B000
trusted library allocation
page read and write
21EA9D53000
heap
page read and write
7FFB4B531000
trusted library allocation
page read and write
1BB4E000
stack
page read and write
2FDE000
trusted library allocation
page read and write
1480000
heap
page read and write
7FFB4B36C000
trusted library allocation
page execute and read and write
2AE8000
trusted library allocation
page read and write
2615000
trusted library allocation
page read and write
20D878A2000
heap
page read and write
7FFB4B79C000
trusted library allocation
page read and write
1BD9D000
stack
page read and write
7FFB4B880000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
7FFB4B420000
trusted library allocation
page execute and read and write
255E000
stack
page read and write
3375000
trusted library allocation
page read and write
2BA0000
heap
page execute and read and write
21F3A510000
heap
page read and write
2376B740000
heap
page read and write
3151000
trusted library allocation
page read and write
7FFB4B751000
trusted library allocation
page read and write
2E13000
trusted library allocation
page read and write
1C1B0000
heap
page read and write
1B82C000
heap
page read and write
3183000
trusted library allocation
page read and write
2BBE5BE3000
heap
page read and write
7FFB4B2C0000
trusted library allocation
page read and write
7FFB4B4B0000
trusted library allocation
page read and write
2B49000
trusted library allocation
page read and write
7FFB4B4B0000
trusted library allocation
page read and write
261535C0000
heap
page read and write
61BE0FB000
stack
page read and write
1272A000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
22664270000
heap
page read and write
1B630000
heap
page read and write
1C50B000
stack
page read and write
1B002000
unkown
page readonly
7FFB4B788000
trusted library allocation
page read and write
7FFB4B2ED000
trusted library allocation
page execute and read and write
12CDE000
trusted library allocation
page read and write
2718000
trusted library allocation
page read and write
2CC6000
trusted library allocation
page read and write
2EB9000
trusted library allocation
page read and write
B6E000
stack
page read and write
2BBE5B20000
heap
page read and write
CFE000
stack
page read and write
1508000
heap
page read and write
2F29000
trusted library allocation
page read and write
2672DEA0000
heap
page read and write
7FFB4B4C0000
trusted library allocation
page read and write
7FFB4B790000
trusted library allocation
page read and write
1B584000
heap
page read and write
7FFB4B31C000
trusted library allocation
page execute and read and write
7FFB4B490000
trusted library allocation
page read and write
2BBF000
trusted library allocation
page read and write
2E05000
trusted library allocation
page read and write
7FFB4B550000
trusted library allocation
page execute and read and write
D2F60FF000
unkown
page read and write
830000
trusted library allocation
page read and write
7FFB4B840000
trusted library allocation
page execute and read and write
25117249000
heap
page read and write
D6AC77F000
stack
page read and write
12FB6000
trusted library allocation
page read and write
7FFB4B7B7000
trusted library allocation
page read and write
BA3F87C000
stack
page read and write
12561000
trusted library allocation
page read and write
2DEE000
trusted library allocation
page read and write
2DE1000
trusted library allocation
page read and write
7FFB4B861000
trusted library allocation
page read and write
1B930000
heap
page execute and read and write
7FFB4B3E0000
trusted library allocation
page execute and read and write
340F000
trusted library allocation
page read and write
7FFB4B50A000
trusted library allocation
page read and write
7FFB4B526000
trusted library allocation
page read and write
1260F000
trusted library allocation
page read and write
2672DF13000
heap
page read and write
12C03000
trusted library allocation
page read and write
2E29000
trusted library allocation
page read and write
7FFB4B77F000
trusted library allocation
page read and write
7FFB4B799000
trusted library allocation
page read and write
7FFB4B7B0000
trusted library allocation
page read and write
7FFB4B34C000
trusted library allocation
page execute and read and write
10B0000
trusted library allocation
page read and write
3189000
trusted library allocation
page read and write
2A99000
trusted library allocation
page read and write
7FFB4B550000
trusted library allocation
page read and write
19E3BDF3000
heap
page read and write
12CD3000
trusted library allocation
page read and write
7FFB4B7A2000
trusted library allocation
page read and write
2B8F000
stack
page read and write
7FFB4B612000
trusted library allocation
page read and write
7FFB4B3A0000
trusted library allocation
page read and write
7FFB4B477000
trusted library allocation
page read and write
12CC0000
trusted library allocation
page read and write
1EC05275000
heap
page read and write
1BDDE000
stack
page read and write
1B97E000
stack
page read and write
12E1B000
trusted library allocation
page read and write
2A96000
trusted library allocation
page read and write
33C5000
trusted library allocation
page read and write
2BBE5AF0000
heap
page read and write
7FFB4B4F0000
trusted library allocation
page read and write
FF0000
heap
page read and write
3419000
trusted library allocation
page read and write
167BEAA0000
heap
page read and write
7FFB4B410000
trusted library allocation
page execute and read and write
29F0000
heap
page execute and read and write
1275D7C0000
heap
page read and write
1B557000
heap
page read and write
2CE5000
trusted library allocation
page read and write
7FFB4B750000
trusted library allocation
page read and write
12E26000
trusted library allocation
page read and write
2BF6000
trusted library allocation
page read and write
1C55E000
stack
page read and write
13124000
trusted library allocation
page read and write
1B4AB000
stack
page read and write
1229000
heap
page read and write
11EF000
stack
page read and write
7FFB4B7F8000
trusted library allocation
page read and write
3386000
trusted library allocation
page read and write
1B63D000
stack
page read and write
2DAE000
trusted library allocation
page read and write
10E0000
heap
page read and write
7FFB4B2EB000
trusted library allocation
page execute and read and write
7FFB4B500000
trusted library allocation
page read and write
2E19000
trusted library allocation
page read and write
19E3C014000
heap
page read and write
7FFB4B7A0000
trusted library allocation
page read and write
F45000
heap
page read and write
1BEDE000
stack
page read and write
1B66E000
heap
page read and write
12C46000
trusted library allocation
page read and write
7FFB4B520000
trusted library allocation
page read and write
2E7B000
trusted library allocation
page read and write
There are 2117 hidden memdumps, click here to show them.